Migrating to a New ProxySG Appliance. ProxySG 900/9000 to ProxySG S400/500

Size: px
Start display at page:

Download "Migrating to a New ProxySG Appliance. ProxySG 900/9000 to ProxySG S400/500"

Transcription

1 Migrating to a New ProxySG Appliance ProxySG 900/9000 to ProxySG S400/500

2 Migrating to a New Blue Coat ProxySG Appliance Copyright 2017 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat logo are trademarks or registered trademarks of Symantec Corp. or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. SYMANTEC CORPORATION PRODUCTS, TECHNICAL SERVICES, AND ANY OTHER TECHNICAL DATA REFERENCED IN THIS DOCUMENT ARE SUBJECT TO U.S. EXPORT CONTROL AND SANCTIONS LAWS, REGULATIONS AND REQUIREMENTS, AND MAY BE SUBJECT TO EXPORT OR IMPORT REGULATIONS IN OTHER COUNTRIES. YOU AGREE TO COMPLY STRICTLY WITH THESE LAWS, REGULATIONS AND REQUIREMENTS, AND ACKNOWLEDGE THAT YOU HAVE THE RESPONSIBILITY TO OBTAIN ANY LICENSES, PERMITS OR OTHER APPROVALS THAT MAY BE REQUIRED IN ORDER TO EXPORT, RE-EXPORT, TRANSFER IN COUNTRY OR IMPORT AFTER DELIVERY TO YOU. Americas: Rest of the World: Symantec Corporation Symantec Limited 350 Ellis Street Ballycoolin Business Park Mountain View, CA Blanchardstown, Dublin 15, Ireland Document Revision: 10/2017 ii

3 Table of Contents ProxySG Migration Process... 3 Additional Upgrade Information and Assistance... 3 Recommended Migration Path... 4 High-Level Process... 5 Tasks to Perform on the Source Appliance... 5 Tasks to Perform on the Target Appliance... 7 Prepare the Source Appliance Prepare the Target Appliance Next Steps

4 2

5 Section 1 ProxySG Migration Process This document describes how to migrate from the Blue Coat ProxySG 900 or 9000 appliance ( source ) to the Blue Coat ProxySG S400 or S500 appliance ( target ). The migration process requires that both the source appliance and the target appliance be upgraded to the same SGOS release; the version must be SGOS or later. Note: Symantec recommends that you upgrade to the version recommended in this guide because it includes fixes for issues that could impact the migration process. After migration is complete, you can upgrade the target appliance to your preferred long-term SGOS release. Additional Upgrade Information and Assistance If your appliance is running an older version of SGOS, you may want to review the features introduced between your current version and the upgrade version; refer to the SGOS Release Notes at MySymantec ( You require a MySymantec login to review release notes and download system images. To review any upgrade impacts, refer to the SGOS Upgrade/Downgrade WebGuide: For an overview of the migration process, view a 12-minute self-paced video (login is required): common/ledetail/ Symantec Support or your reseller's professional services group can also provide assistance if you need help with your upgrade. 3

6 Recommended Migration Path Symantec recommends the following migration path when replacing an End-of-Life (EOL) model. EOL Model Recommended Model , S , S S , S S400-30, S400-40, S S400-40, S S Note: The minimum supported version on the ProxySG S400 is SGOS The minimum supported version on the ProxySG S500 is SGOS Do not attempt to install earlier versions on these appliances. 4

7 Section 2 High-Level Process Migrating from one ProxySG appliance to another involves exporting the configuration from the source appliance and importing it to the target appliance. To transfer the configuration, use the SGOS configuration archiving feature. Because new SGOS versions introduce new features, remove obsolete features, and sometimes change default behaviors, you may need to edit the configuration to get the same results in the new configuration. The high-level process for migrating your configuration from one appliance to another is listed below. Detailed instructions begin on page 13. Note: To minimize any disruption in your network, or to prevent loss of data in your access logs or event logs, Symantec recommends completing this migration during a maintenance window. Tasks to Perform on the Source Appliance Note: The steps below are high-level; for detailed steps, see Prepare the Source Appliance on page Determine whether a software upgrade is required, download necessary images from MySymantec, and install the image(s). Refer to the SGOS Upgrade/Downgrade WebGuide ( to determine the upgrade path. Depending on which version your appliance is currently running, the upgrade path may require an upgrade to an interim release. Upgrade to SGOS or later. 2. Review the policy rules defined in your configuration and verify whether they are supported in the SGOS version you are upgrading to. A policy rule that is no longer supported is referred to as a CPL deprecation. For example, Instant Messaging policy gestures were deprecated in SGOS Note: You can either resolve the policy deprecations or ignore them. Symantec recommends that you examine the deprecations and resolve them to ensure that your security policies are not compromised. Refer to the Deprecated Policy Constructs section of the SGOS Upgrade/Downgrade Webguide and look for all deprecations in software releases between your current version and the version you are upgrading to. 3. Back up your configuration by creating a configuration archive with keyrings 1 and save it to a local system. 4. (Optional) Download access logs, event logs, and a sysinfo snapshot from the source appliance to preserve them. Note: If you intend the target appliance to use the same IP address that the source appliance currently uses, you will have to power down the source appliance before migration. Thus, it is is especially important to download the logs and snapshots from the source appliance before proceeding. 5. Record the network configuration settings (IP address, gateway, DNS, etc.). 1.Only keyrings created or imported on the ProxySG appliance as showable can be backed up using this method. 5

8 6. Power down, uncable, and unrack the source appliance. For information on recycling ProxySG appliances, refer to the following: Edit the Source Configuration Archive Note: For detailed steps, refer to Edit the Source Configuration File on page 17. Edit the configuration archive that you stored on a local system, and address the following issues: 1. If the target appliance will have different network settings from the old appliance, remove the settings from the configuration archive. Failure to delete these settings will result in an inability to restore the configuration archive. 2. Reconcile the interface numbering scheme on your old configuration with the interface numbering scheme on the new one. The interface numbering for each port is unique because it references the slot to which the port belongs and the port number. When you replace the hardware model, the interface numbering scheme might change because the order and numbering of the slots, the number of Ethernet ports in a slot, and the bridge pairs available on the interface module vary by platform and model of the ProxySG appliance. The slot number is shown on the rear of the appliance. 3. If your ProxySG was running SGOS version through , the configuration archive has a few lines of incorrect configuration due to a bug; you must delete the incorrect configuration before restoring the archive on the ProxySG S400/S500. For specifics on what needs to be deleted, see Edit the Source Configuration File on page To preserve the default keyring, extract the configuration that imports the default keyring and certificate from the archive. You will later import this to the new ProxySG before importing the rest of the configuration. Otherwise, to preserve the default keyring from your old ProxySG, delete the keyring (key and certificate) from the archive configuration. 6

9 Tasks to Perform on the Target Appliance Note: For detailed steps, refer to Prepare the Target Appliance on page Install the ProxySG S400/S500 in your network and perform initial configuration. Refer to the network settings you recorded in step 4 of "Tasks to Perform on the Source Appliance" on page Load the license on the target appliance. 3. Upgrade the appliance to same SGOS version that the source appliance was upgraded to when you exported the configuration. 4. If you extracted the default keyring configuration to its own file, restore this configuration on the target appliance. 5. Restore the archived, edited configuration onto the target appliance. Interface Mapping When you replace an appliance with a different hardware model, the interface numbering scheme might change. The interface modules the slot, interface labeling, and bridge pair groups on the newer ProxySG appliance models may be different from that of the older models. You must verify the interface configuration on your source appliance and perform the necessary adjustments to maintain consistency in your network configuration before restoring your configuration archive on to the target appliance. The illustrations below indicate the port and slot numbers available on the new appliances. ProxySG S400 7

