i-i
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide 1-viii Accessing the IWSVA Web console ...
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation GuideA-16Configuring Virus-scanning Server ClustersFor the Blue Coat Port 80 S
Deployment IntegrationA-17To delete a cluster configuration using the management console:1. Select Management. Type the log on username and password i
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation GuideA-18
B-1Appendix B Tuning and TroubleshootingThis appendix explains the following:• IWSVA Performance Tuning on page B-2• Troubleshooting on page B-6
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation GuideB-2IWSVA Performance TuningIf you are experiencing issues with slow brows
Tuning and TroubleshootingB-3• User group membership cache: This cache can store group membership information. By default, entries in this cache will
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation GuideB-4Disable Verbose Logging When LDAP is EnabledTrend Micro recommends tur
Tuning and TroubleshootingB-5a. Bypass LDAP authentication for the application by adding the URLs that application accesses to “Global Trusted URLs.”
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation GuideB-6TroubleshootingTroubleshooting Tips• Issue: IWSVA could not connect to
Tuning and TroubleshootingB-7General Feature ProblemsIf you have problems with IWSVA, collect the following information to provide to Trend Micro supp
1-ixPrefacePrefaceWelcome to the Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide. This guide helps you to get “up and ru
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation GuideB-8Use these files when working with Trend Micro technical support to hel
C-1Appendix C Best Practices for IWSVA Installation and DeploymentThis appendix describes the following:• IWSVA Installation Overview on page C-2• Pro
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide C-2IWSVA Installation OverviewThis installation overview provides a quic
Best Practices for IWSVA Installation and DeploymentC-3IWSVA provides operating system updates separately from application service packs. Make sure th
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide C-413. Backup the IWSVA configuration to keep a copy of the newly create
Best Practices for IWSVA Installation and DeploymentC-5• Redundant architectures must be designed to support your maximum number of users when it fail
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide C-6SQUID - IWSVA bundles the popular open source caching program, called
Best Practices for IWSVA Installation and DeploymentC-7Best Practice Suggestions• IWSVA uses a hybrid malware scanning architecture that is comprised
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide C-8• For installations with Transparent Bridge mode on VMWare ESX, the e
D-1Appendix D Maintenance and Technical SupportThis appendix describes the following:• Product Maintenance on page D-2• Contacting Technical Support o
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide 1-xAudienceThe IWSVA documentation is written for IT managers and system
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide D-2Product MaintenanceFrom time to time, Trend Micro might release a pat
Maintenance and Technical SupportD-3Typically, ninety (90) days before the Maintenance Agreement expires, you will be alerted of the pending discontin
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide D-4Contacting Technical SupportTo contact Trend Micro Technical Support,
Maintenance and Technical SupportD-5TrendLabsTrendLabs is Trend Micro’s global infrastructure of antivirus research and product support centers that p
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide D-6Known IssuesKnown issues are features in your IWSVA software that mig
Maintenance and Technical SupportD-7• Description: Include a brief description of the symptoms you are experiencing. Our team of virus engineers will
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide D-8• The Virus Primer, which helps you understand the difference between
E-1Appendix ECreating a New Virtual Machine Under VMware ESX for IWSVAThis appendix describes how to create a new virtual machine for InterScan Web Se
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide E-2IntroductionThe actual installation of ESX is not covered in this doc
Creating a New Virtual Machine Under VMware ESX for IWSVAE-33. In the Storage area, double click a storage area that contains enough space to upload t
Preface1-xiChapter 4, Migrating to Inter-Scan Web Security Virtual Appli-anceThis chapter describes the different migration sce-narios and how to comp
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide E-4The Datastore Browser window opens. FIGURE E-2. Storage Area4. From
Creating a New Virtual Machine Under VMware ESX for IWSVAE-5The New Virtual Machine Wizard appears.FIGURE E-3. Virtual Machine Configuration7. Under
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide E-6The Name and Location Selection page appears.FIGURE E-4. Name and L
Creating a New Virtual Machine Under VMware ESX for IWSVAE-7The Virtual Machine Datastore Selection page appears.FIGURE E-5. Virtual Machine Datasto
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide E-8The Virtual Machine Guest Operating System screen appears.FIGURE E-6.
