Summary of Contents for Trend Micro Network VirusWall Enforcer 1500i
Page 2
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files, release notes, and the latest version of the applicable user documentation, which are available from the Trend Micro website at: docs.trendmicro.com...
Page 3
Read through it prior to installing or using the product. Detailed information about how to use specific features within the product are available in the Online Help and the Knowledge Base at the Trend Micro website. Trend Micro is always seeking to improve its documentation. Your feedback is always welcome.
Contents Preface About this Installment and Deployment Guide .........viii Content Overview ..................viii Document Set ..................... ix Documentation and Software Updates .............ix Audience ....................... x Device and Software Version ............... x Document Conventions ..................x Chapter 1: Introducing Network VirusWall Enforcer Network VirusWall Enforcer Overview .............
Page 5
Trend Micro™ Network VirusWall™ Enforcer 1500i Installment and Deployment Guide Network Port Indicators .................2-14 Indicators on Onboard Ports ............2-14 Indicators on the Copper Expansion Cards ........2-15 Installing the Device ..................2-15 Chapter 3: Deploying Network VirusWall Enforcer Planning for Deployment ................3-2 Deployment Overview ................3-2...
Page 6
Contents Chapter 4: Preconfiguring Network VirusWall Enforcer Before Preconfiguration ................. 4-2 Verifying Network Support ..............4-2 Preparing for Preconfiguration ..............4-2 Understanding Preconfiguration ..............4-3 The Preconfiguration Console ..............4-3 Performing Preconfiguration ................ 4-3 Logging on the Preconfiguration Console ..........4-4 Configuring Device Settings ..............
Preface Preface Welcome to the Trend Micro™ Network VirusWall™ Enforcer Installment and Deployment Guide. This book contains basic information about the tasks you need to perform to deploy the device. It is intended for novice and advanced users of who want to plan, deploy, and preconfigure Network VirusWall Enforcer.
Trend Micro™ Network VirusWall™ Enforcer 1500i Installment and Deployment Guide About this Installment and Deployment Guide This document contains detailed information about getting started with Network VirusWall Enforcer. It provides an overview of the device and how to install it. It also covers initial configuration and deployment to help you prepare the device for use in protecting your network.
Readme Text Provides late-breaking • USB flash drive news and software build • Trend Micro information Download Center Documentation and Software Updates For the latest documentation and software updates, visit the Trend Micro Download Center at: http://downloadcenter.trendmicro.com/...
Trend Micro™ Network VirusWall™ Enforcer 1500i Installment and Deployment Guide Audience This Installment and Deployment Guide is targeted at network administrators who will deploy the device. Network VirusWall Enforcer documentation assumes that readers have networking knowledge and understand antivirus and content security concepts.
Page 12
Preface P-4. Conventions used in the documentation (Continued) ABLE ONVENTION ESCRIPTION Actual text, typed commands, file names, and pro- Monospace gram output Important information Note: Recommendations Tip: Critical information WARNING!
Page 14
Chapter 1 Introducing Network VirusWall Enforcer This chapter introduces Trend Micro™ Network VirusWall™ Enforcer and provides an overview of important concepts and features. This chapter discusses the following topics: • Network VirusWall Enforcer Overview on page 1-2 • Key Concepts on page 1-3 •...
Trend Micro™ Network VirusWall™ Enforcer 1500i Installment and Deployment Guide Network VirusWall Enforcer Overview Network VirusWall Enforcer is an outbreak prevention appliance that allows organizations to enforce security policies at the network layer. Network VirusWall Enforcer scans network traffic to help ensure that it is free of fast-spreading network viruses.
Introducing Network VirusWall Enforcer Key Concepts Before proceeding to the succeeding sections of this document, take note of the following concepts. 1-1. Key Concepts in this Document ABLE ONCEPT ESCRIPTION Management port Dedicated for management purposes. You can specify only one management port. Mirror port Sends all traffic passing the device to a computer to capture all data.
Trend Micro™ Network VirusWall™ Enforcer 1500i Installment and Deployment Guide Technical and Environmental Specifications The following table lists the technical specifications of Network VirusWall Enforcer: 1-2. Technical specifications ABLE PECIFICATION ETAILS Base unit Dell™ PowerEdge™ R210 Rack Mount Server Processor Intel Celeron™...
