# Firewall requirements

## Firewall Requirements Sections

[Important Notes](#important-notes)\
This section covers Respond UX vs Quadrant UX applicability. It also covers SSL inspection, internet/air-gap requirements, and remote support IP range conflicts.

[Vectra Cloud Connectivity](#vectra-cloud-connectivity)\
This section covers connectivity to Vectra services hosted in Vectra’s cloud. It is mainly for Respond UX deployments. The [Auth Gateways](#auth-gateways) section also applies to Quadrant UX deployments of CDR for M365, IDR for Azure AD, and CDR for AWS.

[Appliance Connectivity](#appliance-connectivity)\
This section covers connectivity required for Vectra appliances (physical or virtual). It applies to both RUX for Network and Quadrant UX deployments. This section also contains additional details regarding connectivity from Vectra appliances to the Vectra cloud.

## Important Notes

### Respond UX vs Quadrant UX Applicability

The Respond User Experience (Respond UX or RUX) and the Quadrant User Experience (Quadrant UX or QUX) are two different analyst user experiences that Vectra offers. It is important to differentiate between the different UX's when looking at requirements for FW rules. Some FW rules will only apply to deployments using the Respond UX and some will apply only to deployments using the Quadrant UX. For additional information please see: Vectra Analyst User Experiences (Respond vs Quadrant).

While the Respond UX is delivered from Vectra's cloud as part of the overall Vectra AI Platform, it can be used without traditional Brain and Sensor appliances when only non-network data sources are used. RUX for Network deployments (using network Sensors with the Respond UX) still require a Brain appliance to be installed in the customer environment (which can be in IaaS clouds or physical data centers, etc). Sensors will be deployed and paired with that Brain to capture network traffic for analysis.

Requirements listed below that apply only to RUX for Network deployments or only to QUX deployments will be labeled as such.

### Firewall/Proxy SSL Inspection

Please note that Vectra appliances validate SSL certificates for all HTTPS connections. For this reason, SSL/TLS inspection on firewall and proxy appliances must be disabled for these connections to work.

We have also identified that some firewall software transparently enables SSL inspection if certain filters (DNS hostname filtering) are enabled. This is not necessarily obvious to the administrator and should be investigated if connectivity issues are being observed.

### Internet Access From Vectra Brain

A Vectra Brain requires connectivity to the automatic update service for normal operation. This connectivity is used for automatic (including security) updates and to synchronize keys for cryptographic authentication of sensors.

The Brain requires Internet DNS resolution to obtain the IP addresses for these requests. The customer may choose public/Internet DNS servers or internal DNS servers; however, Internet DNS entries must be resolvable by the Brain. Please note that DNS is often considered to be a UDP-only protocol, however, TCP may be used depending on the type of DNS transaction. Both UDP and TCP use port 53 and should be permitted to all configured DNS servers.

Vectra can function in air-gapped environments when a Quadrant UX based deployment is done, but there will be some impacts such as:

* Vectra Threat Intelligence detections will be disabled.
* Suspect Domain Activity detection will be disabled.
* Context enrichments from external sources such as whois, etc that are displayed in certain models will not function.

Please see the [Vectra Quadrant UX Deployment Guide](https://support.vectra.ai/s/article/KB-VS-1077) for additional details about air gap environments including guidance for offline updates. Respond UX for Network is not possible in air-gapped environments since the Respond UX is delivered from Vectra's cloud and communicates with a locally installed Brain.

### Internet Access to Vectra Appliances

As with all security infrastructure Vectra appliances should be blocked from Internet access and access should only be granted from trusted workstations and/or authenticated sources.

### Management Network IP Address Range Conflicts with Remote Support

Customers should note that the following IP ranges will conflict with remote support capability:

* 192.168.72.0/21
* 192.168.80.0/21

If you will ever need Vectra to assist remotely (outside of screen sharing sessions), care should be taken to number the management network interface (MGT) used on any appliance (physical, virtual, or cloud - Brains or Network Data Sources/Sensors) outside of the above ranges. If your management network interface (MGT) is numbered in either of these ranges, remote support access will not function. Remote support connectivity with Vectra all goes through the Brain (even to access other appliances in your deployment) so firewall rules for remote support functionality only need to allow connectivity from the Brain to Vectra's cloud (Sensors must still allow connectivity to the Brain per the below charts).