10 ProxySG S500 Note: Slots 5 7 are functional on ProxySG S only. In the tables on the following pages, locate the model numbers of the appliances you are migrating from and to, and then take the action indicated to retain equivalent functionality on the target appliance. The specific steps for the actions are provided in the detailed instructions that follow. 8

11 MIGRATING FROM: SG 900 MIGRATING TO: SG S400 SG 900 interfaces (2) integrated (on board) NICs Equivalent interfaces on SG S400 (2) integrated (on board) NICs Action to take to retain equivalent functionality No action required. 0:0 1:0 (2) integrated (on board) GigE NICs 0:0 1:0 Use the (2) integrated 1000Base-T ports with a hardware bridge (also called passthru or bypass). No action required. 2:0 (Bridge: passthru-2) 2:1 (Bridge: passthru-2) Optional NIC Cards? Quad GigE fiber NIC w/bypass Slot 3: 3:2 (Bridge: passthru-3:2) 3:3 (Bridge: passthru-3:2) Slot 4: 4:0 (Bridge: passthru-4) 4:1 (Bridge: passthru-4) 4:2 (Bridge: passthru-4:2) 4:3 (Bridge: passthru-4:2) 2:0 (Bridge: passthru-2) 2:1 (Bridge: passthru-2) Purchase Quad fiber NIC w/ bypass and install in Slot 3. 3:2 (Bridge: passthru-3:2) 3:3 (Bridge: passthru-3:2) If the NIC was installed in Slot 3 on the SG 900, no action is required. If the NIC was installed in Slot 4, edit interface numbers and bridge names in configuration file as described on page 17. Quad GigE copper NIC w/bypass Slot 3: 3:2 (Bridge: passthru-3:2) 3:3 (Bridge: passthru-3:2) Slot 4: 4:0 (Bridge: passthru-4) 4:1 (Bridge: passthru-4) 4:2 (Bridge: passthru-4:2) 4:3 (Bridge: passthru-4:2) Purchase Quad 10/100/1000Base- T NIC w/bypass and install in Slot 3 or 4. Slot 3: 3:2 (Bridge: passthru-3:2) 3:3 (Bridge: passthru-3:2) Slot 4: 4:0 (Bridge: passthru-4) 4:1 (Bridge: passthru-4) 4:2 (Bridge: passthru-4:2) 4:3 (Bridge: passthru-4:2) No action is required. 9

12 MIGRATING FROM: SG 9000 MIGRATING TO: SG S400 SG 9000 interfaces (2) integrated (on board) NICs 0:0 0:1 (2) integrated (on board) GigE NICs with bypass Equivalent interfaces on SG S400 (2) integrated (on board) NICs 0:0 1:0 Use the (2) integrated 1000Base-T ports with a hardware bridge (also called passthru or bypass). Action to take to retain equivalent functionality Edit interface numbers in configuration file as described on page 17. Edit interface numbers in configuration file as described on page 17. 0:2 (Bridge: passthru-0:2) 0:3 (Bridge: passthru-0:2) Optional NICs? Quad GigE Fiber-SX or 1000 Base- T NIC w/bypass In Slot 1: 1:0 (Bridge: passthru-1) 1:1 (Bridge: passthru-1) 1:2 (Bridge: passthru-1:2) 1:3 (Bridge: passthru-1:2) In Slot 2: 2:0 (Bridge: passthru-2) 2:1 (Bridge: passthru-2) 2:2 (Bridge: passthru-2:2) 2:3 (Bridge: passthru-2:2) In Slot 3 (N/A ): 3:2 (Bridge: passthru-3:2) 3:3 (Bridge: passthru-3:2) Dual 10G Fiber or Copper NIC w/ bypass In Slot 1: 1:0 (Bridge: passthru-1) 1:1 (Bridge: passthru-1) In Slot 2: 2:0 (Bridge: passthru-2) 2:1 (Bridge: passthru-2) In Slot 3 (N/A ): 2:0 (Bridge: passthru-2) 2:1 (Bridge: passthru-2) Purchase Quad GigE Fiber-SX or 1000 Base-T NIC w/bypass and install in Slot 3. 3:2 (Bridge: passthru-3:2) 3:3 (Bridge: passthru-3:2) Purchase Dual 10G Fiber (SR or LR) or Copper w/bypass and install in Slot 3 or 4. In Slot 3: In Slot 4: 4:0 (Bridge: passthru-4) 4:1 (Bridge: passthru-4) If the NIC was installed in Slot 3 on the SG 9000, no action is required. If the NIC was installed in Slot 1 or 2, edit interface numbers in configuration file as described on page 17. Edit interface numbers and bridge names in configuration file as described on page

13 MIGRATING FROM: SG 9000 MIGRATING TO: SG S500 SG 9000 interfaces (2) integrated (on board) NICs 0:0 0:1 (2) integrated (on board) GigE NICs with bypass 0:2 (Bridge: passthru-0:2) 0:3 (Bridge: passthru-0:2) Optional NICs? Quad GigE Fiber-SX or 1000 Base-T NIC w/bypass In Slot 1: 1:0 (Bridge: passthru-1) 1:1 (Bridge: passthru-1) 1:2 (Bridge: passthru-1:2) 1:3 (Bridge: passthru-1:2) In Slot 2: 2:0 (Bridge: passthru-2) 2:1 (Bridge: passthru-2) 2:2 (Bridge: passthru-2:2) 2:3 (Bridge: passthru-2:2) In Slot 3 (N/A ): 3:2 (Bridge: passthru-3:2) 3:3 (Bridge: passthru-3:2) Equivalent interfaces on SG S500 (2) integrated (on board) NICs 0:0 2:0 or 2:1 Use the (2) integrated 10G Base-T ports with bypass. 1:0 (Bridge: passthru-1) 1:1 (Bridge: passthru-1) Or, if you need the 10G ports elsewhere, purchase a GigE copper NIC and install in Slot 3 or 4. For example, in Slot 3: Purchase Quad GigE Fiber-SX or 1000 Base-T NIC w/bypass and install in Slot 3 or 4. In Slot 3: 3:2 (Bridge: passthru-3:2) 3:3 (Bridge: passthru-3:2) In Slot 4: 4:0 (Bridge: passthru-4) 4:1 (Bridge: passthru-4) 4:2 (Bridge: passthru-4:2) 4:3 (Bridge: passthru-4:2) Action to take to retain equivalent functionality Edit interface numbers in configuration file as described on page 17. Edit interface numbers in configuration file as described on page 17. If the NIC was installed in Slot 3 on the SG 9000 and the equivalent NIC is installed in Slot 3 on the SG S500, no action is required. Otherwise, edit interface numbers in configuration file as described on page

14 SG 9000 interfaces Dual 10G Copper NIC w/bypass In Slot 1: 1:0 (Bridge: passthru-1) 1:1 (Bridge: passthru-1) In Slot 2: 2:0 (Bridge: passthru-2) 2:1 (Bridge: passthru-2) In Slot 3 (N/A ): Dual 10G Fiber NIC w/bypass In Slot 1: 1:0 (Bridge: passthru-1) 1:1 (Bridge: passthru-1) In Slot 2: 2:0 (Bridge: passthru-2) 2:1 (Bridge: passthru-2) In Slot 3 (N/A ): Equivalent interfaces on SG S500 Use the (2) integrated 10G Base-T ports w/bypass. 1:0 (Bridge: passthru-1) 1:1 (Bridge: passthru-1) Purchase a Dual 10G Fiber (SR or LR) NIC w/bypass. The NIC can be installed in any open slot. For example, in Slot 3: Action to take to retain equivalent functionality If the NIC was installed in Slot 1 on the SG 9000, no action is required. If the NIC was installed in Slot 2 or Slot 3, edit interface numbers and bridge names in configuration file as described on page 17. If necessary, edit interface numbers and bridge names in configuration file as described on page

