Dynatrace Hardware Private Agent specifications

The Hardware Private Agent enables a company to synthetically test (http and https) their web applications inside the firewall, and combines these results with similar tests being conducted from outside the firewall. The data can be viewed in the Dynatrace Portal.

This Private Agent can be installed behind a customer firewall, which requires certain ports to be open so that data can be transmitted to the Dynatrace Synthetic Monitoring Platform. Private Agent synthetic tests are configured via the Dynatrace Portal, and can be viewed in the Portal alongside Internet backbone performance measurements.

Hardware and software specifications

The Private Agent server is located behind a preconfigured Cisco ASA 5510 VPN firewall and is managed by the Dynatrace Synthetic Monitoring Network Operations team. To ensure proper functioning of the Private Agent, we recommend that there are no restrictions or filtering on the public IP Address.

The following are the specifications for the Private Agent:

  • Hardware

    • Private Agent Firewall – Cisco ASA 5510 VPN device - 100mb Full Duplex
    • Private Agent Server – HP DL360P
  • Operating System

    • Microsoft Windows 2008 – Current Service Pack and Security Patches
  • Installed Application(s):

    • Microsoft SQL 2008 R2 w/ Current Service Pack - BIND Server - NTP Client - Sophos Anti-Virus
    • Dynatrace Synthetic Monitoring Scheduler - Balancer - Browser Agent

Network connectivity specifications

There are three options for network connectivity for Private Agent

External Private Agent

In this configuration, the Private Agent is connected directly to the Internet and is intended to test public sites. The IP address provided by the customer for the external connection to the Dynatrace firewall must be a publicly routable address.

Private Agent behind a customer firewall

In this configuration, the Private Agent lies behind a customer firewall and can perform both internal and external testing. The customer firewall controls all traffic to and from the Private Agent. Note the rules that need to be in place, as illustrated in the diagram below, that allow Dynatrace to replicate test data and maintain and monitor the Private Agent equipment.

The IP address provided by the customer for the external connection to the Dynatrace firewall must be either a publicly routable address or an internal IP address that is using NAT to get to an external IP address.

In this configuration, the Private Agent lies behind a customer firewall and can perform external testing through the customer firewall link and internal testing through a dedicated customer link connection on the Dynatrace firewall. Note the rules that need to be in place, as illustrated in the diagram below, that allow Dynatrace to replicate test data and to maintain and monitor the Private Agent equipment.

The IP address provided by the customer for the external connection to the Dynatrace firewall must be either a publicly routable address or an internal IP address that is using NAT to get to an external IP address. The customer provides an additional IP address for the internal customer link connection.

Private Agent configuration

The Private Agent is configured as shown in the following figure.