Setting up an icap Server for ISG- 1000/2000 AV Support



Similar documents
Identity-Based Traffic Logging and Reporting

TECHNICAL NOTE INSTALLING AND CONFIGURING ALE USING A CLI. Installing the Adaptive Log Exporter

TECHNICAL NOTE SETTING UP A STRM UPDATE SERVER. Configuring your Update Server

Migrating Log Manager to JSA

By default, STRM provides an untrusted SSL certificate. You can replace the untrusted SSL certificate with a self-signed or trusted certificate.

Identity-Based Application and Network Profiling

Configuring Devices for Use with Cisco Configuration Professional (CCP) 2.5

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2)

Web Security Firewall Setup. Administrator Guide

Juniper Secure Analytics

SECURE ACCESS TO THE VIRTUAL DATA CENTER

After you have created your text file, see Adding a Log Source.

Elluminate Live! Access Guide. Page 1 of 7

Citrix XenServer 5.6 OpenSource Xen 2.6 on RHEL 5 OpenSource Xen 3.2 on Debian 5.0(Lenny)

Java Remote Desktop. Java Remote Desktop. The Manual of Java Remote Desktop J3PSoftware Revision 2.0 1

Elluminate Live! Access Guide. Page 1 of 7

Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com

Integrating Juniper Netscreen (ScreenOS)

RemoteTM LAN Server User Guide

Unless otherwise noted, all references to STRM refer to STRM, STRM Log Manager, and STRM Network Anomaly Detection.

Configuring a Lan-to-Lan VPN with SSG5 and Check Point Appliance Safe@Office 500

NSM Plug-In Users Guide

Limitation of Riverbed s Quality of Service (QoS)

Junos Pulse. Windows In-Box Junos Pulse Client Quick Start Guide. Published: Copyright 2013, Juniper Networks, Inc.

REPLACING THE SSL CERTIFICATE

Setting Up a Unisphere Management Station for the VNX Series P/N Revision A01 January 5, 2010

Unless otherwise noted, all references to STRM refer to STRM, STRM Log Manager, and STRM Network Anomaly Detection.

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Accessing Restricted University Online Resources Using Network Connect. on the Secure Remote Access Service

IF-MAP FEDERATION WITH JUNIPER NETWORKS UNIFIED ACCESS CONTROL

SA Supported Platforms

QUICK START. GO-Global Cloud 4.1 SETTING UP A LINUX CLOUD SERVER AND HOST INSTALL THE CLOUD SERVER ON LINUX

JUNOScope IP Service Manager

Adaptive Log Exporter Users Guide

Kaspersky Security Center Web-Console

RSA Security Analytics

Upgrading from Call Center Reporting to Reporting for Contact Center. BCM Contact Center

Junos Pulse Access Control Service 4.4R4-MDM Supported Platforms Document

Sun ONE Identity Server Web Policy Agents Release Notes

StreamServe Persuasion SP5 Supported platforms and software

50-Port 10/100/1000Mbps with 4 Shared SFP. Managed Gigabit Switch WGSW Quick Installation Guide

Quick Note 026. Using the firewall of a Digi TransPort to redirect HTTP Traffic to a proxy server. Digi International Technical Support December 2011

ThinPoint Quick Start Guide

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

DS License Server. Installation and Configuration Guide. 3DEXPERIENCE R2014x

SMART Vantage. Installation guide

Secure Agent Quick Start for Windows

Java. How to install the Java Runtime Environment (JRE)

isupplier PORTAL ACCESS SYSTEM REQUIREMENTS

PERFORMANCE VALIDATION OF JUNIPER NETWORKS SRX5800 SERVICES GATEWAY

Managing Vulnerability Assessment

Juniper Secure Analytics

Personal Token Software Installation Guide

Configuring a Dial-up VPN Using Windows XP Client with L2TP Over IPSec (without NetScreen-Remote)