15 Section 3 Prepare the Source Appliance Perform the following procedure to upgrade the ProxySG 900 or ProxySG 9000 to the required software image, archive the configuration, download logs, and record any additional settings you will need when configuring the new appliance. Preparing the Source Appliance Step 1 Step 2 Determine your upgrade path. Obtain the required software images. The ProxySG 900/9000 must be running SGOS or later. Refer to the SGOS Upgrade/Downgrade WebGuide ( to determine the upgrade path. Depending on which version your ProxySG appliance is currently running, you might have to upgrade to an interim SGOS version. a. Go to MySymantec: b. Select Downloads > Network Protection (Blue Coat) Downloads. c. When prompted, log in with your MySymantec credentials. d. Select your product. e. Select your appliance model (if applicable). f. Select a software version. g. Accept the License Agreement. h. Select the file(s) to download and click Download Selected Files. Note: The first time you download files, you are prompted to install the Download Manager. Follow the onscreen prompts to download and run the installer. For more information, refer to Step 3 (Optional, but recommended) Before upgrading to a new software version, create a back up of your ProxySG appliance configuration. i. The Download Manager window opens. Select the download location. j. Download the new software image and put it on a workstation the ProxySG can access. k. Download the release notes and review them. See Step 6 on page 15 for details. 13

16 Preparing the Source Appliance (Continued) Step 4 Step 5 Install any interim SGOS releases required to upgrade to your required SGOS version. If you have a direct upgrade, go to Step 5. Install the required SGOS version: SGOS or later a. Log in to your ProxySG 900 or ProxySG 9000 using a supported web browser. See for supported browser versions. b. Select the Maintenance > Upgrade > Upgrade tab. c. Click Upload and browse to the interim release image you downloaded in Step 2 on page 13. d. Click Install. e. When notified, resolve CPL deprecation warnings before you restart the latest image you downloaded. Refer to Deprecated Policy Constructs in the SGOS Upgrade/Downgrade Webguide for more information. f. Click Restart. The reboot requires several minutes and logs you out of the ProxySG appliance. a. After the reboot is complete, log in to the appliance. b. Look at the Management Console banner to verify that the appliance is running the correct SGOS release. a. Log in to your ProxySG 900 or ProxySG b. Select the Maintenance > Upgrade > Upgrade tab. c. Click Upload and browse to the release image you downloaded in Step 2. d. Click Install. e. When notified, resolve CPL deprecation warnings before you restart the latest image you downloaded. Refer to the Deprecated Policy Constructs section of the SGOS Upgrade/ Downgrade Webguide for more information. f. Click Restart. The reboot requires several minutes and logs you out of the ProxySG appliance. g. When the reboot is complete, log in to the appliance. h. Look at the Management Console banner to verify that the appliance is running the correct SGOS release. 14

17 Preparing the Source Appliance (Continued) Step 6 Create a back up of your ProxySG appliance configuration using SSH- Console session. The archive generated in this step includes the showable keyrings on the appliance. a. In your terminal emulation application, enable session logging. Configure the application to log the session output and save that file on your local system. The following example uses PuTTY: IMPORTANT: Keys are exported in clear text with no encryption or obfuscation. Take precautions to secure the archive file appropriately. The archive does not include keyrings saved with the Do not show keypair option. For keyrings that are not included in the archive, you must manually create a new keyring and import the key and the certificate into the new ProxySG appliance before you are instructed to restore this archive. This example is an excerpt from the output file, showing the beginning and the end of the configuration content. The... indicates the middle sections that aren t shown in this example. b. Access the CLI on the appliance and enter the following commands from the CLI command prompt: SGOS# enable SGOS# config terminal SGOS(config) show configuration noprompts withkeyrings SGOS(config) c. Exit the terminal emulation application, making sure that session logging is turned off. d. Open the session log/output file (ProxySG_archive_12_2015, in this example) and delete all the text/commands before and after the configuration. For example:!- Version: SGOS Proxy Edition!- Serial number: xxxxxxxxxxxxxx!- Local time: :41:29-00:00UTC!- BEGIN networking interface 0:0 ;mode ip-address interface 2:0 ;mode label "WAN" ip-address interface 2:1 ;mode label "LAN" ip-default-gateway dns-forwarding ;mode edit primary clear server add server !- END networking...!- END policy!- BEGIN general line-vty ;mode length 36!- END general e. Save this text file on your local system or hard drive (ProxySG_archive_12_2015, in this example). 15

18 Preparing the Source Appliance (Continued) Step 7 (Optional) Download access logs, event logs, and a sysinfo snapshot from the old appliance if you want to preserve them. a. Enter the following URLs in your web browser, substituting the IP address of your ProxySG: b. Save the content of each in a text file. Note Download the logs and snapshot information off the old machine just as soon as the box is taken off-line during the maintenance window, before migrating anything over to the new appliance. If the new appliance will be using the same IP address as the old one, you ll have to turn the old one off before you bring the new one up, so it ll be important to have all the logs downloaded before that happens. Step 8 Record the network configuration information you will need to configure the management interface on the new appliance. For example: Management Interface: 0:0 IP address: Subnet mask: Default gateway: Primary DNS server: Alternate DNS server: N/A Look in the configuration archive and record the following information about the old appliance: Management Interface: IP address: Subnet mask: Default gateway: Primary DNS server: Alternate DNS server: Step 9 Power down the appliance, uncable it, and unrack it. 16

19 Edit the Source Configuration File Modify the configuration archive that you stored on a local system to address configuration differences between the source appliance and the target appliance. Editing the Configuration File Step 1 Step 2 Step 3 Edit the configuration file that you stored on a local system. If the target appliance will have different network settings from the source appliance, remove the settings from the configuration archive. Failure to delete these settings will result in an inability to restore the configuration archive. Reconcile the interface numbering scheme on your source configuration with the interface numbering scheme on the target appliance Open the configuration file (ProxySG_archive_12_2015, in this example) in your preferred text editor. a. For the management interface, delete the network configuration details, such as IP address, subnet mask, and default gateway.!- BEGIN networking interface 0:0 ;mode ip-address interface 0:0.101 ;mode ip-address interface 1:0 ;mode reject-inbound disable virtual-ip clear virtual-ip address failover ;mode create edit multicast-address enable ip-default-gateway dns-forwarding ;mode edit primary clear server add server !- END networking a. Edit interface numbers and bridge names in the configuration file so they correspond to those used in the new appliance. Refer to Interface Mapping on page 7. b. To prevent errors, delete the configuration settings for interfaces and bridge groups that are no longer valid on the new appliance. Note: Slot numbers are shown on the rear of the appliance.!- BEGIN networking interface 0:0 ;mode ip-address interface 0:2 ;mode label "WAN" ip-address interface 0:3 ;mode label "LAN" ip-default-gateway dns-forwarding ;mode edit primary clear server add server !- END networking 17

