McAfee Content Security Blade Server 5.5 (M3

Transcription

McAfee Content Security Blade Server 5.5 (M3
McAfee Content Security Blade Server
5.5 (M3 chassis)
Installation Guide
COPYRIGHT
Copyright © 2009 McAfee, Inc. All Rights Reserved.
No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form
or by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies.
TRADEMARK ATTRIBUTIONS
AVERT, EPO, EPOLICY ORCHESTRATOR, FLASHBOX, FOUNDSTONE, GROUPSHIELD, HERCULES, INTRUSHIELD, INTRUSION INTELLIGENCE,
LINUXSHIELD, MANAGED MAIL PROTECTION, MAX (MCAFEE SECURITYALLIANCE EXCHANGE), MCAFEE, MCAFEE.COM, NETSHIELD,
PORTALSHIELD, PREVENTSYS, PROTECTION-IN-DEPTH STRATEGY, PROTECTIONPILOT, SECURE MESSAGING SERVICE, SECURITYALLIANCE,
SITEADVISOR, THREATSCAN, TOTAL PROTECTION, VIREX, VIRUSSCAN, WEBSHIELD are registered trademarks or trademarks of McAfee, Inc.
and/or its affiliates in the US and/or other countries. McAfee Red in connection with security is distinctive of McAfee brand products. All other
registered and unregistered trademarks herein are the sole property of their respective owners.
LICENSE INFORMATION
License Agreement
NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED,
WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH
TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS
THAT ACCOMPANIES YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET,
A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEB SITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU
DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN
THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND.
License Attributions
Refer to the product Release Notes.
2
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
Contents
Introducing McAfee Content Security Blade Server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
How to use this guide. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Who should read this guide. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Definition of terms used in this guide. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Graphical conventions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Documentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Available resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Introducing the blade servers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Key advantages of the blade servers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Types of blade. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Management blade. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Failover Management blade. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Content scanning blades. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Pre-installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
What’s in the box. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Plan the installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Inappropriate use. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Where to place the blade server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Considerations about Network Modes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Transparent bridge mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Transparent router mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Explicit proxy mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Deployment Strategies for Using the device in a DMZ. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
SMTP configuration in a DMZ. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Workload management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
In-built redundancy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Planning Your Installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Before installing the enclosure. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Installation process overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Setting up lights-out management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
After installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
3
Contents
Connecting and Configuring the blade server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Physically installing the blade server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Connect to the network. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Installing the switches. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Port numbers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Using Copper LAN connections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Using Fiber LAN connections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Supplying power to the blade server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Installing the software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Order of installing the Management blades. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Software images. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Locally installing the software on the Management blades. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Remotely installing the software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Using the Configuration Console. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Welcome page. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Performing a custom setup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Restoring from a file. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Using the device. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Updates and HotFixes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
After installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Testing the Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Introducing the user interface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Testing the device. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Testing connectivity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Testing mail traffic. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Testing virus detection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Testing spam detection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Exploring the blade server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Demonstrating failover and workload management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Testing management features on the blade server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Blade server status information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Generating reports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Using policies to manage message scanning. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Creating an anti-virus scanning policy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Creating an anti-spam scanning policy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Creating an email compliance policy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
4
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
Contents
Creating a content filtering policy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
About Virtual host management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Troubleshooting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
System configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Transparent Web Authentication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Anti-spam. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Anti-virus automatic updating. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Delivery. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Directory Harvest Prevention does not work. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Email attachments. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
ICAP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Mail issues. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
POP3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
General issues. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
System maintenance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Getting more help — the user information bar. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
5
Introducing McAfee Content Security Blade
Server
®
This guide provides the necessary information for installing the McAfee Content Security Blade
Server version 5.5 supplied with the M3 blade server chassis. It provides steps and verification
of the installation process.
NOTE: The terms chassis and enclosure are used interchangeably throughout the documentation
set.
This guide demonstrates how to configure Content Security Blade Server 5.5 and when completed
the user will have a fully functional blade server.
Contents
How to use this guide
Definition of terms used in this guide
Graphical conventions
Documentation
Available resources
How to use this guide
This guide helps you to:
• Plan and perform your installation.
• Become familiar with the interface.
• Test that the product functions correctly.
• Apply the latest detection definition files.
• Explore some scanning policies, create reports, and get status information.
• Troubleshoot basic issues.
You can find additional information about the product's scanning features in the online help.
Who should read this guide
The information in this guide is intended primarily for network administrators who are responsible
for their company's anti-virus and security program.
6
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
Introducing McAfee Content Security Blade Server
Definition of terms used in this guide
Definition of terms used in this guide
This information defines some key terms used in this guide.
Term
Definition
demilitarized zone (DMZ)
A computer host or small network inserted as a buffer
between a private network and the outside public network
to prevent direct access from outside users to resources
on the private network.
DAT files
Detection definition (DAT) files, also called signature files,
containing the definitions that identify, detect, and repair
viruses, Trojan horses, spyware, adware, and other
potentially unwanted programs (PUPs).
operational mode
Three operating modes for the product: explicit proxy
mode, transparent bridge mode, and transparent router
mode.
policy
A collection of security criteria, such as configuration
settings, benchmarks, and network access specifications,
that defines the level of compliance required for users,
devices, and systems that can be assessed or enforced by
a McAfee security application.
Reputation Service check
Part of sender authentication. If a sender fails the
Reputation Service check, the appliance is set to close the
connection and deny the message. The sender's IP address
is added to a list of blocked connections and is
automatically blocked in future at the kernel level.
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
7
Introducing McAfee Content Security Blade Server
Graphical conventions
Graphical conventions
Figures in this guide use the following symbols.
Internet
Blade Server (M3
chassis)
Mail server
Other server (such as DNS
server)
User or client computer
Router
Switch
Firewall
Network zone (DMZ or
VLAN)
Network
Actual data path
Perceived data path
Documentation
This Installation Guide is included with your product. Additional information is available in the
online help included with the product, and other documentation available from the
http://mysupport.mcafee.com website.
Available resources
This information describes where to get more information and assistance.
8
McAfee products
McAfee KnowledgeBase. Go to
https://mysupport.mcafee.com/eservice/Default.aspx
and click Search the KnowledgeBase. From
the Product list, select Email and Web
Security Appliance Software.
Product Guide
McAfee download site. Includes information
about basic concepts, policies, protocols
(SMTP, POP3, FTP, HTTP, and ICAP),
maintenance, and monitoring. You will need
your Grant ID number.
Online help
Product interface. Includes information about
basic concepts, policies, protocols (SMTP,
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
Introducing McAfee Content Security Blade Server
Available resources
POP3, FTP, HTTP, and ICAP), maintenance,
and monitoring.
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
9
Introducing the blade servers
®
The McAfee Content Security Blade Server version 5.5 scans web and email traffic for viruses,
spam, and many other threats to your network.
The blade servers are the highest capacity models within the McAfee Email and Web Security
product range.
The blade server:
• Scans and processes your SMTP and POP3 messaging traffic (Email Security software).
• Scans and processes your HTTP, ICAP, and FTP traffic (Web Security software).
• Runs eight times faster than a standalone Secure Messaging Gateway appliance.
• Reduces the cost of storing and running standalone appliances in your datacenter.
• Is scalable. You can add more content scanning blades to increase the scanning throughput
without compromising performance.
• Is easy to manage and administer. It balances the scanning workload and updates the
detection definition (DAT) files across the blades.
• With this release, you can install McAfee Web Gateway 6.8.5 (formally WebWasher) software
onto some or all of your content scanning blades.
NOTE: The blade server has built-in workload management. If you already use a load balancer
in your network, you can leave it there when you install the blade server; even though it is no
longer required to balance the scanning workload.
Contents
Key advantages of the blade servers
Types of blade
Key advantages of the blade servers
Email threat protection
• Award-winning email threat protection
• Detect and block spam, phishing, spyware, and viruses from your email systems
Web threat protection
• Detect and block phishing sites, spyware, potentially unwanted programs and viruses from
being downloaded onto your network
• You can use the web scanning features included within the Content Security Blade Server
software, or you can install the McAfee Web Gateway 6.8.5 (Formally WebWasher) software
onto some or all of your content scanning blades.
10
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
Introducing the blade servers
Types of blade
• Award-winning McAfee SiteAdvisor protects users against visiting unsuitable sites
Content filtering
• Comply with email privacy regulations such as the Health Insurance Portability and
Accountability Act (HIPAA), the Sarbanes-Oxley Act (SOX), the European Union (EU) Directive,
and others
Cost savings
• Reduce product acquisition, license, and support fees
• Reduce data center costs for cooling, space, and power
• Reduce long-term capital costs
Highest throughput, scalability, and reliability
• Increase capacity as needed with no downtime with hotswappable blades
• Redundant power supplies and automatic failover
Proven anti-spam technology
• Detect and block more than 98 percent of spam, including the latest image, PDF, and MP3
spam attacks, with no critical false positives (as measured by third-party tests)
• Streaming updates every two to three minutes quickly shut down new forms of spam
• Anti-spam effectiveness is achieved through a combination of technologies including:
• McAfee® IP reputation filtering
• Domain-name reputation scoring
• Heuristic detection
• Content filtering
• Sender authentication based on the Sender Policy Framework (SPF) and DomainKeys
Identified Mail (DKIM) standards
• Greylisting, which tracks and allows mail from known legitimate senders to pass while
temporarily rejecting unknown senders
Types of blade
This section describes the different types of blade that come with the blade server:
• Management blade.
• Failover Management blade.
• Content scanning blades.
Management blade
The Management blade manages the network traffic, and passes off the traffic to the content
scanning blades using its internal workload management. The Management blade is not used
to scan files. The Management blade:
• Provides the initial software installation for the content scanning blades.
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
11
Introducing the blade servers
Types of blade
• Manages all updates for the other blades.
• Aggregates all events, quarantined email, and deferred email.
Either the Management blade or the Failover Management blade is active at any one time. They
cannot be active at the same time.
The Management blade and content scanning blades work together as a single system when
you:
• Make configuration changes using a web-based interface.
• Update the DAT files.
• View status information.
The Management blade also ensures that:
• The whole system does not experience downtime during updates.
• Updates do not happen if a previous update failed.
• Relevant alerts (SNMP, for example) are generated when a blade is added, removed, or
fails.
The Management blade can interact with the chassis to:
• Shutdown, reboot or disable a content scanning blade.
• Interact with McAfee Quarantine Manager. The Quarantine Manager application ensures
that your network has a centralized quarantine resource.
Failover Management blade
The Failover Management blade is identical to the Management blade. It takes over the
management functions should the Management blade fail. To do so, it uses:
• Spanning Tree Protocol (STP) for transparent bridge mode.
• Virtual Router Redundancy Protocol (VRRP) for transparent router and explicit proxy modes.
The Failover Management blade is not used to scan files. When configured, it remains dormant
until it is needed.
Content scanning blades
At least one content scanning blade is supplied with the blade server.
When you first install a content scanning blade, the Management blade automatically installs
the scanning software image on the new blade. The scanning software image installed depends
on the options you select during the configuration of your blade server.
You can choose to install the scanning features included within the Content Security Blade
Server software, or you can install the McAfee Web Gateway 6.8.5 (Formally WebWasher)
software onto some or all of your content scanning blade. You can install:
• Email and Web Security software — this installs on all content scanning blades, and each
blade scans both email and web traffic.
