InterScan Web Security Virtual Appliance Installation Guide
InterScan Web Security Virtual Appliance Installation Guide
Virtual Appliance3
Antivirus and Content Security at the Web Gateway
Installation Guide
ws
Web Security
Trend Micro Incorporated reserves the right to make changes to this document
and to the products described herein without notice. Before installing and
using the software, please review the readme files, release notes, and the latest
version of the applicable user documentation, which are available from the
Trend Micro Web site at:
http://www.trendmicro.com/download
Trend Micro, the Trend Micro t-ball logo, LeakProof are trademarks or
registered trademarks of Trend Micro, Incorporated. All other product or
company names may be trademarks or registered trademarks of their owners.
Copyright© 1998-2008 Trend Micro Incorporated. All rights reserved.
Document Part No. IBEM33647/80522
Release Date: July 2008
Protected by U.S. Patent No. 5,951,698
The Installation Guide for Trend Micro™ InterScan™ Web Security Virtual
Appliance is intended to introduce the main features of the software and
installation instructions for your production environment. You should read
through it prior to installing or using the software.
Detailed information about how to use specific features within the software are
available in the online help file and the online Knowledge Base at Trend
Micro’s Web site.
Trend Micro is always seeking to improve its documentation. Your feedback is
always welcome. Please evaluate this documentation on the following site:
http://www.trendmicro.com/download/documentation/rating.asp
Contents
Preface
Audience ............................................................................................................... x
IWSVA Documentation ................................................................................... xi
Document Conventions ..................................................................................xii
About Trend Micro .........................................................................................xiii
iii
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
iv
Contents
v
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
vi
Contents
Index
vii
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
viii
Preface
Preface
Welcome to the Trend Micro™ InterScan Web Security Virtual Appliance 3.1 Installation Guide.
This guide helps you to get “up and running” by introducing IWSVA, assisting with
deployment, installation, migration (if necessary), initial configuration, troubleshooting,
performance tuning, and main post-installation configuration tasks. It also includes
instructions on testing your installation using a harmless test virus, troubleshooting, and
accessing Support.
This preface describes the following topics:
• Audience
• IWSVA Documentation
• Document Conventions
ix
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
Audience
The IWSVA documentation is written for IT managers and system administrators
working in a medium or large enterprise environment. The documentation assumes that
the reader has in-depth knowledge of networks schemas, including details related to the
following:
• HTTP and FTP protocols
• Database configuration
• VMware ESX administration experience when installing on VMware ESX
The documentation does not assume the reader has any knowledge of antivirus or Web
security technology.
Chapter 1, Pre-installation Plan- This chapter describes the tasks you need to do before
ning installing IWSVA. This includes planning for network
traffic and HTTP and FTP service flows and ensuring
that your server meets specific requirements.
Chapter 3, Installing InterScan This chapter describes how to obtain either a trial or
Web Security Virtual Appliance production version of IWSVA and how to install the
application.
Chapter 4, Migrating to IWSVA This chapter describes the different migration scenar-
ios and how to complete a migration to IWSVA.
x
Preface
Appendix B, Tuning and Trouble- This appendix describes performance tuning involving
shooting URL filtering and LDAP performance. Also, this
appendix provides general troubleshooting tips and
possible installation and feature issues.
Appendix C, Additional IWSVA This appendix describes the testing of various IWSVA
Testing features that involve scanning, blocking, and filtering.
Appendix E, Creating a New This appendix describes how to create a new virtual
Virtual Machine Under VMware machine for IWSVA.
ESX for IWSVA
IWSVA Documentation
In addition to the Trend Micro™ InterScan Web Security Virtual Appliance 3.1 Installation
Guide, the documentation set includes the following:
• Administrator’s Guide—this guide provides detailed information about all
IWSVA configuration options. Topics include how to update your software to keep
protection current against the latest risks, how to configure and use policies to
support your security objectives, and using logs and reports.
• Readme file—the Readme file contains late-breaking product information that is
not found in the online or printed documentation. Topics include a description of
new features, installation tips, known issues, and release history.
The latest versions of the Installation Guide, Administrator’s Guide, and readme file
are available in electronic form at:
xi
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
http://www.trendmicro.com/download/
CD ISO creation document—Entitled, How to Use the Trend Micro IWSVA ISO
File, this document describes how to create a bootable installation CD from an ISO
file.
Online help—Helps you configure all features through the user interface. You can
access the online help by opening the Web console and then clicking the help icon.
The purpose of online help is to provide “how to’s” for the main product tasks,
usage advice, and field-specific information such as valid parameter ranges and
optimal values. Online help is accessible from the IWSVA management console.
• Knowledge Base—the Knowledge Base is an online database of problem-solving
and troubleshooting information. It provides the latest information about known
product issues. To access the Knowledge Base, open:
http://esupport.trendmicro.com/support
Document Conventions
To help you locate and interpret information easily, the InterScan Web Security Virtual
Appliance documentation uses the following conventions.
CONVENTION DESCRIPTION
xii
Preface
CONVENTION DESCRIPTION
Configuration notes
Note:
Recommendations
Tip:
xiii
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
xiv
Chapter 1
Pre-installation Planning
This chapter describes the following:
• Server Requirements
• Information Needed to Install IWSVA
• Planning Network Traffic Protection
1-1
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
Server Requirements
Operating System
A purpose-built, hardened, and performance-tuned 64-bit operating system is included
with InterScan Web Security Virtual Appliance (IWSVA).
Hardware Requirements
Minimum Requirements:
• Single 2.0 GHz Intel ™ Core2Duo™ 64-bit processor supporting Intel™ VT™ or
equivalent
• 2GB RAM
• 8GB of disk space. IWSVA automatically partitions the detected disk space as
required
• Monitor that supports 800 x 600 resolution with 256 colors or higher
Recommended Requirements:
• Dual 2.8 GHz Intel ™ Core2Duo™ 64-bit processor or equivalent for up to 4000
users
• Dual 3.0 GHz Intel ™ QuadCore™ 64-bit processor or equivalent for up to 8000
users
• 4GB RAM is recommended to support up to 4000 users
• 8GB RAM is recommended to support up to 8000 users
• 300GB of disk space or more for log intensive environments. IWSVA automatically
partitions the detected disk space as per recommended Linux practices
Server Platform Compatibility
IWSVA should install and operate without issues on many brands of “off-the-shelf ”
server platforms. However, Trend Micro cannot guarantee 100% compatibility with all
brands and models of server platforms.
To obtain a list of Trend Micro certified servers that are compatible with IWSVA, access
the following URL:
http://www.trendmicro.com/go/certified
1-2
Pre-installation Planning
To obtain a general list of available platforms that should operate with IWSVA, access
the following URL:
http://wiki.centos.org/HardwareList
Trend Micro cannot guarantee full compatibility with the hardware components from
this general list.
Web Browser
To access the HTTP-based Web console, using any of the browsers in table Table 1-1.