## Vectra Cloud Connectivity

* For this document, the portions of the Vectra AI Platform that reside in Vectra’s cloud are referred to as the Vectra cloud.
  * This does not refer to any specific service offering.
* Please check each category below to see if it is applicable to your deployment and if rules are required in your environment to enable the required connectivity.
  * For rule categories that have multiple region options, it is only necessary to put rules in place to allow connectivity to the region that your Vectra tenant is deployed in. This region should be visible in the URL used to access the Respond UX.
    * i.e. `[tenant_id].ew1.prod.vectra-svc.ai` is used for EU deployments (ew1).
* RUX for Network refers to a RUX deployment that has enabled network data sources (sensors).
  * This means you have a Brain somewhere in your premises (data center or public cloud) that is connected to the Vectra cloud for use with the Respond UX and paired with network Sensors (virtual or physical) to capture network traffic and distill a metadata stream for processing by the Brain appliance.
  * Please refer to the [Vectra Respond UX Deployment Guide](https://support.vectra.ai/s/article/KB-VS-1696) for more details.
* Please refer to the table below to see applicability of the various categories.
* The **For Brain or User’s Browser** column should be interpreted as follows:
  * **Brain** – Rules required for the Brain to the Vectra Cloud.
  * **User’s Browser** – Rules required for the user’s web browser to the Vectra cloud.

<table data-header-hidden data-full-width="true"><thead><tr><th width="318.47265625"></th><th width="281.6796875"></th><th width="259.9375"></th></tr></thead><tbody><tr><td><strong>Rule Category</strong></td><td><strong>Required For</strong></td><td><strong>For Brain or User’s Browser</strong></td></tr><tr><td><a href="#rux-for-network-gui-synchronization">RUX for Network GUI Synchronization</a></td><td>RUX for Network Deployments</td><td>Brain</td></tr><tr><td><a href="#auth-gateways">Auth Gateways</a></td><td><p>RUX for Network Deployments</p><p>Quadrant UX deployments of CDR for M365, IDR for Azure AD, and CDR for AWS.</p></td><td>Brain</td></tr><tr><td><a href="#rux-metadata-forwarding">RUX Metadata Forwarding</a></td><td>RUX for Network Deployments</td><td>Brain</td></tr><tr><td><a href="#rux-research-metadata-forwarding">RUX Research Metadata Forwarding</a></td><td>RUX for Network Deployments</td><td>Brain</td></tr><tr><td><a href="#section-2">RUX Analyst/Admin Access</a></td><td>All RUX Deployments</td><td>User’s Browser</td></tr><tr><td><a href="#_Respond_UX_(RUX)_1">RUX Static Asset CDN</a></td><td>All RUX Deployments</td><td>User’s Browser</td></tr><tr><td><a href="#_Respond_UX_Customer">RUX Customer File Upload</a></td><td>All RUX Deployments</td><td>User’s Browser</td></tr><tr><td><a href="#vectra-cloud-egress-ips">Vectra Cloud Egress IPs</a></td><td>Vectra Cloud connecting to configured SaaS data source connectors</td><td>N/A</td></tr></tbody></table>

### RUX for Network GUI Synchronization

* Required for:
  * All RUX for Network deployments.
* This is used to synchronize configurations between the Brain appliance and your Vectra tenant.
* This communications channel is initiated from the Brain to the endpoint in your Vectra tenant’s region.
* The protocol and ports in use for each entry is the same: **Websocket and HTTPS over TCP/443**

<table data-header-hidden data-full-width="false"><thead><tr><th width="365.3203125" align="center"></th><th width="100" align="center"></th><th width="100" align="center"></th><th width="144.20703125" align="center"></th></tr></thead><tbody><tr><td align="center"><strong>Fully Qualified Domain Name (FQDN)</strong></td><td align="center"><strong>IP(s)</strong></td><td align="center"><strong>Region</strong></td><td align="center"><strong>Initiated From</strong></td></tr><tr><td align="center">main-cbi-tunnel-uw2.app.prod.vectra-svc.ai</td><td align="center">Dynamic</td><td align="center">US</td><td align="center">Brain</td></tr><tr><td align="center">main-cbi-tunnel-ew1.app.prod.vectra-svc.ai</td><td align="center">Dynamic</td><td align="center">EU</td><td align="center">Brain</td></tr><tr><td align="center">main-cbi-tunnel-ec2.app.prod.vectra-svc.ai</td><td align="center">Dynamic</td><td align="center">Switzerland</td><td align="center">Brain</td></tr><tr><td align="center">main-cbi-tunnel-cc1.app.prod.vectra-svc.ai</td><td align="center">Dynamic</td><td align="center">Canada</td><td align="center">Brain</td></tr><tr><td align="center">main-cbi-tunnel-as2.app.prod.vectra-svc.ai</td><td align="center">Dynamic</td><td align="center">Australia</td><td align="center">Brain</td></tr></tbody></table>

### Auth Gateways

* Required for:
  * All Respond UX for Network Deployments.
  * Quadrant UX deployments of CDR for M365, IDR for Azure AD, and CDR for AWS.
    * Your Brain must be able to securely access the Vectra cloud over TCP/443 HTTPS connections to enable detection events from these products to be reported to your UI.
* In Respond UX for Network deployments, the Brain forwards network detections, entities, host sessions, and any selective PCAPs (Vectra Packet Capture) to your Vectra tenant via this connection.
* This communications channel is initiated from your Brain to the endpoint in your Vectra tenant’s region.