• Email Security software — you can select the content scanning blades to install the Email
Security software.
• Web Security software — you can select the content scanning blades to install the Web
Security software.
12
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
Introducing the blade servers
Types of blade
• McAfee Web Gateway software — you can select the content scanning blades to install the
McAfee Web Gateway (formally WebWasher) software.
NOTE: If you select and install McAfee Web Gateway software, you cannot install either the
Email and Web Security software, or the Web Security Software on the same chassis. You must
also install your blade server in Explicit Proxy mode if you are planning on using McAfee Web
Gateway software.
Each content scanning blade starts scanning immediately after software is installed.
A content scanning blade is used only to scan your traffic. It is not a Management blade. The
content scanning blade:
• Receives the DAT files and software patches from the Management blade.
• Sends information about all scanning and detection events to the Management blade.
• Sends information about all quarantined and deferred email messages and files to the
Management blade.
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
13
Pre-installation
To ensure the safe operation of the product, consider the following before you begin the
installation.
• Understand the power requirements for your blade server and your power supply system.
• Familiarize yourself with its operational modes and capabilities. It is important that you
choose a valid configuration.
• Decide how to integrate the blade server into your network and determine what information
you need before you start. For example, the name and IP address for the blade server.
• Unpack the product as close to its intended location as possible.
• Remove the product from any protective packaging and place it on a flat surface.
• Observe all provided safety warnings.
CAUTION: Review and be familiar with all provided safety information.
Contents
Where to place the blade server
Considerations about Network Modes
Planning Your Installation
What’s in the box
To check that all components are present, refer to the packing list supplied with your product.
Generally, you should have:
• A Blade Server chassis/enclosure
• A Management blade
• A Failover Management blade
• One or more Scanning blades
• Power cords
• Network cables
• Email and Web Security v5.5 installation and recovery CD
• Linux source code CD
• McAfee Quarantine Manager v6.0 CD
• Documentation CD
If an item is missing or damaged, contact your supplier.
14
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
Pre-installation
Plan the installation
Plan the installation
Before unpacking your blade server, it is important to plan the installation and deployment.
Information to help you is contained in: HP BladeSystem c-Class Site Planning Guide.
Consider the following:
• General guidelines to prepare your site
Overviews of general site requirements to prepare your computer room facility for the blade
server hardware.
• Environmental requirements
Information on environmental site requirements, including temperature, airflow, and space
requirements.
• Power requirements and considerations
Power requirements and electrical factors that must be considered before installation.
Includes Power Distribution Unit (PDU) installation.
• Hardware specifications and requirements
System specifications for the blade server enclosure, racks, and single-phase and three-phase
power sources.
• Configuration scenarios
• Preparing for installation.
Inappropriate use
The product is:
• Not a firewall. — You must use it within your organization behind a correctly configured
firewall.
• Not a server for storing extra software and files. — Do not install any software on
the device or add any extra files to it unless instructed by the product documentation or
your support representative. The device cannot handle all types of traffic. If you use explicit
proxy mode, only protocols that are to be scanned should be sent to the device.
Where to place the blade server
Install the blade server so that you can control physical access to the unit and access the ports
and connections.
A rack-mounting kit is supplied with the blade server M3 chassis, allowing you to install the
blade server in a 19-inch rack. See the HP BladeSystem c3000 Enclosure Quick Setup Instructions.
Considerations about Network Modes
Before you install and configure your Content Security Blade Server, you must decide which
network mode to use. The mode you choose determines how you physically connect your blade
server to your network.
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
15
Pre-installation
Considerations about Network Modes
You can choose from the following network modes.
• Transparent bridge mode — the device acts as an Ethernet bridge.
• Transparent router mode — the device acts as a router.
• Explicit proxy mode — the device acts as a proxy server and a mail relay.
If you are still unsure about the mode to use after reading this and the following sections,
consult your network expert.
CAUTION: If you plan on deploying one or more scanning blades running McAfee Web Gateway
(formally WebWasher) software, you must configure your blade server in Explicit Proxy mode.
Architectural considerations about network modes
The main considerations regarding the network modes are:
• Whether communicating devices are aware of the existence of the device. That is, if the
device is operating in one of the transparent modes.
• How the device physically connects to your network.
• The configuration needed to incorporate the device into your network.
• Where the configuration takes place in the network.
Considerations before changing network modes
In explicit proxy and transparent router modes, you can set up the device to sit on more than
one network by setting up multiple IP addresses for the LAN1 and LAN2 ports.
If you change to transparent bridge mode from explicit proxy or transparent router mode, only
the enabled IP addresses for each port are carried over.
TIP: After you select an operational mode, McAfee recommends not changing it unless you
move the device or restructure your network.
Contents
Transparent bridge mode
In transparent bridge mode, the communicating servers are unaware of the device — the
device’s operation is transparent to the servers.
Figure 1: Transparent communication
In Figure 1: Transparent communication, the external mail server (A) sends email messages
to the internal mail server (C). The external mail server is unaware that the email message is
intercepted and scanned by the device (B).
The external mail server seems to communicate directly with the internal mail server — the
path is shown as a dotted line. In reality, traffic might pass through several network devices
and be intercepted and scanned by the device before reaching the internal mail server.
16
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
Pre-installation
Considerations about Network Modes
What the device does
In transparent bridge mode, the device connects to your network using the LAN1 and LAN2
ports. The device scans the traffic it receives, and acts as a bridge connecting two separate
physical networks, but treats them as a single logical network.
Configuration
Transparent bridge mode requires less configuration than transparent router and explicit proxy
modes. You do not need to reconfigure all your clients, default gateway, MX records, Firewall
NAT or mail servers to send traffic to the device. Because the device is not a router in this
mode, you do not need to update a routing table.
Where to place the device
For security reasons, you must use the device inside your organization, behind a firewall.
Figure 2: Single logical network
TIP: In transparent bridge mode, position the device between the firewall and your router, as
shown in Figure 2: Single logical network.
In this mode, you physically connect two network segments to the device, and the device treats
them as one logical network. Because the devices — firewall, device, and router — are on the
same logical network, they must all have compatible IP addresses on the same subnet.
Devices on one side of the bridge (such as a router) that communicate with devices on the
other side of the bridge (such as a firewall) are unaware of the bridge. They are unaware that
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
17
Pre-installation
Considerations about Network Modes
traffic is intercepted and scanned, therefore the device is said to operate as a transparent
bridge.
Figure 3: Transparent bridge mode
Spanning Tree Protocol for managing bridge priority
Should a blade fail, the Spanning Tree Protocol (STP) directs network traffic to the blade with
the next higher bridge priority.
In transparent bridge mode, the Management blade and the Failover Management blade have
different IP addresses.
In transparent router and explicit proxy modes, the two blades again have different IP addresses,
but are then configured with the same virtual IP address or addresses.
Normally, email traffic is handled by the Management blade. If that blade fails, email traffic is
handled by the Failover Managment blade.
Each blade has a different bridge priority. Because the Management blade has the higher priority
(for example, an STP value of 100), the Management blade normally scans the network traffic.
If the Management blade fails, the STP directs network traffic through a path with the next
higher bridge priority, namely the Failover Management blade (for example, with an STP value
of 200).
The blade which has a port blocked by STP will go into redundant mode.
Transparent router mode
In transparent router mode, the device scans email traffic between two networks. The device
has one IP address for outgoing scanned traffic, and must have one IP address for incoming
traffic.
The communicating network servers are unaware of the intervention of the device — the device’s
operation is transparent to the devices.
18
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
Pre-installation
Considerations about Network Modes
What the device does
In transparent router mode, the device connects to your networks using the LAN1 and LAN2
ports. The device scans the traffic it receives on one network, and forwards it to the next
network device on a different network. The device acts as a router, routing the traffic between
networks, based on the information held in its routing tables.
Configuration
Using transparent router mode, you do not need to explicitly reconfigure your network devices
to send traffic to the device. You need only configure the routing table for the device, and
modify some routing information for the network devices on either side of it (the devices
connected to its LAN1 and LAN2 ports). For example, you might need to make the device your
default gateway.
In transparent router mode, the device must join two networks. The device must be positioned
inside your organization, behind a firewall.
NOTE: Transparent router mode does not support Multicast IP traffic or non-IP protocols, such
as NETBEUI and IPX.
Firewall rules
In transparent router mode, the firewall connects to he physical IP address for the LAN1/LAN2
connection to the Management blade.
Where to place the device
Use the device in transparent router mode to replace an existing router on your network.
TIP: If you use transparent router mode and you do not replace an existing router, you must
reconfigure part of your network to route traffic correctly through the device.
Figure 4: Transparent router mode configuration
You need to:
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
19
Pre-installation
Considerations about Network Modes
• Configure your client devices to point to the default gateway.
• Configure the device to use the Internet gateway as its default gateway.
• Ensure your client devices can deliver email messages to the mail servers within your
organization.
Explicit proxy mode
In explicit proxy mode, some network devices must be set up explicitly to send traffic to the
device. The device then works as a proxy or relay, processing traffic on behalf of the devices.
Explicit proxy mode is best suited to networks where client devices connect to the device through
a single upstream and downstream device.
TIP: This might not be the best option if several network devices must be reconfigured to send
traffic to the device.
Network and device configuration
If the device is set to explicit proxy mode, you must explicitly configure your internal mail server
to relay email traffic to the device. The device scans the email traffic before forwarding it, on
behalf of the sender, to the external mail server. The external mail server then forwards the
email message to the recipient.
In a similar way, the network must be configured so that incoming email messages from the
Internet are delivered to the device, not the internal mail server.
Figure 5: Relaying email traffic
The device scans the traffic before forwarding it, on behalf of the sender, to the internal mail
server for delivery, as shown in Figure 5: Relaying email traffic.
For example, an external mail server can communicate directly with the device, although traffic
might pass through several network servers before reaching the device. The perceived path is
from the external mail server to the device.
Protocols
To scan a supported protocol, you must configure your other network servers or client computers
to route that protocol through the device, so that no traffic bypasses the device.
Firewall rules
Explicit proxy mode invalidates any firewall rules set up for client access to the Internet. The
firewall sees only the IP address information for the device, not the IP addresses of the clients,
so the firewall cannot apply its Internet access rules to the clients.
20
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
Pre-installation
Deployment Strategies for Using the device in a DMZ
Where to place the device
Configure the network devices so that traffic needing to be scanned is sent to the device. This
is more important than the location of the device.
The router must allow all users to connect to the device.
Figure 6: Explicit proxy configuration
The device must be positioned inside your organization, behind a firewall, as shown in Figure
6: Explicit proxy configuration.
Typically, the firewall is configured to block traffic that does not come directly from the device.
If you are unsure about your network’s topology and how to integrate the device, consult your
network expert.
Use this configuration if:
• The device is operating in explicit proxy mode.
• You are using email (SMTP).
For this configuration, you must:
• Configure the external Domain Name System (DNS) servers or Network Address Translation
(NAT) on the firewall so that the external mail server delivers mail to the device, not to the
internal mail server.
• Configure the internal mail servers to send email messages to the device. That is, the internal
mail servers must use the device as a smart host. Ensure that your client devices can deliver
email messages to the mail servers within your organization.