B ROWSER W INDOWS
IE 6.0 X X
IE 7.0 X X X
Firefox 1.5 X
Firefox 2.0 X X
Other Requirements
• Database requirements:
• PostgreSQL v7.4.16 (included)
• When using multiple IWSVA servers in a server farm configuration, Trend
Micro recommends that you use separate server (possibly clustered) for
PostgreSQL
• 1.7GB of disk space for every 3 million HTTP requests per day in order to
maintain log files (calculation based on access logging enabled)
• 256MB of RAM (based on access logging enabled, else 64MB)
• Internet Content Adaptation Protocol (ICAP):
• NetApp™ NetCache™ release 6.0.1
• Blue Coat Systems™ SGOS v5 (latest version)
1-3
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
Further Requirements
• For proxy deployment modes, network clients must be able to access the HTTP
port of the IWSVA server that is selected during the install.
• IWSVA server and clients must be able to communicate with each other over the
corporate network.
Fresh Installation
IWSVA only supports fresh installations. The installation process formats your existing
system to install IWSVA. (see Installing IWSVA on page 3-4).
1-4
Pre-installation Planning
Migration
IWSVA only supports new installations — upgrading an existing IWSS or IWSA
installation is not supported. IWSVA supports migrating existing configuration and
policy data from the following Trend Micro Products:
• InterScan Web Security Suite 3.1 Linux
• InterScan Web Security Appliance 3.1
• InterScan Web Security Appliance 3.1 SP1
For more information about migration, see Chapter 4, Migrating to IWSVA.
1-5
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
SNMP Notifications
If you plan to use SNMP notifications, the IWSVA setup program installs the
appropriate SNMP libraries.
Activation Codes
Activating the three IWSVA modules (core program, URL Filtering, and Applet and
ActiveX Scanning) requires three separate activation codes. IWSVA comes with
registration keys for the modules purchased. During product registration, the
Registration Keys are exchanged for Activation Codes that “unlock” the program. You
can register the installation and exchange registration keys for activation codes from a
link in the setup program. Alternatively, you can register and obtain activation codes
before installing by visiting Trend Micro’s online registration Web site at:
http://olr.trendmicro.com
1-6
Pre-installation Planning
1-7
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
• Integration with a WCCP enabled switch or firewall for load balancing and simple
transparency
For further details on Forward Proxy mode, see Deploying in Forward Proxy Mode on
page 2-10.
ICAP Mode
IWSVA acts as an ICAP proxy and accepts ICAP connections from an ICAP v1.0
compliant cache server. Cache servers can help reduce the overall bandwidth
requirements and reduce latency by serving cached content locally. IWSVA scans and
secures all content returned to the cache server and to the clients.
For further details on ICAP mode, see Deploying in ICAP Mode on page 2-22.
1-8
Chapter 2
Deployment Primer
This chapter describes the following:
• Identifying Your Server Placement
• Planning HTTP and FTP Service Flows
• Deploying in Forward Proxy Mode
• Deploying in ICAP Mode
• Deploying in Reverse Proxy Mode
• Deploying in Transparent Bridge Mode
2-1
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
2-2
Deployment Primer
• Corporate LAN—These segments are located behind the internal firewall. The
configuration of the internal firewall passes traffic to machines on the corporate
LAN only when the traffic originates from computers inside the DMZ.
This topology requires that all data inbound from the external servers (such as those on
the Internet) first pass through a server in the DMZ. It also requires that certain types of
data (for example HTTP and FTP packets), outbound from internal segments, pass
through a server in the DMZ. This forces the use of proxies such as IWSVA.
2-3
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
LAN. For example, the firewall might allow HTTP data from the Internet to reach
only the IWSVA server.
2-4
Deployment Primer
2-5
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
2-6
Deployment Primer
Note: IWSVA FTP works with most firewalls, usually requiring only a modification to the
firewall to open a port for the FTP proxy.
2-7
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
3. The FTP server on the Internet responds to the request, ideally with the requested
file.
4. The IWSVA FTP service scans the returned data for unwanted content. If it finds
any unwanted content, it returns an appropriate message to the FTP client.
Otherwise, it returns the requested data to the FTP client.
2-8
Deployment Primer
Unlike the HTTP dependent-mode service, which has the possible benefit of cached
requests, most FTP proxy servers do not cache requests.
FTP Dependent Mode also protects FTP servers from upload and download threats.
FTP requests follow this sequence:
1. The FTP client sends a request to the IWSVA FTP service.
2. The IWSVA FTP service validates the request (for example, the file type is not
blocked). If the request is valid, the IWSVA FTP service relays it to the other FTP
proxy or the FTP server being protected by IWSVA.
3. The FTP server on the Internet responds to the request, ideally with the requested
file.
4. The IWSVA FTP service scans the returned data for unwanted content. If it finds
any unwanted content, it returns an appropriate message to the FTP client.
Otherwise, it returns the requested data to the FTP client.
2-9
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
2-10
Deployment Primer
FTP clients must contact IWSVA instead of the destination server, and use a modified
handshake to supply the FTP server address. The FTP scanning module must be
installed and configured in standalone mode to process this traffic.
A DVANTAGE L IMITATION
2-11
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
2-12
Deployment Primer
During the installation, ensure that the check box to enable transparency to support this
deployment mode is checked.
A DVANTAGES L IMITATIONS
No LDAP support
2-13
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
When using WCCP transparency, FTP over HTTP connections are supported and FTP
downloads are scanned. With the addition of supporting WCCP v2.0, IWSVA is able to
participate in a cluster of IWSVA devices to provide a load balancing WCCP Web
security platform.
Trend Micro recommends IOS 12.4(15)T3 or later should be used when deploying
WCCP environments.
Advantages of using WCCP:
• Transparency for client side
• Scalable
Limitations of using WCCP:
• Cisco proprietary
• WCCP does not work with LDAP
2-14
Deployment Primer
Note: If you configure IWSVA to work in stand-alone mode, each client on your network
needs to configure Internet connection settings to use the IWSVA device and port
(default 8080) as their proxy server.
A DVANTAGE L IMITATION
2-15
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
FIGURE 2-8 Use a Layer 4 switch to load balance between IWSVA servers
for multiple HTTP stand-alone servers
2-16
Deployment Primer
• If the URL is valid, the HTTP service forwards the request to an upstream
HTTP proxy server.
3. The upstream proxy server performs its processing, then forwards the request to the
Web site on the Internet
4. The contacted Web site returns a response (ideally a Web page) to the HTTP proxy
server.
5. The HTTP proxy server performs its processing on the returned data, then
forwards the response data to the IWSVA HTTP service.
6. The HTTP service scans the content for unwanted data and returns an appropriate
response to the HTTP client.
A DVANTAGES L IMITATIONS
Proxy server controls timing and content IWSVA has to scan every response-even
availability behavior if cached.
2-17
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
A DVANTAGES L IMITATIONS
WARNING! Two security trade-offs exist for this potential performance enhancement:
1. If the cache contains data with a virus, for which there was no pattern
when the data hit the cache, the IWSVA HTTP service cannot prevent the
spread of the virus.