Symantec AntiVirus for Network Attached Storage 5.1

Sophos Anti-Virus standalone startup guide. For Windows and Mac OS X

SA Supported Platforms

ET2 System Requirements.docx

Accessing Citrix on a MAC using OS X (Mountain Lion and Newer)

CONFIGURATION OPTIONS FOR HARDWARE RULE SEARCH (RMS) AND SOFTWARE RULE SEARCH (SWRS)

Scholastic Reading Inventory Installation Guide

Paxera Uploader Basic Troubleshooting

Kaspersky Security Center Web-Console

Platform Guide. SA Supported Platforms. Service Package Version 7.4R1

Enterprise Site Manager (ESM) & Administrator Console Installation / Uninstall

Citrix ICA UNIX Client Quick Reference Card

HWS Virtual Private Network Configuration and Setup Mac OS X 12/19/2006

QuickStart Guide for Managing Computers. Version 9.2

for Small and Medium Business Quick Start Guide

Alcatel-Lucent OmniPCX Enterprise Free Desktop. Free Desktop version Linux Installation Guide

Platform Guide. SA Supported Platforms. Service Package Version 7.3R1

DSView 4 Management Software Transition Technical Bulletin

AXIS Camera Station Quick Installation Guide

QuickDNS 4.6 Installation Instructions

Sophos Endpoint Security and Control standalone startup guide

MyAccess installation guide for non-myplace clients

Rebasoft Auditor Quick Start Guide

How to Configure Symantec Protection Engine for Network Attached Storage for the Oracle ZFS Storage Appliance

This walk-through was created using Windows XP as a guide, however alternate versions of the Windows OS will be very similar in procedure as well.

SETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR.

FlashAir Configuration Software. User s Manual. (Windows) Revision 2

Windows 7 Hula POS Server Installation Guide

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Symantec Protection for SharePoint Servers Getting Started Guide

Network/Floating License Installation Instructions

DS License Server V6R2013x

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

ScanShell.Net Install Guide

insync Installation Guide

Stealth OpenVPN and SSH Tunneling Over HTTPS

An Oracle Technical White Paper May How to Configure Kaspersky Anti-Virus Software for the Oracle ZFS Storage Appliance

Reporting for Contact Center Setup and Operations Guide. BCM Contact Center

L2TP Configuration without IPSec

Java Secure Application Manager

Oracle Universal Content Management

SA Supported Platforms

Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual

Transcription:

Application Note Setting up an icap Server for ISG- 1000/2000 AV Support Version 1.1 Ronald Ng AJTAC Engineer AV/DI/UF Specialist Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2000 or 888 JUNIPER www.juniper.net Part Number: 350075-001 August 2006

Contents Contents...2 Introduction...3 Prerequisites...3 Installation of the External AV Scanner...3 Administering Scan Engine 5.0...4 Installing the License...4 How External Scanning Works...5 Configuring the ISG-1000/2000 for External AV Scanning...6 WebUI Configuration...6 2 Copyright 2006, Juniper Networks, Inc.

Introduction Beginning with ScreenOS 5.4.0, the ISG-1000 and ISG-2000 now support anti-virus using Symantec icap server solution. This document describes requirements to run AV on an ISG- 1000 and/or ISG-2000. Prerequisites Requirements on the firewall are as follows: ISG-1000 or ISG-2000 ScreenOS 5.4.0r1 or higher The external scanner must be installed on a server that runs on any of the following operating systems: Windows 2000 server (with Service Pack 3) Windows 2003 server Solaris 8/9 Red Hat Linux 9.0 Red hat Enterprise Linux 3.0 Red Hat Linux Advanced Server 2.1 SuSE Linux Enterprise Server 8. All servers require a direct connection to the Internet, with Sun Java 2 run-time environment (version 1.4.2_06 or later within the version 1.4.2 platform) installed. Additional requirement of IE 6.0 SP1 or later to run the admin tool via the web browser. Installation of the External AV Scanner External AV scanner is supported with Symantec Scan Engine 5.0. This engine uses icap v1.0 and is fully compliant with RFC 3507. Customer will need to purchase Symantec Scan Engine 5.0 server software from their VAR or Reseller. Once the Scan Engine software is purchased, make sure the required OS is installed on the server platform to be used. See the section on prerequisites above. Before the server software is installed, Sun Java 2 is required. The installation will not complete unless the correct version Java 2 is installed. You can obtain the latest version at http://java.sun.com/j2se/1.4.2/download.html. Download Java Runtime Environment. Once this is installed on the server, you may proceed with the installation of Symantec Scan Engine 5.0. Copyright 2006, Juniper Networks, Inc. 3

