SGOS on AWS Deployment Guide

Similar documents
Blue Coat ProxySG First Steps Transparent Proxy Deployments SGOS 6.7

Blue Coat ProxySG First Steps Solution for Controlling HTTPS SGOS 6.7

SGOS on KVM Deployment Guide

Blue Coat Security First Steps Solution for Controlling HTTPS

Migrating to a New ProxySG Appliance. ProxySG 900/9000 to ProxySG S400/500

Blue Coat ProxySG First Steps Solution for Exception Pages SGOS 6.7

Pulse Connect Secure Virtual Appliance on Amazon Web Services

Using Kerberos Authentication in a Reverse Proxy Environment

SymantecTM Desktop and Laptop Option. Symantec DLO s Storage in Cloud (Amazon Web Services)

SymantecTM Desktop and Laptop Option. Symantec DLO s Storage in Cloud (Amazon Web Services)

Office 365 Best Practices: Protocols

Veritas Desktop and Laptop Option 9.1 Qualification Details with Cloud Service Providers (Microsoft Azure and Amazon Web Services)

F5 BIG-IQ Centralized Management and Amazon Web Services: Setup. Version 5.4

IPv6 Classification. PacketShaper 11.8

Multi-Tenant Policy Deployment Guide

Symantec Protection Center Getting Started Guide. Version 2.0

AltaVault Cloud Integrated Storage Installation and Service Guide for Cloud Appliances

VX 9000 Virtualized Controller INSTALLATION GUIDE

VX 9000E WiNG Express Manager INSTALLATION GUIDE

Deploy the Firepower Management Center Virtual On the AWS Cloud

Symantec ediscovery Platform

Filters AWS CLI syntax, 43 Get methods, 43 Where-Object command, 43

Silver Peak EC-V and Microsoft Azure Deployment Guide

EdgeConnect for Amazon Web Services (AWS)

Amazon AppStream 2.0: SOLIDWORKS Deployment Guide

PCoIP Connection Manager for Amazon WorkSpaces

SonicWall Web Application Firewall 2.0. AWS Deployment Guide

unisys Unisys Stealth(cloud) for Amazon Web Services Deployment Guide Release 2.0 May

How to Deploy the Barracuda NG Firewall in an Amazon Virtual Private Cloud

QUICK START: VERITAS STORAGE FOUNDATION BASIC FOR AMAZON EC2

dbx MNT AWS Setup Guide

Enterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3

ProxySG Virtual Appliance MACH5 Edition Initial Configuration Guide

SonicWall Secure Mobile Access SMA 500v Virtual Appliance 8.6. Getting Started Guide

Pexip Infinity and Amazon Web Services Deployment Guide

Partner Information. Integration Overview. Remote Access Integration Architecture

NetApp Cloud Volumes Service for AWS

FortiMail AWS Deployment Guide

QUICK START: SYMANTEC ENDPOINT PROTECTION FOR AMAZON EC2

Veritas Desktop and Laptop Option 9.2

Deploy and Secure an Internet Facing Application with the Barracuda Web Application Firewall in Amazon Web Services

Deploying the Cisco CSR 1000v on Amazon Web Services

Symantec Desktop and Laptop Option 8.0 SP2. Symantec Desktop Agent for Mac. Getting Started Guide

Infoblox Trinzic V-x25 Series Appliances for AWS

Symantec Ghost Solution Suite Web Console - Getting Started Guide

CloudLink Amazon Web Services Deployment Guide

Eucalyptus User Console Guide

Installing the Nasuni Filer on the EC2 Platform. Version 7.9 July 2017 Last modified: July 10, Nasuni Corporation All Rights Reserved

Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers

Pexip Infinity and Amazon Web Services Deployment Guide

ProxySG Virtual Appliance MACH5 Edition Initial Configuration Guide

PCoIP Connection Manager for Amazon WorkSpaces

CPM. Quick Start Guide V2.4.0

Veritas Desktop Agent for Mac Getting Started Guide

Veritas Desktop and Laptop Option Mac Getting Started Guide

Configuring AWS for Zerto Virtual Replication

Tetration Cluster Cloud Deployment Guide

1.0. Quest Enterprise Reporter Discovery Manager USER GUIDE

VeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide

Veritas CloudPoint 1.0 Administrator's Guide

Immersion Day. Getting Started with Windows Server on Amazon EC2. June Rev

Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers

F5 iworkflow and Microsoft Hyper-V: Setup. Version 2.2.0

Symantec Patch Management Solution for Windows 8.5 powered by Altiris technology User Guide

Symantec Managed PKI. Integration Guide for ActiveSync

MyIGW Main. Oregon. MyVPC /16. MySecurityGroup / us-west-2b. Type Port Source SSH /0 HTTP

ElasterStack 3.2 User Administration Guide - Advanced Zone

LB Cache Quick Start Guide v1.0

Symantec Workflow 7.1 MP1 Release Notes

Installation of Informatica Services on Amazon EC2

CloudEdge Deployment Guide

Blue Coat Security First Steps Solution for Exception Pages

Wave 5.0. Wave OpenVPN Server Guide for Wave 5.0

HySecure Quick Start Guide. HySecure 5.0

Veritas System Recovery 18 Management Solution Administrator's Guide

CA Agile Central Administrator Guide. CA Agile Central On-Premises

BIG-IP Virtual Edition and Microsoft Hyper- V: Setup. Version 13.1

Amazon Virtual Private Cloud. Getting Started Guide

FortiManager VM - Install Guide. Version 5.6

Log & Event Manager UPGRADE GUIDE. Version Last Updated: Thursday, May 25, 2017

Symantec Cloud Workload Protection on AWS Marketplace. Buyer's Guide for Getting Started

How to Setup Total Application Security

Cluster Server Generic Application Agent Configuration Guide - AIX, Linux, Solaris

CIT 668: System Architecture

Netwrix Auditor. Virtual Appliance and Cloud Deployment Guide. Version: /25/2017

Silver Peak. AWS EC-V for Multi- Instance Inbound Load Balancing

NetBackup Copilot for Oracle Configuration Guide. Release 2.7.1

Immersion Day. Creating an Elastic Load Balancer. September Rev

BIG-IP Virtual Edition and Microsoft Hyper- V: Setup. Version 12.1

Immersion Day. Getting Started with Windows Server on. Amazon EC2. Rev

FortiManager VM - Install Guide VERSION 5.4

Tanium IaaS Cloud Solution Deployment Guide for Microsoft Azure

Symantec Enterprise Vault

AppGate for AWS Step-by-Step Setup Guide. Last revised April 28, 2017

Hands-On Lab. Windows Azure Virtual Machine Roles. Lab version: Last updated: 12/14/2010. Page 1

Message Manager Administrator Guide

Veritas System Recovery 16 Management Solution Administrator's Guide

F5 iworkflow and Citrix XenServer: Setup. Version 2.0.1

Symantec Managed PKI. Integration Guide for AirWatch MDM Solution

Server Installation ZENworks Mobile Management 2.6.x January 2013

Transcription:

SGOS on AWS Deployment Guide Version 6.7.x Guide Revision: 4/6/2018

2 SGOS on AWS Deployment Guide SGOS on AWS Deployment Guide

SGOS on AWS Deployment Guide 3 Legal Notice Copyright 2018 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat logo are trademarks or registered trademarks of Symantec Corp. or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. SYMANTEC CORPORATION PRODUCTS, TECHNICAL SERVICES, AND ANY OTHER TECHNICAL DATA REFERENCED IN THIS DOCUMENT ARE SUBJECT TO U.S. EXPORT CONTROL AND SANCTIONS LAWS, REGULATIONS AND REQUIREMENTS, AND MAY BE SUBJECT TO EXPORT OR IMPORT REGULATIONS IN OTHER COUNTRIES. YOU AGREE TO COMPLY STRICTLY WITH THESE LAWS, REGULATIONS AND REQUIREMENTS, AND ACKNOWLEDGE THAT YOU HAVE THE RESPONSIBILITY TO OBTAIN ANY LICENSES, PERMITS OR OTHER APPROVALS THAT MAY BE REQUIRED IN ORDER TO EXPORT, RE-EXPORT, TRANSFER IN COUNTRY OR IMPORT AFTER DELIVERY TO YOU. Symantec Corporation 350 Ellis Street Mountain View, CA 94043 www.symantec.com 4/6/2018

Table of Contents Table of Contents 5 About SGOS on AWS 6 Important Details about SGOS on AWS 7 Step 1: Complete Prerequisite Tasks 8 Step 2: Import and Register an AMI 11 Step 3: Deploy the Instance 15 Step 4: Verify the Instance 18 Step 5: Install the License 19 Step 6: Disassociate User Data from the Instance 20 Step 7: (Optional) Configure Load Balancing 21 Configure a Listener 21 Configure Health Checks 22 Back up and Restore an Instance of SGOS 23 Create a Snapshot to Back up Your SGOS Instance 23 Restore an Instance of SGOS from a Snapshot 23 Create an AMI from a Snapshot of an SGOS Instance 23 Deploy the Newly Registered AMI 24 Troubleshoot SGOS on AWS 25 General Troubleshooting Steps 25 Troubleshoot Licensing Errors 26 Troubleshoot Credentials Errors 27 Appendix A: Supported Configurations 28 Appendix B: Metadata and User Data Reference 29 AWS Metadata 29 AWS User Data 30 AWS User Data Security 31

SGOS on AWS Deployment Guide (6.7.x) About SGOS on AWS This guide provides instructions for deploying a ProxySG virtual appliance (Secure Web Gateway edition, SGOS version 6.7.x) running on Xen Hypervisor in Amazon Web Services (AWS). Because AWS is outside of the Symantec network, you must manually transfer SGOS virtual machine images into AWS, where you can configure and manage your virtual SGOS instances. SGOS on AWS permits the same features and functionality as the Secure Web Gateway Virtual Appliance (SWG VA), except it does not support transparent proxy or WCCP. This document guides you through the process of setting up SGOS on AWS. Deployment consists of the following steps: Deployment Step Prepare your environment and make sure you have the required resources and files to deploy SGOS on AWS. Use a virtual hard disk (VHD) file to create an Amazon Machine Image (AMI). This section provides instructions for EC2 CLI and AWS CLI. Import the AMI into the AWS Management Console and configure it using a user data file and manual settings. Verify that you can access the instance through SSH and the ProxySG Management Console. Install the SGOS license through the ProxySG Management Console. Disassociate the user data from the instance so that you can easily change usernames and passwords later. Configure an AWS Elastic Load Balancer (ELB) for multiple SGOS instances. This is an optional step. Create snapshots in AWS to capture the contents of an EBS volume at specific points in time. This is a recommended step. Review the known issues in this release. Document Reference "Step 1: Complete Prerequisite Tasks" on page 8 "Step 2: Import and Register an AMI" on page 11 "Step 3: Deploy the Instance " on page 15 "Step 4: Verify the Instance " on page 18 "Step 5: Install the License" on page 19 "Step 6: Disassociate User Data from the Instance" on page 20 "Step 7: (Optional) Configure Load Balancing" on page 21 "Back up and Restore an Instance of SGOS" on page 23 SGOS Release Notes at MySymantec If you encounter any issues while the SGOS on AWS instance is running, refer to "Troubleshoot SGOS on AWS" on page 25 in this guide for assistance. For details beyond the scope of SGOS documentation, refer to AWS documentation: https://aws.amazon.- com/documentation/ 6