Instead of using the proxy-behind flow, Trend Micro recommends that administrators
use an ICAP caching device. This solution provides the performance enhancements of
caching without the security issues of proxy-behind topology.
Web page requests follow this sequence:
1. The Web client sends a request to HTTP proxy server.
2. The proxy server forwards the request to IWSVA.
3. IWSVA validates the request using URL Filtering/Blocking.
• If the URL is invalid (blocked), the HTTP service sends the HTTP client an
appropriate notice, completing the transaction.
2-18
Deployment Primer
• If the URL is valid, the HTTP service forwards the request to the Web server
on the internet.
4. The contacted Web server returns a response (ideally a Web page) to IWSVA.
5. IWSVA performs its processing on the returned data (virus, spyware, ActiveX
scanning), then forwards the appropriate response/data to Proxy server.
6. The Proxy server caches the data (if cacheable), then delivers the response/data to
the HTTP client.
A DVANTAGES L IMITATIONS
2-19
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
IWSVA server and the Internet. This is typically used to get the advantages of the two
configurations of Dependent Mode: Proxy-ahead and Proxy-behind.
Web page request follows this sequence:
1. The Web client sends a request to first proxy server.
2. The first proxy server forwards the request to IWSVA.
3. IWSVA validates the request using URL Filtering/Blocking.
• If the URL is invalid (blocked) the HTTP service sends the HTTP client an
appropriate notice, completing the transaction.
• If the URL is valid, the HTTP service forwards the request to the second proxy
server.
4. The second proxy server performs its processing, then forwards the request to the
Web server on the internet.
5. The contacted Web server returns a response (ideally a Web page) to second proxy
server.
6. The second proxy server caches the data (if cacheable), then deliver the
response/data to IWSVA.
7. IWSVA performs its processing on the returned data (Virus, Spyware, ActiveX
scanning), then forwards the appropriate response/data to first proxy server.
2-20
Deployment Primer
8. The first proxy server caches the data (if cacheable), then delivers the response/data
to the HTTP client.
A DVANTAGES L IMITATIONS
Proxy server controls timing and content Costs more-- additional proxy server is
availability behavior needed
2-21
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
2-22
Deployment Primer
A DVANTAGES L IMITATIONS
ICAP allows scanning of only new and nec- Up front cost of ICAP equipment
essary content.
Reduced, selective scanning enhances per- Adds extra step in IWSVA installation
formance process
2-23
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
Note: Non-ICAP environments can receive similar benefits by using multiple IWSVA
servers. However, the administrator must utilize additional load balancing technology.
2-24
Deployment Primer
The following figures show the HTTP flow with single and multiple IWSVA servers.
(Both images assume the requested data in not in the ICAP device's cache.) The ICAP
service determines which IWSVA server receives the request in a multi-server
environment.
IWSVA configured in ICAP Mode processes a Web page requests in the following
sequence:
1. An HTTP client makes a request for a URL, sending the request to the ICAP
caching proxy device.
2. The ICAP device, based on its configuration, determines that the request must be
forwarded to an IWSVA server. If multiple servers are available, it alternates in
round-robin fashion for load balancing.
3. The IWSVA server validates the URL.
• If the URL is not blocked, IWSVA sends the response to the ICAP device.
• If the URL is invalid (blocked), IWSVA directs the ICAP device to send an
appropriate response to the HTTP client and the transaction is complete.
4. If the URL is valid, the ICAP server requests the page from the Web site on the
Internet.
5. The Web site on the Internet returns the requested page (or some other appropriate
response).
6. If the page is returned, the ICAP device, based on its configuration, determines that
an IWSVA server must scan the data. Again, if multiple servers are available, it
alternates in round-robin fashion for load balancing.
7. The IWSVA server scans the results and returns an appropriate response to the
ICAP device, based on whether the data is clean or contains unwanted content.
8. If the data is clean, the ICAP device returns said data to the HTTP client, and the
ICAP device retains a copy of the data to satisfy future requests. If the data contains
unwanted content, the ICAP device returns an appropriate error message (dictated
2-25
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
by IWSVA) to the HTTP client, and the ICAP device does not retain a copy for
future requests.
2-26
Deployment Primer
A DVANTAGES L IMITATIONS
2-27
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
2-28
Deployment Primer
2-29
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
IWSVA configured in Reverse Proxy Mode processes a Web page requests in the
following sequence:
1. Clients initiate Web request.
2. The request is received by IWSVA, configured to listen on port 80.
3. IWSVA scans the content, then forwards it to an actual Web server.
4. The Web server delivers the requested page back to IWSVA.
5. IWSVA rewrites the page headers, and sends on the request.
6. The modified page returns to the requestor.
A DVANTAGES L IMITATIONS
IWSVA scans all objects only once-before New engine, pattern, and configurations
they are cached will not affect cached objects.
2-30
Deployment Primer
2-31
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
2-32
Chapter 3
3-1
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
Component Installation
During installation, the following Trend Micro components are automatically installed:
• Main Program—Management console and the basic library files necessary for
IWSVA.
• HTTP Scanning—Service necessary for HTTP scanning (either ICAP or HTTP
proxy) and URL blocking.
• FTP Scanning—Service necessary for FTP scanning.
• URL Filtering—Service necessary for URL filtering (not enabled by default).
Requires a separate activation code.
• Applets and ActiveX Scanning—Service necessary for scanning Java applets and
ActiveX controls. Requires a separate Activation Code.
• IntelliTunnel Security—Services to block communication provided by certain
Instant Message (IM) protocols and certain authentication connection protocols.
• SNMP Notifications—Service to send SNMP traps to SNMP-compliant network
management software.
• Control Manager Agent for IWSVA—Files necessary for the Control Manager
agent. You need to install the agent if you are using Control Manager (Trend Micro’s
central management console).
• Command Line Interface—A custom CLI shell to manage InterScan Web Security
Virtual Appliance from the command line, either by TTY or SSH.
3-2
Installing InterScan Web Security Virtual Appliance
Note: URL Filtering and Applets and ActiveX Scanning each require a separate activation
code.
Obtaining IWSVA
IWSVA is supported on the following platforms:
• Bare Metal installation (dedicated off-the-shelf server platform without an operating
system)
• VMware ESX as a virtual machine
Trend Micro recommends that you evaluate which method of installation best suits your
environment.
You can install IWSVA from the Trend Micro Enterprise Solutions DVD or download
the installation ISO from the Trend Micro IWSVA download location
(http://www.trendmicro.com/download/product.asp?productid=86).
The DVD is available to purchase and contains the installable file and all
documentation.
To install from the Trend Micro Enterprise Solutions DVD
To complete this installation, you need to create a bootable installation CD/DVD with
the IWSVA ISO file.
1. To create the installation media, insert the Trend Micro Enterprise Solution disk
into the CD/DVD-ROM drive on the computer where ISO images can be created.
2. Copy the IWSVA ISO image from the Trend Micro Enterprise Solutions Media
onto the local hard drive.