<table data-header-hidden data-full-width="true"><thead><tr><th width="383.625" align="center"></th><th width="149.61328125" align="center"></th><th width="148.4609375" align="center"></th><th width="121.22265625" align="center"></th><th width="137.1484375" align="center"></th></tr></thead><tbody><tr><td align="center"><strong>Fully Qualified Domain Name (FQDN)</strong></td><td align="center"><strong>IP(s)</strong></td><td align="center"><strong>Protocol / Ports</strong></td><td align="center"><strong>Region</strong></td><td align="center"><strong>Initiated From</strong></td></tr><tr><td align="center">authgateway.uw2.public.app.prod.vectra-svc.ai</td><td align="center">54.245.33.175<br>52.42.70.176<br>100.21.109.72<br>52.26.91.157</td><td align="center"><p>HTTPS</p><p>TCP/443</p></td><td align="center">US</td><td align="center">Brain</td></tr><tr><td align="center">authgateway.ew1.public.app.prod.vectra-svc.ai</td><td align="center">54.171.40.108<br>54.246.213.148<br>54.75.47.147</td><td align="center"><p>HTTPS</p><p>TCP/443</p></td><td align="center">EU</td><td align="center">Brain</td></tr><tr><td align="center">authgateway.ec2.public.app.prod.vectra-svc.ai</td><td align="center"><p>16.62.18.237</p><p>16.62.142.98</p><p>51.96.54.201</p></td><td align="center"><p>HTTPS</p><p>TCP/443</p></td><td align="center">Switzerland</td><td align="center">Brain</td></tr><tr><td align="center">authgateway.cc1.public.app.prod.vectra-svc.ai</td><td align="center">3.96.112.208<br>52.60.211.221<br>15.222.69.161</td><td align="center"><p>HTTPS</p><p>TCP/443</p></td><td align="center">Canada</td><td align="center">Brain</td></tr><tr><td align="center">authgateway.as2.public.app.prod.vectra-svc.ai</td><td align="center">13.54.11.66<br>13.55.79.24<br>13.55.106.102</td><td align="center"><p>HTTPS</p><p>TCP/443</p></td><td align="center">Australia</td><td align="center">Brain</td></tr></tbody></table>

### RUX Metadata Forwarding

* Required for:
  * All Respond UX for Network Deployments.
* Network metadata is forwarded to AWS S3 buckets and processed to make it available for features such as Instant Investigation and Advanced Investigation in the Respond UX.
* This communications channel is initiated from your Brain to the endpoint in your Vectra tenant’s region.
* The protocol and ports in use for each entry is the same: **HTTPS over TCP/443**

<table data-header-hidden data-full-width="true"><thead><tr><th width="514.98046875" align="center"></th><th width="100" align="center"></th><th width="119.75390625" align="center"></th><th width="146.4296875" align="center"></th></tr></thead><tbody><tr><td align="center"><strong>Fully Qualified Domain Name (FQDN)</strong></td><td align="center"><strong>IP(s)</strong></td><td align="center"><strong>Region</strong></td><td align="center"><strong>Initiated From</strong></td></tr><tr><td align="center">cbo-upload-network-metadata-forwarder-uswt2-371371611652.s3-accesspoint.us-west-2.amazonaws.com</td><td align="center">Dynamic</td><td align="center">US</td><td align="center">Brain</td></tr><tr><td align="center">cbo-upload-network-metadata-forwarder-euwt1-371371611652.s3-accesspoint.eu-west-1.amazonaws.com</td><td align="center">Dynamic</td><td align="center">EU</td><td align="center">Brain</td></tr><tr><td align="center">cbo-upload-network-metadata-forwarder-eucl2-371371611652.s3-accesspoint.eu-central-2.amazonaws.com</td><td align="center">Dynamic</td><td align="center">Switzerland</td><td align="center">Brain</td></tr><tr><td align="center">cbo-upload-network-metadata-forwarder-cacl1-371371611652.s3-accesspoint.ca-central-1.amazonaws.com</td><td align="center">Dynamic</td><td align="center">Canada</td><td align="center">Brain</td></tr><tr><td align="center">cbo-upload-network-metadata-forwarder-apse2-371371611652.s3-accesspoint.ap-southeast-2.amazonaws.com</td><td align="center">Dynamic</td><td align="center">Australia</td><td align="center">Brain</td></tr></tbody></table>

### RUX Research Metadata Forwarding

* Optional but highly recommended for:
  * All Respond UX for Network Deployments
* Research metadata from precursor algorithms are used to improve model quality and reduce detection noise.
* This communications channel is initiated from your Brain to the endpoint in your Vectra tenant’s region.
* The protocol and ports in use for each entry is the same: **HTTPS over TCP/443**