Creating a New Virtual Machine Under VMware ESX for IWSVAE-9The New Virtual Machine Wizard (Virtual CPUs) screen appears.FIGURE E-7. Virtual Machine
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide E-10The New Virtual Machine Wizard (Memory) screen appears.FIGURE E-8.
Creating a New Virtual Machine Under VMware ESX for IWSVAE-11The New Virtual Machine Wizard (Memory) screen appears.FIGURE E-9. Virtual Machine Netw
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide E-12The Virtual Disk Capacity screen appears.FIGURE E-10. Virtual Disk
Creating a New Virtual Machine Under VMware ESX for IWSVAE-13The New Virtual Machine Wizard (Ready to Complete New Virtual Machine) screen appears.FIG
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide 1-xiiIWSVA DocumentationIn addition to the Trend Micro™ InterScan Web Se
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide E-14The Virtual Machine Properties screen appears.FIGURE E-12. Virtual
Creating a New Virtual Machine Under VMware ESX for IWSVAE-15Client Device uses the remote workstation's CD/DVD ROM drive to perform the installa
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide E-16Powering On the IWSVA Virtual Machine and Completing the Installatio
F-1Appendix FCreating a New Virtual Machine Under Microsoft Hyper-V for IWSVAThis appendix describes how to create a new virtual machine for InterScan
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide F-2IntroductionStarting with IWSVA 5.1 SP1, Microsoft Hyper-V based virt
Creating a New Virtual Machine Under Microsoft Hyper-V for IWSVAF-3Installing IWSVA 6.5 on Microsoft Hyper-VUse the following steps as a guideline for
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide F-42. Select Connect to Server.A dialog box appears prompting you to sel
Creating a New Virtual Machine Under Microsoft Hyper-V for IWSVAF-55. Create a new virtual network by selecting External from the list of options and
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide F-66. From the External pull-down menu, select the physical network adap
Creating a New Virtual Machine Under Microsoft Hyper-V for IWSVAF-7Importing the IWSVA ImageAfter configuring the Hyper-V network settings, import the
Preface1-xiiiDocument ConventionsTo help you locate and interpret information easily, the InterScan Web Security Virtual Appliance documentation uses
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide F-82. Select Import Virtual Machine from the menu options.The Import Vir
Creating a New Virtual Machine Under Microsoft Hyper-V for IWSVAF-9A progress bar appears indicating the status of the import process.FIGURE F-8. Im
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide F-102. Right click the virtual machine you want to configure.A menu with
Creating a New Virtual Machine Under Microsoft Hyper-V for IWSVAF-113. Select the Settings... option.The Settings box for that virtual machine opens.