3. Eject the Enterprise Solutions DVD and place a blank CD disk into the CD/DVD
writer.
4. Burn the IWSVA ISO image to the blank CD
5. Insert the newly created IWSVA Installation CD into the target server where you
would like to install IWSVA.
6. Reboot the server and boot from the IWSVA installation CD to begin the
installation process.
3-3
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
Note: The file on the Enterprise DVD and on the Trend Micro Evaluation site is an ISO
image. The ISO image allows you to create an IWSVA installation CD to install the
product.
Note: The ISO image needs to be copied and then burned onto a blank CD in order to
create the IWSVA installation CD (see the CD ISO creation document, How to Use the
Trend Micro IWSVA ISO File).
Installing IWSVA
IWSVA only supports new installations — upgrading an existing IWSS or IWSA
installation is not supported. IWSVA supports migrating existing configuration and
policy data from IWSS 3.1 Linux and IWSA 3.1 products (see Migration on page 1-5).
The IWSVA installation process formats your existing system to install IWSVA. The
installation procedure is basically the same for both a Bare Metal or a VMware ESX
virtual machine platform. The Bare Metal installation simply boots off of the IWSVA
installation CD to begin the procedure and the VMware installation requires the creation
of a virtual machine before installation. The additional VMware virtual machine
configuration is described in Appendix E, Creating a New Virtual Machine Under
VMware ESX for IWSVA.
3-4
Installing InterScan Web Security Virtual Appliance
WARNING! Any existing data or partitions are removed during the installation pro-
cess. Please backup any existing data on the system (if any) before install-
ing IWSVA.
IWSVA also installs a copy of the open source content caching application called Squid.
It is disabled by default but you can enable this free open-source utility through the CLI
interface. Trend Micro provides Squid content caching for convenience and easy
installation. Support for Squid is provided by the Squid open-source community.
Trend Micro Disclaimer: Trend Micro IWSVA pre-installs Squid to help reduce the
complexity of installing and configuring Squid to function with
IWSVA. Squid is disabled by default and must be enabled by the
customer through the IWSVA CLI after installation has been
completed. Support for Squid is obtained through open source
channels and it is the responsibility of the customer to become
acquainted with Squid's benefits and functionality before enabling.
To install IWSVA:
1. Start the IWSVA installation.
Installing on a Bare Metal Server
• Insert the IWSVA Installation CD (which was created from the IWSVA ISO
image) into the CD/DVD drive of the desired server.
Installing on a VMware ESX Virtual Machine
a. Create a virtual machine on your VMware ESX server
See Appendix E, Creating a New Virtual Machine Under VMware ESX for
IWSVA.
3-5
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
b. Power on the virtual machine that was created to boot from the IWSVA
installation ISO.
Installation Steps for both a VMware ESX Virtual Machine and a Bare Metal
Server
A page appears displaying IWSVA Installation Menu. The options in this menu are
the following:
• Install IWSVA: Select this option to install IWSVA onto the new hardware or
virtual machine
• System Recovery: Select this option to recover an IWSVA system in the event
that the administrative passwords can not be recovered.
• System Memory Test: Select this option to perform memory diagnostic tests
to rule out any memory issues
• Exit Installation: Select this option to exit the installation process and to boot
from the local disk.
2. Select Install IWSVA.
The license acceptance page appears. From this page, you can access the readme
(Readme button).
3. Click Accept to continue.
A page appears where you choose a keyboard language.
4. Select the keyboard language for the system and then click Next.
The IWSVA installer scans your hardware to determine if the minimum
specifications have been met and displays the results as illustrated below. If the host
hardware contains any components that do not meet the minimum specifications,
the installation program will highlight the non-conforming components and the
installation will stop.
5. Select the deployment mode for the IWSVA installation and then click Next.
Below are the deployment modes for the IWSVA installation. These are only
enabled if you select a static IP address. The default is to use a dynamic IP address
using DHCP. Click Edit to set a static IP address.
• Installing for Transparent Bridge Mode
• Installing for Forward Proxy Mode
• Standalone Proxy Configuration
• Upstream Proxy Configuration
3-6
Installing InterScan Web Security Virtual Appliance
7. Configure the network settings as required for IWSVA and then click Next.
8. From the time zone page, specify the time zone for IWSVA.
Use the drop down list to display the supported time zones or point to your
location using the time zone map.
9. Click Next.
3-7
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
10. Specify passwords for the root, enable, and admin accounts.
IWSVA uses three different levels of administrator types to secure the system.
The password must be a minimum of 6 characters and a maximum of 32 characters.
For best security, create a highly unique password only known to you. You can use
both upper and lower case alpha characters, numerals, and any special characters
found on your keyboard to create your passwords.
• Root Account: The Root account is used to gain access to the operating
system shell and has all rights to the server. This is the most powerful user on
the system.
• Enable Account: The Enable account is used to gain access to the command
line interface's privilege mode. It has all rights to execute any CLI command.
• Admin Account: The Admin account is the default administration account
used to access the IWSVA Web and CLI management interfaces. It has all
3-8
Installing InterScan Web Security Virtual Appliance
rights to the IWSVA application, but no access rights to the operating system
shell.
As you type the passwords, the password strength meter on the right indicates how
strong the selected password is. For the best security, Trend Micro recommends
using a strong, unique password.
11. Click Next.
A page appears where you accept all the configuration settings.
12. Confirm that the selected values are correct and then click Next.
The installation process prompts you to begin the installation. Selecting Continue
will erase any data on the hard disk partition and format the hard disk. If you have
data on the hard disks that you would like to keep, cancel the installation and
backup the information before proceeding.
13. Click Continue.
A page appears that provides the formatting status of the local drive for the IWSVA
installation. When formatting completes, the IWSVA installation begins.
Once the installation is complete a summary screen appears. The installation log is
saved in the /root/install.log file for reference.
14. Click Reboot to restart the system.
For a bare metal installation:
The CD automatically ejects. Remove the CD from the drive to prevent
reinstallation.
For a virtual machine installation:
Trend Micro recommends disconnecting the CD ROM device from the virtual
machine now that IWSVA is installed.
After IWSVA reboots, the initial CLI login screen appears.
3-9
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
Both of these messages are normal. The latter message indicates that the system BIOS
is not reporting or presenting any PSB or ACPI objects or hooks to the Linux kernel.
Either the CPU or BIOS does not support PSB or ACPI objects or hooks or they are
simply disabled.
15. Logon either in the CLI or in the IWSVA Web console to launch IWSVA.
See Logging Into IWSVA for the First Time on page 3-27 for complete details.
Login to the CLI shell if you need to perform additional configuration,
troubleshooting, or housekeeping tasks.
3-10
Installing InterScan Web Security Virtual Appliance
3-11
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
The table below describes the configuration information required for this
deployment mode.
C ONFIGURATION D ESCRIPTION
P ARAMETER
Internal Interface Select which network adapter should be used for the
internal connection of the transparent bridge.
External Interface Select which network adapter should be used for the
external connection of the transparent bridge.