SGOS on AWS Deployment Guide (6.7.x) Important Details about SGOS on AWS Note the following about SGOS on AWS: Version 6.7.x is supported on the SWG-V100 and SG-VA-C2S models. You have two ways to manage SGOS instances: through SSH to the CLI and the ProxySG Management Console in a web browser. You cannot access a serial or VGA console to a virtual machine. You cannot downgrade the SG-VA-C2S to SGOS 6.6.x. (You can downgrade the SWG-V100.) This release does not support AWS Marketplace for third-party AMIs. 7

8 SGOS on AWS Deployment Guide Step 1: Complete Prerequisite Tasks Before deploying SGOS on AWS, complete the following tasks: 1. Prepare and verify your environment, including firewall configuration, Amazon VPC configuration, and security groups for the VPC. Refer to Amazon documentation for details. 2. Allow access to the following Symantec servers: https://download.bluecoat.com https://services.bluecoat.com You require access to these servers in order to retrieve and install the SGOS on AWS license. 3. Verify system requirements for the virtual appliance. Refer to the following table. Depending on the AWS EC2 Instance Type and virtual appliance model you use, the ProxySG appliance's licensing health status might indicate a Warning. In addition, the Configured Memory statistic (in the Management Console, select Maintenance > Health Monitoring > Licensing) displays a notification that the appliance has under-provisioned memory. This is expected behavior and means that the configured virtual memory is lower than the 8 GB allowed by the license. Under-provisioned memory reduces the maximum number of connections, but it does not invalidate the license. Instance Type Number of Virtual CPUs Virtual Memory (GB) Number of Virtual Drives Storage Space Per Drive ProxySG Health with SWG-V100 ProxySG Health with SG-VA- C2S m4.large (recommended) 2 8 1 100 GB OK OK t2.large 2 8 1 100 GB OK OK t2.medium 2 4 1 100 GB OK Warning c4.large 2 3.75 1 100 GB Warning Warning Refer to "Appendix A: Supported Configurations" on page 28 for more information on instance types support. 4. Set up your preferred CLI: EC2 CLI Tools http://docs.aws.amazon.com/awsec2/latest/commandlinereference/ AWS CLI http://docs.aws.amazon.com/cli/latest/userguide/cli-chap-getting-set-up.html 5. Confirm that you are able to access the private key (PEM file) you want AWS to register with the EC2 instance. 6. Obtain or confirm your MySymantec credentials. You require these credentials to generate the instance user data file and to retrieve the SGOS on AWS license.

SGOS on AWS Deployment Guide 9 7. Obtain or confirm the following information: o o o o The username for the administrator account The virtual appliance serial number (which you either retrieved when you downloaded the VHD from MySymantec) The intended password for the administrator account The intended enable password for the appliance Make sure that the passwords are strong. You require these details to generate the user data file. 8. Generate the user data file: a. Go to the following URL: https://support.symantec.com/content/unifiedweb/en_us/keygenerator.html b. When prompted to log in, enter your MySymantec username and password. a. Enter the following: Console Username: The administrative username for accessing the SGOS Management Console. Serial Number: The appliance serial number. Console Password: The administrative password. Enable Password: The enable password. Be sure to create strong passwords. c. Click Generate User Data. The browser displays the user data. d. Click Download File to download the user data file. e. Click Finish. 9. (If necessary) Create an S3 bucket for the region from which you intend to launch EC2 instances. Using the AWS dashboard:

10 SGOS on AWS Deployment Guide a. Log in to the AWS dashboard. The URL is https://console.aws.amazon.com/s3/home?region=<region_name># where <region_name> is the ID of the region from which you will launch EC2 instances. b. In the list of AWS services, in the Storage & Content Delivery section, select S3. c. If there are no existing S3 buckets, or if you want to use a new bucket for importing the image, click Create Bucket. Follow the prompts to create the bucket. Alternatively, you can use an existing bucket for importing the image. Using the AWS CLI: a. Issue the following command: $ aws s3 mb s3://bucket_name --region region_name where region_name is the ID of the region from which you will launch EC2 instances. Example: $ aws s3 mb s3://hq-lab-1 --region us-east-1 The following output indicates that the bucket was created: make_bucket: s3://hq-lab-1 You cannot use EC2 CLI to create a bucket because it does not have the functionality to interact with S3. 10. (If you intend to use load balancing) Understand how ELBs are deployed in AWS. Refer to AWS documentation for details: http://docs.aws.amazon.com/elasticloadbalancing/latest/developerguide/elastic-load-balancing.html