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide F-12The Processor area appears.FIGURE F-11. Assigning Processors to th
Creating a New Virtual Machine Under Microsoft Hyper-V for IWSVAF-138. In the Hardware area, select Memory to allocate memory for your IWSVA environme
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide F-1410. In the Hardware area, select the hard disk controller you want t
Creating a New Virtual Machine Under Microsoft Hyper-V for IWSVAF-15The Hard Drive area appears.FIGURE F-14. Hard Drive Settings13. In the Media are
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide F-16The Choose Disk Type screen appears.FIGURE F-15. Configure Virtual
Creating a New Virtual Machine Under Microsoft Hyper-V for IWSVAF-1716. Leave the Fixed size option selected and click Next.The Specify Name and Locat
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide 1-xivinformation that flows through Internet gateways, email servers, an
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide F-1819. Click Next.The Configure Disk screen appears. FIGURE F-17. Spe
Creating a New Virtual Machine Under Microsoft Hyper-V for IWSVAF-19A summary screen appears that lists the configuration of the virtual hard drive.FI
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide F-20A progress bar appears indicating the status of the hard disk creati
Creating a New Virtual Machine Under Microsoft Hyper-V for IWSVAF-21To power on the IWSVA virtual machine:1. From the Server Manager, click the name o
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide F-22To check and/or change the keyboard type:5. Check the keyboard type
Creating a New Virtual Machine Under Microsoft Hyper-V for IWSVAF-23Where <keyboard type> is the code for the specific keyboard type you want to
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide F-24To complete the hard disk configuration:1. At the enable system prom
Creating a New Virtual Machine Under Microsoft Hyper-V for IWSVAF-25Where <eth0> is the name of the virtual network adaptor that was previously
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide F-26b. To configure the Gateway address, at the system prompt, type:conf
Creating a New Virtual Machine Under Microsoft Hyper-V for IWSVAF-27c. To configure the Domain Name Server (DNS) assignment, at the system prompt, typ
1-1Chapter 1Preinstallation PlanningThis chapter describes the following:• Server Requirements on page 1-2• Information Needed to Install IWSVA on pag
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide F-28d. To create a network host name, at the system prompt, type:configu
Index1-1IndexAActivation Code 1-8adding policyrequest mode A-13response mode A-13Applet and ActiveX scanning component 1-3Application Service Pack C-8
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide 1-2Ffeature problems B-7forward proxy mode 1-10deploying 2-10overview 2-
Index1-3LLayer 4 switch 2-13Layer 4 switches 2-12LDAP A-4authentication in transparent mode A-6, B-4integration A-4performance tuning B-2requirements
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide 1-4throughput A-3reverse proxy mode 1-10overview 2-29risk ratings D-8Ssc
Index1-5white papers D-8XX-Infection-Found A-17X-Virus-ID A-17
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide 1-6
i-i
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide 1-2Server RequirementsOperating SystemA purpose-built, hardened, and per
Preinstallation Planning1-3Server Platform CompatibilityIWSVA should install and operate without issues on many brands of “off-the-shelf ” server plat
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide 1-4During installation, the following open-source application is install
Preinstallation Planning1-5Other Requirements• Database Requirements:• PostgreSQL v9.2.8 (included)• Internet Content Adaptation Protocol (ICAP):• Net
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide 1-6Information Needed to Install IWSVAYou can either purchase or downloa
Preinstallation Planning1-7Type of Proxy ConfigurationIWSVA supports multiple deployment modes.• Forward proxy where clients directly connect to IWSVA
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide 1-8Tip: For security reasons, Trend Micro recommends that you change th
Preinstallation Planning1-9Planning Network Traffic ProtectionIWSVA can be deployed in different modes to help secure your network. (See Chapter 2, De
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide 1-10For further details on the Transparent Bridge Mode, see Deploying in
Preinstallation Planning1-11For more details on the Simple Transparency Mode, see HTTP Proxy in Simple Transparency Mode on page 2-16.WCCP ModeIWSVA w
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide 1-12
2-1Chapter 2Deployment PrimerThis chapter describes the following:• Identifying Your Server Placement on page 2-2• Planning Network Traffic Flows on p
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing an
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide 2-2Identifying Your Server PlacementBefore installing InterScan Web Secu
Deployment Primer2-3• Corporate LAN—These segments are located behind the internal firewall. The configuration of the internal firewall passes traffic
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide 2-4• The firewall configuration allows connections to machines on the co