20 Editing the Configuration File Step 4 Step 5 If your ProxySG was running a SGOS version from to , the configuration archive has a few lines of incorrect configuration due to a bug; you must delete these lines before restoring the archive on the ProxySG S400/ S500. If you do not want to preserve the default keyring from your old ProxySG, delete the keyring (key and certificate) from the archive configuration. Note: The... indicates sets of lines not shown here in the example configuration. Delete the following from the archive (if it exists): create ccl bluecoat-appliance edit ccl bluecoat-appliance ;mode add BC_Engineering_CA add ABRCA_root Delete the keyring configuration lines. For example: inline keyring show default "end inline" -----BEGIN RSA PRIVATE KEY END RSA PRIVATE KEY BEGIN CERTIFICATE END CERTIFICATE----- end inline Step 6 Or, if you want to preserve the default keyring, extract the config that imports the default keyring and certificate from the archive. You will later import this to the new ProxySG before importing the rest of the configuration. Separating the certificate configuration from the main configuration avoids issues with importing a certificate that is already in use. Note: The... indicates sets of lines not shown here in the example configuration. Extract the following sections and save to a new text file (keyring.txt):!- BEGIN ssl ssl ;mode inline keyring show default "end inline" -----BEGIN RSA PRIVATE KEY END RSA PRIVATE KEY BEGIN CERTIFICATE END CERTIFICATE----- end inline... Step 7 Save the updated configuration file. Save the file (ProxySG_archive_12_2015, in this example). 18

21 Section 4 Prepare the Target Appliance Use the following procedure to install and configure the target appliance. Installing the Target Appliance Step 1 Step 2 Rack mount and cable the target ProxySG appliance. Activate the serial console on the target appliance. Cable the appliance the same way that the source appliance was cabled. Typically you would cable it as follows: For in-path deployments, connect the LAN interface to the switch and connect the WAN interface to the router. For virtually in-path deployments (WCCP), connect the LAN interface to a dedicated interface on the router. For rack mounting instructions, refer to the Quick Start Guide poster for your ProxySG platform: SG-S400: SG-S500: a. Connect the serial cable from your laptop to the ProxySG S400 or S500 appliance. b. Using terminal emulation software on your laptop (such as PuTTY), connect to the ProxySG appliance serial console (9600, 8, N, 1). c. Power on the appliance. The appliance bootup process begins. d. Press Enter three times to activate the ProxySG appliance serial console. The serial console prompts take you through the initial configuration of the appliance. Note If you have previously configured this appliance, the CLI does not display the initial configuration prompt. To launch the initial configuration script, you must restore the appliance to factory defaults. Enter the following command from the CLI: restore-defaults factory-defaults 19

22 Installing the Target Appliance (Continued) Step 3 Run the initial configuration wizard to configure network access. a. Enter a to specify that you want to perform a manual setup. b. Enter b to choose Other solution. c. Enter the number that corresponds to the interface you want to configure. d. Specify whether you want to configure a non-native VLAN. If you enter Y, you are prompted for the VLAN ID. e. Assign the network addresses (management IP address, subnet mask, default gateway, and primary DNS server). Refer to the information that you recorded in Step 8 on page 16. f. Set the console username and password. g. Set an enable mode password. h. When prompted to secure the console or not, select your preference Y/N. i. When prompted to restrict Management Console access to a specific workstation, select your preference Y/N. j. If prompted for a license edition, select the appropriate edition. k. Close the serial console connection after the CLI displays the configuration complete message. Step 4 Install the license. a. In the Management Console, select Maintenance > Licensing > Install. b. Click Retrieve. The console displays the Request License Key dialog box. c. Enter your MySymantec User ID and Password and then click Request license. d. Click OK to retrieve the license. 20

23 Installing the Target Appliance (Continued) Step 5 Upgrade the target appliance to the same SGOS version ( and later) as you had on the source appliance when you exported the configuration. Obtain the release image: a. Go to MySymantec: b. Select Downloads > Network Protection (Blue Coat) Downloads. c. When prompted, log in with your MySymantec credentials. d. Select your product. e. Select your appliance model (if applicable). f. Select a software version. g. Accept the License Agreement. h. Select the file(s) to download and click Download Selected Files. Note: The first time you download files, you are prompted to install the Download Manager. Follow the onscreen prompts to download and run the installer. For more information, refer to i. The Download Manager window opens. Select the download location. j. Download the new software image and put it on a workstation the ProxySG can access. k. Download the release notes and review them. Install the image: a. Log in to your ProxySG using a supported web browser. See for supported browser versions. b. Select the Maintenance > Upgrade > Upgrade tab. c. Click Upload and browse to the image. d. Click Install. e. Click Restart. The appliance will reboot. This might take several minutes. When the appliance has completed rebooting, you will be logged out of the appliance. a. Log in to the appliance. b. Verify the SGOS version shown on the Management Console banner. 21

24 Installing the Target Appliance (Continued) Step 6 If you extracted the default keyring configuration to its own file (for example, keyring.txt), restore this configuration. a. From the Management Console, select Configuration > General > Archive > Archive Configuration. b. In the Install Configuration from drop-down, select Local File and then click Install. The Open dialog box displays. c. Browse to the keyring configuration text file (keyring.txt, in this example) and then click Open. d. If prompted, click Continue in the Security Warning window. If the configuration installed without any errors or warnings, you will see a message indicating the file was successfully installed. Otherwise, the Install Results window opens (see Step 9). Step 7 Download databases for Symantec services and enable the services. If your configuration includes elements from Symantec WebFilter, Application Protection, Threat Risk, Application Classification, or Geolocation databases, you must download the databases for these services and enable them. This step includes the Symantec WebFilter service as an example: a. Select Proxy > Configuration > Content Filtering > Blue Coat > Download. b. Click Download Now. The download begins. Depending on your link speed, the initial download can take up to thirty minutes. c. Once complete, browse to Proxy > Configuration > Content Filtering > General. d. Check Blue Coat and click Apply. e. Repeat this process for any other service databases your configuration requires. Step 8 Note Restore the configuration archive. For all keyrings that were archived with the Do not show keypair option, you must manually create new keyrings and import the keypair one at a time. a. From the Management Console, select Configuration > General > Archive > Archive Configuration. b. In the Install Configuration from drop-down, select Local File and then click Install. The Open dialog box displays. c. Browse to the edited configuration archive text file (ProxySG_archive_12_2015, in this example) and then click Open. d. If prompted, click Continue in the Security Warning window. If the configuration installed without any errors or warnings, you will see a message indicating the file was successfully installed. Otherwise, the Install Results window opens (see Step 9). 22

25 Installing the Target Appliance (Continued) Step 9 Review any warnings or errors after installing the configuration archive. Address any issues discovered during archive installation: a. Copy the content of the Install Results window and paste into a text editor. b. To locate error messages, search for %. (Each error message is preceded by a percent sign.) c. To locate warning messages, search for Warning: d. Look in the Management Console for the setting mentioned in the error or warning message, and make any necessary changes. Step 10 For security reasons, SSLv2 and SSLv3 are disabled by default in SGOS and later. If you are migrating from a system running an older SGOS release and haven t changed the SSL versions for the HTTPS Reverse Proxy service, you will automatically get this change. If you need to continue to support the older SSL protocol versions, you will need to enable them in the HTTPS Reverse Proxy service after the upgrade. IMPORTANT: No change is needed here if you want the HTTPS Reverse Proxy service to use the new default SSL protocol versions in SGOS v and later (TLSv1, TLSv1.1 and TLSv1.2) and the supported cipher-suite for those versions. Step 11 Upgrade to your preferred long term release. (Downgrading is not recommended.) To enable the default protocols for HTTPS Reverse Proxy that were used in 6.4.x: a. From the Management Console, select Configuration > Services > Proxy Services > Proxy Services. b. Locate your HTTPS Reverse Proxy service and click Edit Service. c. Enable the default SSL protocols used in older SGOS versions: TLSv1, SSLv3, SSLv2; disable other protocols, if desired. d. Click OK. e. Apply the changes. Evaluate the recommended long-term releases on MySymantec to determine if you want to upgrade to one of these releases. The final upgrade version must be SGOS or later. Step 12 Delete the previous key files and configuration file so that your keys and other sensitive information are not available to others. Congratulations! You have successfully completed migrating your configuration to a new ProxySG appliance. 23