• Ensure that your firewall rules are updated. The firewall must accept traffic from the device,
but must not accept traffic that comes directly from the client devices. Set up rules to prevent
unwanted traffic entering your organization.
Deployment Strategies for Using the device in a
DMZ
A demilitarized zone (DMZ) is a network separated by a firewall from all other networks, including
the Internet and other internal networks. The typical goal behind the implementation of a DMZ
is to lock down access to servers that provide services to the Internet, such as email.
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
21
Pre-installation
Deployment Strategies for Using the device in a DMZ
Hackers often gain access to networks by identifying the TCP/UDP ports on which applications
are listening for requests, then exploiting known vulnerabilities in applications. Firewalls
dramatically reduce the risk of such exploits by controlling access to specific ports on specific
servers.
The device can be added easily to a DMZ configuration. The way you use the device in a DMZ
depends on the protocols you intend to scan.
Contents
SMTP configuration in a DMZ
Workload management
In-built redundancy
SMTP configuration in a DMZ
The DMZ is a good location for encrypting mail. By the time the mail traffic reaches the firewall
for the second time (on its way from the DMZ to the internal network), it has been encrypted.
Devices which scan SMTP traffic in a DMZ are usually configured in explicit proxy mode.
Configuration changes need only be made to the MX records for the mail servers.
NOTE: You can use transparent bridge mode when scanning SMTP within a DMZ. However, if
you do not control the flow of traffic correctly, the device scans every message twice, once in
each direction. For this reason, explicit proxy mode is usually used for SMTP scanning.
Mail relay
Figure 7: Device in explicit proxy configuration in a DMZ
If you have a mail relay already set up in your DMZ, you can replace the relay with the device.
To use your existing firewall policies, give the device the same IP address as the mail relay.
Mail gateway
SMTP does not provide methods to encrypt mail messages — you can use Transport Layer
Security (TLS) to encrypt the link, but not the mail messages. As a result, some companies do
not allow such traffic on their internal network. To overcome this, they often use a proprietary
22
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
Pre-installation
Deployment Strategies for Using the device in a DMZ
mail gateway, such as Lotus Notes® or Microsoft® Exchange, to encrypt the mail traffic before
it reaches the internal network.
To implement a DMZ configuration using a proprietary mail gateway, add the scanning device
to the DMZ on the SMTP side of the gateway.
Figure 8: Protecting a mail gateway in DMZ
In this situation, configure:
• The public MX records to instruct external mail servers to send all inbound mail to the device
(instead of the gateway).
• The device to forward all inbound mail to the mail gateway, and deliver all outbound mail
using DNS or an external relay.
• The mail gateway to forward all inbound mail to the internal mail servers and all other
(outbound) mail to the device.
• The firewall to allow inbound mail that is destined for the device only.
NOTE: Firewalls configured to use Network Address Translation (NAT), and that redirect inbound
mail to internal mail servers, do not need their public MX records reconfigured. This is because
they are directing traffic to the firewall rather than the mail gateway itself. In this case, the
firewall must instead be reconfigured to direct inbound mail requests to the device.
Firewall rules specific to Lotus Notes
By default, Lotus Notes servers communicate over TCP port 1352. The firewall rules typically
used to secure Notes servers in a DMZ allow the following through the firewall:
• Inbound SMTP requests (TCP port 25) originating from the Internet and destined for the
device.
• TCP port 1352 requests originating from the Notes gateway and destined for an internal
Notes server.
• TCP port 1352 requests originating from an internal Notes server and destined for the Notes
gateway.
• SMTP requests originating from the device and destined for the Internet.
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
23
Pre-installation
Planning Your Installation
All other SMTP and TCP port 1352 requests are denied.
Firewall rules specific to Microsoft Exchange
A Microsoft Exchange-based mail system requires a significant workaround.
When Exchange servers communicate with each other, they send their initial packets using the
RPC protocol (TCP port 135). However, once the initial communication is established, two ports
are chosen dynamically and used to send all subsequent packets for the remainder of the
communication. You cannot configure a firewall to recognize these dynamically-chosen ports.
Therefore, the firewall does not pass the packets.
The workaround is to modify the registry on each of the Exchange servers communicating
across the firewall to always use the same two “dynamic” ports, then open TCP 135 and these
two ports on the firewall.
We mention this workaround to provide a comprehensive explanation, but we do not recommend
it. The RPC protocol is widespread on Microsoft networks — opening TCP 135 inbound is a red
flag to most security professionals.
If you intend to use this workaround, details can be found in the following Knowledge Base
articles on the Microsoft website:
• Q155831
• Q176466
Workload management
The blade server includes its own internal workload management, distributing the scanning
load evenly between all scanning blades installed within the enclosure.
You do not need to deploy an external load balancer.
In-built redundancy
With the Content Security Blade Server, if any content scanning blade fails, the workload
management features distribute work among the remaining content scanning blades.
Should the Management blade fail, the Failover Management blade continues to handle workload
management, ensuring highly reliable scanning.
In addition, the blade server includes redundancy within the chassis, by having multiple power
supplies and cooling fans. If a power supply or fan fails, the blade server keeps running, and
the failed component can be replaced without powering down the blade server.
Planning Your Installation
The configuration of your existing network often dictates how the device should be inserted
into your network.
Before deploying the device, analyze your network topography diagrams and familiarize yourself
with your existing network.
To get the best possible performance from your new device, it is essential that you monitor the
traffic flow in your existing network carefully, and analyze how integrating your device will
change that flow.
24
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
Pre-installation
Planning Your Installation
Contents
Before installing the enclosure
Before installing the enclosure, determine the following:
• Power and air conditioning.
• Network mode.
• Network addresses.
• Onboard Administrator
• Lights-out management.
• Failover requirements.
Power and air conditioning
To determine power and air conditioning requirements for the enclosure with the expected
number of blades, see:
• HP BladeSystem cClass Solution Overview
• HP BladeSystem c3000 Enclosure Setup and Installation Guide
• HP BladeSystem Power Sizer Tool
Network mode
You need to decide which network mode to use for the installation:
• Transparent router mode.
• Transparent bridge mode.
• Explicit proxy mode.
Network addresses
You need to determine the IP subnet and DHCP address range for the blade server.
Onboard Administrator
When setting up the onboard Administrator:
• Configure the Onboard Administrator using the chassis display.
• Login to the Onboard Administrator interface via HTTP.
• Run the Onboard Administrator setup wizard.
See HP BladeSystem c3000 Enclosure Setup and Installation Guide
Lights-out management
You need to determine:
• Onboard Administrator IP address.
• Lights-out management IP addresses.
• Network infrastructure for lights-out management.
Failover requirements
Failover requirements depend on the mode used to configure the blade server.
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
25
Pre-installation
Planning Your Installation
• Transparent bridge mode
The Bridge Priority (STP setting) determines which is the Management blade and which is
the Failover Management blade. The blade with the lower priority becomes the Management
blade. You must determine what Bridge Priority to use for the two blades, based on your
environment.
• Transparent router and explicit proxy modes
The blade server uses Virtual Router Redundancy Protocol (VRRP) to configure the
Management blade and Failover Management blade. The Management blade and Failover
Management blade each have a distinct IP address, but external devices connect to the
blade server using a virtual IP address. In this way, external devices can connect to the
blade server (using the same virtual IP address), no matter which physical blade is active.
You must:
• Determine the virtual IP address for the external devices.
• Determine the IP addresses for the Management blade and the Failover Management
blade.
• Specify which blade is to be the Management blade.
Installation process overview
Install the blade server in the following order. A summary of these steps, and the location of
the instructions you need to follow, are provided in Installation quick reference table.
1
Unpack the pallet and check the contents against the parts lists in the box.
2
Rack-mount the enclosure. This includes the physical installation, and setting the integrated
Lights-out (iLO)software for the enclosure.
3
Insert the Management blade (transparent router or explicit proxy mode) or the Failover
Management blade (transparent bridge mode).
4
Connect the peripherals (monitor, keyboard) to the KVM module located at the rear of the
chassis.
5
Connect the power sources to the enclosure.
6
Use the KVM to mount the internal CD/DVD drive to the required Management blade. Install
the software on the Management blade. See Installing the software.
7
Use the Configuration Console for basic configuration, such as server name, IP addresses,
and gateway.
8
Connect to the administration interface.
9
Run the Setup Wizard, remembering to switch on load balancing.
10 Repeat steps 3 to 9 for the remaining Management blade, remembering to switch on load
balancing.
11 Connect the blade server to the network, noting deployment scenarios and intended network
mode.
12 Insert each content scanning blade in turn, and PXE boot from the Management blade.
This process takes approximately 10 minutes per blade.
26
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
Pre-installation
Planning Your Installation
New blades default to a PXE boot for a first-time installation. Subsequent reinstallations
are performed using lights-out management.
NOTE: It is possible to install several content scanning blades at a time, but installing too
many content scanning blades concurrently may slow the installation process. McAfee
recommends only installing 4 or 5 content scanning blades at a time.
13 Route the test network traffic through the blade server.
14 Test that the network traffic is being scanned.
15 Configure policies and reporting.
16 Route production traffic through the system.
Setting up lights-out management
Use this task to set up lights-out management for remote hardware administration of the blade
server.
For details about setting up and using lights-out management, see the HP Integrated Lights-Out
2 User Guide.
Task
1
Using the Onboard Administrator, assign IP addresses to the integrated Lights Out (iLO's)
for each blade.
2
Log on to the HP management system.
3
Assign an IP address for the blade server.
After installation
After you have installed the device, make sure that your configuration is working correctly. See
Testing the device.
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
27
Connecting and Configuring the blade server
McAfee recommend that you consider installing the blade server in the following order:
This step ...
is described here ...
1.
Unpack the pallet and check the
contents against the parts lists in the
box.
http://h20000.www2.hp.com/bc/docs/support/SupportManual/c01167165/c01167165.pdf
2.
Rack-mount the enclosure and install
http://h20000.www2.hp.com/bc/docs/support/SupportManual/c01167165/c01167165.pdf
the blades. This includes setting up iLO
for each blade.
3.
Connect the peripherals and power.
http://h20000.www2.hp.com/bc/docs/support/SupportManual/c01167165/c01167165.pdf
http://h20000.www2.hp.com/bc/docs/support/SupportManual/c00209014/c00209014.pdf
4.
Connect the blade server to the network. Connect to the network
5.
Install the software on the management Installing the software
blades.
6.
Perform basic configuration.
7.
Connect to the administration interface.
8.
Install each content scanning blade in
turn, and PXE boot from the
Management blade.
Installing the software on a content scanning blade
9.
Route the test network traffic through
the blade server.
Testing the device
10.
Test that the network traffic is being
scanned.
Testing the device
11.
Configure policies and reporting.
12.
Configure production traffic through the
system.
CAUTION: Connecting the blade server to your network can disrupt Internet access or other
network services. Ensure that you have arranged network down-time for this, and that you
schedule this during periods of low network usage.
Contents
Physically installing the blade server
Connect to the network
Supplying power to the blade server
28
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
Physically installing the blade server
Use this task to physically install the blade server.
Task
1
Remove the blade server from the protective packaging and place it on a flat surface.
2
If you are going to install the blade server in a 19-inch rack, perform the steps in the
http://h20000.www2.hp.com/bc/docs/support/SupportManual/c01167165/c01167165.pdf.
3
Connect a monitor and keyboard to the blade server.