Administering Scan Engine 5.0 You can administer the Scan Engine server from your desktop, using IE 6.0 SP1 or higher. However, make sure you have Java 2 enabled on your PC. Access the administration tool is via http to port 8004. For example, if your Scan Engine 5.0 server is at 172.19.50.138, then you can access the admin tool at http://172.19.50.138:8004 Installing the License 1. Before you can begin, you will need to install your license on your Scan Engine 5.0 server. From the administration screen, click the System icon. 2. Click Install License. Browse to the location where your license key file is, and click Install. At this point, the server is now set up for antivirus updates. For more information on the operation of Symantec Scan Engine, please refer to the Symantec documentation that came with the application. 4 Copyright 2006, Juniper Networks, Inc.

How External Scanning Works Copyright 2006, Juniper Networks, Inc. 5

Configuring the ISG-1000/2000 for External AV Scanning In setting up the ISG-1000/2000 for External AV scanning, the server must be able to access the Internet directly (without going through any proxied connections). The server must be able to communicate on TCP port 1344. The steps for configuration are as follows: 1. Create a server object 2. Create an AV Profile, and bind the server object to the AV profile 3. Create your policies, and bind the AV profile to any policies where AV scanning is required To walk through this procedure, we will assume the Symantec Scan Engine 5.0 server is accessible at IP address 172.19.50.138. We will create an icap AV server name JTAC_ICAP, and an AV Profile ICAP_AV. (Note: Configuration recommends using object names without spaces for compatibility) WebUI Configuration 1. To create the server object, go t Objects > Antivirus > ICAP Server, and click New. 6 Copyright 2006, Juniper Networks, Inc.

We will create the AV server name JTAC_ICAP, at 172.19.50.138 as shown in the illustration below: 2. Click Ok. 3. Next, create the AV Profile. Go to Screening > Antivirus > Profile. Click new. 4. Enter the profile name ICAP_AV 5. Click Ok. You will see a list of profiles created. 6. Next to ICAP_AV, click Edit 7. Next to the field ICAP Server Binded, click the pulldown menu, and select JTAC_ICAP. 8. Click Ok. You can now create your policy and bind this AV profile to the policy. Copyright 2006, Juniper Networks, Inc. 7

8 Copyright 2006, Juniper Networks, Inc.

CLI Configuration 1. First, create the server object. The CLI command for this is: set icap server JTAC_ICAP host 172.19.50.138 2. Create the AV Profile, and bind JTAC_ICAP to this profile nsisg2000-> set av profile ICAP_AV nsisg2000(av:icap_av)-> set icap JTAC_ICAP nsisg2000(av:icap_av)-> exit nsisg2000-> 3. Create the policy, and bind the AV profile to the policy nsisg2000-> set policy from trust to untrust any any http permit policy id = 1 nsisg2000-> set policy id 1 nsisg2000(policy:1)-> set av ICAP_AV nsisg2000(policy:1)-> exit nsisg2000-> Copyright 2006, Juniper Networks, Inc. All rights reserved. Juniper Networks and the Juniper Networks logo are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered trademarks, or registered service marks in this document are the property of Juniper Networks or their respective owners. All specifications are subject to change without notice. Juniper Networks assumes no responsibility for any inaccuracies in this document or for any obligation to update information in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Copyright 2006, Juniper Networks, Inc. 9