26 Section 5 Next Steps If your previous appliance was running a pre version of SGOS, you may want to review the features and changes introduced in SGOS between the previous version and your current version. Refer to the SGOS Release Notes at MySymantec (login is required). To review any upgrade impacts, refer to the SGOS Upgrade/Downgrade WebGuide: 24

Blue Coat ProxySG First Steps Transparent Proxy Deployments SGOS 6.7

Blue Coat ProxySG First Steps Transparent Proxy Deployments SGOS 6.7 Transparent Proxy Deployments SGOS 6.7 Legal Notice Copyright 2018 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat logo are trademarks

More information

Blue Coat ProxySG First Steps Solution for Controlling HTTPS SGOS 6.7

Blue Coat ProxySG First Steps Solution for Controlling HTTPS SGOS 6.7 Blue Coat ProxySG First Steps Solution for Controlling HTTPS SGOS 6.7 Legal Notice Copyright 2018 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the

More information

Blue Coat Security First Steps Solution for Controlling HTTPS

Blue Coat Security First Steps Solution for Controlling HTTPS Solution for Controlling HTTPS SGOS 6.5 Legal Notice Copyright 2017 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat logo are trademarks

More information

SGOS on KVM Deployment Guide

SGOS on KVM Deployment Guide SGOS on KVM Deployment Guide Guide Revision: 8/18/2017 2 SGOS on KVM Deployment Guide SGOS on KVM Deployment Guide 3 Legal Notice Copyright 2017 Symantec Corp. All rights reserved. Symantec, the Symantec

More information

Using Kerberos Authentication in a Reverse Proxy Environment

Using Kerberos Authentication in a Reverse Proxy Environment Using Kerberos Authentication in a Reverse Proxy Environment Legal Notice Copyright 2017 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat

More information

Multi-Tenant Policy Deployment Guide

Multi-Tenant Policy Deployment Guide Multi-Tenant Policy Deployment Guide SGOS 6.6.x and later Third Party Copyright Notices Copyright 2016 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and

More information

Blue Coat ProxySG First Steps Solution for Exception Pages SGOS 6.7

Blue Coat ProxySG First Steps Solution for Exception Pages SGOS 6.7 Blue Coat ProxySG First Steps Solution for Exception Pages SGOS 6.7 Legal Notice Copyright 2018 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue

More information

Office 365 Best Practices: Protocols

Office 365 Best Practices:  Protocols Office 365 Best Practices: Email Protocols VERSION 9: 08/11/17 Office 365 Integration: Email Protocols/Page 2 Skype/Lync Integration/Page 3 Copyrights Copyright 2016 Symantec Corp. All rights reserved.

More information

Symantec Protection Center Getting Started Guide. Version 2.0

Symantec Protection Center Getting Started Guide. Version 2.0 Symantec Protection Center Getting Started Guide Version 2.0 Symantec Protection Center Getting Started Guide The software described in this book is furnished under a license agreement and may be used

More information

SGOS on AWS Deployment Guide

SGOS on AWS Deployment Guide SGOS on AWS Deployment Guide Version 6.7.x Guide Revision: 4/6/2018 2 SGOS on AWS Deployment Guide SGOS on AWS Deployment Guide SGOS on AWS Deployment Guide 3 Legal Notice Copyright 2018 Symantec Corp.

More information

ProxySG Virtual Appliance MACH5 Edition Initial Configuration Guide

ProxySG Virtual Appliance MACH5 Edition Initial Configuration Guide ProxySG Virtual Appliance MACH5 Edition Initial Configuration Guide Platform: VMware ESX or ESXi Server Platform: ESX/ESXi Server Version 6.5.x and later SGOS 6.5.x and later i ProxySG Virtual Appliance

More information

ProxySG Virtual Appliance MACH5 Edition Initial Configuration Guide

ProxySG Virtual Appliance MACH5 Edition Initial Configuration Guide 2015 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE, CROSSBEAM, K9, DRTR, MACH5, PACKETWISE, POLICYCENTER, PROXYAV, PROXYCLIENT,

More information

IPv6 Classification. PacketShaper 11.8

IPv6 Classification. PacketShaper 11.8 PacketShaper 11.8 Legal Notice Copyright 2017 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat logo are trademarks or registered trademarks

More information

Partner Information. Integration Overview. Remote Access Integration Architecture

Partner Information. Integration Overview. Remote Access Integration Architecture Partner Information Partner Name Product Name Integration Overview Authentication Methods Supported Client Integration OTP Barracuda Networks Barracuda SSL VPN User Name + Security Code VIP Enterprise

More information

SonicWall Secure Mobile Access SMA 500v Virtual Appliance 8.6. Getting Started Guide

SonicWall Secure Mobile Access SMA 500v Virtual Appliance 8.6. Getting Started Guide SonicWall Secure Mobile Access SMA 500v Virtual Appliance 8.6 Getting Started Guide Copyright 2017 SonicWall Inc. All rights reserved. SonicWall is a trademark or registered trademark of SonicWall Inc.

More information

Symantec Validation and ID Protection. VIP Credential Development Kit Release Notes. Version January 2017

Symantec Validation and ID Protection. VIP Credential Development Kit Release Notes. Version January 2017 VIP Credential Development Kit Release Notes Version 2.0.7 January 2017 VIP Credential Development Kit Release Notes Page 1 of 6 Introduction This document includes important and late-breaking information

More information

SonicWall SonicOS 5.9

SonicWall SonicOS 5.9 SonicWall SonicOS 5.9 April 2017 This provides instructions for upgrading your SonicWall network security appliance to SonicOS 5.9 from a previous release. NOTE: On SonicWall TZ series and some smaller

More information

Symantec Validation and ID Protection. VIP Credential Development Kit Release Notes. Version May 2017

Symantec Validation and ID Protection. VIP Credential Development Kit Release Notes. Version May 2017 VIP Credential Development Kit Release Notes Version 2.0.8 May 2017 VIP Credential Development Kit Release Notes Page 1 of 6 Introduction This document includes important information about the Symantec

More information

Symantec Managed PKI. Integration Guide for ActiveSync

Symantec Managed PKI. Integration Guide for ActiveSync Symantec Managed PKI Integration Guide for ActiveSync ii Symantec Managed PKI Symantec Managed PKI Integration Guide for ActiveSync The software described in this book is furnished under a license agreement

More information

Symantec ediscovery Platform

Symantec ediscovery Platform Symantec ediscovery Platform Native Viewer (ActiveX) Installation Guide 7.1.5 Symantec ediscovery Platform : Native Viewer (ActiveX) Installation Guide The software described in this book is furnished

More information

Partner Information. Integration Overview Authentication Methods Supported

Partner Information. Integration Overview Authentication Methods Supported Partner Information Partner Name Product Name Integration Overview Authentication Methods Supported Client Integration F5 Networks FirePass VPN User Name - Security Code User Name - Password - Security

More information

VeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide

VeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide VeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide VeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide The software described in this book is furnished

More information

Reverse Proxy Deployment Guide

Reverse Proxy Deployment Guide Reverse Proxy Deployment Guide PDF of the Online WebGuide SGOS 6.5.x and Later Third Party Copyright Notices Copyright 2016 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark

More information

Veritas System Recovery 18 Management Solution Administrator's Guide

Veritas System Recovery 18 Management Solution Administrator's Guide Veritas System Recovery 18 Management Solution Administrator's Guide Documentation version: 18 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are

