Network Requirements
Internet Connectivity
UTMStack requires internet access for:- Threat intelligence updates
- Software updates and patches
- License validation (Enterprise version)
- Integration with cloud services
Internal Network Access
Ensure UTMStack can communicate with:- Data sources (agents, devices, SaaS integrations)
- Network devices sending logs
- Admin and analyst workstations
- DNS servers
- NTP servers for time synchronization
IP Address Configuration
Static IP Address
It is strongly recommended to configure a static IP address for your UTMStack server.Configure Static IP
Update the configuration with your network settings:
Replace
ens18 with your actual network interface name. Use ip link show to list available interfaces.DNS Configuration
Hostname Setup
Set a meaningful hostname for your UTMStack server:DNS Resolution
Ensure proper DNS resolution is configured:Time Synchronization
Accurate time synchronization is critical for log correlation and security analysis.TLS/SSL Configuration
UTMStack uses TLS encryption for secure communication.Default Certificate
UTMStack generates a self-signed certificate during installation. For production use, replace it with a trusted certificate.Custom Certificate
To use a custom SSL certificate:- Obtain a certificate from a trusted Certificate Authority
- Prepare your certificate files (certificate, private key, CA chain)
- Consult the UTMStack documentation for certificate installation procedures
All data in transit between agents and UTMStack servers is encrypted using TLS by default.
Network Segmentation
Security Best Practices
Consider implementing network segmentation:- Place UTMStack in a dedicated management VLAN
- Restrict access to administrative interfaces
- Use separate networks for data collection and management
- Implement network access controls between segments
Agent Communication
Ensure agents can reach the UTMStack server:- Agents connect to the server using a unique authentication key (+24 characters)
- All agent communication is encrypted using TLS
- Configure firewall rules to allow agent traffic to required ports
Next Steps
After configuring network settings:- Configure firewall rules and ports
- Test connectivity from admin workstations
- Test connectivity from data sources
- Configure integrations and data sources