Professional Documents
Culture Documents
Secure Connect Gateway Virtual Edition PreSite Checklist PKB en US 1
Secure Connect Gateway Virtual Edition PreSite Checklist PKB en US 1
Secure Connect Gateway Virtual Edition PreSite Checklist PKB en US 1
February 2022
Rev. A03
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid
the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2021 – 2022 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries.
Other trademarks may be trademarks of their respective owners.
Contents
Contents 3
1
Before you begin
Secure connect gateway — Virtual Edition is an appliance that can be deployed using this checklist and the supporting
documentation. We strongly recommend the involvement of:
● The customer lead to define the devices that will be monitored using secure connect gateway
● The customer IP networking team to define how the devices will securely connect to the backend.
If you are a customer, you can also request the Dell Field services team to deploy secure connect gateway and add the devices
at no additional cost. For steps to create a service request, click here.
The following table describes the conventions that are used in this document:
Document purpose
This document helps you deploy secure connect gateway — virtual edition in your environment. It also helps you gather the
information and make the decisions to ensure success with the guidance of your Dell technical support agent.
In this document, the term local system refers to the secure connect gateway virtual appliance.
Step 2 - Deployment
● Deploy secure connect gateway.
● Optionally, install Policy Manager for Secure Connect Gateway on a different server.
Step 3 - Deploying
● Prepare the environment and network for your devices to connect to secure connect gateway.
● Register your deployed products with Dell Support.
● Add devices to secure connect gateway.
● Configure the remote support and alert delivery services.
Best practices 5
3
Download Secure Connect Gateway
Run security checks on the secure connect gateway deployment package in accordance with your security policy.
The following table provides links to download secure connect gateway deployment package, documents, and Policy Manager
for Secure Connect Gateway application:
Customer information
Table 3. Customer information
Item
Company name
Primary Manager Name for this project
Primary contact phone number and email address
Secure connect gateway deployment service request number,
if applicable
Requested install date
PS Project Number (optional)
* You can also enter the primary and technical contacts during secure connect gateway registration.
Customer information 7
5
Secure Connect Gateway configuration
choices
Select the required secure connect gateway configuration and note the number of virtual appliances that are required for the
selected configuration.
Some Dell devices have integrated (onboard) secure connect gateway solutions. For customers with fewer Dell devices these
may be preferable.
* Do not place secure connect gateway or storage files on Dell devices that are managed by secure connect gateway.
** Each HA secure connect gateway should run in separate virtual environments.
Go to Company Administration to view the devices that are installed or pending installation. Choose and
list devices to be deployed in the Devices to be monitored using Secure Connect Gateway section.
Some devices need an extra workstation with specific software to enable those products to send
alert data to Dell. Workstations are customer-provided. Switch management software is customer installable and may incur a
separate cost.
Plan the various resources required to deploy secure connect gateway. For more information about the minimum system
and network requirements, see the secure connect gateway — virtual edition User's Guide available at https://www.dell.com/
SCG-VE-docs.
* It is recommended to configure failover methods to send Call Home data from devices to the backend using FTPS when the
connectivity between the local system and the backend is lost.
Policy Manager
Table 10. Policy Manager
Item Item
Name or IP address Default policy for Remote Support
(allow/ask/refuse) refuse
Provide details of the supporting resources needed before deploying secure connect gateway.
Proxy network
A proxy network can be used for the connectivity between the local system and the following:
1. Internet
2. Server on which Policy Manager is installed
SMTP server
Provide your SMTP server details to receive email notifications from secure connect gateway. For information about the email
messages that are sent by secure connect gateway, see the secure connect gateway — virtual edition User's Guide available at
https://www.dell.com/SCG-VE-docs or click here.
For information about the minimum network requirements to deploy secure connect gateway and port requirements for the
devices, see the secure connect gateway — virtual edition Support Matrix available at https://www.dell.com/SCG-VE-docs.
NOTE: This step can be deferred until you Add devices to Secure Connect Gateway.
For information about installing Policy Manager, go to https://www.dell.com/SCG-VE-docs. To download Policy Manager, go to
https://www.dell.com/SCG-VE > Drivers & Downloads tab.
For more information about the checks that must be performed, go to https://onlinesupport.emc.com/CompanyAdminSites
If you are a customer, you must have a business account. For information about creating a business account,
see the secure connect gateway — virtual edition User's Guide available at https://www.dell.com/SCG-VE-
docs.
If you are a Dell employee and a service enabled partner, you must have an active RSA Soft Fob.
If you are a non-servicing partner, the customer must enter their credentials, or raise a Dell Service Request
with details of the Site location (UCID, PartyID number, or SiteID number ) and devices to be deployed.
Installer check
Click Manage Sites and search for the Site location (UCID, PartyID number, or SiteID number ). Click the Site
location (UCID, PartyID number, or SiteID number) and then Contacts. Select Web Support Enabled to
filter the list.
If you are a customer, you must be listed as an authorized contact. If you are not listed, contact
support@emc.com.
If you are a partner, you must be listed as a support partner. If you are not listed, contact
GSP_SSC_ESRS@emc.com.
Site location (UCID, PartyID number, or SiteID number)Check
Click View Sites to view your Company Site location (UCID, PartyID number, or SiteID number ) and the devices
installed. You can deploy secure connect gateway only if the devices are supported by secure connect gateway.
For the list of supported devices, see secure connect gateway — virtual edition Support Matrix available at
https://www.dell.com/SCG-VE-docs.
If the devices are not supported, use a different Site location (UCID, PartyID number, or SiteID number ), or
contact Dell technical support.
To access the secure connect gateway user interface, go to https://<IP address or hostname of the local
system>:5700.
Registering secure connect gateway ensures connectivity with the backend. For information about signing into secure connect
gateway and registration, see the secure connect gateway — virtual edition User's Guide available at https://www.dell.com/
SCG-VE-docs.
If you are a partner or Dell employee, create the High-Availability cluster at https://connectivityhub.dell.com/.
Add the devices using the table on the next page as a reference. Some devices must only be added to secure connect gateway
from the device user interface using the RESTful protocol. For more information, see the device configuration documentation.
For information about the devices that must be added using the RESTful protocol, see the secure connect gateway — virtual
edition User's Guide available at https://www.dell.com/SCG-VE-docs.
For each serial number, include the product login and password to be used by Dell for remote support, and if
remote support and alert delivery settings are enabled (default).
If you are a Dell employee or a partner, verify if remote support to the devices is successful.
Perform the following steps to verify that the remote alert from the device to the backend is successful:
1. Trigger a test alert from the device. For steps to trigger the session, see the product documentation.
2. If you are a Dell employee, use CLM to check if the test alert was received in the backend.
3. If you are partner or a customer, use https://www.dell.com/support/home/en-us/product-
support/serialnumber/<My serial number>/overview to check if the test alert was received in
the backend.
NOTE: Though, the alert is processed immediately by Dell technical support, it may take approximately four
hours to appear in the reporting systems mentioned above. You can also check the status on the device user
interface or in the Alert Delivery and File Transfer audit pages in secure connect gateway user interface.
If the alert information is not displayed, create a service request.
Check the secure connect gateway user interface for any updates and install the updates.
18 Final steps
13
Notes and comments
Table 21. Notes and comments
Task