Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.



Similar documents
Trend Micro Encryption Gateway 5

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.



Core Protection for Virtual Machines 1

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.




Copyright 2012 Trend Micro Incorporated. All rights reserved.

EMC Data Domain Management Center

F-Secure Messaging Security Gateway. Deployment Guide

Trend Micro Encryption Gateway 5

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Virtual Appliance Setup Guide


Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

FortiAnalyzer VM (VMware) Install Guide

SonicWALL SRA Virtual Appliance Getting Started Guide

Installing and Configuring vcloud Connector

PHD Virtual Backup for Hyper-V

Extreme Control Center, NAC, and Purview Virtual Appliance Installation Guide

Copyright 2013 Trend Micro Incorporated. All rights reserved.

SOA Software API Gateway Appliance 7.1.x Administration Guide

SevOne NMS Download Installation and Implementation Guide

Virtual Appliance for VMware Server. Getting Started Guide. Revision Warning and Disclaimer

Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual

User Manual. User Manual Version

Installing and Configuring vcloud Connector

F-Secure Internet Gatekeeper Virtual Appliance

HP Intelligent Management Center v7.1 Virtualization Monitor Administrator Guide

VMware vcenter Log Insight Getting Started Guide

Defender Token Deployment System Quick Start Guide

Virtual Managment Appliance Setup Guide

Server Installation Guide ZENworks Patch Management 6.4 SP2

Installing and Configuring vcenter Support Assistant

MadCap Software. Upgrading Guide. Pulse

Virtual Web Appliance Setup Guide

Web Application Firewall

Quick Start Guide. for Installing vnios Software on. VMware Platforms

Parallels Panel. Parallels Small Business Panel 10.2: User's Guide. Revision 1.0

Comodo MyDLP Software Version 2.0. Installation Guide Guide Version Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013


Cyberoam Virtual Security Appliance - Installation Guide for XenServer. Version 10

Basic Exchange Setup Guide

Deployment and Configuration Guide

Getting Started Guide

VMware vcenter Support Assistant 5.1.1

VMware vcenter Configuration Manager and VMware vcenter Application Discovery Manager Integration Guide

SSL VPN. Virtual Appliance Installation Guide. Virtual Private Networks

Getting Started with ESXi Embedded

Thinspace deskcloud. Quick Start Guide

Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip

ArcMail Technology Defender Mail Server Configuration Guide for Microsoft Exchange Server 2003 / 2000

NexentaConnect for VMware Virtual SAN

Citrix XenServer Workload Balancing Quick Start. Published February Edition

vrealize Air Compliance OVA Installation and Deployment Guide

CommandCenter Secure Gateway

Snom 720 and Elastix Server

Virtual Appliance Setup Guide

Basic Exchange Setup Guide

Parallels Business Automation 5.5

Microsoft Dynamics GP. Workflow Installation Guide Release 10.0

Product Version 1.0 Document Version 1.0-B

Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview

Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and October 2013

Foglight. Foglight for Virtualization, Enterprise Edition 7.2. Virtual Appliance Installation and Setup Guide

VCCC Appliance VMware Server Installation Guide

Application Note. Gemalto s SA Server and OpenLDAP

McAfee Asset Manager Console

User guide. Business

Virtual LoadMaster for Microsoft Hyper-V

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

T E C H N I C A L S A L E S S O L U T I O N

Basic System. Vyatta System. REFERENCE GUIDE Using the CLI Working with Configuration System Management User Management Logging VYATTA, INC.

How to Configure Threat Management Services Portal in Windows Vista

Cyberoam Virtual Security Appliance - Installation Guide for VMware ESX/ESXi. Version 10


Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario

Virtual LoadMaster for VMware ESX, ESXi using vsphere

GMS. 1 Create the virtual machine 2 Configure the virtual machine 3 Configure the virtual GMS server. Quick Start Guide. Microsoft Hyper-V Hypervisor

SOFTWARE LICENSE LIMITED WARRANTY

AlienVault. Unified Security Management (USM) x Initial Setup Guide

Symantec Messaging Gateway 10.0 Installation Guide. powered by Brightmail

Setting up Sharp MX-Color Imagers for Inbound Fax Routing to or Network Folder

LifeSize Transit Virtual Appliance Installation Guide June 2011

Installing and Using the vnios Trial

Setup Guide Revision B. McAfee SaaS Archiving for Microsoft Exchange Server 2010

Unitrends Virtual Backup Installation Guide Version 8.0

RSA Authentication Manager 8.1 Virtual Appliance Getting Started

Exinda How to Guide: Virtual Appliance. Exinda ExOS Version Exinda, Inc

Installing and Configuring vcenter Multi-Hypervisor Manager

WatchGuard Dimension v1.1 Update 1 Release Notes

Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Microsoft Hyper-V


Hosted Security 2.0 Quick Start Guide

MultiSite Manager. User Guide

Managing Multi-Hypervisor Environments with vcenter Server

Transcription:

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files, release notes, and the latest version of the applicable user documentation, which are available from the Trend Micro Web site at: http://www.trendmicro.com/download Trend Micro, the Trend Micro t-ball logo, are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. Copyright 2010 Trend Micro Incorporated. All rights reserved. Document Part No. EEEM54295/100119 Release Date: January 2010 Protected by U.S. Patent No. not available. Patent pending.