Page 18
Introducing Network VirusWall Enforcer The following table lists the environmental specifications of Network VirusWall Enforcer: 1-3. Environmental specifications ABLE PECIFICATION ETAILS Temperature 10° to 35°C (50° to 95°F) with a maximum temperature (operating) gradation of 10°C per hour For altitudes above 2950 feet, the maximum operating temperature is de-rated 1°F/550ft.
Page 19
Trend Micro™ Network VirusWall™ Enforcer 1500i Installment and Deployment Guide 1-3. Environmental specifications (Continued) ABLE PECIFICATION ETAILS Altitude (operat- -16 to 3048 m (-50 to 10,000 ft) ing) For altitudes above 2950ft, the maximum operating tem- perature is derated 1ºF/550ft.
Chapter 2 Getting Started This chapter guides you through setting up and powering on a Trend Micro™ Network VirusWall™ Enforcer device. This chapter discusses the following topics: • Package Contents on page 2-2 • Front Panel on page 2-4 •...
Trend Micro™ Network VirusWall™ Enforcer 1500i Installment and Deployment Guide Package Contents Figure 2-1 illustrates the package contents. Device with bezel Power cord Documents Rack kit and USB drive 2-1. Package contents IGURE Note: The actual items in your package may appear slightly different from those shown in this document.
Page 22
Administrator’s Guide • Installation and Deployment Guide • Quick Start Guide • Readme • Trend Micro™ Control Manager™ patches • Syslog and TFTP tools Note: Refer to the troubleshooting section in the Administrator’s Guide for instructions on how to use the provided tools.
Trend Micro™ Network VirusWall™ Enforcer 1500i Installment and Deployment Guide 2-1. Network VirusWall Enforcer package contents (Continued) ABLE UANTITY ESCRIPTION 3 printed • Printed documents that provide safety, Security documents licensing, and getting started informa- Appliance tion. Consult these documents before License using Network VirusWall Enforcer.
Page 24
Getting Started 2-2. Front panel features ABLE NDICATOR UTTON ESCRIPTION ONNECTOR Power-on indicator, The power button turns the device on power button and off. The indicator lights up when the device is on. Tip: To force the device to shut down, press and hold the power button for five seconds.
Page 25
Trend Micro™ Network VirusWall™ Enforcer 1500i Installment and Deployment Guide 2-2. Front panel features (Continued) ABLE NDICATOR UTTON ESCRIPTION ONNECTOR Device identifica- The identification buttons on the front tion button and back panels can be used to locate a particular device within a rack.
Getting Started USB ports Power button and indicator VGA port 2-3. Network VirusWall Enforcer front panel IGURE Installing the Bezel The device is supplied with a removable bezel as shown in Figure 2-4. 2-4. Network VirusWall Enforcer with the bezel IGURE...
Page 27
Trend Micro™ Network VirusWall™ Enforcer 1500i Installment and Deployment Guide To replace the bezel, hook the right end of the bezel onto the chassis, and then fit the free end of the bezel onto the device. Secure the bezel with the keylock.
Getting Started Back Panel Figure 2-6 shows the controls, indicators, and connectors located on the device's back panel. 8 9 10 11 2-6. Back panel IGURE 2-3. Back panel features ABLE NDICATOR UTTON ESCRIPTION ONNECTOR iDRAC6 Enter- Dedicated management port for the prise port optional iDRAC6 Enterprise card.
Page 29
Trend Micro™ Network VirusWall™ Enforcer 1500i Installment and Deployment Guide 2-3. Back panel features (Continued) ABLE NDICATOR UTTON ESCRIPTION ONNECTOR Video connector Connects a VGA display to the device. eSATA Connects to eSATA devices for addi- tional storage USB connectors Connects USB devices to the device.
Page 30
Getting Started Port 1 Port 2 Port 4 Port 3 2-7. Standard four-port configuration IGURE 2-11...
Trend Micro™ Network VirusWall™ Enforcer 1500i Installment and Deployment Guide Device Ports Network VirusWall Enforcer supports four network ports, with the first two ports (port 1 and 2) providing management functionality. More specifically, these ports can be configured as management (MGMT) or mirror (MIRR) ports. Ports 3 and 4 are regular data ports that connect to the network and provide security functionality.
