Advertisement

Fidelis Deception
Appliance
Quick Start Guide
Rev-K (HPE DL360 Gen10) Platform
About Fidelis Cybersecurity
Fidelis Cybersecurity, the industry innovator in Active XDR and proactive cyber defense solutions, safeguards
modern IT environments with unparalleled detection, deception, response, cloud security, and compliance
capabilities. We offer full visibility across hybrid environments via deep, dynamic asset discovery, multi-faceted
context, and risk assessment. These features help minimize attackable surface areas, automate exposure
prevention, threat detection, and incident response, and provide the context, accuracy, speed, and portability
security professionals need to find and neutralize adversaries earlier in the attack lifecycle. Fidelis Cybersecurity
is dedicated to helping clients become stronger and more secure. Fidelis is trusted by many top commercial,
enterprise, and government agencies worldwide. For more information, please visit www.fidelissecurity.com
Copyright © 2022 Fidelis Cybersecurity
®
Decoy Server
®
, Inc. All rights reserved.
www.fidelissecurity.com

Advertisement

Table of Contents
loading

Summary of Contents for Fidelis Deception Decoy Server FDH-1000-C

  • Page 1 Fidelis Cybersecurity is dedicated to helping clients become stronger and more secure. Fidelis is trusted by many top commercial, enterprise, and government agencies worldwide. For more information, please visit www.fidelissecurity.com www.fidelissecurity.com...
  • Page 2: System Overview

    1. System Overview Fidelis Deception Decoy Server appliance runs emulated and Real OS decoys. It is connected to Trunk port and/or multiple flat networks, and it communicates with assets on your networks. Figure 1: Fidelis Deception – Decoy Server Appliance – Rev-K The Decoy Server reports deception alerts when attackers access the decoy.
  • Page 3: Product Documentation

    2. Documentation, Passwords, and Technical Support Product Documentation You can find Fidelis Network product documentation, appliance specifications, and instructions at https://support.fidelissecurity.com or through the navigation item in the CommandPost user interface. Appliance Default Passwords System Account Default Password Appliance Console...
  • Page 4 Cat 5e patch cable Decoys Decoys Decoys (eth3) (eth2) (eth1) Admin Decoy Server FDH-1000-C (eth0) Decoy Server FDH-3000-C DL360 Figure 2: Rear Port Assignments– Decoy Server with Copper Ports (Rev-K) ® Copyright © 2022 Fidelis Cybersecurity , Inc. All rights reserved www.fidelissecurity.com...
  • Page 5 Decoys Decoys Decoys (eth3) (eth5) (eth2) (eth1) (eth4) Admin Decoy Server FDH-1000-F (eth0) Decoy Server FDH-3000-F DL360 Figure 3: Rear Port Assignments– Decoy Server 10GbE Optical Ports (Rev-K) ® Copyright © 2022 Fidelis Cybersecurity , Inc. All rights reserved www.fidelissecurity.com...
  • Page 6 Ports directly to specific subnets Admin Network The Admin network connects Fidelis Decoy server to the CommandPost, and optionally to an on-premises Fidelis Sandbox. You need one switch port per Decoy server appliance for the Admin network. Appliance Switch Port Type...
  • Page 7: Appliance Installation

    Cable the sensor appliance(s) to the switches: 1. Connect the Admin (eth0) port to the ADMIN switch port. 2. Optionally, connect the iLO port to the ADMIN (or iLO) switch port. ® Copyright © 2022 Fidelis Cybersecurity , Inc. All rights reserved www.fidelissecurity.com...
  • Page 8 Via Console or iLO Via KVM Console Connect a keyboard and monitor to the appliance. For Fidelis Decoy Server version 9.4 or later, the following screen is displayed. If you do not see this screen, connect via SSH (see instructions below).
  • Page 9 Login to the system through the console or iLO. 3. Use the following credentials at the login prompt. You will be required to change the password immediately. ‒ user: fidelis ‒ default password: fidelispass ® Copyright © 2022 Fidelis Cybersecurity , Inc. All rights reserved www.fidelissecurity.com...
  • Page 10 5. Skip the DHCP configuration by selecting No. Note: It is recommended that you use a static IP address for the interface so that the connection to the CommandPost/Management is not lost. ® Copyright © 2022 Fidelis Cybersecurity , Inc. All rights reserved www.fidelissecurity.com...
  • Page 11 6. Configure the network parameters for the system management interface. 7. When complete, select Apply and wait for confirmation to exit Setup. 8. To exit, select Quit to finish setup. ® Copyright © 2022 Fidelis Cybersecurity , Inc. All rights reserved www.fidelissecurity.com...
  • Page 12 Register Decoy Servers with Fidelis Network Cloud Please contact Fidelis Technical Support to connect your Decoy Servers to the Fidelis Network Cloud. Fidelis Technical Support will work with you to configure the Decoy Servers and enable the Fidelis Network Cloud for your environment.
  • Page 13: Appendix A: Network Configuration Worksheet

    Appendix A: Network Configuration Worksheet Network Setting Assignments Interface Admin Hostname (FQDN) Static IP Address Subnet Mask Gateway Proxy Server DNS Servers NTP Servers Time Zone ® Copyright © 2022 Fidelis Cybersecurity , Inc. All rights reserved www.fidelissecurity.com...
  • Page 14: Appendix B: System Specifications

    200 - 240 VAC BTU Rating (max) 3067 BTU/hr (100 VAC) 1902 BTU/hr (100 VAC) 2958 BTU/hr (200 VAC) 1840 BTU/hr (200 VAC) 2949 BTU/hr (240 VAC) 1832 BTU/hr (240 VAC) ® Copyright © 2022 Fidelis Cybersecurity , Inc. All rights reserved www.fidelissecurity.com...
  • Page 15 Fidelis Cybersecurity is dedicated to helping clients become stronger and more secure. Fidelis is trusted by many top commercial, enterprise, and government agencies worldwide. For more information, please visit www.fidelissecurity.com www.fidelissecurity.com...

Table of Contents