<table data-header-hidden data-full-width="true"><thead><tr><th width="490.4140625" align="center"></th><th width="100" align="center"></th><th width="120.79296875" align="center"></th><th width="135.91796875" align="center"></th></tr></thead><tbody><tr><td align="center"><strong>Fully Qualified Domain Name (FQDN)</strong></td><td align="center"><strong>IP(s)</strong></td><td align="center"><strong>Region</strong></td><td align="center"><strong>Initiated From</strong></td></tr><tr><td align="center">cbo-upload-network-precursors-uswt2-371371611652.s3-accesspoint.us-west-2.amazonaws.com</td><td align="center">Dynamic</td><td align="center">US</td><td align="center">Brain</td></tr><tr><td align="center">cbo-upload-network-precursors-euwt1-371371611652.s3-accesspoint.eu-west-1.amazonaws.com</td><td align="center">Dynamic</td><td align="center">EU</td><td align="center">Brain</td></tr><tr><td align="center">cbo-upload-network-precursors-eucl2-371371611652.s3-accesspoint.eu-central-2.amazonaws.com</td><td align="center">Dynamic</td><td align="center">Switzerland</td><td align="center">Brain</td></tr><tr><td align="center">cbo-upload-network-precursors-cacl1-371371611652.s3-accesspoint.ca-central-1.amazonaws.com</td><td align="center">Dynamic</td><td align="center">Canada</td><td align="center">Brain</td></tr><tr><td align="center">cbo-upload-network-precursors-apse2-371371611652.s3-accesspoint.ap-southeast-2.amazonaws.com</td><td align="center">Dynamic</td><td align="center">Australia</td><td align="center">Brain</td></tr></tbody></table>

### RUX Analyst/Admin Access

* Required for:
  * All Respond UX deployments.
* Any analyst or admin that wishes to access the Respond UX will need to ensure that their browser can reach their Vectra tenant to login and access the UI.
* This communications channel is initiated from the user’s host.
* The protocol and ports in use for each entry is the same: **HTTPS over TCP/443**

<table data-header-hidden data-full-width="true"><thead><tr><th width="340.640625" align="center"></th><th align="center"></th><th align="center"></th><th width="139.19921875" align="center"></th></tr></thead><tbody><tr><td align="center"><strong>Fully Qualified Domain Name (FQDN)</strong></td><td align="center"><strong>IP(s)</strong></td><td align="center"><strong>Region</strong></td><td align="center"><strong>Initiated From</strong></td></tr><tr><td align="center">[tenant_id].uw2.portal.vectra.ai</td><td align="center">Dynamic</td><td align="center">US</td><td align="center">User’s Browser</td></tr><tr><td align="center">[tenant_id].ew1.portal.vectra.ai</td><td align="center">Dynamic</td><td align="center">EU</td><td align="center">User’s Browser</td></tr><tr><td align="center">[tenant_id].ec2.portal.vectra.ai</td><td align="center">Dynamic</td><td align="center">Switzerland</td><td align="center">User’s Browser</td></tr><tr><td align="center">[tenant_id].cc1.portal.vectra.ai</td><td align="center">Dynamic</td><td align="center">Canada</td><td align="center">User’s Browser</td></tr><tr><td align="center">[tenant_id].as2.portal.vectra.ai</td><td align="center">Dynamic</td><td align="center">Australia</td><td align="center">User’s Browser</td></tr></tbody></table>

### RUX Static Asset CDN

* Required for:
  * All Respond UX deployments.
* The Respond UX has certain static assets (HTML, CSS, JS) that are required to serve the web application hosted by a CDN (Content Delivery Network).
* This communications channel is initiated from the user’s host.

<table data-header-hidden data-full-width="true"><thead><tr><th width="313.40234375" align="center"></th><th width="153.4609375" align="center"></th><th width="100" align="center"></th><th width="100" align="center"></th><th width="142.07421875" align="center"></th></tr></thead><tbody><tr><td align="center"><strong>Fully Qualified Domain Name (FQDN)</strong></td><td align="center"><strong>Protocol / Ports</strong></td><td align="center"><strong>IP(s)</strong></td><td align="center"><strong>Region</strong></td><td align="center"><strong>Initiated From</strong></td></tr><tr><td align="center"><p>dd6462tdmvp79.cloudfront.net</p><p>dpew7prsvwbf0.cloudfront.net</p></td><td align="center"><p>HTTPS</p><p>TCP/443</p></td><td align="center">Dynamic</td><td align="center">All</td><td align="center">User’s Browser</td></tr></tbody></table>

### RUX Customer File Upload

* Required for:
  * All Respond UX deployments.
* This communications channel is used for:
  * Vectra Match deployments and will allow upload of rulesets.
  * PCAP download from the Vectra Cloud for Selective PCAP (Vectra Packet Capture)
  * Additional capabilities are planned for future releases.
    * It is recommended to put rules in place even if you don’t use Match or Selective PCAP.
* This communications channel is initiated from the user’s host.