More information

Installation and Configuration Guide

Installation and Configuration Guide CYBERSECURITY, EVOLVED EdgeWave iprism Web Security Installation and Configuration Guide V8.0 15333 Avenue of Science, Suite 100 San Diego, CA 92128 Give us a call 1-855-881-2004 Send us an email: info@edgewave.com

More information

Dell SonicWALL SonicOS 5.9 Upgrade Guide

Dell SonicWALL SonicOS 5.9 Upgrade Guide Dell SonicWALL Upgrade Guide April, 2015 This provides instructions for upgrading your Dell SonicWALL network security appliance to from a previous release. This guide also provides information about importing

More information

SG-S to -30 Upgrade Kit. Product Installation Guide

SG-S to -30 Upgrade Kit. Product Installation Guide SG-S400-20 to -30 Upgrade Kit Product Installation Guide Legal Notice Copyright 2017 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat logo

More information

Blue Coat Security First Steps. Solution for Integrating Authentication using IWA BCAAA

Blue Coat Security First Steps. Solution for Integrating Authentication using IWA BCAAA Solution for Integrating Authentication using IWA BCAAA Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,

More information

Configuring the SMA 500v Virtual Appliance

Configuring the SMA 500v Virtual Appliance Using the SMA 500v Virtual Appliance Configuring the SMA 500v Virtual Appliance Registering Your Appliance Using the 30-day Trial Version Upgrading Your Appliance Configuring the SMA 500v Virtual Appliance

More information

Enterprise Vault Requesting and Applying an SSL Certificate and later

Enterprise Vault Requesting and Applying an SSL Certificate and later Enterprise Vault Requesting and Applying an SSL Certificate 10.0.3 and later Enterprise Vault : Requesting and Applying an SSL Certificate Last updated: 2018-04-12. Legal Notice Copyright 2018 Veritas

More information

Symantec Validation & ID Protection Service. Integration Guide for Microsoft Outlook Web App

Symantec Validation & ID Protection Service. Integration Guide for Microsoft Outlook Web App Symantec Validation & ID Protection Service Integration Guide for Microsoft Outlook Web App 2 Symantec VIP Integration Guide for Microsoft Outlook Web App The software described in this book is furnished

More information

Symantec pcanywhere 12.5 SP4 Release Notes

Symantec pcanywhere 12.5 SP4 Release Notes Symantec pcanywhere 12.5 SP4 Release Notes Symantec pcanywhere 12.5 SP4 Release Notes The software described in this book is furnished under a license agreement and may be used only in accordance with

More information

SonicOS Release Notes

SonicOS Release Notes SonicOS Contents Platform Compatibility... 1 Known Issues... 2 Resolved Issues... 4 Upgrading SonicOS Enhanced Image Procedures... 5 Related Technical Documentation... 10 Platform Compatibility The SonicOS

More information

Novell Access Manager

Novell Access Manager Quick Start AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP2 June 11, 2010 www.novell.com Novell Access Manager 3.1 SP2 Quick Start Legal Notices Novell, Inc., makes no representations or warranties

More information

Symantec Workflow Solution 7.1 MP1 Installation and Configuration Guide

Symantec Workflow Solution 7.1 MP1 Installation and Configuration Guide Symantec Workflow Solution 7.1 MP1 Installation and Configuration Guide Symantec Workflow Installation and Configuration Guide The software described in this book is furnished under a license agreement

More information

Veritas System Recovery 16 Management Solution Administrator's Guide

Veritas System Recovery 16 Management Solution Administrator's Guide Veritas System Recovery 16 Management Solution Administrator's Guide Documentation version: 2017 Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo

More information

Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers

Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers INTRODUCTION Setup of Quest VROOM requires installation of Rapid Recovery and Foglight for Virtualization

More information

Nokia Intrusion Prevention with Sourcefire. Appliance Quick Setup Guide

Nokia Intrusion Prevention with Sourcefire. Appliance Quick Setup Guide Nokia Intrusion Prevention with Sourcefire Appliance Quick Setup Guide Part Number N450000567 Rev 001 Published September 2007 COPYRIGHT 2007 Nokia. All rights reserved. Rights reserved under the copyright

More information

JabberNow Release Notes

JabberNow Release Notes JabberNow Release Notes Product Version: JabberNow 1.1 Document Version: A May 2006 Disclaimers Copyright 2006 Jabber, Inc. The information contained in this document is proprietary to Jabber, Inc. This

More information

July SonicWall SonicOS 6.2 Upgrade Guide

July SonicWall SonicOS 6.2 Upgrade Guide SonicWall SonicOS 6.2 July 2017 This provides instructions for upgrading your SonicWall network security appliance from SonicOS 6.1 firmware or a previous version of SonicOS 6.2 to the latest version of

More information

Configuration & Management Guide

Configuration & Management Guide Configuration & Management Guide Management Center v1.7.1.1 Guide Revision: September 13, 2016 2 TOC Management Center Overview 23 Web Console Overview 25 Dashboard 26 Network 26 Configuration 27 Jobs

More information

Symantec Encryption Management Server

Symantec Encryption Management Server Symantec Encryption Management Server Upgrade Guide 3.4 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Version

More information

NetBackup Copilot for Oracle Configuration Guide. Release 2.7.1

NetBackup Copilot for Oracle Configuration Guide. Release 2.7.1 NetBackup Copilot for Oracle Configuration Guide Release 2.7.1 NetBackup Copilot for Oracle Configuration Guide Documentation version: 2.7.1 Legal Notice Copyright 2015 Symantec Corporation. All rights

More information

Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers

Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers INTRODUCTION Setup of Quest VROOM requires installation of Rapid Recovery and Foglight for Virtualization

More information

Cluster Server Generic Application Agent Configuration Guide - AIX, Linux, Solaris

Cluster Server Generic Application Agent Configuration Guide - AIX, Linux, Solaris Cluster Server 7.3.1 Generic Application Agent Configuration Guide - AIX, Linux, Solaris Last updated: 2017-11-04 Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and

More information

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.8 April 2017 Last modified: July 17, 2017 2017 Nasuni Corporation All Rights Reserved Document Information Testing Disaster

More information

Web Security Service. Near Real-Time Log Sync Solution Brief. Version /OCT

Web Security Service. Near Real-Time Log Sync Solution Brief. Version /OCT Web Security Service Near Real-Time Log Sync Solution Brief Version 6.10.4.1/OCT.12.2018 Symantec Web Security Service/Page 2 Page 3 Copyrights Copyright 2018 Symantec Corp. All rights reserved. Symantec,

More information

Symantec Security Information Manager FIPS Operational Mode Guide

Symantec Security Information Manager FIPS Operational Mode Guide Symantec Security Information Manager 4.7.3 FIPS 140-2 Operational Mode Guide Symantec Security Information Manager 4.7.3 FIPS 140-2 Operational Mode Guide The software described in this book is furnished

More information

Installation and Configuration Guide

Installation and Configuration Guide Installation and Configuration Guide h-series 800-782-3762 www.edgewave.com 2001 2011 EdgeWave Inc. (formerly St. Bernard Software). All rights reserved. The EdgeWave logo, iprism and iguard are trademarks

More information

Veritas Backup Exec Migration Assistant

Veritas Backup Exec Migration Assistant Veritas Backup Exec Migration Assistant Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks of Veritas Technologies

More information

Symantec Patch Management Solution for Windows 8.5 powered by Altiris technology User Guide

Symantec Patch Management Solution for Windows 8.5 powered by Altiris technology User Guide Symantec Patch Management Solution for Windows 8.5 powered by Altiris technology User Guide Symantec Patch Management Solution for Windows 8.5 powered by Altiris technology User Guide Documentation version:

More information

Bi-directional ADN Deployment Using WCCP with Reflect Client IP [Configuration Sample] Ken Fritz (PSS)

