...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
This topic only applies to Armor Complete users who are account administrators and new to the Armor Management Portal (AMP).
Note |
---|
Before you begin, Armor recommends that you review pre-installation/pre-deployment information, such as virtual machine offerings and supported browsers. To learn more, see Pre-deployment considerations for Armor Complete. |
...
title | Step 1: Open the Account Signup Email |
---|
...
title | Step 2: Complete Your Security Information |
---|
...
Note |
---|
In this step, you will add your phone number to your account. This phone number will be used for multi-factor authentication. To complete the account signup process and to log into AMP, you must be near this phone number. |
- Note your Armor username.
- The Username will be pre-populated with the email address of the Primary Contact for the account.
- In Password and Confirm Password, create and enter an account password.
- Your password must be at least 12 characters in length.
- Your password must contain an upper-case character, a lower-case character, a number, and a special character.
- Your password cannot contain personal information, such as your name, email address, birthday, etc. For example, if your name is John Smith, then you cannot use joh or smi in your password.
- You can only change your password once every 24 hours.
- Passwords expire after 60 days.
- After 6 failed login attempts, you will be locked out of your account for an hour. To resolve this, you must contact your account administrator or contact Armor Support.
- After 15 minutes of no activity, you will be logged out of the Armor Management Portal (AMP).
- Complete the Challenge Phrase and Challenge Response.
- If you call Armor for technical support, you will be asked the Challenge Phrase, and you must correctly answer the Challenge Response.
- Do not use inappropriate language or suggestive material.
- The answer must be at least five characters long.
- In Phone Number, select your country code / flag, and then enter your phone number.
- This phone number will be used for multi-factor authentication (MFA). Every time you log into the Armor Management Portal (AMP), you will receive a phone call in order to complete the login process.
- You can enter a phone number with spaces and special characters, such as (555) 555-555.
- (Optional) If your phone number contains an extension, enter the number in Extension. You cannot include spaces or special characters in this field.
- Click Validate to validate the phone number entered.
- You will receive a phone call; answer the phone, and then follow the instructions.
- (Optional) After you complete the signup process, you can configure your account to use the Microsoft Authenticator application for MFA. To learn how to use this application, see Configure multi-factor authentication for your account.
- Click Continue.
Note |
---|
If you already coordinated with Armor to pay with a check, then you will be redirected to Armor Management Portal (AMP) login screen. |
...
title | Step 3: Complete Your Payment Information |
---|
...
- In Currency, select your currency.
- (Optional) If your business is tax exempt, select I'm tax exempt.
- In Tax Exempt ID, enter a valid tax exempt ID.
- For Payment Method, mark the desired payment (credit card or bank account).
Option 1: Credit card
Note |
---|
Cardholder Name, Address, City, State, and Postal Code will be pre-populated with the name and contact information for thePrimary Contact on the account. |
- In Card Number, enter the credit card number.
- In Expiration Date, select the appropriate month and year.
- In CVV, enter the verification number for the credit card
- In Country, select the corresponding country.
- Click Submit.
- You will be redirected to Armor Management Portal (AMP) login screen.
Option 2: ACH Bank Debit
...
title | Step 4: Create a Virtual Machine with a New Workload |
---|
...
- If you do not have any virtual machines listed, then click Deploy New, and then select Virtual Machine.
...
- You can click High CPU or High Memory to filter the list of virtual machines. You can also click Show All Options to see every virtual machine offering.
- Armor labels virtual machines by CPU and memory features. For instance, 2x4 indicates that the virtual machine has 2 CPU and 4 GB of memory.
...
- Your password must contain:
- An upper-case letter
- A lower-case letter
- A number
- A special character: ! @ # $ % ^ * ( ) { } [ ]
- You can also click Generate Password to allow Armor to create a password.
...
When you order a virtual machine, you are also ordering Intelligence Security Model (ISM) for the virtual machine. Prices for ISM will vary based on the number of virtual machines you have ordered. IMS pricing is based on the following tiered structure:
...
Tier
...
Number of virtual machines
...
title | Step 5: Enable and Install Your SSL/VPN Access |
---|
...
Note |
---|
If you run Ubuntu 16.x, then please review Install SSL VPN for Ubuntu 16.x. If you run Ubuntu 18.x, then please review Install SSL VPN for Ubuntu 18.x. If you run Mac OS 10.11 or higher, then please review Install SSL VPN for Mac OS 10.11+. |
Note |
---|
For Account Administrators only. |
...
In the field, enter and select the name of the user, or their email address.
...
Mark the desired data center or data centers that the user can connect to.
...
Click Submit.
- The newly added user will appear in the table; the table is organized in alphabetical order, based on the first name of the user.
...
- AMP will automatically detect your operating system; however, you can click Download for another platform to view other operating system options.
- When you open the client, follow the on-screen installation instructions.
For Windows users, the client will download as a .zip file.
- Extract the installation files to your local hard drive.
- Launch the installer.exe file to begin the installation.
For Mac OS users, the client will download as a .tgzfile.
- Extract the installation files to your local hard drive.