<table data-full-width="true"><thead><tr><th width="395.8828125" align="center"></th><th width="151.8515625" align="center"></th><th width="93.1875" align="center"></th><th width="84.61328125" align="center"></th><th width="144.1015625" align="center"></th></tr></thead><tbody><tr><td align="center"><strong>Fully Qualified Domain Name (FQDN)</strong></td><td align="center"><strong>Protocol / Ports</strong></td><td align="center"><strong>IP(s)</strong></td><td align="center"><strong>Region</strong></td><td align="center"><strong>Initiated From</strong></td></tr><tr><td align="center">prd-main-customerfiles-580786928539-uswt2.s3.amazonaws.com</td><td align="center"><p>HTTPS</p><p>TCP/443</p></td><td align="center">Dynamic</td><td align="center">US</td><td align="center">User’s Browser</td></tr><tr><td align="center">prd-main-customerfiles-580786928539-euwt1.s3.amazonaws.com</td><td align="center"><p>HTTPS</p><p>TCP/443</p></td><td align="center">Dynamic</td><td align="center">EU</td><td align="center">User’s Browser</td></tr><tr><td align="center">prd-main-customerfiles-580786928539-eucl2.s3.amazonaws.com</td><td align="center"><p>HTTPS</p><p>TCP/443</p></td><td align="center">Dynamic</td><td align="center">Switzerland</td><td align="center">User’s Browser</td></tr><tr><td align="center">prd-main-customerfiles-580786928539-cacl1.s3.amazonaws.com</td><td align="center"><p>HTTPS</p><p>TCP/443</p></td><td align="center">Dynamic</td><td align="center">Canada</td><td align="center">User’s Browser</td></tr><tr><td align="center">prd-main-customerfiles-580786928539-apse2.s3.amazonaws.com</td><td align="center"><p>HTTPS</p><p>TCP/443</p></td><td align="center">Dynamic</td><td align="center">Australia</td><td align="center">User’s Browser</td></tr></tbody></table>

### Vectra Cloud Egress IPs

When the Vectra Cloud connects externally to retrieve logs from configured data sources, it does so from the IPs listed at <https://ips.devops.vectra-svc.ai/ips.json>. The specific IPs used will be limited to the IPs listed for the regions in use for your Vectra deployment. For example, if you are only deployed in eu-west-1, then only the IPs from the list associated with eu-west-1 will be used. See the following table for details.

<table><thead><tr><th width="315.4375">Region Code</th><th width="297.0234375">Region</th></tr></thead><tbody><tr><td>ap-southeast-2</td><td>Australia</td></tr><tr><td>ca-central-1</td><td>Canada</td></tr><tr><td>eu-central-2</td><td>Switzerland</td></tr><tr><td>eu-west-1</td><td>EU</td></tr><tr><td>us-west-2</td><td>US</td></tr></tbody></table>

In most situations, customers do NOT need to configure any specific firewall rules to allow Vectra to reach the endpoints required. If you see the IPs in the list accessing your data in your logs, this is not a cause for concern. It is due to the fact that your configured data source connector is connecting to the endpoint to retrieve the data necessary to provide the service.

In the case of CDR for Azure, if private access is required for the Azure storage accounts that Vectra reads your Azure logs from, please see [Configuring Private Access for Azure Storage Accounts](https://docs.vectra.ai/cdr-for-azure/deployment/appendix-1-azure-configuration-notes#configuring-private-access-for-azure-storage-accounts) in the CDR for Azure deployment guide. Details are provided for how to configure the Storage accounts used to only accept connections from the IPs associated with the Vectra Cloud.

## Appliance Connectivity

The [Vectra Cloud connectivity](#vectra-cloud-connectivity) section above primarily deals with connectivity required to deliver the Respond UX and detections from Vectra SaaS offerings to both RUX and QUX deployments, the content in this section also applies to any deployment using Vectra appliances (Brains, Sensors, and Stream) for RUX or QUX deployments.

### Vectra Cloud Appliance Connectivity

All communications with the Vectra Cloud occur over a TLS encrypted channel. Appliance devices (physical, virtual, cloud) authenticate using keys. Unique public/private keys are generated when a device is provisioned by Vectra. The corresponding public key is copied to the Vectra Cloud. Every device connecting to the Vectra Cloud authenticates using its own private key.