Deployment Primer2-5Create a flow plan for the network traffic by doing the following:• Understand each IWSVA service’s purpose and function• Determin
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide 2-6There are seven possible deployment modes:Transparent Bridge Settings
Deployment Primer2-7Each configuration has implications for configuring IWSVA, configuring the network, and for network security.HTTPS DecryptionIWSVA
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide 2-8To configure FTP clients to use this flow:• Set the IWSVA server as a
Deployment Primer2-9FIGURE 2-3. FTP Proxy in Standalone ModeFTP Proxy in Dependent ModeYou can also install IWSVA FTP on a dedicated machine between
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide 2-10FTP requests follow this sequence:1. The FTP client sends a request
Deployment Primer2-11IWSVA configured in forward proxy mode provides the following configuration options to enable client protection:• Reconfiguring C
The Installation Guide for Trend Micro™ InterScan™ Web Security Virtual Appliance is intended to introduce the main features of the software and insta
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide 2-12FIGURE 2-5. Reconfiguring the Client SettingsUsing a Layer 4 Switc
Deployment Primer2-13• Simple transparency is not compatible with some older Web browsers when their HTTP requests do not include information about th
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide 2-14During the installation, ensure that the check box that enables tran
Deployment Primer2-15FIGURE 2-7. IWSVA deployment in a WCCP environmentPlanning the HTTP Flow Using the Forward Proxy ModeFor complete details on im
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide 2-16settings. This requires cooperation from your network users, and als
Deployment Primer2-17FIGURE 2-8. Use a Layer 4 switch to load balance between IWSVA servers in simple transparent modeHTTP Proxy in Dependent Mode (
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide 2-18HTTP Proxy in Dependent Mode (Proxy AheadWeb page requests follow th
Deployment Primer2-196. The HTTP service scans the content for unwanted data and returns an appropriate response to the HTTP client.HTTP Proxy in Depe
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide 2-20Web page requests follow this sequence:1. The Web client sends a req
Deployment Primer2-21HTTP Double Proxy in Dependent ModeDouble proxy configuration requires two caching proxies. The first proxy is placed between the
1-iiiContentsPrefaceAudience ... xHow to
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide 2-228. The first proxy server caches the data (if cacheable), then deliv
Deployment Primer2-23Deploying in WCCP ModeNote: For advanced information on deploying in WCCP mode, see the IWSVA 6.5 Administrator's Guide, “Ap
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide 2-24FIGURE 2-11. Using an ICAP-enabled ProxyTABLE 2-7. ICAP-enabled
Deployment Primer2-25Planning the HTTP Flow Using the ICAP ModeFor complete details on implementing the ICAP Mode, see ICAP Mode on page 1-10.HTTP Pro
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide 2-26Although IWSVA performs the same filtering of URLs and scanning of d
Deployment Primer2-27by IWSVA) to the HTTP client, and the ICAP device does not retain a copy for future requests.FIGURE 2-12. HTTP Proxy in ICAP Mo
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide 2-28FIGURE 2-13. HTTP Proxy in ICAP Mode (Multiple IWSVA Servers)TABLE
Deployment Primer2-29Deploying in Reverse Proxy ModeOverview of Reverse Proxy ModeIWSVA is usually installed close to clients to protect them from sec
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide 2-30FIGURE 2-14. Reverse proxy protects Web server from clientsPlannin
Deployment Primer2-31Note: Administrators should be aware of the following:- The URL-filtering feature makes no sense in this configuration; only ant
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide 1-iv Forward Proxy Mode ...
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide 2-326. The modified page returns to the requestor.FIGURE 2-15. HTTP Re
Deployment Primer2-33Deploying in Transparent Bridge ModeOverview of Transparent Bridge ModeIn the Transparent Bridge Mode, IWSVA acts as a bridge bet
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide 2-34Note: Silicom bypass cards are recognized by VMware ESXi 5.0, but th
Deployment Primer2-35Note: The HA deployment mode is only supported in Transparent Bridge mode. High Availability among multiple IWSVAs deployed in th
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide 2-36WARNING! If you accidentally configure both IWSVA devices as parent
3-1Chapter 3Installing InterScan Web Security Virtual ApplianceThis chapter explains the following:• Obtaining IWSVA on page 3-2• Installing IWSVA on
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide 3-2Obtaining IWSVAIWSVA is supported on the following platforms:• Bare M
Installing InterScan Web Security Virtual Appliance3-33. Eject the Enterprise Solutions DVD and place a blank DVD disk into the DVD writer.4. Burn the
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide 3-4Installing IWSVAIWSVA only supports new installations or migrations f
Installing InterScan Web Security Virtual Appliance3-5Cache Web site: www.squid-cache.org. Trend Micro will not provide support for Squid's featu
Contents 1-vIWSVA ICAP Mode with Multiple Servers ... 2-27Deploying in Reverse Proxy Mode ...