Page 32
Getting Started 2-4. Port types (Continued) ABLE NTERFACE UNCTION EFAULT ESCRIPTION TYPE STATE NUMBER Management Manage- Disabled You can access the web con- (Copper; ment sole through all regular ports, ports 1 to 2) (MGMT) but you can also dedicate a single port for accessing the web console and managing the device.
Trend Micro™ Network VirusWall™ Enforcer 1500i Installment and Deployment Guide By using bypass server adapters, Network VirusWall Enforcer data ports provide a fault-tolerance solution known as "failopen" or "LAN bypass". This solution allows the Network VirusWall Enforcer to continue passing network traffic even if other device components fail or when the device loses power.
Getting Started Link indicator Activity indicator 2-9. Onboard port indicators IGURE 2-5. Indicator codes for onboard ports ABLE NDICATOR TATUS Link and activity indicators are off. The port is not connected to the network. Link indicator is green. The port is connected to a valid link part- ner on the network.
Page 35
Trend Micro™ Network VirusWall™ Enforcer 1500i Installment and Deployment Guide • Mounted to a standard 19-inch four-post rack cabinet The device requires 1 rack unit (RU) of vertical space in the rack. Tip: If mounting more than one device, position and mount the devices in close proximity.
Page 36
Getting Started Installing the device involves performing the following tasks. WARNING! Before performing the following tasks, review the safety instructions in the Product Information Guide that came with the device. Step 1: Unpack the device Unpack your device. The Network VirusWall Enforcer rack kit does not require screws and is very simple to use.
Page 37
Trend Micro™ Network VirusWall™ Enforcer 1500i Installment and Deployment Guide Step 3: Connect the keyboard and monitor (optional) 2-11. Connecting the keyboard and the monitor IGURE Connect the keyboard and monitor. The connectors on the back of your device have icons indicating which cable to plug into each connector.
Page 38
Getting Started Connect the power cable(s) to the device and, if using a monitor, connect the monitor’s power cable to the monitor. Step 5: Secure the power cables 2-13. Securing the power cables IGURE Bend the power cable(s) of the device into a loop as shown in the illustration and secure the cable to the bracket using the provided strap.
Page 39
Trend Micro™ Network VirusWall™ Enforcer 1500i Installment and Deployment Guide Step 6: Turn on the device 2-14. Powering the device and the monitor IGURE Press the power button on the device and on the monitor (optional). The power indicators should light up.
Page 40
Chapter 3 Deploying Network VirusWall Enforcer Before configuring a Network VirusWall Enforcer device, plan how to integrate the device into your network. Determine the topology it will support. This chapter explains how to plan for the deployment. It also provides deployment scenarios to help you understand the various ways the device can protect your network.
Trend Micro™ Network VirusWall™ Enforcer 1500i Installment and Deployment Guide Planning for Deployment To take advantage of the benefits Network VirusWall Enforcer can bring to your organization, you will need to understand the possible ways to deploy one or more devices.
Deploying Network VirusWall Enforcer • Plan for network traffic, considering the location of critical computers, such as email, web, and application servers. • Determine the number of devices needed to meet your security needs and their locations on the network. •...
Trend Micro™ Network VirusWall™ Enforcer 1500i Installment and Deployment Guide To protect an organization from network threats, position the device in a key place on your network segment. The device should be able to scan all network traffic to prevent, detect, or contain threats.
Deploying Network VirusWall Enforcer Identify segments of your network to protect by considering which kinds of endpoints may introduce security risks or violate security policies. Also, consider the location of resources that are critical to your organization, such as: • Remote endpoints that access your internal network resources •...
Page 45
Trend Micro™ Network VirusWall™ Enforcer 1500i Installment and Deployment Guide Figure 3-1 illustrates a dialup connection between a home user and an organization’s internal network. A RAS server, the point where the dialup connection terminates, is connected to a regular port (see...
Page 46
Deploying Network VirusWall Enforcer The recommended settings for this scenario are the same as the settings for the dialup user scenario (see Figure 3-1). Business unit A Business unit B VPN tunnel Network A Network B 3-3. Site-to-site VPN deployment scenario IGURE Figure 3-3 illustrates a VPN connection between two business units.
Trend Micro™ Network VirusWall™ Enforcer 1500i Installment and Deployment Guide Guest Endpoints Guest endpoints are endpoints that do not belong to an internal network domain. They are often visitors who temporarily access your network resources through their portable computers. Guest endpoints represent a major risk because they are typically outside the scope of the network security infrastructure.
Deploying Network VirusWall Enforcer Key Segments and Critical Assets Key network segments need to be protected from network-based threats. This may include a group of endpoint computers or network resources critical to your organization, such as email, web, or application servers. L2 switch L3 switch Critical hosts...
Trend Micro™ Network VirusWall™ Enforcer 1500i Installment and Deployment Guide The device can also guard against attacks that not only originate on the Internet, but also attacks that may originate from within your network. Since traffic first passes through the device before reaching email and web servers, the device can scan and detect infected packets that come from endpoints on the LAN.
Page 50
Deploying Network VirusWall Enforcer 802.1Q Trunk VLAN 10 VLAN 20 VLAN 30 3-6. Multiple VLAN segments with each device protecting one IGURE segment Figure 3-6, the devices are installed on an 802.1Q trunk line between two switches. 3-11...
Trend Micro™ Network VirusWall™ Enforcer 1500i Installment and Deployment Guide 3-7. Multiple VLAN segments with each device protecting all IGURE segments Single-Switch VLAN Environment A single-switch configuration may have the following properties: • Possible only when using a switch that can be configured to carry individual VLAN traffic on specific physical ports.
Deploying Network VirusWall Enforcer • The upstream network is connected to port 2 on the switch. • The regular port on Network VirusWall Enforcer is connected to port 1 on the switch. • Endpoints are connected to other regular ports on Network VirusWall Enforcer. 3-8.
IPv6 Limitations on page 3-13. Note: Many resources on the Internet, including the Trend Micro™ ActiveUpdate™ and product registration servers, are accessible only through IPv4 traffic. When configured as an IPv6-only host, Network VirusWall Enforcer traffic to and from the Internet can be translated using a dual-stack proxy.
Deploying Network VirusWall Enforcer Planning for Network Traffic The scenario presented in Key Segments and Critical Assets on page 3-9 is a good example of how to plan for network traffic. There is a strategic advantage to positioning the device in front of resources that endpoints access regularly, such as an email server or an Internet gateway.
Trend Micro™ Network VirusWall™ Enforcer 1500i Installment and Deployment Guide Failopen Failopen or LAN bypass involves one Network VirusWall Enforcer device. Failopen is a fault-tolerance solution that allows a Network VirusWall Enforcer to continue passing network traffic even when other device components fail or when the device loses power.
Connected Conducting a Pilot Deployment Trend Micro recommends conducting a pilot deployment in a controlled environment to help you understand how the device features work. A pilot deployment also helps you determine how the device can be used to accomplish your security goals and the level of support you will likely need after a full deployment.
Trend Micro™ Network VirusWall™ Enforcer 1500i Installment and Deployment Guide Creating a Contingency Plan Trend Micro recommends creating a contingency plan in case there are issues with the installation, operation, or upgrade of the device. Consider your network’s vulnerabilities and how you can retain a minimum level of security if issues arise.
Page 58
Deploying Network VirusWall Enforcer Router Network VirusWall Enforcer Switch Console Protected Segment 3-9. Basic Deployment IGURE Network VirusWall Enforcer protects your network as follows: • Scans traffic to and from endpoints • Prevents endpoints that violate your security policies from gaining access to resources •...
Page 60
Chapter 4 Preconfiguring Network VirusWall Enforcer This chapter discusses the following topics: • Before Preconfiguration on page 4-2 • Understanding Preconfiguration on page 4-3 • The Preconfiguration Console on page 4-3 • Performing Preconfiguration on page 4-3 • Connecting to the Network on page 4-10 •...
Trend Micro™ Network VirusWall™ Enforcer 1500i Installment and Deployment Guide Before Preconfiguration Complete the following tasks before you preconfigure Network VirusWall Enforcer: • Test the failopen functionality. Network traffic should still pass through the device after a hardware or system error or if the device loses power.
Preconfiguring Network VirusWall Enforcer Understanding Preconfiguration Ensure that the tasks in Preparing for Preconfiguration on page 4-2 have been completed before starting preconfiguration. To perform preconfiguration: Plan and determine the deployment strategy (see Deploying Network VirusWall Enforcer on page 3-1). Perform preconfiguration (see instructions in The Preconfiguration Console on page...
Trend Micro™ Network VirusWall™ Enforcer 1500i Installment and Deployment Guide Logging on the Preconfiguration Console A few minutes after powering on the device, the attached monitor will display the Preconfiguration console. If this screen does not display, press CTRL+R. 4-1.
Page 64
Preconfiguring Network VirusWall Enforcer To log on to the Preconfiguration console To get full access to the Preconfiguration console, type the default administrator user name and password: User name: admin Password: admin Note: Only the accounts can be used to log on to administrator power user the Preconfiguration console.
Trend Micro™ Network VirusWall™ Enforcer 1500i Installment and Deployment Guide Configuring Device Settings Immediately after logging on to the Preconfiguration console for the first time, configure the device host name and network settings. To configure the device settings: On the Main Menu of the Preconfiguration console, type 2 to select Device Settings.
VirusWall Enforcer as a dual-stack host, provide both IPv4 and IPv6 settings. WARNING! If there is a NAT device in your environment, Trend Micro recom- mends assigning a static IP address to the device. Because different port settings are assigned from your NAT, your device may not work properly if dynamic IP addresses are used.
Page 67
Trend Micro™ Network VirusWall™ Enforcer 1500i Installment and Deployment Guide To enable non-regular ports and modify their function: On the Main Menu of the Preconfiguration console, type 4 to open the Interface Settings screen. 4-4. Interface Settings screen IGURE Type 2 to select Interface setting.
Preconfiguring Network VirusWall Enforcer To modify the function of the selected port depending on your deployment strategy, press the . Disabled management interface (onboard) ports can SPACEBAR be assigned the following functions: • DIS—the port is disabled; this is the default setting •...
4-9. Configuring Network VirusWall Enforcer After preconfiguring Network VirusWall Enforcer, you can configure the device and start protecting your network. Trend Micro recommends performing the following tasks after preconfiguring a device: • Change the password for the default accounts •...
Chapter 5 Troubleshooting and Technical Support This chapter provides troubleshooting information for issues that may arise during the preconfiguration. Tip: Refer to the Administrator’s Guide for answers to frequently asked questions and other troubleshooting tips. This chapter discusses the following topics: •...
Trend Micro™ Network VirusWall™ Enforcer 1500i Installment and Deployment Guide Device Issues SSUE ORRECTIVE CTION XPLANATION admin pass- You have two options: word misplaced 1. If the device has registered to Control Manager, you or forgotten can access the web console and change the password through the Control Manager console using a Control Manager account.
Troubleshooting and Technical Support Getting Technical Support Trend Micro is committed to providing service and support that exceeds your expectations. You must register your product to qualify for support. Before Contacting Technical Support Before contacting technical support, see if these resources can help you address your problem: •...
Page 73
Trend Micro™ Network VirusWall™ Enforcer 1500i Installment and Deployment Guide Having the following information ready before you contact our support staff can help them resolve problems faster: • Device model and image (firmware) version • Deployment setup • Interface speed and duplex mode settings •...
Page 74
Index delayed packets activation Dell PowerEdge R610 4-10 deployment ActiveUpdate 3-13 identifying what to protect activity indicator 2-15 number of devices 3-15 Administrator’s Guide overview airflow and cooling 2-16 planning altitude deployment planning application policy 3-13 deployment scenarios audience basic deployment 3-18 auto MDI/MDI-X 3-16...
Page 75
Trend Micro™ Network VirusWall™ Enforcer 1500i Installment and Deployment Guide DVD drive connecting the power cable 2-18 installing the bezel 2-20 keyboard and monitor 2-18 endpoint notifications 3-13 rack mounting 2-17 – environmental specifications rail assembly 2-17 eSATA securing the power cable...
Page 76
Index MDI/MDI-X policy enforcement 3-16 4-10 media slot port activity 3-13 memory port functions 2-12 – port indicators MGMT 2-12 2-13 – copper expansion cards 2-15 MIRR 2-12 2-13 – onboard ports 2-14 mirror port 2-12 2-13 ports 2-12 monitor 2-10 default state 2-12...
Need help?
Do you have a question about the Network VirusWall Enforcer 1500i and is the answer not in the manual?
Questions and answers