The Vectra Cloud houses several services:

* update2.vectranetworks.com
  * Used for delivering updates to the Vectra software.
  * [Offline updates](https://docs.vectra.ai/operations/readme-1/offline-updates-v89) are also supported.
* api.vectranetworks.com
  * Used for lightweight health monitoring of the Vectra platform and for delivering additional context certain Detections may need.
  * Queries to external information sources to provide context are proxied through this connection.
  * If required, customers can block the platform from reporting health monitoring by blocking outbound connections on their firewall to api.vectranetworks.com.
* rp.vectranetworks.com
  * Used only for Brains deployed in IaaS clouds. Used for authentication and verification (integrity check of the file system).
* metadata.vectra.ai
  * Metadata sharing improves threat detection by contributing anonymized metadata sourced from Brain deployed in your organization. This is optional in QUX deployments.
* rs.vectranetworks.com
  * This enables remote support from authorized Vectra employees.
* SaaS product offerings such as Recall

#### Proxy Support

Vectra Cloud connectivity to update2.vectranetworks.com and api.vectranetworks.com supports connecting through a customer proxy. If a proxy connection is required for your Brain appliance to reach these endpoints, edit the proxy settings in *Configuration → Data Sources → Network → Brain Setup → Proxy & Status*.

* Note that [Remote Support](https://docs.vectra.ai/configuration/access/vectra-remote-support) does not support proxy configuration by default. If this is the only option, please contact Vectra support to configure remote support to manually to use a proxy.

#### Lightweight Health Monitoring

The lightweight health monitoring includes the following statistics, only aggregate statistics are collected, no details are collected.

* System Health Metrics
  * Installed packages, running processes, system interface information, system usage, database usage, system error stats
* Environment Metrics
  * Host counts, traffic counts, Brain configuration, remote support status, notification status, metadata status
* Detection Metrics
  * Detection counts, PCAP stats, Triage stats

#### Metadata Sharing

[Why is Metadata Sharing Important](https://docs.vectra.ai/reference/why-is-metadata-sharing-important)

* Full details are available at this link.  There are optional additional levels of sharing also described.

Metadata Sharing Improves Threat Detection

* By contributing anonymized metadata sourced from the X-series platform deployed in your organization, you are contributing directly to the efficacy and accuracy of the Vectra software and the security of your network.
* Access to Detection metadata improves Vectra’s threat detection algorithms, enabling the Vectra software you use to be more effective in a constantly evolving threat landscape.
* Data is collected daily and includes:
  * Anonymized information about Detections that are triggered in your network.
  * Anonymized information about algorithms in the research and development phase (and not yet visible in the UI) that are triggered in your network.
  * Anonymized attribution of Detections to Hosts.
  * Anonymized information related to host identification efficacy.
* Vectra Secures and Limits Access to Metadata
  * Any metadata you contribute is anonymized by removing personal and network-specific information before it is sent to metadata.vectranetworks.com via an encrypted connection.
  * Vectra treats this metadata as highly confidential and only allows authorized research personnel to access the metadata.
  * Any metadata collected is securely deleted after a six-month period.
* Contact Vectra support if non-anonymized Full Metadata Sharing is desired
  * Algorithm development using non-anonymized metadata helps to ensure that new models function as efficiently as possible in your environment.

### Required Connectivity For Appliances

<table data-header-hidden data-full-width="true"><thead><tr><th width="131.375" align="center"></th><th width="253.46875" align="center"></th><th width="177.15234375" align="center"></th><th width="288.40234375" align="center"></th></tr></thead><tbody><tr><td align="center"><strong>Source</strong></td><td align="center"><strong>Destination</strong></td><td align="center"><strong>Protocol/Port</strong></td><td align="center"><strong>Description</strong></td></tr><tr><td align="center">Administrator workstations</td><td align="center"><p>Brain</p><p>Sensors</p></td><td align="center">TCP/22 (SSH)</td><td align="center">Command-line management of the Brain and Sensor appliances.</td></tr><tr><td align="center">Administrator workstations</td><td align="center">Brain</td><td align="center">TCP/443 (HTTPS)</td><td align="center">Web management of brain appliances.</td></tr><tr><td align="center">Brain</td><td align="center"><p>update2<strong>.</strong>vectranetworks<strong>.</strong>com</p><p>(54.200.156.238)</p></td><td align="center">TCP/443<br>(HTTPS)</td><td align="center"><p>Automatic updates.</p><p>Pairing keys for physical sensors.</p><p>See note above regarding SSL keys.</p></td></tr><tr><td align="center">Brain</td><td align="center"><p>api<strong>.</strong>vectranetworks<strong>.</strong>com</p><p>(54.200.5.9)</p></td><td align="center">TCP/443 (HTTPS)</td><td align="center">Health monitoring, algorithm support, reverse lookups for external IPs, Vectra Threat Intelligence, additional detection content. See note above regarding SSL keys.</td></tr><tr><td align="center">Brain (Cloud)</td><td align="center"><p>rp<strong>.</strong>vectranetworks<strong>.</strong>com</p><p>(54.200.156.238)</p></td><td align="center">TCP/443 (HTTPS)</td><td align="center">Used only for Brains deployed in IaaS clouds. Used for authentication and verification (integrity check of the file system)</td></tr><tr><td align="center">Brain</td><td align="center">DNS servers (as configured)</td><td align="center">TCP/53, UDP/53</td><td align="center">Both TCP and UDP are required for normal operation. See note above regarding DNS resolution.</td></tr><tr><td align="center">Brain</td><td align="center"><p>NTP servers (as configured)</p><p>Default is ntp.ubuntu.com</p></td><td align="center">UDP/123</td><td align="center">Time synchronization.</td></tr><tr><td align="center">Brain</td><td align="center">SMTP servers (as configured)</td><td align="center">TCP (as configured)</td><td align="center">Email alerting.</td></tr><tr><td align="center">Brain</td><td align="center">SMTP (OAuth)</td><td align="center">TCP/443<br>TCP/587</td><td align="center">Please see SMTP (OAuth) for Microsoft chart below.</td></tr><tr><td align="center">Brain</td><td align="center">Sensors, Stream</td><td align="center">TCP/22 (SSH)</td><td align="center">Remote management and troubleshooting.</td></tr><tr><td align="center">Sensors, Stream</td><td align="center">Brain</td><td align="center">TCP/22 (SSH), TCP/443 (HTTPS)</td><td align="center">Pairing, metadata transfer, and ongoing communication.</td></tr><tr><td align="center">Stream</td><td align="center">Data lake (as configured)</td><td align="center">TCP (as configured)</td><td align="center">Metadata stream to a data lake</td></tr></tbody></table>