Bi-directional ADN Deployment Using WCCP with Reflect Client IP [Configuration Sample] Ken Fritz (PSS) Bi-directional ADN Deployment Using WCCP with Reflect Client IP [Configuration Sample] February 17, 2011 Ken Fritz (PSS) Copyright 2011 Blue Coat Systems, Inc. All rights reserved worldwide. No part of

More information

Veritas Desktop and Laptop Option 9.1 Qualification Details with Cloud Service Providers (Microsoft Azure and Amazon Web Services)

Veritas Desktop and Laptop Option 9.1 Qualification Details with Cloud Service Providers (Microsoft Azure and Amazon Web Services) Veritas Desktop and Laptop Option 9.1 Qualification Details with Cloud Service Providers (Microsoft Azure and Amazon Web Services) Veritas Desktop and Laptop Option: Qualification Details with Cloud Service

More information

NetBackup Collection Quick Start Guide

NetBackup Collection Quick Start Guide NetBackup Collection Quick Start Guide This whitepaper is intended for IT professionals, IT managers, and IT personnel responsible for the planning, setup, and/or administration of Veritas Information

More information

HG658d Home Gateway. User Guide HUAWEI TECHNOLOGIES CO., LTD.

HG658d Home Gateway. User Guide HUAWEI TECHNOLOGIES CO., LTD. HG658d Home Gateway User Guide HUAWEI TECHNOLOGIES CO., LTD. HG658d Home Gateway V100R001 User Guide Issue 01 Date 2013-07-23 Part Number 202633 Huawei Technologies Co., Ltd. provides customers with comprehensive

More information

Enterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3

Enterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3 Enterprise Vault.cloud CloudLink Google Account Synchronization Guide CloudLink 4.0.1 to 4.0.3 Enterprise Vault.cloud: CloudLink Google Account Synchronization Guide Last updated: 2018-06-08. Legal Notice

More information

Blue Coat Security First Steps Solution for Exception Pages

Blue Coat Security First Steps Solution for Exception Pages Blue Coat Security First Steps Solution for Exception Pages SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,

More information

Symantec Managed PKI. Integration Guide for AirWatch MDM Solution

Symantec Managed PKI. Integration Guide for AirWatch MDM Solution Symantec Managed PKI Integration Guide for AirWatch MDM Solution ii Symantec Managed PKI Integration Guide for AirWatch MDM Solution The software described in this book is furnished under a license agreement

More information

PGP Viewer for ios. Administrator s Guide 1.0

PGP Viewer for ios. Administrator s Guide 1.0 PGP Viewer for ios Administrator s Guide 1.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Version 1.0.2.

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2010/2013 Users 11.0 Light Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2010/2013 Users The software described in this book

More information

AXIS Camera Station S20 Appliance Series AXIS Camera Station S2008 Appliance AXIS Camera Station S2016 Appliance AXIS Camera Station S2024 Appliance

AXIS Camera Station S20 Appliance Series AXIS Camera Station S2008 Appliance AXIS Camera Station S2016 Appliance AXIS Camera Station S2024 Appliance AXIS Camera Station S2008 Appliance AXIS Camera Station S2016 Appliance AXIS Camera Station S2024 Appliance User Manual Table of Contents About the AXIS Camera Station S20 Appliance Series.............

More information

Chapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM

Chapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM Chapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM Topology Note: ISR G1 devices use FastEthernet interfaces instead of GigabitEthernet interfaces. 2015 Cisco and/or its affiliates. All rights

More information

SymantecTM Desktop and Laptop Option. Symantec DLO s Storage in Cloud (Amazon Web Services)

SymantecTM Desktop and Laptop Option. Symantec DLO s Storage in Cloud (Amazon Web Services) SymantecTM Desktop and Laptop Option Symantec DLO s Storage in Cloud (Amazon Web Services) Disclaimer The information contained in this publication is subject to change without notice. Symantec Corporation

More information

Blue Coat Security First Steps Solution for Integrating Authentication Using LDAP

Blue Coat Security First Steps Solution for Integrating Authentication Using LDAP Solution for Integrating Authentication Using LDAP SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,

More information

Symantec Cloud Workload Protection on AWS Marketplace. Buyer's Guide for Getting Started

Symantec Cloud Workload Protection on AWS Marketplace. Buyer's Guide for Getting Started Symantec Cloud Workload Protection on AWS Marketplace Buyer's Guide for Getting Started The software described in this book is furnished under a license agreement and may be used only in accordance with

More information

SonicWall Mobile Connect ios 5.0.0

SonicWall Mobile Connect ios 5.0.0 SonicWall Mobile Connect ios 5.0.0 October 2017 These release notes provide information about the SonicWall Mobile Connect ios 5.0.0 release. Topics: About Mobile Connect ios 5.0.0 Supported Platforms

More information

Nimsoft Service Desk. Single Sign-On Configuration Guide. [assign the version number for your book]

Nimsoft Service Desk. Single Sign-On Configuration Guide. [assign the version number for your book] Nimsoft Service Desk Single Sign-On Configuration Guide [assign the version number for your book] Legal Notices Copyright 2012, CA. All rights reserved. Warranty The material contained in this document

More information

F5 WANJet 200. Quick Start Guide. Quick Start Overview

F5 WANJet 200. Quick Start Guide. Quick Start Overview F5 WANJet 200 Quick Start Guide Quick Start Overview Following is a high level overview of the steps required to successfully install and configure your F5 WANJet 200 appliance. For detailed instructions

More information

User Guide. We protect more people from more online threats than anyone in the world.

User Guide. We protect more people from more online threats than anyone in the world. User Guide We protect more people from more online threats than anyone in the world. Care for our Environment, It's the right thing to do. Symantec has removed the cover from this manual to reduce the

More information

Symantec Drive Encryption Evaluation Guide

Symantec Drive Encryption Evaluation Guide Symantec Drive Encryption Evaluation Guide Getting Started Installing Symantec Encryption Management Server is the first product deployment step for any Symantec Encryption evaluation (also known as a

More information

SonicWall Global VPN Client Getting Started Guide

SonicWall Global VPN Client Getting Started Guide SonicWall Global VPN Client 4.10 Getting Started Guide Copyright 2017 SonicWall Inc. All rights reserved. SonicWall is a trademark or registered trademark of SonicWall Inc. and/or its affiliates in the

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2010 Users 9.0 Symantec Enterprise Vault: Guide for Microsoft Outlook 2010 Users The software described in this book is furnished under a license agreement

More information

Veritas NetBackup Appliance Security Guide

Veritas NetBackup Appliance Security Guide Veritas NetBackup Appliance Security Guide Release 2.7.3 NetBackup 52xx and 5330 Veritas NetBackup Appliance Security Guide Document version: 2.7.3 Legal Notice Copyright 2016 Veritas Technologies LLC.

More information

Symantec Encryption Management Server and Symantec Data Loss Prevention. Integration Guide

Symantec Encryption Management Server and Symantec Data Loss Prevention. Integration Guide Symantec Encryption Management Server and Symantec Data Loss Prevention Integration Guide The software described in this book is furnished under a license agreement and may be used only in accordance

More information

SRA Virtual Appliance Getting Started Guide

SRA Virtual Appliance Getting Started Guide SRA Virtual Appliance Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

PGP Viewer for ios. User s Guide 1.0

PGP Viewer for ios. User s Guide 1.0 PGP Viewer for ios User s Guide 1.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Version 1.0.2. Last updated:

More information

Veritas Desktop and Laptop Option Mobile Application Getting Started Guide

Veritas Desktop and Laptop Option Mobile Application Getting Started Guide Veritas Desktop and Laptop Option Mobile Application Getting Started Disclaimer Contents The software described in this document is furnished under a license agreement and may be used only in accordance

More information

Symantec Endpoint Protection, Symantec Endpoint Protection Small Business Edition, and Symantec Network Access Control 12.1.

Symantec Endpoint Protection, Symantec Endpoint Protection Small Business Edition, and Symantec Network Access Control 12.1. Symantec Endpoint Protection, Symantec Endpoint Protection Small Business Edition, and Symantec Network Access Control 12.1.3 Release Notes Symantec Endpoint Protection, Symantec Endpoint Protection Small

More information

SymantecTM Desktop and Laptop Option. Symantec DLO s Storage in Cloud (Amazon Web Services)

SymantecTM Desktop and Laptop Option. Symantec DLO s Storage in Cloud (Amazon Web Services) SymantecTM Desktop and Laptop Option Symantec DLO s Storage in Cloud (Amazon Web Services) Disclaimer The information contained in this publication is subject to change without notice. Symantec Corporation

More information

Symantec Ghost Solution Suite Web Console - Getting Started Guide

Symantec Ghost Solution Suite Web Console - Getting Started Guide Symantec Ghost Solution Suite Web Console - Getting Started Guide Symantec Ghost Solution Suite Web Console- Getting Started Guide Documentation version: 3.3 RU1 Legal Notice Copyright 2019 Symantec Corporation.

More information

Veritas NetBackup Copilot for Oracle Configuration Guide. Release 2.7.2

Veritas NetBackup Copilot for Oracle Configuration Guide. Release 2.7.2 Veritas NetBackup Copilot for Oracle Configuration Guide Release 2.7.2 Veritas NetBackup Copilot for Oracle Configuration Guide Documentation version: 2.7.2 Legal Notice Copyright 2016 Veritas Technologies

More information

Symantec PGP Viewer for ios

Symantec PGP Viewer for ios Symantec PGP Viewer for ios User's Guide 1.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Version 1.0.0.

More information

Veritas ediscovery Platform

Veritas ediscovery Platform Veritas ediscovery Platform Release Notes 9.0.1 Release Notes PAGE: 2 Veritas ediscovery Platform : Release Notes 9.0.1 The software described in this book is furnished under a license agreement and may

More information

Veritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server

Veritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server Veritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server Windows Server 2003, Windows Server 2008 5.1 Service Pack 2 Veritas Cluster Server Application Note: High Availability

More information

Veritas NetBackup Copilot for Oracle Configuration Guide. Release 3.1 and 3.1.1

Veritas NetBackup Copilot for Oracle Configuration Guide. Release 3.1 and 3.1.1 Veritas NetBackup Copilot for Oracle Configuration Guide Release 3.1 and 3.1.1 Veritas NetBackup Copilot for Oracle Configuration Guide Legal Notice Copyright 2018 Veritas Technologies LLC. All rights

More information

McAfee Network Security Platform

McAfee Network Security Platform 40 Gigabit Active Fail-Open Bypass Kit Guide Revision C McAfee Network Security Platform This document describes the contents and how to install and use the McAfee 40 Gigabit Active Fail-Open Bypass Kit

More information

Silver Peak EC-V and Microsoft Azure Deployment Guide

Silver Peak EC-V and Microsoft Azure Deployment Guide Silver Peak EC-V and Microsoft Azure Deployment Guide How to deploy an EC-V in Microsoft Azure 201422-001 Rev. A September 2018 2 Table of Contents Table of Contents 3 Copyright and Trademarks 5 Support

More information

Lab Configuring an ISR with SDM Express

Lab Configuring an ISR with SDM Express Lab 5.2.3 Configuring an ISR with SDM Express Objectives Configure basic router global settings router name, users, and login passwords using Cisco SDM Express. Configure LAN and Internet connections on

More information

SonicOS Enhanced Release Notes

SonicOS Enhanced Release Notes SonicOS Contents Platform Compatibility... 1 Known Issues... 2 Resolved Known Issues... 3 Upgrading SonicOS Enhanced Image Procedures... 5 Related Technical Documentation...8 Platform Compatibility The

More information

Getting Started with ESX Server 3i Installable Update 2 and later for ESX Server 3i version 3.5 Installable and VirtualCenter 2.5

Getting Started with ESX Server 3i Installable Update 2 and later for ESX Server 3i version 3.5 Installable and VirtualCenter 2.5 Getting Started with ESX Server 3i Installable Update 2 and later for ESX Server 3i version 3.5 Installable and VirtualCenter 2.5 Getting Started with ESX Server 3i Installable Revision: 20090313 Item:

More information

Creating New MACHINEGUID and Disk UUID Using the PGPWdeUpdateMachineUUID.exe Utility

Creating New MACHINEGUID and Disk UUID Using the PGPWdeUpdateMachineUUID.exe Utility Creating New MACHINEGUID and Disk UUID Using the PGPWdeUpdateMachineUUID.exe Utility Legal Notice Copyright (c) 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark

More information

SonicWall SMA 8200v. Getting Started Guide

SonicWall SMA 8200v. Getting Started Guide SonicWall SMA 8200v Getting Started Guide Copyright 2017 SonicWall Inc. All rights reserved. SonicWall is a trademark or registered trademark of SonicWall Inc. and/or its affiliates in the U.S.A. and/or

More information

Veritas NetBackup Appliance Security Guide

Veritas NetBackup Appliance Security Guide Veritas NetBackup Appliance Security Guide Release 2.7.2 NetBackup 52xx and 5330 Veritas NetBackup Appliance Security Guide Documentation version: 2.7.2 Legal Notice Copyright 2016 Veritas Technologies

More information

Veritas CommandCentral Enterprise Reporter Release Notes

Veritas CommandCentral Enterprise Reporter Release Notes Veritas CommandCentral Enterprise Reporter Release Notes for Microsoft Windows and Solaris 5.2 RU3 February 2012 CommandCentral Enterprise Reporter Release Notes The software described in this book is

More information

Host Upgrade Utility User Guide for Cisco UCS E-Series Servers and the Cisco UCS E-Series Network Compute Engine

Host Upgrade Utility User Guide for Cisco UCS E-Series Servers and the Cisco UCS E-Series Network Compute Engine Host Upgrade Utility User Guide for Cisco UCS E-Series Servers and the Cisco UCS E-Series Network Compute First Published: August 09, 2013 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive

More information

Symantec Enterprise Vault Technical Note

Symantec Enterprise Vault Technical Note Symantec Enterprise Vault Technical Note FSA Reporting deployment guidelines 8.0 Symantec Information Foundation Symantec Enterprise Vault: FSA Reporting deployment guidelines The software described in

More information

Altiris Software Management Solution 7.1 from Symantec User Guide

Altiris Software Management Solution 7.1 from Symantec User Guide Altiris Software Management Solution 7.1 from Symantec User Guide Altiris Software Management Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement

More information

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. For Red Hat Enterprise Linux 5

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. For Red Hat Enterprise Linux 5 Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark For Red Hat Enterprise Linux 5 Symantec ESM Baseline Policy Manual for CIS Benchmark for Red Hat Enterprise Linux 5 The software

More information

Polycom RealPresence Resource Manager System

Polycom RealPresence Resource Manager System Upgrade Guide 8.2.0 July 2014 3725-72106-001E Polycom RealPresence Resource Manager System Copyright 2014, Polycom, Inc. All rights reserved. No part of this document may be reproduced, translated into

More information

Server Installation ZENworks Mobile Management 2.6.x January 2013

Server Installation ZENworks Mobile Management 2.6.x January 2013 www.novell.com/documentation Server Installation ZENworks Mobile Management 2.6.x January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information