4
Connect power leads to the monitor and the blade server, but do not connect to the power
supplies yet.
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
29
Connect to the network
This section describes how to connect the blade server to your network.
The switches and cables that you use to connect the blade server to your network depend on
how you are going to use the blade server. For information about network modes, see
Considerations about Network Modes.
Installing the switches
Before making any connections, you must install and configure the Ethernet switches.
The switches are installed at the rear of the chassis. The LAN 1 switch fits into the top left
switch bay, and the LAN 2 switch fits into the top right switch bay.
Ensure that you:
• Ensure the Spanning Tree Protocol (STP) state is OFF for Spanning Tree Group 1 (by default,
all ports are members of STP Group 1.) (If you are installing your blade server in transparent
bridge mode.)
• Configure the Access Control Lists (ACLs) on the switches to isolate the content scanning
blades from receiving external DHCP addresses.
• Configure the ACLs so that the blade heartbeat packets are kept within the blades server.
• If VLAN-tagged traffic is to pass through the blade server, the switches need to be configured
to allow this traffic to pass.
Information about how to do this is provided in the documentation listed below:
• http://bizsupport.austin.hp.com/bc/docs/support/SupportManual/c00865002/c00865002.pdf
• http://bizsupport.austin.hp.com/bc/docs/support/SupportManual/c00865010/c00865010.pdf
Port numbers
When you connect the blade server to your network, use the following port numbers:
• For HTTPS, use Port 443.
• For HTTP, use Port 80.
• For SMTP, use Port 25.
• For POP3, use port 110.
• For FTP, use Port 21.
30
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
Connect to the network
Using Copper LAN connections
Using Copper LAN connections
Using the LAN1 and LAN2 switch connections and the supplied network cables (or equivalent
Cat 5e or Cat 6 Ethernet cables), connect the blade server to your network according to the
network mode you have chosen.
Transparent bridge mode
Use the copper LAN cables (supplied) to connect the blade server’s LAN1 and LAN2 switches
to your network so that the blade server is inserted into the data stream.
Transparent router mode
The blade server functions as a router. The LAN segments connected to its two network interfaces
must therefore be on different IP subnets. It must replace an existing router, or a new subnet
must be created on one side of the blade server. Do this by changing the IP address or the
netmask used by the computers on that side.
Explicit proxy mode
Use a copper LAN cable (supplied) to connect the LAN1 or LAN2 switch to your network. The
cable is a straight-through (uncrossed) cable, and connects the blade server to a normal
uncrossed RJ-45 network switch.
In explicit proxy mode, the unused switch connection can be used as a dedicated management
port. To manage the blade server locally, use a crossover Cat 5e Ethernet cable to connect the
blade server to your local computer’s network card.
Using Fiber LAN connections
Before making any connections, you must install the fiber-optic SFP transceivers. To do this,
see the
http://bizsupport.austin.hp.com/bc/docs/support/SupportManual/c00865010/c00865010.pdf.
NOTE: Only use the fiber-optic SFP transceivers supplied by HP or McAfee. Using SFP transcievers
from other vendors is likely to prevent access to the blade server.
Use the fiber cables to connect the LAN1 and LAN2 switches to your network. The switches and
cables that you use depend on how you are going to use the blade server.
Transparent bridge mode
Use the fiber cables to connect the LAN1 and LAN2 switches to your network.
Transparent router mode
Use the fiber cables to connect the LAN1 and LAN2 switches to different IP subnets.
Explicit proxy mode
Use a fiber cable to connect the blade server’s LAN1 switches to your network.
In explicit proxy mode, the unused switch can be used as a dedicated management switch. If
your management computer has a compatible Network Interface Card (NIC), connect it to the
remaining switch for local management.
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
31
Supplying power to the blade server
Use this task to supply power to the blade server and switch it on.
Task
1
Connect the blade server power cables to power outlets.
NOTES
• To ensure all blades power up, use two different power circuits. If only one circuit is
used, and the power management settings are configured to AC redundant (as
recommended), some blades will fail to power up.
• If the power cords are not suitable for the country of use, contact your supplier.
2
Switch on the blade server by pushing the power buttons on the management and failover
management blades.
After booting up, the Configuration Console appears on the monitor. See .
32
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
Installing the software
Use these tasks to install the blade server software on the Management blade or the Failover
Management blade.
Tasks
Locally installing the software on the Management blades
Remotely installing the software
Using the Configuration Console
Order of installing the Management blades
You should install and configure the Management blade first, and then install and configure the
Failover Management blade.
Software images
With Content Security Blade Server version 5.5, you can select the software images that can
be installed onto the content scanning blades. The options are:
• Email and Web Security
• Email Security
• Web Security
• McAfee Web Gateway (formally WebWasher)
If you select Email and Web Security, all content scanning blades have this software image
installed. If you select Email Security and either Web Security or McAfee Web Gateway, you
configure each content scanning blade to scan either email or web traffic.
NOTE: You can select either Web Security or McAfee Web Gateway. You cannot install both
web scanning images onto the same blade system.
Refer to the McAfee Web Gateway Appliances Installation and Configuration Guide for further
information on configuring McAfee Web Gateway software.
Locally installing the software on the Management
blades
Use this task to install the software on the Management blade or Failover Management blade
when you are local to the blade server.
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
33
Installing the software
Remotely installing the software
Before installing the software, check to see if newer versions of your software are available
from the McAfee download site:
http://www.mcafee.com/us/downloads/
NOTE: You will need a valid grant number.
Tasks
1
Insert the Management blade into position 1 (for the Management blade) or position 2 (for
the Failover Management blade).
2
Attach a monitor and keyboard to the KVM, located on the rear of the chassis.
3
Using the KVM interface, mount the CD/DVD-ROM drive to the Management blade being
installed.
4
Boot the Management blade or Failover Management blade from the Installation and
Recovery CD. The software is installed on the selected blade.
5
Set the basic configuration. See Using the Configuration console.
Remotely installing the software
Use this task to install the software on the Management blade or Failover Management blade
when you are away from the blade server.
NOTE: The integrated Lights-Out features for each blade can also be accessed via the Onboard
Administrator.
Use integrated Lights-Out software to boot the blade server from the Installation CD.
See Setting up lights-out management and the
http://h20000.www2.hp.com/bc/docs/support/SupportManual/c00553302/c00553302.pdf.
Using the Configuration Console
With the version 5.5 software, the configuration process has been simplified. You can now
configure your device either from the Configuration Console, or from the Setup Wizard within
the user interface.
The Configuration Console launches automatically at the end of the startup sequence after
either:
• an unconfigured device starts,
• or after a device is reset to its factory defaults.
When launched, the Configuration Console provides you with options to either configure your
device in your preferred language from the device console, or provides instructions for you to
connect to the Setup Wizard within the user interface from another computer on the same class
C subnet. Both methods provide you with the same options to configure your device.
NOTE: From the Configuration Console, you can configure a new installation of the appliance
software. However, to configure your appliance using a previouosly saved configuration file,
you need to log onto the appliance user interface, and run the setup Wizard (System | Setup
Wizard).
34
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
Installing the software
Using the Configuration Console
This version of the software also introduces automatic configuration using DHCP for the following
parameters:
• Host name
• Domain name
• Default gateway
• DNS server
• Leased IP address
• NTP server
Welcome page
Performing a custom setup
Restoring from a file
Welcome page
This is the first page of the Setup Wizard. Use this page to select the type of installation you
want to perform.
NOTE: If you access this page from the Setup Wizard, you will be prompted to enter your
username and password.
• Select Custom Setup (default) to select the operating mode for your device. If you choose
to protect mail traffic you can enable SMTP and POP3. If you choose to protect web traffic
you can enable HTTP, FTP and ICAP. You should use this if you need to configure IPv6 and
to make other changes to the default configuration.
• Select Restore from a File (not available from the Configuration Console) to set up your
device based on a previously saved configuration. Following the import of the file you will
be able to chack the imported settings before finishing the wizard.
Performing a custom setup
For the Custom setup, the wizard includes these these pages:
• Traffic
• Basic Settings
• Network Settings
• Cluster Management
• DNS and Routing
• Time Settings
• Password
• Summary
Traffic
Use this page to specify the type of traffic that the device scans.
• Web traffic includes HTTP (for web browsing), ICAP (for use with ICAP clients), and FTP for
file transfer.
• Email traffic includes SMTP and POP3.
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
35
Installing the software
Using the Configuration Console
You can enable or disable each protocol (SMTP, POP3, HTTP, ICAP and FTP). If the device is
in Transparent Router or Transparent Bridge mode, and the protocol is disabled, traffic for the
protocol passes through the device, but is not scanned.
NOTE: If you are installing McAfee Web Gateway software, the device must be configured in
Explicit Proxy mode.
If you intend to use Web Security Gateway, specify the schedules for software updates on this
page, and upload the license file.
If the device is in Explicit Proxy mode, and a protocol is disabled, traffic directed to the blade
server for that protocol is refused. The protocol is blocked at the device. In Explicit Proxy mode,
only SMTP, POP3, HTTP, ICAP and FTP traffic is handled by the blade server. All other traffic
is refused.
If, after installation, you do not want to scan any of the types of traffic, you can disable each
protocol from its page. From the menu, select Email | Email Configuration | Protocol
Configuration or Web | Web Configuration
Option definitions
Option
Definition
Scan web traffic
Using Web Gateway
scanning devices
Select this option to install McAfee Web Gateway (formaly
WebWasher) software onto one or more of your content
scanning blades.
Further options enable you to:
Using Web Security
scanning devices
•
Upload Web Gateway license file
•
Set the URL Filter updates interval
•
Set the McAfee Web Gateway anti-Virus updates interval
•
Set the Proactive Scanning updtes interval
•
Set the CRL updates interval
Select this option to install Web Security scanning on your
blade server.
You can also choose to Enable protection against
Potentially Unwanted Programs (including
Spyware).
McAfee Anti-Spyware protects your network from many
types of potentially unwanted software such as spyware,
adware, remote administration tools, dialers and password
crackers. This feature is not enabled by default.
NOTE: McAfee Anti-Spyware is designed to detect and, with
your permission, remove potentially unwanted programs
(PUPs). Some purchased or intentionally downloaded
programs act as hosts for PUPs. Removing these PUPs may
prevent their hosts from working. Be sure to review the
license agreements for these host programs for further
details. McAfee, Inc. neither encourages nor condones
breaking any license agreements that you may have entered
into. Please read the details of all license agreements and
privacy policies carefully before downloading or installing
any software.
Scan email traffic
Email traffic includes SMTP and POP3 traffic. After installation:
The device protects your network against viruses, spam and phish, and uses McAfee
TrustedSource to protect your network from unwanted email.
Further options include:
36
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
Installing the software
Using the Configuration Console
Option
Local relay domain
Definition
•
Enable protection against Potentially Unwanted Programs (including
Spyware)
•
Scan SMTP traffic
•
Scan POP3 traffic
Under Relaying options, the device suggests the domain information if this is available
via DHCP. Delete the asterisk to accept the domain name, or type another domain name.
Basic Settings
Use this page to specify basic settings for the device.
The device tries to provide some information for you, and shows the information highlighted
in amber. To change the information, click and retype.
Option definitions
Option
Definition
Cluster Mode
•
Cluster Master - This blade becomes the Management blade, and controls the
scanning workload for several other contetn scanning blades.