### Additional (Feature Dependent) Connectivity

<table data-header-hidden data-full-width="true"><thead><tr><th width="132.6796875" align="center"></th><th width="395.2890625" align="center"></th><th width="167.9609375" align="center"></th><th width="339.06640625" align="center"></th></tr></thead><tbody><tr><td align="center"><strong>Source</strong></td><td align="center"><strong>Destination</strong></td><td align="center"><strong>Protocol/Port</strong></td><td align="center"><strong>Description</strong></td></tr><tr><td align="center">Brain</td><td align="center">content.user-telemetry.vectra.ai<br>data.user-telemetry.vectra.ai</td><td align="center">TCP/443<br>(HTTPS)</td><td align="center">Required for In-App support functionality.<br>See <a href="https://support.vectra.ai/s/article/KB-VS-1606">In-App Support KB</a> for more details.</td></tr><tr><td align="center">Administrator workstations</td><td align="center">Recall Kibana server</td><td align="center">TCP/443 (HTTPS)</td><td align="center">Recall IP addresses are provided during implementation and may be requested at any time from Vectra Support.</td></tr><tr><td align="center">Brain</td><td align="center"><p>rs.vectranetworks.com</p><p>(74.201.86.229)</p></td><td align="center">TCP/443 or UDP/9970</td><td align="center"><a href="https://support.vectra.ai/s/article/KB-VS-1045">Remote Support</a> access for remote troubleshooting. See note above regarding SSL inspection and other note about potential IP range conflicts with the MGT interface.</td></tr><tr><td align="center">Brain</td><td align="center"><p>metadata.vectra.ai</p><p>(100.20.236.31, 44.229.57.246, 44.228.37.60, 44.228.101.87)</p></td><td align="center">TCP/443 (HTTPS)</td><td align="center">Anonymized metadata sharing to contribute to future algorithm development.</td></tr><tr><td align="center">Brain</td><td align="center">Recall collector</td><td align="center">TCP/443 (HTTPS)</td><td align="center">Recall IP addresses are provided during implementation and may be requested at any time from Vectra Support.</td></tr><tr><td align="center">Brain</td><td align="center">Syslog (as configured)</td><td align="center">TCP or UDP (as configured)</td><td align="center">CEF or standard Syslog format.</td></tr><tr><td align="center">Brain</td><td align="center">Kafka (as configured)</td><td align="center">TCP (as configured)</td><td align="center">CEF or standard Syslog format.</td></tr><tr><td align="center">Brain</td><td align="center"><p>Carbon Black Response</p><p>(as configured)</p></td><td align="center">TCP/443 (as configured)</td><td align="center">Carbon Black integration (requires API key).</td></tr><tr><td align="center">Brain</td><td align="center">api.crowdstrike.com</td><td align="center">TCP/443 (HTTPS)</td><td align="center">Crowdstrike integration (Client ID and Client Secret).</td></tr><tr><td align="center">Brain</td><td align="center">vCenter (as configured)</td><td align="center">TCP (as configured)</td><td align="center">vCenter integration enables vSensor physical host view, augmented host identification, and vCenter alerts.</td></tr><tr><td align="center">Brain</td><td align="center">LDAP (as configured)</td><td align="center">TCP/389 STARTTLS/389</td><td align="center">LDAP authentication.</td></tr><tr><td align="center">Brain</td><td align="center">Radius (as configured)</td><td align="center">UDP/1812</td><td align="center">Radius (PAP) authentication.</td></tr><tr><td align="center">Brain</td><td align="center">TACACS (as configured)</td><td align="center">TCP/49</td><td align="center">TACACS (PAP or CHAP) authentication.</td></tr><tr><td align="center">Brain</td><td align="center">Backup server (as configured)</td><td align="center">TCP/22 (SSH)</td><td align="center"><a href="https://support.vectra.ai/s/article/KB-VS-1121">Automated backup (SCP or SFTP)</a>.</td></tr><tr><td align="center">Brain</td><td align="center">Brain</td><td align="center">TCP/22 (SSH), TCP/443 (HTTPS)</td><td align="center"><a href="https://support.vectra.ai/s/article/KB-VS-1121">Automated backup (brain-to-brain)</a>. Connectivity is bidirectional.</td></tr><tr><td align="center">Sensors, Stream</td><td align="center">update2.vectranetworks.com (54.200.156.238)</td><td align="center">TCP/443 (HTTPS)</td><td align="center"><a href="https://support.vectra.ai/s/article/KB-VS-1024">Required for automatic pairing</a>. Optional for manual (offline) pairing.</td></tr><tr><td align="center">SIEM/CLM log management</td><td align="center">Brain</td><td align="center">TCP or UDP (as configured)</td><td align="center">Log forwarding of DHCP/AD security events to augment host identification.</td></tr><tr><td align="center">Brain</td><td align="center"><p>login.windows.net</p><p>api.securitycenter.windows.com</p></td><td align="center">TCP/443 (HTTPS)</td><td align="center">Required for <a href="https://support.vectra.ai/s/article/KB-VS-1236">ATP lockdown</a></td></tr><tr><td align="center">Brain</td><td align="center">EMEA customers (only)<br><br>authgateway.ew1.public.app.prod.vectra-svc.ai<br>(54.171.40.108 , 54.246.213.148 , 54.75.47.147 )<br><br>AMS/APJ customers (only)<br><br>authgateway.uw2.public.app.prod.vectra-svc.ai<br>(54.245.33.175, 52.42.70.176, 100.21.109.72 , 52.26.91.157)</td><td align="center">TCP/443<br>(HTTPS)</td><td align="center">Required for Vectra MDR Service for QUX Deployments. These endpoints are also required for RUX deployments that have network data sources (Sensors). These are already discussed in the <a href="#auth-gateways">Auth Gateways</a> section of this doc for RUX. Essentially, if your deployment has a Brain, it MUST be able to reach Vectra over these endpoints for Vectra MDR service.</td></tr><tr><td align="center">Sensor</td><td align="center">S3 and SQS AWS Regional Endpoints. Only required for ZIA enabled Sensor.</td><td align="center">TCP/443</td><td align="center">Required for ZIA SASE/SSE integration. See <a href="https://support.vectra.ai/s/article/KB-VS-1006">KB</a> for details.</td></tr></tbody></table>