- Access the mac_phat_client folder, and then run the naclient.pkg installer.
- When you run the installer, you will see an error regarding the certificate. Click Continue. (In a future release, Armor will resolve the issue.)
- To launch the SSL VPN client, in your Applications folder, search for naclient.
- If you run Mac OS 10.11 or higher, then please review Install SSL VPN Client for Mac OS, version 10.11 and higher.
- Extract the installation files to your local hard drive.
...
- Your SSL VPN login credentials are the same credentials you use to access the Armor Management Portal (AMP).
...
title | Step 6: Create a Firewall Rule with a New IP Address Group |
---|
...
Step 1: Create an IP Group
In the Firewall screen, each entry in the table represents a single firewall rule; however, each firewall rule can contain several IP addresses or just a single IP address.
You can combine related IP addresses into a single IP Group. For example, if you want to block traffic from three separate IP address, you do not have to create three separate firewall rules. Instead, you can combine the three separate IP addresses into a single, configurable IP Group. Then, when you create a firewall rule, you can pick the newly created IP Group as your Source or Destination IP addresses.
In the Armor Management Portal (AMP), on the left-side navigation, click Security.
Click Firewall.
If you have virtual machines in various data centers, then in the top drop-down menu, select the desired data center.
- Click IP Groups.
- Click Actions, and then click New Group.
- In IP Group Name, enter a descriptive name.
- Armor recommends that you add Source or Destination into the name of the IP Group to help you identify the IP Group as the Source or Destination IP group.
- In Add Members To Group, enter a member, and then click the plus icon.
- You can enter:
- A single IP address
- A range of IP addresses
- CIDR
- You must add at least one member.
- You can add multiple members to a service group.
- You can enter:
- Click Apply.
- The newly created IP group will appear at the bottom of the table.
Step 2: Create a Service Group
In the Firewall screen, each entry in the table represents a single firewall rule; however, each firewall rule can contain several protocols (and ports).
You can combine related protocols (and ports) into a Service Group. For example, if you want to create a firewall rule to block three types of traffic, you do not have to create three separate firewall rules. Instead, you can combine the three types of traffic (protocols and ports) into a single, configurable Service Group. Then, when you create a firewall rule, you can pick the newly created Service Group.
...
In the Armor Management Portal (AMP), on the left-side navigation, click Security.
...
Click Firewall.
...
If you have virtual machines in various data centers, then in the top drop-down menu, select the desired data center.
...
Service or sub-protocol
...
Notes
...
Example
...
You must enter a port number.
These services are not case-sensitive.
...
- tcp/80
- TCP/80
- Tcp/80
- tCp/80
...
These additional services are not case-sensitive.
Do not enter a port number with these additional services.
...
- ATALK
- igmp
- Gre
...
You must enter icmp, followed by the specific sub-protocol.
You must enter the sub-protocol in lower-case letters.
Do not enter a port number.
...
- icmp/source-host-isolated
- icmp/time-exceeded
...
- The newly created service group will appear at the bottom of the table.
For a complete list of supported services and sub-protocol, see Review supported services and sub-protocols.
Step 3: Create a Firewall Rule
In the Armor Management Portal (AMP), on the left-side navigation, click Security.
Click Firewall.
If you have virtual machines in various data centers, then in the top menu, click the corresponding data center.
Click Actions, and then click New Rule.
- If you do not see Actions, then click Create a Firewall Rule.
- In Name, enter a descriptive name.
- In Action, select Allow to allow specified traffic to access your virtual machine or Block to block specified traffic.
- Under Service, enter and select the name of the desired Service Group.
- To learn how to create a Service Group, see Create a service group.
- Under Source, enter and select the name of the desired IP Group.
- To learn how to create an IP Group, see Create an IP group.
- Under Destinations, in the field, enter and select the name of the desired IP Group.
- Click Save Rule.
After you create a rule, Armor recommends that you place the rule in the correct order.
Note |
---|
If you are not familiar with ordering rules, contact Armor Support to help you properly order your firewall rules. It is extremely important to order rules in order to receive desired traffic. To learn how to send a support ticket, see Support Tickets. |
...
- Under Rule, in the numbered fields, enter a number to move the rule to a different position.
- If you have more than 25 rules, the additional rules will be placed in a secondary section within the Firewallscreen. To reorder and move these additional rules into a higher position, enter a number under the Ordercolumn, and then press Enter on your keyboard.
- In the top menu that appears, click Save.
...
title | Step 7: Create a Role and Add Permissions |
---|
...
In the Armor Management Portal (AMP), roles are similar to job titles that you can create and assign to your users. You can populate these roles with certain permissions. For example, you can create an Audit role, and then you can add specific permissions that will give the assigned user permission to access audit-related features.
By default, a new administrator account contains an Admin role with all the available permissions selected.
When you create a new user account, you must assign that user a role. You can assign a default role or create a new role.
Note |
---|
There are three default permissions in AMP:
If you want to use a default role, then you can skip to Step 8: Create An User and Assign A Role. |
...
title | Step 8: Create a User and Assign a Role |
---|
...