•
Cluster Failover - If the Management blade fails, this blade controls the scanning
workload instead.
Device Name
Specifies a name, such as appliance1.
Domain Name
Specifies a name such as domain.example.com.
Default Gateway (IPv4) Specifies an IPv4 address such as 198.168.10.1. You can test later that the appliance can
communicate with this server.
Next Hop Router (IPv6) Specifies an IPv6 address, such as FD4A:A1B2:C3D4::1.
Network Settings
The first time you run a configuration on a new install (or revert to default settings) the Network
Settings page is launched. If you change the Cluster Mode of the device, this page will also be
launched.
Use this page to configure the IP address, network speeds and operating mode for the device.
If possible, your device will populate many of these options using DHCP. The IP addresses must
be unique and suitable for your network. Specify only as many IP addresses as you need.
Option definitions
Option
Definition
Change Network Settings When clicked, starts a wizard with the following options.
Operating mode
Offers a choice of mode.
In Transparent Route or Transparent Bridge mode, other network devices, such
as mail servers, are unaware that the blade server has intercepted and scanned the
email before forwarding it. The operation is transparent to the devices.
In Explicit Proxy mode, some network devices send traffic to the appliance. The
blade server then works as a proxy, processing traffic on behalf of the devices.
LAN Interface Type
Specifies the type of connection — copper wire or optical fiber. This option is available
only with higher-speed appliances.
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
37
Installing the software
Using the Configuration Console
Option
IP Address
Definition
Specifies network addresses to enable the appliance to communicate with your
network. For example, 198.168.10.1.
Specify the IP address for each Management blade.
You can specify multiple IP addresses for the blade server ports. If the blade server
is in Transparent Bridge mode, the IP addresses are combined into one list for both
ports. In the other modes, click Network Interface 1 or Network Interface 2
to work on each of the two lists.
Configure the IP address for the Management blade, and for load balancing. If you
are in explicit proxy or transparent router mode, create a virtual IP address. The
virtual IP address must be the same for both the Management blade and the Failover
Management blade.
NOTE: You will need to setup the Failover Management blade with different IP addresses
to the Management blade for both the physical IP and for load balancing.
The IP address at the top of a list is the primary address. Any IP addresses below it
are “aliases.”
Network Mask
Specifies an IPv4 network mask, for example: 255.255.255.0, or specifies the IPv6
prefix length (1-64 or 128).
Cluster Management
Use this page to specify load-balancing requirements.
• Cluster Management (Cluster Master)
• Cluster Management (Cluster Failover)
A cluster is a group of devices that shares both its configuration and balances the network
traffic.
The cluster contains:
• One cluster master. The master both synchronizes the configuration and balances the load
of network traffic to the other cluster members.
• One cluster failover. If the cluster master fails, the cluster failover will seamlessly take over
the work of the cluster master.
• One or more cluster scanners. They scan traffic according to the policies synchronized from
the master.
Benefits
• Scalable performance through load balancing multiple devices removes the need for costly
upgrades.
• Easier management through synchronization of configuration and updates, reducing
administrative overhead.
• Improved resilience through high availability, reducing possibility of unscheduled outages.
• Improved intelligence through consolidated reports.
Setting up the cluster
When configuring a master or failover, the administrator must do the following:
• For Proxy or Transparent Router Mode, set a virtual IP address that is the same on both the
master and failover. The cluster members then use VRRP to failover.
• For Transparent Bridge, set up the cluster to use STP to failover. The bridge priority must
be lower on the master (set by default).
38
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
Installing the software
Using the Configuration Console
For all cluster members, the administrator must set the cluster identifier. This unique identifier
ensures that members of the cluster are joined correctly. To create multiple clusters, you can
use a different identifier for each cluster.
Direct all network traffic that is to be scanned to the Cluster Master (or the virtual IP address
if a Cluster Failover will be used.
Managing the cluster
Once configured, the cluster is joined automatically using the cluster identifier. The Dashboard
on the cluster master lists the device and cluster type.
The administrator then only needs to use the user interface of the cluster master for
management, for example, setting scanning policies. The cluster master will then automatically
push this configuration to the other cluster members.
The cluster master collates:
• Anti-virus updates
• Reports
• Queued email
• McAfee Quarantine Manager (MQM)
NOTE: Software patches need to be applied to each separate device in turn.
Cluster Management (Cluster Master)
Use this page to specify information for the Management blade.
Option
Definition
Address to use for load
balancing
Specifies the Management blade address.
Cluster identifier
Specifies an identifier. Range is 0-65535.
Cluster Management (Cluster Failover)
Use this page to specify information for the Failover Management blade.
Option
Definition
Address to use for load
balancing
Specifies the Failover Management blade address. Provides a list of all subnets assigned
to the appliance.
Cluster identifier
Specifies an identifier. Range is 0-65535.
DNS and Routing
Use this page to configure the device’s use of DNS and routes.
Domain Name System (DNS) servers translate or "map" the names of network devices into IP
addresses (and the reverse operation). The device sends requests to DNS servers in the order
that they are listed here.
Option definitions
Option
Server Address
Definition
Specifies the DNS servers. The first server in the list must be your fastest or most
reliable server. If the first server cannot resolve the request, the device contacts the
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
39
Installing the software
Using the Configuration Console
Option
Definition
second server. If no servers in the list can resolve the request, the device forwards
the request to the DNS root name servers on the Internet.
If your firewall prevents DNS lookup (typically on port 53), specify the IP address of
a local device that provides name resolution.
Network Address
Displays the network address of a routing device.
Mask
Displays the network subnet mask such as 255.255.255.0.
Gateway
Specifies the IP addresses of other gateways (typically firewall or routers) through
which the device will communicate with the network.
The Basic Settings page specified the default gateway.
Metric
Displays a number used by routing software. Default value is 0.0.
Enable dynamic routing
Dynamic routing allows your network devices, including the device, to listen for the
routing information that routers broadcast on your network. The devices can use
that information to configure their own routing information.
NOTE: The device supports only the Routing Information Protocol (RIP) and Open
Shortest Path First (OSPF) routing protocols.
Time Settings
Use this page to set the time and date, and any details for the use of the Network Time Protocol
(NTP). NTP synchronizes timekeeping among devices in a network. Some Internet Service
Providers (ISPs) provide a timekeeping service. For more information about NTP, see RFC 1305
at www.apps.ietf.org/rfc/rfc1305.html, www.ntp.org or www.ntp.isc.org
The device can synchronize its time settings to other devices, keeping its own logs, reports and
schedules accurate. Because NTP messages are not sent often, they do not noticeably affect
the blade servers performance.
Option definitions
Option
Definition
Time zone
Specifies your local time zone. You might need to set this twice each year if your region
observes daylight saving time.
System time (local)
Specifies the date and the local time. To set the date, click the calendar icon.
Set time now
When clicked, sets the time on the device. You need to click this button before you
click Next.
If it is needed, you can configure Network Time Protocol (NTP) after installation.
Enable NTP
When selected, accepts NTP messages from a specified server or a network broadcast.
Enable NTP client
broadcasts
When selected, accepts NTP messages from network broadcasts only. This method is
useful on a busy network but must trust other devices in the network.
When deselected, accepts NTP messages only from servers specified in the list.
NTP Server
Displays the network address or a domain name of one or more NTP servers that your
device uses.
If you specify several servers, the device examines each NTP message in turn to
determine the correct time.
40
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
Installing the software
Using the Configuration Console
Password
Use this page to specify a password for the device. For a strong password, include letters and
numbers. You can type up to 15 characters.
Option definitions
Option
Definition
User ID
This is scmadmin. You can add more users later.
Password
Specifies the new password. Change the password as soon as possible to keep your
device secure.
You must enter the new password twice to confirm it. The original default password
is scmchangeme.
NOTE: You must change the password from its default value before you can apply the
configuration.
Summary
Use this page to review a summary of the settings that you have made through the Setup
Wizard. To change any value, click its blue link to display the page where you originally typed
the value.
After you click Finish, the setup wizard has completed.
Use the IP address shown on this page to access the interface. For example
https://192.168.200.10. Note that the address begins with https, not http.
When you first log onto the interface, type the user name, scmadmin and the password that
you gave to this setup wizard.
Option definitions
Option
Definition
The value is set according to best practice.
The value is probably not correct.
Although the value is valid, it is not set according to best practice. Check the value before
continuing.
No value has been set. The value has not been changed from the default. Check the value
before continuing.
Restoring from a file
When configuring your device from the Setup Wizard within the user interface, using the Restore
from a file option enables you to import previously saved configuration information and apply
it to your device. After this information has been imported you can make changes before applying
the configuration.
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
41
Installing the software
Using the Configuration Console
Option
Definition
Import Config
Browse to and select a previously saved configuration file to upload to your device.
Values to Restore
By default all configuration is restored. You can choose to restore only specific parts
of your configuration by de-selecting the information you do not want restored.
You will have the chance to review these changes before applying them.
Configuration Import
Messages
As the configuration file is imported, messages are displayed.
Once the configuration information has been imported, you are taken to the Custom Mode of
the Setup Wizard. (See Performing a custom setup.) All imported options are shown on the
wizard pages, giving you the opportunity to make any amendments before applying the
configuration.
Using the Configuration Console
42
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
Using the device
Read this information before you use the device.
Contents
Updates and HotFixes
After installation
Updates and HotFixes
Before deploying the device, download and apply the latest applicable updates and HotFixes
from the download site:
http://www.mcafee.com/us/downloads/
NOTE: You will need a valid grant number.
After installation
After you have installed the device, make sure that your configuration is working correctly. See
Testing the device.
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
43
Testing the Configuration
You are now ready to test the configuration on the device. This section includes some information
to help you get started:
• How to start the user interface again.
• Tasks to complete to make sure that the device is working correctly.
Contents
Introducing the user interface
Testing the device
Introducing the user interface
To start the interface for the device, you must log on using the username and password. The
user interface opens on the Dashboard page.
NOTE: The interface you see might look slightly different from that shown here, because it can
vary depending on the hardware platform, software version and language.
Figure 9: Interface components - Dashboard page
Navigation bar
44
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
Support control buttons
Testing the Configuration
Introducing the user interface
User information bar
View control
Section icons
Content area
Tab bar
Navigation bar
The navigation bar contains four areas: user information, section icons, tab bar, and support
controls.
User information bar
The left-hand side of the user information bar displays a list of currently logged on users (and
the server they’re logged on to), a Change Password button, and a Log Off button. On the
right-hand side of the bar, About the Appliance gives you appliance and package version
information. Resources provides instructions on how to submit a virus sample to McAfee correctly
and links to additional McAfee resources such as our Service Portal and the Virus Information
Library.
These links can be accessed from the user information bar.
About
Product and licensing information.
Resources
Contact and the following information:
Technical Support — Frequently asked questions on the McAfee website.
Submit a Sample — Instructions for submitting a virus sample to McAfee.
Virus Information Library — Links to the Virus information Library,
which describes every virus and other potentially unwanted programs that
McAfee detects and cleans.
Download SNMB files — Download files for SMI, MIB and HP
Openview.
Help Topics button
Opens the Online Help.
Section icons
There are five or six section icons depending on the software that you are using. Click an icon
to change the information in the content area and the tab bar.
, when displayed, to open the page for the web scanning software you
Use the Web icon
have installed. When you have McAfee Web Gateway installed, use this icon to open the McAfee
Web gateway interface directly in the content area.