### SMTP (OAuth) For Microsoft

**Quadrant UX Only**: *Configuration → RESPONSE → Notifications → SMTP*

Respond UX deployments do not require this as email notifications are sent from Vectra's cloud.

<table data-header-hidden data-full-width="true"><thead><tr><th width="282.41015625" align="center"></th><th width="223.69140625" align="center"></th><th width="145.71484375" align="center"></th></tr></thead><tbody><tr><td align="center"><strong>Cloud Type</strong></td><td align="center"><strong>Destination</strong></td><td align="center"><strong>Protocol/Port</strong></td></tr><tr><td align="center">Public (office365<strong>.</strong>com)</td><td align="center">login<strong>.</strong>microsoftonline<strong>.</strong>com<br>smtp<strong>.</strong>office365<strong>.</strong>com</td><td align="center">TCP/443<br>TCP/587</td></tr><tr><td align="center">US Government (office365<strong>.</strong>us)</td><td align="center">login<strong>.</strong>microsoftonline<strong>.</strong>us<br>smtp<strong>.</strong>office365<strong>.</strong>us</td><td align="center">TCP/443<br>TCP/587</td></tr><tr><td align="center">German (office365<strong>.</strong>de)</td><td align="center">login<strong>.</strong>microsoftonline<strong>.</strong>de<br>smtp<strong>.</strong>office365<strong>.</strong>de</td><td align="center">TCP/443<br>TCP/587</td></tr><tr><td align="center">China (office365<strong>.</strong>cn)</td><td align="center">login<strong>.</strong>microsoftonline<strong>.</strong>cn<br>smtp<strong>.</strong>office365<strong>.</strong>cn</td><td align="center">TCP/443<br>TCP/587</td></tr></tbody></table>