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide 3-6Installation Steps for both a VMware ESX Virtual Machine and a Bare M
Installing InterScan Web Security Virtual Appliance3-7Note: You must assign a valid hostname to the IWSVA server for it to function properly.The IWS
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide 3-8Use the drop-down list to display the supported time zones or point t
Installing InterScan Web Security Virtual Appliance3-9FIGURE 3-2. Summary screen contains default password.After the installation is complete a summ
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide 3-10FIGURE 3-3. The initial CLI log in screenNote: During installation
Installing InterScan Web Security Virtual Appliance3-11Logging in to IWSVA for the First TimeAfter IWSVA has restarted, you can log in to the applianc
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide 3-12
4-1Chapter 4Migrating to InterScan Web Security Virtual ApplianceThis chapter describes the following: • About Migration on page 4-2• Information Not
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide 4-2About MigrationInterScan Web Security Virtual Appliance (IWSVA) 6.5 s
Migrating to InterScan Web Security Virtual Appliance4-3• Password information in a configuration backup file will not be displayed in clear text. • I
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide 1-vi Connection Requirements and Properties ...
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide 4-4Overview of the Migration ProcessThis procedure lists the major steps
Migrating to InterScan Web Security Virtual Appliance4-5Migrating from IWSVA 5.6, 6.0, 6.0 SP1 to IWSVA 6.5Note: IWSVA 6.5 only supports partial migra
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide 4-6Migrating from IWSVA 6.5 to Another IWSVA 6.5Note: IWSVA 6.5 does not
Migrating to InterScan Web Security Virtual Appliance4-74. Choose an option and click OK to continue. After MigratingExisting customers can check the
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide 4-8
A-1Appendix A Deployment IntegrationThis appendix describes the following: • IWSVA in a Distributed Environment on page A-2• Integration with LDAP on
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation GuideA-2IWSVA in a Distributed EnvironmentInterScan Web Security Virtual Appli
Deployment IntegrationA-3Throughput and Availability RequirementsThe administrator must determine the IWSVA availability requirements. • Is IWSVA down
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation GuideA-4Integration with LDAPSupport Multiple Domains for Multiple LDAP Server
Deployment IntegrationA-5Catalog is handy when creating IWSVA LDAP policies for a parent group with user(s)/group(s) member(s) residing on remote doma
Contents 1-viiBest Practice Suggestions ...C-4Selecting Deployment Method and R
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation GuideA-6LDAP Authentication in Transparent ModeBefore configuring LDAP authent
Deployment IntegrationA-7Note: You must configure your IE settings to enable automatic authentication on each client computer. By default, automatic
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation GuideA-8Protecting an HTTP or FTP Server using Reverse ProxyIf you are protect
Deployment IntegrationA-9• Define the following configuration settings in the [ftp] section of the pni-file: Integration with an ICAP DeviceYou can in
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation GuideA-10a. Click the Setup tab, and then click System > Licenses on the le
Deployment IntegrationA-11Click Commit Changes.For request mode,•icap://{ICAP-SERVER1-IP}:1344/REQ-Service on•icap://{ICAP-SERVER2-IP}:1344/REQ-Servic
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation GuideA-12The Edit ICAP Service name screen appears. 7. Type or select the foll
Deployment IntegrationA-13Gateway opens a separate browser window and starts the Visual Policy Manager. The first time you start the policy editor, it
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation GuideA-14The Add New Policy Table screen appears.e. Type the policy name under
Deployment IntegrationA-15To set up ICAP for Cisco CE ICAP servers:1. Open the Cisco CE console.2. Type config to enter the configuration mode.3. Type
Komentáře k této Příručce