NOTE: With McAfee Web Gateway installed, you can access the McAfee Web Gateway interface
directly, as directed above. However, some tasks — such as creating new users — is better
carried out from the Content Security Blade Server interface, as the new user profiles are then
replicated onto the McAfee Web Gateway software.
Tab bar
The contents of the tab bar are controlled by the selected section icon. The selected tab dictates
what is displayed in the content area.
Support control buttons
The support control buttons are actions that apply to the content area. They are (from left to
right) Back and Help. Two additional buttons appear when you configure something that allows
you to apply or cancel your changes.
View control
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
45
Testing the Configuration
Testing the device
The view control button turns an optional Status window on and off.
Content area
The content area contains the currently active content and is where most of your interaction
will be.
NOTE: The changes that you make take effect after you click the green checkmark.
Testing the device
Use these tasks to test:
• The device configuration
• Mail traffic
• Virus detection
• Spam detection
NOTE: Before using the device, update its DAT files.
Testing connectivity
Use this task to confirm basic connectivity.
Task
1
From the interface, select Troubleshoot | Tests | System Tests.
2
Click Start in the upper-right corner. Each test should succeed.
3
Look in the System Tests area and check that all the tests are successful.
Testing mail traffic
Use this task to ensure that mail traffic is passing through the device.
Task
1
Send an email message from an external email account (such as Hotmail) to an internal
mailbox and confirm that it arrived.
2
Select Dashboard.
The SMTP protocol section shows that a message was received.
Testing virus detection
Use this task to test the software by running the EICAR Standard AntiVirus Test File. This file
is a combined effort by anti-virus vendors throughout the world to implement one standard by
which customers can verify their anti-virus installations.
Task
1
Copy the following line into a file, making sure you do not include any spaces or line breaks:
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
46
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
Testing the Configuration
Testing the device
2
Save the file with the name EICAR.COM.
3
From an external email account, create a message that contains the EICAR.COM file as an
attachment and send the message to an internal mailbox.
4
Return to the Dashboard page.
The SMTP protocol section shows that a virus was detected.
Delete the message when you finish testing your installation, to avoid alarming unsuspecting
users.
This file is not a virus. For more information about the EICAR test file, visit:
http://www.eicar.org/.
Testing spam detection
Use this task to run a General Test mail for Unsolicited Bulk Email (GTUBE) to verify that the
device is detecting incoming spam.
Task
1
From an external email account (SMTP client), create a new email message.
2
In the body of the message, copy the following text:
XJS*C4JDBQADN1.NSBN3*2IDNEN*GTUBE-STANDARD-ANTI-UBE-TEST-EMAIL*C.34X
Make sure that you type this line with no line breaks.
3
Send the new email message to an internal mailbox address.
The device scans the message, recognizes it as a junk email message, and deals with it
accordingly. The GTUBE overrides blacklists and whitelists.
For more information about the GTUBE, visit http://spamassassin.apache.org/.
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
47
Exploring the blade server
This section contains tasks and scenarios that show some key benefits of using a blade server
to protect your gateway.
To complete the tasks and scenarios, you will need some of the information that you entered
in the configuration console and Setup Wizard.
Tasks
Demonstrating failover and workload management
Testing management features on the blade server
Demonstrating failover and workload management
Use this task to demonstrate the blade server’s workload management and built-in redundancy
management.
Your blade server comes with at least one content scanning blade blade. You can add more as
necessary. This test assumes that you have two content scanning blade blades.
NOTE: For information about adding and removing blades from the enclosure, refer to the HP
BladeSystem c3000 Enclosure Quick Setup Instructions.
Task
1
On the Dashboard | Blade page, select the Blade Status tab to ensure the blade server
is functioning correctly.
• The management blade has the name you entered when using the Configuration Console.
The management blade has a NETWORK status.
• The Failover Management blade has the name you entered when using the Configuration
Console. The Failover Management blade has a REDUNDANT status.
• The content scanning blades are called Blade <number> and have a status of OK.
2
Remove the management blade from the enclosure and watch as the blade server continues
to function using the Failover Management blade.
• The Failover Management blade state changes to Network.
• The management blade changes to a Failed state.
3
From System | Cluster Management, select a content scanning blade and click Disable
to take that content scanning blade off-line. The blade server continues scanning traffic.
CAUTION: The design of the blade server allows the removal of a content scanning blade
blade from the enclosure without first stopping the content scanning blade blade. However,
McAfee do not recommend that you do so, as there is a slight risk that doing this could
corrupt the information on the disk drives.
48
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
Exploring the blade server
Testing management features on the blade server
4
Look at the Messages column to watch the number of messages that are processed by
each content scanning blade.
5
On Blade Status, select the content scanning blade blade that you turned off and click
Start.
6
Look at the Messages column again. The blade server scans more traffic and automatically
balances the scanning load between the two blades.
7
Optional: Add a third content scanning blade to the enclosure and activate it.
8
Check Blade Status again. The blade server scans even more messages and balances
the scanning load between the three blades.
Testing management features on the blade server
Use these tasks to demonstrate how the blade server management features reduce your system
management burden; the system is managed as one system whether you have one content
scanning blade or several.
You can obtain reports and status information for all the blades using the Status and Logs
information. You can use the Management blade to keep DAT files on all the content scanning
blade up-to-date and also manage the quarantine location.
Blade server status information
While traffic passes through the blade server, you can look at the Dashboard to get up-to-date
information about the total traffic throughput, detections, and performance for each protocol.
The Dashboard includes blade-specific information, such as:
• General Status (Management blade and )
• Hardware Status (Management blade)
• Blade Status (all blades)
This table shows the information that you can get about all the blades.
Speedometer
The average throughput of the blade server, based on measurements taken every
few minutes.
Name
Name of the blade:
•
The Management blade.
•
The Failover Management blade.
NOTE: These names are specified using the Configuration Console.
•
Blade <number> — content scanning blades.
State
The current state of each blade.
Load
The overall system load for each blade.
Active
The number of connections currently active on each blade. The row for the
Management blade shows the total for all content scanning blades.
Connections
The total number of connections since the counters were last reset. The row for
the Management blade shows the total for all content scanning blades.
Other columns
Version information for the Anti-Virus Engine, Anti-Virus DAT files, Anti-Spam Engine
and Anti-Spam Rules. The version numbers are the same if the blades are
up-to-date. During updating, the values might be different.
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
49
Exploring the blade server
Using policies to manage message scanning
Generating reports
The Content Security Blade Server includes several pre-defined reports that you can download
in PDF, HTML or Text formats. You can define the schedule for these reports being generated,
and can define who the reports are sent to. You can also create your own reports.
The blade server log displays event information according to the report type and period you
select. The blade server’s own reporting features can generate reports, or show logs, statistics,
performance counters and graphs for a wide range of data about the blade server and its
activities, such as memory and processor usage.
For example, after you performed the steps in Testing virus detection, click Email | Email
Overview. The INCOMING EMAIL SUMMARY shows the EICAR test file that you detected.
Task
Use this task to update the blade server’s DAT files and to then view the the update report.
NOTE: The Dashboard is displayed by default each time you log on to the blade server.
1
Select System | Component Management | Update Status.
2
From the Version information and updates, click Update now for any anti-virus or
anti-spam DAT file updates that you want to update.
3
Select Reports | System reports.
4
Select Filter | Updates.
5
Click Apply. Information about the updates applied to your blade server are displayed.
Further report information
You can:
• Save the report into Favorites. This allows you to run the same report at future times.
• Where relevant, switch between different views of the reported data.
Using policies to manage message scanning
Use these tasks to demonstrate the blade server scanning features in action. It provides
step-by-step instructions to create and test some sample policies and tells you how to generate
applicable reports.
A policy is a collection of settings and rules that tells the blade server how to combat specific
threats to your network. When you create real scanning policies for your organization, it is
important that you spend time researching and planning your requirements. You can find
guidelines to help you in your policy planning in the Online help.
Before you create policies
All quarantine actions are disabled by default. Before you enable them, configure the blade
server to use the McAfee Quarantine Manager to manage the quarantine location. To do this:
50
1
From the user interface, select Email | Quarantine Configuration.
2
Select Use an off-box McAfee Quarantine Manager (MQM) service.
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
Exploring the blade server
Using policies to manage message scanning
3
Enter details of your McAfee Quarantine Manager.
NOTE: If you are replacing an existing McAfee appliance with your blade server, make sure
you use your existing Appliance ID. If you use a different Appliance ID, you will not be
able to release any messages quarantined by the old appliance.
4
Apply your changes.
Creating an anti-virus scanning policy
Create an anti-virus scanning policy to:
• Detect viruses in incoming messages.
• Quarantine the original email.
• Notify the recipient.
• Alert the sender.
Task
Use this task to demonstrate what happens when a mass mailer virus rule is triggered by the
EICAR test file, and actions that can be taken.
1
On the device, ensure that you are using McAfee Quarantine Manager ( Email |
Quarantine Configuration | Quarantine Options ).
2
On the device, select Email | Email Policies | Scanning Policies.
The default policy is set to Clean or Replace with an alert, if cleaning fails.
3
Click Viruses: Clean or replace with an alert to display the Default Anti-Virus
Settings (SMTP).
4
Under Actions, in If a virus is detected ensure that Attempt to clean is selected.
5
In the And also section beneath the action, select Deliver a notification email to the
sender and Quarantine the original email.
6
In If cleaning fails, select Replace the detected item with an alert.
7
In the And also section beneath If cleaning fails, select Deliver a notification E-mail
to the sender and Quarantine the original email as the secondary actions.
8
Click OK.
9
Select Email | Email Policies | Scanning Policies [Scanner Options] -- Email
address configuration.
10 In Bounced emails, assign the email address as an administrator email address.
Without this configuration, the device does not include a From: address on the email
notification. Most email servers do not deliver email without a From: address.
11 Click OK, then click the green checkmark.
12 Select Email | Email Policies | Scanning Policies [Anti-Virus] | Custom Malware
Options.
13 Select Mass mailers, then set If detected to Deny connection (block).
The sending mail server receives a Code 550: denied by policy error message. The
device keeps a list of connections that are not allowed to send email under any
circumstances. The list can be viewed at Email | Email Configuration | Receiving
Email | Permit and Deny [+] Permitted and blocked connections. The Denied
Connections option is described in the Online help.
14 Test the configuration:
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
51
Exploring the blade server
Using policies to manage message scanning
a Send an email from <client email address> to <server email address>.
b Create a text file that includes the following string:
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
c Save the file as eicar.txt.
d Attach the file to the email.
The gateway security device replaces the file with an alert and the sender receives a
notification alert.
15 Return to Custom Malware Options and click Specific detection name:.
16 Type EICAR.
17 Ensure the primary action is Refuse the original data and return an error code
(block), then click OK.
18 From an external email account, create a message and attach the EICAR test file.
The email client returns with an error 550: denied by policy error message.
Email | Email Configuration | Receiving Email | Permit and Deny Lists [+]
Blocked connections is empty.
19 In Custom Malware options, change the primary action to Deny the connection, then
click OK.
20 Send the same email and check the denied connection. It has the IP address of your client
machine (example IP address).
21 Try to send a benign email. This is also denied because of the denied connections list. To
the sending server, it appears that the server is not online.
