Network Setup

High-Level Networking Setup

It is strongly recommended to deploy the MetaDefender Sandbox (previously known as Filescan) server in a segregated network (e.g. DMZ, VLAN, VPC).

This segregated network can be connected to a corporate network through a firewall that only allows access to the Sandbox Web interface and REST API over HTTPS (port 443). This "management" connection might use a dedicated network card.

A secondary network card could be used for "sample analysis" purposes to allow outbound connections to the Internet. An important purpose of the Sandbox system is to download the second stage payloads and analyze them. This secondary network connection can also be used for updating system packages, downloading updated YARA rules and connecting to reputation services in the Cloud.

An Internet connection is required during the product installation. After a successful installation, the outbound connection might be disabled after considering the following limitations:

  • Offline systems cannot receive updated features (like YARA rules) to improve detections for recent threats.
  • All third-party integrations (e.g. Reputation API, geolocation/WHOIS lookup) require an Internet connection.
  • The "File download" feature is not available in offline environments.
  • The "URL rendering and phishing detection" features are not available in offline environments.

Note that the quality of the Sandbox analysis will deteriorate without these important features!

The following iptables rules are recommended for a standard single-server deployment.

This setup will block all incoming connections except for HTTPS (port 443) and SSH (port 22) traffic.

We also need to allow internal communication on the docker0 interface, otherwise the Sandbox Webservice cannot send requests to Sandbox Broker running on the host system.

Please fine-tune these rules to match your specific requirements:

Copy

Additional Hardening

It is also possible to block all outgoing traffic except for a selected list of domains. Please refer to the list of Domains Contacted During Installation to identify the most important domains.

Disclaimer: With maximum hardening the analysis quality will decrease, as the purpose of the sandbox is to allow outbound traffic to download the second stage payloads and analyze them.

Note that iptables alone is not suitable for blocking/allowing connections on the domain level (iptables works with IP addresses instead).

In your custom firewall configuration, you can allow the following list of essential domains as a starting point:

Bash
Copy

Internal Communication Ports

All internal communication among Sandbox components uses custom REST APIs.

The broker HTTP server is listening on port 23001.

The transform HTTP server is listening on port 22001.

Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard