It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda XDR

Before Installing Barracuda Managed Vulnerability Security

  • Last updated on

Architecture

The following is the architecture diagram for Barracuda Managed Vulnerability Security:

Architecture Diagram.png

Barracuda Managed Vulnerability Security runs on two servers:

  • A server acting as the dedicated security console

  • A server acting as the scan engine

Requirements

  • Barracuda Managed Vulnerability Security is a separate paid subscription and is not included your standard Barracuda Managed XDR subscription.

Before you install Barracuda Manage Vulnerability Security, you should know the following:

  • Host System Requirements

  • Networking Rules

  • NAT Settings

Host System Requirements

The Rapid7 deployment requires two dedicated hosts; one that runs the security console application, and another that run the scan engine application. Windows servers are recommended.

Recommended System Resources - Security Console

Asset Volume

Processor

Memory

Storage

< 5,000

4 cores

16 GB

1 TB

Recommended System Resources - Scan Engine

Asset Volume

Processor

Memory

Storage

< 5,000
2 cores
8 GB
100 GB
Supported Operating Systems

Platform

Versions

Windows

  • Windows Server Desktop experience only. Core is not supported.

    • Microsoft Windows Server 2022

    • Microsoft Windows Server 2019

    • Microsoft Windows Server 2016

  • Microsoft Windows Server 2012 R2

  • Microsoft Windows 8.1

Linux

  • Ubuntu Linux 22.04 LTS (Recommended)

  • Ubuntu Linux 20.04 LTS

  • Ubuntu Linux 18.04 LTS

  • Ubuntu Linux 16.04

  • Oracle Linux 8

  • Oracle Linux 7

  • SUSE Linux Enterprise Server 1

RedHat

  • Red Hat Enterprise Linux Server 8

  • Red Hat Enterprise Linux Server 7

  • Red Hat Enterprise Linux Server 6

CentOS

  • CentOS 7

Networking Rules

Source

Destination

Port

Notes

Security Console

updates.rapid7.com

TCP 443

System updates and license activation

Security Console

support.rapid7.com

TCP 443

Technical Support

Security Console

https://us3.api.endpoint.ingress.rapid7.com:443

TCP 443

Connectivity to Barracuda XDR SOC Management Platform

Security Console

us3.deployment.endpoint.ingress.rapid7.com

TCP 443

Connectivity to Barracuda XDR SOC Management Platform

Security Console

s3.us-west-2.amazonaws.com

TCP 443

Connectivity to Barracuda XDR SOC Management Platform

Security Console

Scan Engine(s)

TCP 40814

Management of scan activity and retrieval of scan data

Scan Engine(s)

Security Console

TCP 40815

Management of scan activity and retrieval of scan data

Scan Engine(s)

Scan Targets

All TCP & UDP Ports

Scan Engines require unimpeded access to any port that may be open (visible) on your scan targets.
You do not have to specifically open all ports, but any port that is already open to the network should be accessible to the scan engine(s), so that the port can be scanned for vulnerabilities.

Security Console

Your internal SMTP relay

TCP 25 or 465

Reporting

NAT Settings

A NAT rule is necessary so the Barracuda XDR SOC can reach the Rapid7 Security Console to manage the vulnerability scanning. The steps for creating a NAT rule vary depending on your organization’s networking infrastructure.

Create a NAT policy to allow traffic from the Barracuda XDR SOC IP addresses (listed below) to the internal IP address of running the Security Console application via a public IP assigned to your organization over port 3780.

  • 3.233.123.93

  • 34.232.30.171

Link to Rapid7 Documentation: https://docs.rapid7.com/insightvm/system-requirements