The device checks the message as it enters your mail gateway and identifies that it contains a
virus. It quarantines the message and notifies the intended recipient and the sender that the
message was infected.
Creating an anti-spam scanning policy
Use this task to set up a policy to protect your organization from receiving unsolicited messages.
A policy like this protects users from receiving unsolicited email messages that reduce productivity
and increase the message traffic through your servers.
Task
1
On the device, ensure that you are using McAfee Quarantine Manager Email | Quarantine
Configuration.
2
Select Email | Email Policies | Scanning Policies.
You must set up a separate anti-spam policy for the SMTP and POP3 protocols.
3
Set the primary action to Accept and drop the data.
4
Set the secondary action to Quarantine the original E-mail. Change the spam score to
5.
If you enable anti-spam detection, McAfee recommends that you also enable anti-phishing
detection. Scanning performance is not impacted by performing both anti-spam and
anti-phish checks.
5
From an external email account, create a message to a mailbox protected by the device.
6
In the message body, use the text:
XJS*C4JDBQADN1.NSBN3*2IDNEN*GTUBE-STANDARD-ANTI-UBE-TEST-EMAIL*C.34X
7
52
Send the message.
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
Exploring the blade server
Using policies to manage message scanning
8
Open McAfee Quarantine Manager and look at the spam queue.
9
Release the spam message.
10 Check the recipient email account to see the message.
Detected messages are sent to McAfee Quarantine Manager and can be managed by an
administrator.
Creating an email compliance policy
Use this task to set up a policy to ensure that messages your users send to external mail accounts
comply with official content libraries.
This policy maintains regulatory compliance to standards such as the HIPAA personal medical
information privacy standard and privacy standards on messages that contain sensitive
information. It notifies senders that their messages failed the compliance requirements.
Task
1
On the device, select Email | Email Policies | Dictionaries.
2
Select Privacy Rules.
3
View the List of terms for selected dictionary.
4
Select Email | Email Policies | Scanning Policies.
5
Under Content, select Content Scanning.
6
Select Enable content scanning | Yes.
7
Click OK.
8
Under Content scanning rules, click Create new content scanning rule.
9
Select Privacy Rules, from within Type: Compliancy.
10 Click OK.
11 In If Triggered, select Accept and then drop the data (Block).
12 Click OK.
13 Click OK.
14 Create an email on the server from <example server email address> to <example client
email address>. Include the line: Hi: We need to assess the accredited accumulation on your
annuity. Please consider arbitration if your assets have less capital than expected.
15 Send the message.
16 Use Email | Email Overview | INCOMING EMAIL SUMMARY to see the results.
The client email agent does not receive the email. The server email account should receive two
email messages: an email notification that the message failed the compliancy test and a copy
of the original email.
Creating a content filtering policy
Use this task to set up a policy to quarantine incoming messages that contain unwanted content.
This is now achieved using a wizard to guide you.
Use the following to set up an example of content filtering:
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
53
Exploring the blade server
Using policies to manage message scanning
Task
1
On the device, select Email | Email Policies | Scanning Policies.
If content scanning is disabled, select Yes in Enable content scanning.
2
From the Content section, click Content scanning.
If content scanning is currently disabled, click Yes.
3
Type a Rule name:.
4
Click Next >.
5
From The rule is triggered if any selected dictionary applies, select one or more
dictionaries, for example, Gambling (English).
6
Click Next >.
7
From The rule is ignored if any selected dictionary applies, select any dictionary you
want ignored. For this example, do not select any dictionaries.
8
Click Next >.
9
From If the content scanning rule is triggered, select your required action, for example
Replace the content with an alert (Modify).
10 Select Quarantine from the Original email options area.
11 Click Finish.
12 Click OK to complete the wizard.
13 Apply your configuration changes.
14 From an external email account, create a message to a test mailbox that the device protects.
In the message body, type the words: See you at the blackjack table tonight!
15 Send the message.
16 Open the mailbox to which you addressed the message and view the alert message.
17 Use Email | Email Overview | INCOMING EMAIL SUMMARY to see the event.
18 View the Dashboard to see information about items quarantined because of their content.
19 Using the recipient’s email account, open McAfee Quarantine Manager User interface and
select Unwanted Content.
20 Select the message and click Submit for Release.
21 Open the McAfee Quarantine Manager Administrator interface and select User
Submissions.
22 Select Submitted for Release.
23 Select the message and click Release.
24 Open the mailbox to which you sent the message to view the received message.
The device checks the message as it enters your mail gateway and identifies that it contains a
virus. The device quarantines the message and notifies the intended recipient and the sender
that the message was infected.
About Virtual host management
Using virtual hosts, a single device can appear to behave like several devices. Each virtual device
can manage traffic within specified pools of IP addresses, enabling the device to provide scanning
services to traffic from many sources or customers.
Benefits
• Separates each customer's traffic.
54
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
Exploring the blade server
Using policies to manage message scanning
• Policies can be created for each customer or host, which simplifies configuration and prevents
clashes that might occur in complex policies.
• Reports are separately available for each customer or host, which removes the need for
complex filtering.
• If any behavior places the device on a reputation black list, only a virtual host is affected —
not the whole device.
Setting up the virtual hosts
The feature is available for SMTP scanning only. To specify the pool of inbound IP addresses
and the optional pool of outbound addresses, see the System | Virtual Hosting | Virtual
Networks page.
Managing the virtual hosts
Feature
Behavior
Email Policy
Each virtual host has its own tab, where you can create its scanning policies.
Email Configuration
Each virtual host has its own tab, where you can configure MTA features specific for
that host.
Queued Email
You can view all queued email, or just queued email for each host.
Quarantined Email
You can view all quarantined email, or just quarantined email for each host.
Reporting
You can view all reports, or just reports for each host.
Behavior between the device and MTAs
When the device receives email sent to the virtual host's IP address range, the virtual host:
• Responds to the SMTP conversation with its own SMTP Welcome banner.
• Optionally adds its own address information to the Received header.
• Scans the email according to its own policy.
When the device delivers email:
• The IP address is taken from an outbound address pool, or a physical IP address (if this is
not set).
• The receiving Mail Transfer Agent (MTA) sees the IP address of the virtual host.
• If there is a pool of addresses, the IP address will be selected "round robin."
• The EHLO response will be for the virtual host.
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
55
Troubleshooting
This section describes some of the problems you might encounter when integrating your device
into the existing network.
To use the troubleshooting tools, select Troubleshooting from the navigation bar.
Frequently asked questions (FAQs)
System configuration
Anti-spam
Anti-virus automatic updating
Delivery
Directory Harvest Prevention does not work
Email attachments
ICAP
Mail issues
POP3
General issues
System maintenance
Getting more help — the user information bar
System configuration
I have disabled the FTP protocol but my users can still use FTP with their browsers
Check the browser's FTP proxy settings. On Internet Explorer, select Tools | Internet Options
| Connections | LAN Settings | Proxy Server | Advanced.
The appliance can support FTP over its HTTP protocol handler, so if the FTP proxy is set to use
port 80, your users can still use FTP.
NOTE: This is for FTP download only. The appliance does not support FTP uploads over HTTP.
Transparent Web Authentication
How do I configure Transparent Web Authentication using Kerberos?
When configuring Transparent Web Authentication using Kerberos on a blade server, you must
login separately to the Management blade and to the Failover Management blade, and configure
Kerberos on each. This is because the authentication information cannot be automatically
56
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
Troubleshooting
Anti-spam
synchronized between the Management blade and the Failover Management blade, for the
following reasons:
When using transparent bridge mode, a keytab cannot be created that will work on both the
Management blade and the Failover Management blade.
This is because the keytab includes the hostname of the blade server, which resolves to either
the IP address for the Management blade, or to the IP address of the Failover Management
blade.
To configure Kerberos to work in transparent bridge mode, create two keytabs, one containing
the Management blade IP address and hostname and the other containing the Failover
Management blade IP address and hostname. Import each keytab into the relevant Management
blade
NOTE: This is not an issue in explicit proxy mode or transparent router mode, as the blade
server uses a virtual IP address for the currently active Management blade.
How do I configure Transparent Web Authentication using NTLM?
When configuring Transparent Web Authentication using NTLM on a blade server, you must
login separately to the Management bladeManagement blade and to the Failover Management
blade, and configure NTLM on each. This is because the authentication information cannot be
automatically synchronized between the Management blade and the Failover Management
blade, for the following reasons:
To authenticate using NTLM, the username and password needs to be entered to allow the
blade server to connect to the NTLM Domain Controller. For security reasons, the username
and password are not stored on the blade server.
You need to log into the Management blade and Failover Management blade separately and
connect to the Domain Controller. In both cases, you only need to apply the username and
password during the initial configuration.
NOTE: McAfee recommends that you log into the Failover Management blade after configuring
the Management blade. The interface will display a warning message reminding you to import
the keytab, or to join the NTLM domain controller.
Anti-spam
I have configured the appliance to reject spam with an RBL Servers check but some
spam mail is still getting through
No anti-spam software is fully effective, and cannot guarantee to block all spam email messages.
The appliance uses a list of the names of known email abusers and the networks they use.
These lists are effective in reducing unwanted email messages but are not complete.
To block a specific sender of spam, add the sender's email address to the Denied senders
list.
Email | Email Configuration | Receiving Email | Permit and Deny Lists [+]
Permitted and blocked senders
Users are not getting normal email messages
Users might not receive normal email messages for several reasons:
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
57
Troubleshooting
Anti-spam
• The email messages might be coming from someone listed in the Blocked senders list.
You might need to:
• Refine the Blocked senders list to ensure that wanted email messages are not blocked.
For example, you might need to type specific email addresses rather than ban a whole
domain or network.
• Add the sender, domain, or network to the Permitted senders list. The appliance does
scan email from senders, domains and networks in this list for spam. The Permitted
senders list overrides entries in the Blocked senders list.
• The email message might have been blocked because it comes from a sender or organization
that has been recognized by a real-time anti-spam list as a potential source of spam.
• The balance between blocking spam and normal email messages might need changing. For
example, if the appliance is blocking email messages when there is only a small chance that
they contain spam, you risk unintentionally blocking normal email messages. It is probably
better to risk letting some spam through.
• The email message might contain a virus or potentially unwanted program, and has been
blocked by anti-virus scanning.
Email | Email Configuration | Receiving Email | Permit and Deny Lists
Users are still receiving spam
Users might still receive spam for several reasons:
• No anti-spam software can block all email messages that might contain spam. For the best
chance of detecting and preventing spam, ensure that the appliance is using the latest
versions of the anti-spam engine, anti-spam rules, and extra rules files. See also Sender
authentication and reputation to ensure that you are using all the features that can block
unwanted email.
• The appliance is allowing streaming media to pass through.
Allowing streaming media to pass through the appliance is a security risk, because streaming
media is not scanned by the appliance. We recommend that you do not allow streaming
media of type application/octet-stream or application/* to pass through the appliance because
these MIME types are executable and are a security risk.
• You might need a more stringent anti-spam policy. For example, you might want to ensure
that more email messages are marked as spam before they are received by users, or to
simply block the spam at the appliance.
• The email messages might be coming from senders, domains, or networks that are in the
Permitted senders list. Review the list to make sure that you really want email messages
from these senders to bypass anti-spam scanning. You might need to refine the entry in the
list. For example, rather than permitting whole domains or networks, specify individual email
addresses instead. See the Permitted senders list.