3-12
Installing InterScan Web Security Virtual Appliance
The table below describes the configuration information required for this
deployment mode.
C ONFIGURATION D ESCRIPTION
P ARAMETER
3-13
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
C ONFIGURATION D ESCRIPTION
P ARAMETER
3-14
Installing InterScan Web Security Virtual Appliance
3-15
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
C ONFIGURATION
D ETAILS R ECOMMENDED VALUE
P ARAMETER
3-16
Installing InterScan Web Security Virtual Appliance
3-17
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
3-18
Installing InterScan Web Security Virtual Appliance
3-19
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
The table below describes the configuration information required for this deployment
mode.
C ONFIGURATION D ESCRIPTION
P ARAMETER
3-20
Installing InterScan Web Security Virtual Appliance
C ONFIGURATION D ESCRIPTION
P ARAMETER
3-21
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
The table below describes the configuration information required for this
deployment mode.
C ONFIGURATION
D ETAILS R ECOMMENDED VALUE
P ARAMETER
3-22
Installing InterScan Web Security Virtual Appliance
3-23
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
The table below describes the configuration information required for this deployment
mode.
C ONFIGURATION D ESCRIPTION
P ARAMETER
3-24
Installing InterScan Web Security Virtual Appliance
C ONFIGURATION D ESCRIPTION
P ARAMETER
3-25
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
The table below describes the additional configuration information required for this
deployment mode.
3-26
Installing InterScan Web Security Virtual Appliance
3-27
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
Post-Installation Notes
After IWSVA reboots and the initial CLI is available, Trend Micro recommends that you
update your scan engine and virus pattern files immediately after registering and
activating the product (see the Administrator’s Guide).
Trend Micro only supports listening port 80 for IWSVA in Reverse Proxy Mode, as well
as for the protected server. When configuring IWSVA as a reverse proxy, specify port 80
in the HTTP listening port field, and in the Port field for the protected server. The
IWSVA listening port for reverse proxy is hardheaded to 80.
3-28
Chapter 4
Migrating to IWSVA
This chapter describes the following:
• Migrating from an IWSx Product to IWSVA 3.1
• Migrating from IWSVA 3.1 to Another IWSVA 3.1
4-1
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
1. Open the Web console of the IWSx product and then choose Administration >
Support.
2. Click Generate System Information File.
The Web Console displays a progress bar.
3. Select the Case Diagnostic Tool (CDT) package and then click Download to your
computer to save the CDT package to your local drive.
This CDT package is the configuration package.
4. Open the Web console of IWSVA and then choose Administration >
Configuration Backup/Restore from the main menu.
5. Click Browse to select the configuration package that you backed up from the IWSx
unit and then click Import to start importing.
IWSVA displays a progress bar and then displays a result page with important
status.
4-2
Migrating to IWSVA
IWSVA displays a progress bar. And when finished, IWSVA displays a result
page with export status. If successful, the IWSVA opens a dialog box and
prompts you to save the configuration file to a local disk. This package is the
configuration package.
2. Open the Web console of the target IWSVA and then choose Administration >
Configuration Backup/Restore from the main menu.
3. Click Browse to select the configuration package and then click Import to start
importing.
IWSVA displays a progress bar and then displays a result page with important
status.
4-3
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
4-4
Appendix A
Deployment Integration
This appendix describes the following:
• IWSVA in a Distributed Environment
• Integration with LDAP
• Damage Cleanup Services (DCS) Integration
• Integration with a Cisco Router using WCCP
• Configuring the Cisco device and IWSVA for WCCP
• Configuring IWSVA for a WCCP Service Group
• Protecting an HTTP or FTP Server using Reverse Proxy
• Integration with an ICAP Device
• Configuring the Local Squid Proxy
A-1
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
LDAP server (if config- Type: LDAP Cached data is used for
ured) already started services.
Volume: Medium
Services will not start.
Trend Micro Active Type: HTTP and HTTPS IWSVA components can-
Update Server not be updated in time.
Volume: 10-50 Mb/day
A-2
Deployment Integration
A-3
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
Note: Global Catalog is available only in Microsoft Active Directory. The advantage of using
the Global Catalog port includes better performance for LDAP object lookup, and allows
object lookup that resides in many sub-levels of the Active Directory tree (beyond three).
However, in order for IWSVA to utilize the Global Catalog, the AD being requested for
an object needs to have the Global Catalog enabled along with the AD where the queried
user/group object reside. IWSVA supports the use of the Global Catalog port only to be
configured as the main LDAP server, and not part of the IWSVA referral chasing servers.
A-4
Deployment Integration
Tip: Trend Micro recommends allowing IWSVA to query the root Active Directory server
with the Global Catalog enabled, and using Universal group types to do group nesting
when applying policies. This can be seen by the Global Catalog and will be visible
throughout the Active Directory. For more information, see Microsoft support
(http://support.microsoft.com/kb/231273).
IWSVA bypasses the LDAP-based user identification and applies the special (guest)
policies to every computer accessing it over this port.
A-5
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
Note: If malware attempts to contact a remote server using a protocol other than HTTP,
IWSVA will not detect it, thus will not trigger a cleanup.
A-6
Deployment Integration
When IWSVA registers to a DCS server, infected client cleanups are handled in the
following manner:
1. IWSVA detects the client attempting to access a URL listed in the PhishTrap pattern
file or upload a worm.
2. IWSVA requests the DCS server to clean up the infected client.
3. DCS attempts to connect to the infected client and clean it through remote
procedures.
4. DCS reports the outcome of its cleaning attempt to IWSVA for logging.
When it receives a cleanup request from IWSVA, DCS attempts to connect to the
infected client and repair the system damage. The outcome of the cleaning attempt,
either successful or unsuccessful, is reported back to the IWSVA server for logging. If
the cleanup attempt is not successful, then the client is redirected to a Web page hosted
on the DCS server and an ActiveX control again attempts to clean the infected
computer, with the permission of the computer’s user.
Note: If you are using DCS in conjunction with a HTTPS-enabled IWSVA Web management
console, IWSVA must be configured to allow access to the secure port (typically 8443). If
access to the secure port is blocked, IWSVA will be unable to redirect clients to DCS for
clean-up requests.
A-7
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
FIGURE A-2 Allow access to the secure port (typically 8443) if using
DCS and the HTTPS management console
A-8
Deployment Integration
A-9
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
After the WCCP configuration is saved, you can use the show ip wccp 80 view
command on the router or switch to verify that IWSVA has been added as one of the
WCCP cache engines. If this addition is successful, various information displays,
including the IWSVA IP address (Web Cache ID) and the state of the IWSVA unit,
which will be usable. The following is a typical display indicating that IWSVA was added
successfully:
WCCP Cache-Engine information:
Web Cache ID: 192.168.62.100
Protocol Version: 2.0
State: Usable
Initial Hash Info: 00000000000000000000000000000000
00000000000000000000000000000000
Assigned Hash Info: FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
Hash Allotment: 256 (100.00%)
Packets Redirected: 0
Connect Time: 00:05:07
Bypassed Packets
Process: 0
Fast: 0
CEF: 0
If IWSVA was not added successfully as one of the WCCP cache engines, then no
information will be displayed. In this case, you can use the debug ip wccp packets
command to determine the problem.
