BlastShield Active Gateway Installation on x86 hardware
Use an Active Gateway if you want to protect your assets against unauthorized lateral movement inside the network and make them invisible and isolated from unauthorised users.
All protected Endpoints downstream from an Active Gateway will be rendered invisible to the network underlay, and access control will be managed by BlastShield™ policy. The Gateway provides isolation at the network layer, providing a virtual-air gap and inhibiting unauthorised lateral movement between the protected endpoints. The endpoints will be unable to communicate with non-BlastShield nodes.
Create the Gateway instance in the Orchestrator and download the bsi invitaiton file.
Download the Gateway installation package and flash it onto a USB drive.
Install the Gateway software on your x86 hardware platform.
Deploy the Gateway onto your network.
Create endpoints on the Gateway for the protected devices.
Configure an access policy and microsegmentation.
Prerequisites
Please be aware of the following requirements before you start:
You will require read / write access to your BlastShield™ Orchestrator.
Download the Gateway firmware. You can download it from here.
You will require a USB flash drive to boot your hardware from, and a monitor and keyboard to connect to your server during the installation process.
By default, the Gateway expects to receive an IP address from the network via DHCP for its public side interface. Manual assignment is also supported during the installation process.
You must have a suitable x86 hardware platform to install the Gateway software onto. Refer to the table of x86 Gateway hardware requirements for the minimum specifications.
x86 Gateway hardware requirements
Parameter | Value |
---|---|
CPU | Minimum Intel Atom with AES-NI support or Intel Celeron with AES-NI support. Note that more powerful CPUs with AES-NI support such as Core i3 or Xeon are also supported. |
RAM | Minimum 4GB |
HDD/SSD | Minimum 8GB |
NICs | Two NICs required. Most NICs made by Intel, Broadcom and Mellanox are supported. |
To learn how to do this watch the following video or read the steps below.
From the Orchestrator, select "Gateways" from the left Menu.
Select "Add New Gateway" from the Gateway List.
Enter a Name for the new Gateway.
Set the Addressing Mode for the Gateway:
For an Active Gateway deployment on an x86 platform chose MAC Address as the Addressing Mode.
Select Save and Download Invitation.
Select the option Save Invitation to disk to download the invitation file to your local computer. You will need this file later when you flash the Gateway software to your x86 hardware.
Download the Gateway firmware here.
Unzip the Installer Package (Do NOT run the Installer file).
Write the Installer Image to a USB drive using any available image writer
Note: there are several free utilities available for writing images to USB drives. We recommend the balenaEtcher software, but you can use any utility.
Once you have written the image to USB, copy the invitation (.bsi) file in the root folder of this image on the USB.
In this step you will be booting the x86 platform from the USB image created in the previous step.
Connect your x86 platform as shown here.

Please watch the following video or read the steps below to learn how to boot the x86 platform from the USB image.
Making sure the x86 server is connected as shown above, power it on and exit the boot sequence using the break key that applies to your hardware, then select the boot setup menu.
Re-boot your server from the USB image, once the image boots you will begin the setup process.
Select the uplink interface (to the network).
Select the downstream interface (to your endpoints).
Select the invitation (.bsi) file.
Select the target device (hard drive).
Confirm that all data will be erased and the image will be installed on the server
When the installation is complete you will be prompted to remove the USB flash drive (please remove the USB flash drive at this point), and the server will re-boot. You can disconnect the monitor and keyboard from the Gateway hardware now.
Go to your Orchestrator, and verify the Gateway status is now Online.
Summary
This article provides an overview of how to setup and deploy your x86 BlastShield™ Gateway in a network where it will be protecting downstream endpoint devices.Ensure you have already installed the BlastShield™ Gateway software on your server before you start this process. See this page for details on how to install the software.
Setup and deploy your x86 BlastShield™ Gateway in a network
The BlastShield™ Gateway should be placed immediately upstream from the endpoint devices to be protected. If the endpoint devices connect to an ethernet switch, the BlastShield™ Gateway should be upstream of the ethernet switch. The switch should be configured to operate in port isolation mode and the BlastShield Gateway configuration should have its 'Addressing Mode' set to 'MAC address'.The setup is illustrated in the following diagram.

From within the Orchestrator, select "Gateways" from the left Menu
Select the desired Gateway from the Gateway List
Select "Add New Endpoint"
Enter a name for the new endpoint
Check "Endpoint Enabled" to Enable it when done.
The IP address is auto-populated.
Set the Endpoint Destination identifier. For the x86 active Gateway, set the endpoint destination as follows:
Find the MAC address of the endpoint device from it's network configuration.
Enter the MAC Address for the endpoint device into the Destination (MAC Address) box in the Endpoint configuration on the Orchestrator.
Select Save Changes to confirm.
The status of the endpoint will show as ONLINE.
Repeat, as necessary, for your other endpoints.
BlastShield™ policy works by creating two groups, typically one which defines a user group and a second group which defines a group of protected assets. The groups are used to microsegment the assets and the users. The two groups are linked together with a policy which defines the connectivity permissions between the two groups. The following section explains how to create a group and add members to it. You may create multiple policies and groups.
Create Groups
From the Orchestrator, select "Groups" from the left menu.
Select "Add New Group" from the Group List.
Enter a name for the new Group.
To add members to the new group, click the "Add Members" button.
If you adding users to the group then select the desired Users which you want to be associated with the Group from the "Users" box.
If you are adding Agents to the group then select the desired Agents which you want to be associated with the Group from the "Agents" box.
If you are adding Gateway Endpoints then select the desired Endpoints from the "Endpoints" box.
Alternatively, you can leave the members list empty and add/modify new members later.
Click "Add Members" to save the members.
Click "Save" to save the new group.
Repeat, if required, to ensure you have one group for your endpoints and one group for your users, which is the minimum you will need in order to define the access policy.
Please refer to the following video, which is an example of creating one group for your users and one group for Host Agents.
Create a Policy to link your Groups
Note
Users and Agents must be a member of a group for them to be used in a policy.
Select "Policies" from the left menu.
Select "Add New Policy" from the Policy List.
Enter a name for the new Policy.
Select desired "From" Groups to be associated with the new Policy.
Select desired "To" Groups to be associated with the new Policy.
Save the new Policy.
Policies are directional, so that you can control the direction in which connections may be initiated. Typically for remote access use-cases your policy would be from the "user group" to the "server group" so that users may start connections to the servers, but servers cannot start connections to users. You can create bi-directional permissions by using two policies.
The following video shows an example of creating an access Policy between a group of remote workers and a group of servers. The policy gives the remote workers authorisation to access the server group.