• The mail client software does not automatically move unwanted messages into a spam
folder, so users still see spam in their inboxes. See Configuring Mail Clients for information
on setting mail clients.
• The email message might be larger than is permitted, so it is not scanned for spam. See
theadvanced options in the anti-spam settings to change the size.
• Email messages are not being routed through an appliance with the anti-spam software
enabled.
Email | Email Configuration | Receiving Email
58
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
Troubleshooting
Anti-virus automatic updating
Email | Email Policies | Scanning Policies [Spam] | Advanced Options
How can I stop a particular type of spam?
Your blade server updates its anti-spam engine and spam detection rules frequently.
To ensure that you have the best chance of detecting and preventing spam, check that:
• The appliance is using the latest versions of the anti-spam engine and anti-spam rules.
• The appliance has not been configured to allow streaming media to pass through.
System | Component Management | Update Status
Email | Email Policies | Scanning Policies [Spam] | Advanced Options
Users are complaining that their mailboxes are full
If users automatically divert spam to a spam folder in the mailbox, their mailboxes can quickly
exceed their size limit. Remind users to regularly check their spam folders and delete spam.
Anti-virus automatic updating
When I request an immediate update, nothing happens. How do I know when the
DAT is updated?
The DAT files are downloaded, checked and applied — they are not just added regardless. The
appliance does not wait for the update to complete but starts it in the background. The update
can take a few minutes even with a fast Internet connection.
You can see the version number of the installed DAT files soon after the appliance has
successfully installed the new DAT files.
System | Component Management | Update Status
Dashboard [System Health] -- Updates
Delivery
What can I check if I have problems with mail delivery?
If your internal mailserver is not receiving inbound mail, check that this mail server is configured
to accept email from the appliance.
In the list of local domains for email delivery, do not specify a wildcard catch-all rule. Instead,
enable the fallback relay, and specify it there.
Email | Email Configuration | Receiving Email | Anti-Relay Settings
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
59
Troubleshooting
Directory Harvest Prevention does not work
Directory Harvest Prevention does not work
For Directory Harvest Prevention to work correctly, your email server must check for valid
recipients during the SMTP conversation, and then send a non-delivery report.
Several email servers do not send User unknown errors as part of the SMTP configuration.
These include (but might not be limited to):
• Microsoft Exchange 2000 and 2003 (when using their default configuration).
• qmail.
• Lotus Domino.
Check the user documentation for your email server to see if your email server can be configured
to send 550 Recipient address rejected: User unknown reports as part of the SMTP conversation
when a message to an unknown recipient is encountered.
LDAP integration can provide a work around for this.
Email attachments
The appliance blocks all email when I reduce the number of attachments to block
This setting is intended to block email messages with huge numbers of attachments, which
waste bandwidth.
Some mail clients (like Outlook Express) store extra information in extra attachments, and even
embed the main body of the message in an attachment.
If this number is set too low, even normal email might be rejected.
Email | Email Policies | Scanning Policies [Content] -- Mail size filtering |
Attachment Count
EICAR (the test virus) or content that must be blocked is still getting through
Make sure the appliance is in the mail path. Look at the headers of an email message (in Outlook,
select View | Options | Internet Headers).
If the appliance is in the mail path, you will see a header of the form Received: from sender
by appliance_name via ws_smtp with sender and appliance_name replaced with the
actual sender's name and the name of the appliance.
When the appliance detects a virus, I get notification of a content violation
This problem might be due to a conflict between the HTML template warning page, and a
content-scanning rule.
For example, if you are content-filtering on the word Virus but you have also set up the HTML
template for virus detection to warn you A virus has been detected, an incoming message
containing a virus triggers the message to be replaced with the message, A virus has been
detected. This replacement message then passes through the content filter which triggers on
the word Virus, and the message is replaced with a content violation instead of a virus
notification.
Email | Email Policies | Scanning Policies [Content]
60
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
Troubleshooting
ICAP
The appliance is slow to respond when I log on to the interface
Make sure the browser from which you are connecting is not using the appliance itself as a
proxy. In Internet Explorer, go to Tools | Internet Options | Connections | LAN Settings,
and deselect Use a proxy server.
Check the DNS setup on the appliance. The DNS server field must contain the IP address of a
valid DNS server, which must be accessible from the appliance.
If the appliance is experiencing a heavy load, responses from the interface are slower. Consider
using out-of-band management.
System | Appliance Management | DNS and Routing
System | Appliance Management | Remote Access [+] Out of Band management
ICAP
ICAP service not found
This section describes a common configuration problem that occurs when setting up or
reconfiguring your ICAP services.
If the ICAP client cannot find the requested service:
• Check that the ICAP client is requesting a valid ICAP service. When configuring the ICAP
client, it is easy to mistype the service path. Service paths start with a forward slash (/) and
are case-sensitive. Make sure that you use the exact path name. For example, the path
/REQMOD is different from the path /REQMOD/.
• Check that the appliance supports the ICAP service, and that the requested service has not
been disabled on that appliance.
NOTE: Some ICAP servers do not support all ICAP verbs. For example, some ICAP clients
support the REQMOD verb only. By default, the appliance supports the REQMOD, RESPMOD
and OPTIONS verbs. However, the REQMOD and RESPMOD services can be disabled on the
appliance.
• Check that the network connection between the ICAP client and the ICAP server is working.
Use a ping test.
Troubleshoot | Tools | Ping and Trace Route
Appliance connections are unavailable
If the appliance runs out of available connections, you might have to restart the ICAP protocol.
Understanding ICAP status codes
This list of ICAP status codes was accurate at the time of publication. If a status code is not in
the table, see the ICAP RFC standard for the latest information.
Table 1: ICAP status codes
Code
Description
100
Continue after ICAP preview.
200
OK. The appliance understands the request and will reply.
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
61
Troubleshooting
Mail issues
Code
Description
204
No modifications are needed (also known as 204 No content).
400
Bad request.
404
ICAP service was not found.
405
The method is not allowed for this service. For example, a RESPMOD request was issued to a service that
supports only REQMOD.
408
Request has timed-out. ICAP server gave up waiting for a request from an ICAP client.
500
ICAP server error. For example, the ICAP server might have run out of disk space.
501
Method (verb) not implemented.
502
Bad gateway.
503
Service is overloaded. The ICAP server has exceeded a connection limit associated with the service. The
ICAP client must not exceed this limit in the future.
505
The ICAP version is not supported by the ICAP server.
Mail issues
Why can I not just give the name of the sender that I want to block from relaying?
Think of anti-relay as system-to-system blocking, while anti-spam is sender-based blocking.
Anti-relay is configured using the domains and networks that the appliance delivers mail for,
while the anti-spam configuration blocks a message based on who sent it.
Email | Email Configuration | Receiving Email | Anti-Relay Settings [+]
Relaying email
Email | Email Policies | Scanning Policies [Spam]
Directory Harvest Prevention does not work
For Directory Harvest Prevention to work correctly, your email server must check for valid
recipients during the SMTP conversation, and then send a non-delivery report.
Some email servers do not send User unknown errors as part of the SMTP configuration.
These include (but might not be limited to):
• Microsoft Exchange 2000 and 2003 when using their default configuration.
• qmail.
• Lotus Domino.
Check the user documentation for your email server to see if your email server can be configured
to send 550 Recipient address rejected: User unknown reports as part of the SMTP
conversation when a message to an unknown recipient is encountered.
LDAP integration can provide a work around for this.
Email | Email Configuration | Receiving Email | Recipient Authentication [+]
Directory harvest prevention
62
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
Troubleshooting
POP3
Replication between mail servers is not working
If the appliance is between two Microsoft Exchange servers, ensure that the appliance does
not block the Extended SMTP (ESMTP) email headers. Allow the use of all the ESMTP extensions:
X-EXPS, X-LINK2STATE, XEXCH50, and CHUNKING.
Email | Email Configuration | Protocol Configuration | Protocol Settings [+]
Transparent Options [+] Advanced options
POP3
I have set up a dedicated POP3 connection, and POP3 no longer works
Check that the generic and dedicated servers do not share the same port. The default port
number for POP3 is 110. The dedicated server will override the generic server.
Email | Email Configuration | Protocol Configuration | Protocol Settings [+]
POP3 protocol settings
When fetching mail with Outlook Express over POP3, I sometimes get a time-out
message, giving me the option to Cancel or Wait
The appliance needs to download and scan the entire mail message before it can start passing
it to Outlook Express. For a large message or a slow mail server, this can take some time. Click
Wait to force Outlook Express to wait for the appliance to finish processing the message.
I sometimes get two copies of POP3 mail messages
Some mail clients do not handle time-outs correctly. If the appliance is downloading and scanning
a very large message, the client might time-out while waiting for a response.
A pop-up window prompts you to wait for or cancel the download. If you select Cancel and
try to download again, two copies of the message might appear in your mailbox.
General issues
The Back button on my browser does not take me to the previous page
This is a known issue with web browsers. McAfee recommends that you click the back arrow
in the top right corner of the appliance interface.
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
63
Troubleshooting
System maintenance
System maintenance
The appliance does not accept the HotFix file
Do not unzip the HotFix file before copying it to the appliance. The appliance accepts the original
file as you received it — with a .ZIP extension.
System | Component Management | Package Installer
How can I control the size of the appliance's log files?
The appliance stores its log files in a text-like (XML) format in a partition (/log) on its internal
disk. By default, the logs are purged every few days. The appliance issues warnings when its
areas are nearing full, typically at 75% and 90%.
McAfee recommends that you:
• Find the percentage usage of the logging partition.
• Limit the size of the log file, and take regular backups of the log.
• Adjust the warning levels.
Troubleshoot | Tools | Disk Space
System | Cluster Management | Backup and Restore Configuration
Dashboard [System Health] -- Edit
Getting more help — the user information bar
From the Resources link on the user information bar, you can access links to more sources of
information. You can:
• Access the McAfee online virus information library to find out more about a specific virus.
• Submit a virus sample to McAfee for analysis.
• Contact McAfee Technical Support.
See the Online help for more information.
64
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
Index
A
L
anti-virus updates, nothing happens 59
attachments, email is blocked 60
logs, control the size of 64
Lotus Domino 62
B
M
Back button, problem 63
mail, delivery problems 59
mailboxes are full 59
Microsoft Exchange servers, ESMTP problem 63
D
delivery 59
Directory Harvest Prevention, does not work 60
Directory Harvest Prevention, not working 62
E
EICAR test virus, email gets through 60
email replication, not working 63
email, all blocked 60
email, blocked as spam 57
email, blocked by attachments 60
F
FAQ, ICAP 61
FAQs 56
frequently asked questions 56
FTP, on browsers 56
FTP, uploads over HTTP 56
P
POP3, does not work 63
POP3, two copies of mail 63
problems, Back button 63
Q
qmail, Microsoft Exchange 2000 and 2003 62
S
spam, mailboxes are full 59
spam, still gets through despite RBL 57
spam, stopping any type of 59
spam, users still receive 58
spam,no normal email gets through 57
T
troubleshooting, introduction 56
H
HotFix, not accepted 64
HTTP, cannot upload over HTTP 56
V
virus, causes content violation 60
I
ICAP FAQ 61
McAfee Content Security Blade Server 5.5 (M3 chassis) Installation Guide
65
700-2316A00