For IWSVA, certain WCCP communication-related information is also available from
the http.log file in the /etc/iscan/log/ directory. To locate this information,
search for log entries that begin with “WCCP”.
Note: The CLI command, show log http <log date> monitor http can be
used to search for log entries.
To view WCCP logs, turn on the log flag (wccp_logging = 1) within the
/etc/iscan/IWSSPIProtocolHttpProxy.pni file.
A-10
Deployment Integration
Note: In order to prevent communication related issues, WCCP needs to be configured on the
Cisco router or switch before being configured on IWSVA (see Configuring the Cisco
device and IWSVA for WCCP).
You can modify the following default entries from 80 to the desired service ID.
wccp_dynamic_service=dynamic 80
wccp_service_info=80 protocol=tcp
flags=src_ip_hash,dst_ip_hash,source_port_hash priority=120
ports=80,21
A-11
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
Note: The second and third lines of the above code should be typed as a single line. Because of
space limitations in this readme, this code occupies two lines.
Note: In order to implement the new service ID on IWSVA, restart the wccpd daemon after
the service ID is modified. This results in both IWSVA and the supported WCCP Cisco
device being configured to use the same service ID, which allows them to belong to the
same service group. As members of the same service group, IWSVA and the WCCP
Cisco device can communicate with each other.
The valid customizable WCCP Dynamic Service ID range is from 51-255, while 0-50 is
reserved for Well-Known services. Certain WCCP routers only accept service ID range
from 0-99.
A-12
Deployment Integration
Note: If IWSVA is configured to use the Well-Known Service ID to join a Well-Known Service
group, then Trend Micro recommends configuring only one router on each IWSVA
device.
Note: Based on WCCP specification, the Well-Known service group configuration does not
support FTP traffic redirection to IWSVA for scanning. Configure the WCCP Cisco
device to use the Well-Known service type prior to configuring IWSVA to avoid WCCP
communication issues.
A-13
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
A-14
Deployment Integration
Note: WCCP logging only records WCCP control messages and not user traffic activities. The
WCCP daemon needs to be restarted to pick up the WCCP logging settings in the
IWSVAPIProtocolHttpProxy.pni file.
A-15
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
for IWSVA specified. For more detailed PIX firewall configurations, refer to relevant
Cisco documentations.
wccp web-cache password <password>
wccp interface inside web-cache redirect in
wccp 80 password <password>
wccp interface inside 80 redirect in
A-16
Deployment Integration
If you are protecting the FTP server, install the FTP scanning service and configure it to use
an FTP proxy.
• Define the following configuration setting in the [ftp] section of the pni-file
A-17
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
A-18
Deployment Integration
Note: Disable Bypass on Failure if the priority is more on virus propagation within
your network. Otherwise, enable Bypass on Failure to guarantee an unblocked
connection to the Internet.
7. Under the Consistency field, choose strong from the drop-down menu and leave
the lbw Threshold field empty.
8. Under the Services text box (for response mode), type:
icap://{ICAP-SERVER-IP}:1344/resp on,
where ICAP-SERVER-IP is the IP address of IWSVA ICAP for response mode.
Under the Services text box (for request mode), type
icap://{ICAP-SERVER-IP}:1344/REQ-Service on,
where ICAP-SERVER-IP is the IP address of IWSVA ICAP for request mode.
For multiple IWSVA ICAP server services, type the additional entries in step 7. For
example:
For response mode,
• icap://{ICAP-SERVER1-IP}:1344/resp on
• icap://{ICAP-SERVER2-IP}:1344/resp on
Click Commit Changes.
For request mode,
• icap://{ICAP-SERVER1-IP}:1344/REQ-Service on
• icap://{ICAP-SERVER2-IP}:1344/REQ-Service on
Click Commit Changes.
Note: For multiple ICAP servers within a service farm with strong consistency
selected, make sure that all ICAP servers have identical intscan.ini and
other configuration files and the same virus pattern. The service farm will not
work properly if the ICAP servers have different configurations.
9. Click the Access Control Lists tab, and then select Enable Access Control Lists.
10. Type icap (Service Farm name of the ICAP Server) any in the HTTP
ACL field.
11. Click Commit Changes.
A-19
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
To configure scanning FTP over HTTP traffic, go to FTP > Configuration >
Access Control Lists, and then add “icap (service farm name)” into the
FTP ACL field.
A-20
Deployment Integration
Note: You can edit the configured ICAP services. To edit a server configuration again,
select the service and click Edit. The examples used for configuring ICAP for
Blue Coat is based on version 2.1.07. The settings might vary depending on the
version of Blue Coat.
A-21
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
f. Under the Action column, right-click Bypass ICAP Response Service and
click Set.
The Add Object screen appears.
g. Click New and select Use ICAP Response Service.
The Add ICAP Service Action screen appears.
h. Choose the ICAP service name under the ICAP Service/Cluster Names
field. Enable Deny the request under the On communication error with
ICAP service section. Click OK, and then click OK again.
i. Click Install Policies.
To add the request mode policy:
a. Select Management. Type the logon user name and password if prompted.
b. Select Policy in the left menu, and then click the Visual Policy Manager tab.
c. Click Start. If the Java Plug-in Security Warning screen appears, click Grant
this session.
d. On the menu bar, click Edit > Add Web Access Policy.
The Add New Policy Table screen appears.
e. Type the policy name under the Select policy table name field. Click OK.
f. Under the Action column, right-click Deny and click Set.
The Add Object screen appears.
g. Click New and select Use ICAP Request Service. The Add ICAP Service
Action screen appears.
h. Choose the ICAP service name under the ICAP Service/Cluster Names
field.
i. Enable Deny the request under the On communication error with ICAP
service section.
j. Click OK, and then click OK again.
k. Click Install Policies.
10. To check the current policy, go to the Policy screen, click the Policy Files tab, and
then click Current Policy.
A-22
Deployment Integration
A-23
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
This command takes you into the ICAP service configuration menu. Display a list
of all available commands. Issue the following commands:
server icap://ICAP SERVER IP:1344/REQ-Service (to assign a server type)
vector-point reqmod-precache (to assign the proper vector point type)
error-handling return-error (to assign the proper error-handling type)
enable (to enable the ICAP multiple server configuration)
7. Type exit.
8. For additional configuration steps, type the following:
icap append-x-headers x-client-ip (to enable X-client headers for reports)
icap append-x-headers x-server-ip (to enable X-server headers for
reports)
icap rescan-cache ISTag-change (to turn on ISTAG rescan for updates)
icap bypass streaming-media (to exclude streaming media from ICAP
scanning)
icap apply all (to apply all settings and activate ICAP type)
show icap (to display current ICAP configuration at root CLI menu)
A-24
Deployment Integration
The Add ICAP Cluster Entry screen appears. The pick list contains a list of
any services available to add to the cluster.