The user documentation of Encryption for Email Gateway is intended to introduce the main features of the software and installation instructions for your production environment. You should read through it prior to installing or using the software. Detailed information about how to use specific features within the software are available in the Online Help file and the online Knowledge Base at Trend Micro s Web site. Trend Micro is always seeking to improve its documentation. Your feedback is always welcome. Please evaluate this documentation on the following site: http://www.trendmicro.com/download/documentation/rating.asp

Contents Preface Chapter 1: Trend Micro Encryption for Email Gateway Documentation...iv Audience...iv Document Conventions...v Installation Overview... 1-2 Terminology... 1-2 Minimum Requirements... 1-3 Installation Prerequisites... 1-3 i

Encryption for Email Gateway Quick Installation Guide ii

Preface Preface Welcome to the Encryption for Email Gateway Quick Installation Guide. This guide contains information about product settings and service levels. This preface discusses the following topics: Trend Micro Encryption for Email Gateway Documentation Audience Document Conventions iii

Encryption for Email Gateway Quick Installation Guide Trend Micro Encryption for Email Gateway Documentation The Trend Micro Encryption for Email Gateway documentation consists of the following: Trend Micro Encryption for Email Gateway Administrator s Guide Helps you plan for deployment and configure all product settings. Online Help Helps you configure all features through the user interface. You can access the Online Help by opening the Web console and then clicking the Help icon ( ). Trend Micro Encryption for Email Gateway Quick Installation Guide Helps you plan for deployment and configure product settings. Readme File Contains late-breaking product information that might not be found in the other documentation. Topics include a description of features, installation tips, known issues, and product release history. The readme is available at: http://www.trendmicro.com/download Audience This document is intended to be used by new users of the Encryption for Email Gateway Administrator Console, including system administrators, operators, sensitive content contributors, information security staff, executives, and other users with other specific roles. The audience should have a thorough understanding of the Encryption for Email Gateway system, including general operations and critical concepts. Familiarity with Web browsers and Web-based user interfaces are also required. iv

Preface Document Conventions To help you locate and interpret information easily, the Encryption for Email Gateway documentation uses the following conventions. CONVENTION ALL CAPITALS Bold Italics Monospace Note: DESCRIPTION Acronyms, abbreviations, and names of certain commands and keys on the keyboard Menus and menu commands, command buttons, tabs, options, and ScanMail tasks References to other documentation Examples, sample command lines, program code, Web URL, file name, and program output Configuration notes Tip: Recommendations WARNING! Reminders on actions or configurations that should be avoided v

Encryption for Email Gateway Quick Installation Guide vi

Chapter 1 Installation This chapter introduces the Encryption for Email Gateway Quick Installation Guide. Topics include the following: Overview Minimum Requirements 1-1

Encryption for Email Gateway Quick Installation Guide Overview Encryption for Email Gateway is a Linux-based software solution providing the ability to perform encryption and decryption of emails at the corporate gateway, regardless of the email client and platform from which it originated. The encryption and decryption of email on Encryption for Email Gateway is controlled by a Policy Manager that enables an administrator to configure policies based on various parameters, such as sender and recipient email address, keywords or Payment Card Industry (PCI) compliance. Encryption for Email Gateway presents itself as a Simple Mail Transfer Protocol (SMTP) interface and delivers email over SMTP to a configured outbound MTA. This enables easy integration with other email server based products, be them content scanners, mail servers or archiving solutions. Encryption for Email Gateway documentation is written for IT administrators and email administrators. The documentation assumes that the readers have an in-depth knowledge of email messaging, networks VMware virtual appliances. The document does not assume the reader has any knowledge of email encryption technology. Terminology The following list describes acronyms and definitions for terms used throughout this document: TABLE 1-1. List of Terminology TERM CORBA DLP IBE MTA PCI SMTP TMEE DEFINITION Common Object Request Broker Architecture Data Loss Prevention Identity-based Encryption Mail Transport Agent Payment Card Industry Simple Mail Transfer Protocol Trend Micro Encryption for Email 1-2