Note |
---|
Repeat Step 8: Create An User and Assign A Role for every user you want to invite. |
...
title | Step 9: Enable SSL/VPN Access for Your Users |
---|
...
title | Step 10: Subscribe to Data Center Notifications |
---|
...
title | Step 11: Configure Your Notification Preferences |
---|
...
Armor recommends that you configure your account to receive notifications for Account, Billing, and Technical events.
Note |
---|
These notification preferences do not relate to support tickets. To update your notification preferences for support tickets, see Support Tickets. |
...
You will receive a notification when:
- A password expires in 14 days.
- A password expires in 7 days.
- A password expires in 24 hours.
- A password has expired.
...
You will receive a notification when:
- An invoice has posted.
- An invoice is past due (2, 10, 15, 25, and 30 days).
- A payment method will soon expire (1, 15, and 30 days).
You can configure a user to become the primary billing contact for an account. This user will receive billing notifications. Additionally, this user will be listed in the Bill to field in an invoice.
- In the Armor Management Portal (AMP), in the left-side navigation, click Account.
- Click Users.
- Locate and hover over the desired user.
- Click the vertical ellipses.
- Select Set as Primary Billing Contact.
- Click OK.
...
You will receive a notification when:
- A virtual machine will be deleted or downgraded.
- CPU, disk, and memory utilization is at more than 90% for 5 minutes.
- Ping, SSH (Linux), or RDP (Windows) fails for 5 minutes.
Note |
---|
You can only change the notification preferences for your own account. You cannot change the notification preferences for other user accounts. |
...
- Select Alert to receive notifications in the top bar in the Armor Management Portal (AMP).
- Select Email to receive notifications through email.
- You can select both notification options.
...
Note |
---|
This topic only applies to Armor Enterprise Cloud users who are account administrators and new to the Armor Management Portal (AMP). |
As a first-time user in AMP, you must:
Complete the onboarding / invitation process
Access AMP
Invite users
Set up your infrastructure
Note |
---|
Before you begin, Armor recommends that you review pre-installation/pre-deployment information, such as virtual machine offerings and supported browsers. To learn more, see Pre-deployment considerations for Armor Enterprise Cloud. |
Expand | ||
---|---|---|
| ||
|
Expand | ||||
---|---|---|---|---|
| ||||
|
Expand | ||
---|---|---|
| ||
Option 1: Credit card
Option 2: ACH Bank Debit
|
Expand | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||||
|
Expand | ||
---|---|---|
| ||
|
Expand | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||
Step 1: Create an IP GroupIn the Firewall screen, each entry in the table represents a single firewall rule; however, each firewall rule can contain several IP addresses or just a single IP address. You can combine related IP addresses into a single IP Group. For example, if you want to block traffic from three separate IP address, you do not have to create three separate firewall rules. Instead, you can combine the three separate IP addresses into a single, configurable IP Group. Then, when you create a firewall rule, you can pick the newly created IP Group as your Source or Destination IP addresses.
Step 2: Create a Service GroupIn the Firewall screen, each entry in the table represents a single firewall rule; however, each firewall rule can contain several protocols (and ports). You can combine related protocols (and ports)into a Service Group. For example, if you want to create a firewall rule to block three types of traffic, you do not have to create three separate firewall rules. Instead, you can combine the three types of traffic (protocols and ports) into a single, configurable Service Group. Then, when you create a firewall rule, you can pick the newly created Service Group.
For a complete list of supported services and sub-protocol, see Review supported services and sub-protocols. Step 3: Create a Firewall Rule
After you create a rule, Armor recommends that you place the rule in the correct order.
|
Expand | ||
---|---|---|
| ||
In the Armor Management Portal (AMP), roles are similar to job titles that you can create and assign to your users. You can populate these roles with certain permissions. For example, you can create an Audit role, and then you can add specific permissions that will give the assigned user permission to access audit-related features. By default, a new administrator account contains an Admin role with all the available permissions selected. When you create a new user account, you must assign that user a role. You can assign a default role or create a new role.
|
Expand | ||
---|---|---|
| ||
|
Expand | ||
---|---|---|
| ||
Before an invited user can download and install their SSL VPN, the account administrator must add the following permissions to their account:
Additionally, the account administrator must enable the account to access the SSL VPN client:
|
Expand | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||
|
Expand | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||
Armor recommends that you configure your account to receive notifications for Account, Billing, and Technical events.
|
Expand | ||
---|---|---|
| ||
An organization allows you to specify when a group of users should be added to a specific support ticket, based on the subject matter of the ticket. For instance, for a billing-related ticket, you can indicate that members of the Billing organization should be notified. When a support ticket is shared with an organization, all users within the organization will receive an initial email notification.
|
Excerpt | ||||
---|---|---|---|---|
| ||||
You can use Armor's StatusHub page to review the status of Armor's infrastructure, as well as other Armor services, such as the Armor Management Portal (AMP). Additionally, you can use StatusHub to receive notifications and updates regarding infrastructure outages.
|