7. Choose a service and then click OK.
8. Highlight the ICAP cluster entry and click Edit.
The Edit ICAP Cluster Entry name screen appears.
9. In the ICAP cluster entry weight field, assign a weight from 0-255.
10. Click OK and then OK again, and finally Apply.
Note: Do not delete a cluster used in a Blue Coat Port 80 Security Appliance policy if a
policy rule uses a cluster name.
A-25
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
A-26
Appendix B
B-1
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
URL Filtering
IWSVA utilizes the Trend Micro URL Filtering Engine to perform URL categorization
and reputation rating based on the data supplied by the Trend Micro Web Reputation
feature. Trend Micro recommends using the default setting of a weekly update check to
ensure that your installation has the most current URL Filtering Engine.
IWSVA can control URL access based on Web Reputation feedback, the optional URL
Filtering module, or a combination of both. The combination of Web Reputation and
the URL Filtering module is a multi-layered, multi-threat protection solution provided
by IWSVA.
The optional URL Filtering module grants or denies Web access based on the category
to which a URL belongs. Web Reputation grants or denies Web access based on whether
the requested URL is a phishing or pharming threat, has hacking potential, or has a
reputation score that deems it untrustworthy. Both the optional URL Filtering module
and Web Reputation are controlled by the specifications you make in policies.
For further details, see Chapter 4 in the Administrator’s Guide.
B-2
Tuning and Troubleshooting
• User group membership cache: This cache can store the group membership
information for several hundred users. By default, entries in this cache will be valid for
48 hours, or until the cache fills (at which point entries are replaced, starting with the
oldest).
The time to live (TTL) for entries in this cache can be configured through the setting
user_groups_central_cache_interval in the [user-identification] section of
intscan.ini configuration file.
• Client IP to User ID cache: This cache associates a client IP address with a user who
recently authenticated from that same IP address. Any request originating from the
same IP address as a previously authenticated request will be attributed to that user,
provided the new request is issued within a configurable window of time (15 minutes
by default for HTTP, 90 minutes for ICAP) from that authentication. The caveat is
that client IP addresses seen by IWSVA must be unique to a user within that time
period, thus this cache is not useful in environments where there is a proxy server or
source NAT between the clients and IWSVA, or where DHCP frequently reassigns
client IPs.
B-3
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
B-4
Tuning and Troubleshooting
Troubleshooting
Troubleshooting Tips
• Issue: IWSVA could not connect to the database specified in the Database
Connection Settings page. The IWSVA management console displays the following
error message:
JDBC-ODBC BRIDGE: [UNIXODBC] Could not connect to the
server; Could not connect to remote socket.
Solution:
• Please check the ODBC connection and/or database server and try again.
• Issue: The IWSVA management console displays an authentication error message.
JDBC-ODBC BRIDGE: [UNIXODBC]FATAL: Password authentication
failed for user.
Solution:
• Verify the user credential for the PostgreSQL Server and also ensure that the
database settings are correct (Administration > IWSVA Configuration >
Database | Database Setting). If the problem persists, ensure that the
permissions in the etc/iscan/odbc.ini file are correct.
Installation Problems
Collect the following information about your installation problem before contacting
Trend Micro technical support to expedite the process.
1. IWSVA version and build number
2. Screenshot of the exact error that appears during installation
3. The stage of the installation
B-5
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
B-6
Tuning and Troubleshooting
B-7
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
B-8
Appendix C
C-1
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
FIGURE C-1. This warning screen shows the detection of an EICAR test
virus.
C-2
Additional IWSVA Testing
2. Access the FTP server through IWSVA working as the FTP proxy.
For example, assume the following IP addresses: IWSVA FTP proxy server
(10.2.10.2), FTP server (10.2.10.10).
Open a command line prompt and type the following:
ftp 10.2.10.2
3. Log on as user@host.
For example, if your FTP account name is anonymous and the IP address of the
FTP server is 10.2.10.10; then, log on as [email protected]
4. Upload the test virus (for example, eicar_com.zip) by typing the command
put eicar_com.zip
5. If you have configured the IWSVA FTP proxy correctly, IWSVA displays a message
similar to the following.
C-3
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
C-4
Additional IWSVA Testing
If a client attempts to download an infected file, IWSVA blocks other clients’ access to
that site for four hours by default. When other clients subsequently attempt to access
the same URL that contained the virus, the user will see a URL blocking message instead
of the virus-warning message.
Configure the default block time (in hours) by changing the parameter
infected_url_block_length under the
[Scan-configuration] section of the intscan.ini file.
C-5
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
FIGURE C-5. The following message appears if the URL filtering is set
up properly.
C-6
Additional IWSVA Testing
Testing PhishTrap
Perform the following procedure to test PhishTrap.
To test Phishtrap scanning:
1. Open the IWSVA console and click HTTP > URL Access Control > URL
Blocking.
2. Select Enable URL blocking.
3. Click the Via Pattern File Phish tab.
4. Under Block the following Phish categories, select all four categories (Phishing,
Spyware, Virus accomplice, Disease vector).
5. Click Save.
6. After a successful phishing site detection, a sample message appears:
C-7
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
C-8
Additional IWSVA Testing
Note: Blocking all Java applets and ActiveX controls might be too restrictive for your
environment because it will prevent many legitimate Web sites from functioning properly.
After testing, Trend Micro recommends going back to the Applets and ActiveX Policy:
Edit Global Policy screen to change the settings back to the default or your own
less-restrictive configuration.
C-9
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
Note: MSN Messenger uses the proxy configuration in Internet Explorer, so this test should
be valid without requiring any modifications to firewalls, network, etc. Other IM
applications might not honor the proxy configuration in Internet Explorer and only fall
back to port 80 if the standard port is blocked.
C-10
Appendix D
D-1
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
Product Maintenance
From time to time, Trend Micro might release a patch for a reported known issue or an
upgrade that applies to your product. To find out whether there are any patches
available, visit the following URL:
http://www.trendmicro.com/download/
The Update Center screen displays. Select your product from the links on this screen:
Clicking the link for InterScan Web Security Virtual Appliance takes you to the Update
Center page for IWSVA. Scroll down to review the patches that are available.
Patches are dated. If you find a patch that you have not applied, open the readme
document to determine whether the patch applies to you. If so, follow the installation
instructions in the readme.
Maintenance Agreement
A Maintenance Agreement is a contract between your organization and Trend Micro,
regarding your right to receive technical support and product updates in consideration
for the payment of applicable fees. When you purchase a Trend Micro product, the
License Agreement you receive with the product describes the terms of the Maintenance
Agreement for that product.
A license to the Trend Micro software usually includes the right to product updates,
pattern file updates, and basic technical support (“Maintenance”) for one (1) year from
the date of purchase only. After the first year, Maintenance must be renewed on an
annual basis at Trend Micro’s then-current Maintenance fees.
Note: If the Maintenance Agreement expires, your License Agreement will not.