Installation TABLE 1-1. List of Terminology (Continued) TERM DEFINITION VT Virtualization Technology for hardware assisted virtualization. Minimum Requirements For details about the recommended minimum requirements, refer to the readme. Installation Prerequisites The installation of Encryption for Email Gateway requires a connection to VMware Infrastructure Client. An installation and configuration of VMware ESX/ESXi needs to be done before you can access an ESX Server host, or a VirtualCenter. The installation and configuration of VMware ESX/ESXi is outside the scope of this guide. See the VMware documentation for this information. 1-3

Encryption for Email Gateway Quick Installation Guide Installing Encryption for Email Gateway To begin installation: 1. Connect to the VMware Infrastructure Client and enter your login details. To open the VMware Infrastructure Client, select Start>Programs>VMware>VMware Infrastructure Client. FIGURE 1-1 VMware Infrastructure Client - Login Example 2. Enter the IP address/ Hostname, User name and Password and then click Login. Note that these details are unique and should have been specified at the time of installation of the ESX/ESXi platform. 1-4

Installation 3. After logging on, the following screen appears: FIGURE 1-2 Import a Virtual Appliance 4. Choose Import a virtual Appliance from under Basic Tasks to access the Import Virtual Appliance Wizard. 5. Select the Import from File radio button and then click Browse to locate the.ovf file. The.OVF file is located in the directory where you initially downloaded the Encryption for Email Gateway files. 1-5

Encryption for Email Gateway Quick Installation Guide 6. Select Next to continue with the import process. FIGURE 1-3 Import Virtual Appliance Wizard 1-6

Installation 7. Confirm the details of the OVF file and then select Next. FIGURE 1-4 Virtual Appliance Details 1-7

Encryption for Email Gateway Quick Installation Guide 8. Read the Encryption for Email Gateway Licence Agreement first and accept this by choosing the check box Accept all License agreements. Select Next to proceed to the next step. FIGURE 1-5 Encryption for Email Gateway License Agreement 1-8

Installation 9. Enter a Name for the new virtual appliance and then select Next. FIGURE 1-6 Name and Location 1-9

Encryption for Email Gateway Quick Installation Guide 10. Configure the Network Mapping by selecting the virtual network that you would like to connect to and click on Next. FIGURE 1-7 Network Mapping Example 1-10

Installation 11. Review the summary and click Finish. FIGURE 1-8 Ready to Complete Virtual Appliance Import 12. From the Virtual Infrastructure Client screen, select the Virtual Machine that you have just loaded and right-click to display a menu with a list of options. 1-11

Encryption for Email Gateway Quick Installation Guide 13. Select Power On from the menu to start the virtual appliance. FIGURE 1-9 Virtual Infrastructure Client 14. Allow the boot up sequence to finish and display. 15. Make a note of the address to access the Virtual Appliance Web Interface. In this example the address is https://192.168.30.202. It is important to have this information on hand for the next set of steps. Note: The virtual appliance is configured to obtain network information via DHCP. It is suggested that either a static address reservation is assigned to the Encryption for Email Gateway MAC address in DHCP, or alternatively configure a static IP address through the command line. 1-12

Installation In environments where DHCP is not enabled, or a static IP address is desirable, perform the following steps: 1. Log in to the Encryption for Email Gateway console using the username and password as shown in Figure 1-10. 2. Enter the following command: ifconfig eth0 192.168.1.30 netmask 255.255.255.0 (replace 192.168.1.30 and 255.255.255.0 with the proper IP and netmask) route add default gw 192.168.1.1 (replace 192.168.1.1 with the correct gateway address) vi /etc/resolv.conf (replace the IP of nameserver with the appropriate value) 3. Connect to the Webmin Web console for the static configuration: https://192.168.1.30:10000 Log in using the same credentials as mentioned previously. FIGURE 1-10 Webmin Login page 1-13

Encryption for Email Gateway Quick Installation Guide 4. To configure the network, choose Networking > Network Configuration. FIGURE 1-11 Network Configuration page 5. Select Network Interfaces and then eth0. 6. Select Static, and define the IP address and netmask. FIGURE 1-12 Active Interface Configuration page Note: If you do not know your broadcast address, you can get it by typing the following command in the shell: ifconfig eth0 grep --color Bcast 7. Click Save. 8. Select Routing and Gateways. 1-14

Installation 9. In the Default routes dropdown list, select eth0 as the interface and set the correct gateway. FIGURE 1-13 Routing and Gateways Configuration page 10. Click Save. 11. Click Apply Configuration. 12. Optionally, reboot Encryption for Email Gateway by entering the reboot command in the shell:. 13. Ensure that an open connection to the virtual appliance is established, open a Web browser and enter the server address details: For example: https://192.168.1.30/ This will present the Registration page for Encryption for Email Gateway. 1-15

Encryption for Email Gateway Quick Installation Guide 1-16