If the Maintenance Agreement expires, scanning can still occur, but the product cannot
be updated, even manually. Also, you will not be entitled to receive technical support
from Trend Micro.
Typically, ninety (90) days before the Maintenance Agreement expires, you will be
alerted of the pending discontinuation. You can update your Maintenance Agreement by
purchasing renewal maintenance from your reseller, Trend Micro sales, or on the Trend
Micro Online Registration URL:
D-2
Maintenance and Technical Support
https://olr.trendmicro.com/registration/
D-3
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
For regional contact information and the specific technical support numbers for all the
regional and worldwide offices, open the IWSVA management console and choosing
Support from the menu in the management console’s banner.
General US phone and fax numbers follow:
Voice: +1 (408) 257-1500 (main)
Fax: +1 (408) 257-2003
TrendLabs
TrendLabs is Trend Micro’s global infrastructure of antivirus research and product
support centers that provide up-to-the minute security information to Trend Micro
customers.
D-4
Maintenance and Technical Support
The “virus doctors” at TrendLabs monitor potential security risks around the world, to
ensure that Trend Micro products remain secure against emerging risks. The daily
culmination of these efforts are shared with customers through frequent virus pattern
file updates and scan engine refinements.
TrendLabs is staffed by a team of several hundred engineers and certified support
personnel that provide a wide range of product and technical support services.
Dedicated service centers and rapid-response teams are located in Tokyo, Manila, Taipei,
Munich, Paris, and Lake Forest, CA, to mitigate virus outbreaks and provide urgent
support.
Knowledge Base
The Trend Micro Knowledge Base is a 24x7 online resource that contains thousands of
do-it-yourself technical support procedures for Trend Micro products. Use Knowledge
Base, for example, if you are getting an error message and want to find out what to do
to. New solutions are added daily.
Also available in Knowledge Base are product FAQs, hot tips, preventive antivirus
advice, and regional contact information for support and sales.
Knowledge Base can be accessed by all Trend Micro customers as well as anyone using
an evaluation version of a product. Visit:
http://kb.trendmicro.com
And, if you can't find an answer to a particular question, the Knowledge Base includes
an additional service that allows you to submit your question through an email message.
Response time is typically 24 hours or less.
Known Issues
Known issues are features in your IWSVA software that might temporarily require a
workaround. Known issues are typically documented in section 7 of the Readme
document you received with your product. Readme files for Trend Micro products,
along with the latest copies of the product manuals, can also be found in the Trend
Micro Update Center:
http://www.trendmicro.com/download/
D-5
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
http://kb.trendmicro.com
Trend Micro recommends that you always check the Readme file for information on
known issues that could affect installation or performance, as well as a description of
what’s new in a particular release, system requirements, and other tips.
Click the “Submit a suspicious file/undetected virus” link. The following screen
displays.
You are prompted to supply the following information:
• Email: Your email address where you would like to receive a response from the
antivirus team.
• Product: The product you are currently using. If you are using multiple Trend Micro
products, select the product that has the most effect on the problem submitted, or the
product that is most commonly in use.
• Number of Infected Seats: The number of users in your organization that are
infected.
• Upload File: Trend Micro recommends that you create a password-protected zip file
of the suspicious file, using the word “virus” as the password—then select the
protected zip file in the Upload File field.
• Description: Please include a brief description of the symptoms you are experiencing.
Our team of virus engineers will “dissect” the file to identify and characterize any risks
it might contain and return the cleaned file to you, usually within 48 hours.
Note: Submissions made through the submission wizard/virus doctor are addressed promptly
and are not subject to the policies and restrictions set forth as part of the Trend Micro
Virus Response Service Level Agreement.
D-6
Maintenance and Technical Support
When you click Next, an acknowledgement screen displays. This screen also displays a
case number for the problem you submitted. Make note of the case number for tracking
purposes.
If you prefer to communicate by email, send a query to the following address:
[email protected]
In the United States, you can also call the following toll-free telephone number:
(877) TRENDAV, or 877-873-6328
D-7
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
• Subscribe, free, to Trend Micro’s Virus Alert service, to learn about outbreaks as they
happen, and the Weekly Virus Report
• Learn about free virus update tools available to Webmasters
• Read about TrendLabs, Trend Micro’s global antivirus research and support center
To open Security Information:
1. Open the IWSVA management console.
2. Click Security Info from the drop-down menu at the top-right panel of the screen.
The Security Information screen displays.
D-8
Appendix E
Creating a New Virtual Machine Under
VMware ESX for IWSVA
This appendix describes how to create a new virtual machine for IWSVA.
E-1
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
E-2
Creating a New Virtual Machine Under VMware ESX for IWSVA
4. From the button bar, click the upload button (database icon with upward-pointing
arrow) and upload the IWSVA ISO to this datastore.
5. Close the datastore once the upload is complete.
To create the virtual machine
6. From the menu bar, select File > New > Virtual Machine.
E-3
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
E-4
Creating a New Virtual Machine Under VMware ESX for IWSVA
9. Type in the Name field, an appropriate machine name and then click Next.
E-5
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
10. Select the datastore where the virtual machine will reside.
This does not have to be the same datastore used to upload the IWSVA ISO.
11. Click Next.
E-6
Creating a New Virtual Machine Under VMware ESX for IWSVA
12. For the guest operating system, select Linux and Red Hat Enterprise 5 64Bit.
13. Click Next.
E-7
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
E-8
Creating a New Virtual Machine Under VMware ESX for IWSVA
E-9
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
18. Accept the default network settings and then click Next.
E-10
Creating a New Virtual Machine Under VMware ESX for IWSVA
19. For testing purposes, it is adequate to leave the 8GB disk allocation at its default.
For production environments, provide at least 300GB for logging and reporting
purposes. See Hardware Requirements on page 1-2 for more information on disk
space allocation.
20. Click Next.
E-11
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
The New Virtual Machine Wizard (Ready to Complete New Virtual Machine)
screen appears.
21. Check the Edit the virtual machine settings before submitting check box and
then click Continue.
E-12
Creating a New Virtual Machine Under VMware ESX for IWSVA
E-13
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
Note: When IWSVA is installed on a VMware ESX server and configured in Transparent
Bridge mode, you must enable the virtual switch to accept Promiscuous mode in the
ESX 3.5 server.
•
FIGURE E-13 Promiscuous mode in the ESX 3.5 server
E-14
Index
IN–1
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
IN–2
Index
U
Update Center D-2
URL filtering component 3-2
URLs
Knowledge Base 1-xii, D-5–D-6
readme documents D-5
registration D-3
Security Information Center D-7
technical support D-4
user authentication cache B-3
user group membership cache B-3
user_groups_central_cache_interval B-3
V
verbose logging B-4
virus
scanning server clusters, configuring A-24
virus alert service D-8
virus doctors-see TrendLabs D-5
Virus Encyclopedia D-7
Virus Map D-7
Virus Primer D-7
IN–3
Trend Micro™ InterScan Web Security Virtual Appliance™ Installation Guide
IN–4