SGOS on AWS Deployment Guide 11 Step 2: Import and Register an AMI This section describes the CLI commands, and required parameters, you use to import and register an AMI. Refer to the instructions for your preferred CLI tools either EC2 or AWS. Complete the "Step 1: Complete Prerequisite Tasks" on page 8 before proceeding. Import and Register Using EC2 CLI 1. Import the SGOS VHD file into AWS: $ ec2-import-volume disk_image -f disk_image_format -s volume_size_in_gb -z region -b bucket_name -o owner_access_key_id -w owner_secret_key Example: $ ec2-import-volume ProxySG_SWG_AWS_193348.vhd -f vhd -s 8 -z us-east-1a -b proxysg-images -o access_key_id -w secret_key In the CLI output, confirm that the import was successful. Note the import volume task ID, which is in the format import-vol-alphanumeric_string. 2. Verify the status of the import: $ ec2-describe-conversion-tasks import_volume_task_id Example: $ ec2-describe-conversion-tasks import-vol-ffob6lad In the CLI output, confirm that the VHD import was successful and that the disk image properties you specified are correct. Note the VolumeId value. 3. (If necessary) For any properties that were specified incorrectly, remove the volume using the VolumeId: $ ec2-delete-volume volume_id Example: $ ec2-delete-volume vol-18d64fb Repeat step 1 to re-import the VHD. 4. Create a snapshot of the volume using the VolumeId: $ ec2-create-snapshot volume_id Example: $ ec2-create-snapshot vol-18d64fb In the CLI output, note the snapshot ID, which is in the format snap-alphanumeric_string.

12 SGOS on AWS Deployment Guide 5. Verify that the snapshot creation is complete using the snapshot ID: $ ec2-describe-snapshots snapshot_id Example: $ ec2-describe-snapshots snap-62af4d7b If the snapshot creation is still in progress, it shows a progress of 0%. When the snapshot is complete, the output shows a completed status and 100%. 6. Register the snapshot you created using the snapshot ID: $ ec2-register -n AMI_name -s snapshot_id -a x86_64 -d " AMI_description " -- virtualization-type hvm Example: $ ec2-register -n MyImportedSGOSVHD -s snap-62af4d7b -a x86_64 -d "CLI Imported SGOS AMI" --virtualization-type hvm Import and Register Using AWS CLI 1. Upload the SGOS VHD file to the appropriate S3 bucket: $ aws s3 cp local_path_to_vhd S3_URI Example: $ aws s3 cp C://My_VHDs/ProxySG_SWG_AWS_193348.vhd s3://proxysg-image 2. After the upload is complete, create a snapshot of the VHD file specifying the S3 bucket and VHD file from the previous step: $ aws ec2 import-snapshot --description "ProxySG Snapshot Import" --disk-container "{ \"Description\":\"Description\", \"UserBucket\":{ \"S3Bucket\":\"S3_bucket\", \"S3Key\":\"VHD_name\" } }" Example: $ aws ec2 import-snapshot --description "ProxySG Snapshot Import" --disk-container "{ \"Description\":\"ProxySG Snapshot Import Task\", \"UserBucket\":{ \"S3Bucket\":\"proxysg-images\", \"S3Key\":\"ProxySG_SWG_AWS_193348.vhd\" } }" JSON output such as the following indicates successful snapshot creation: { "SnapshotTaskDetail": { "Status": "active", "Description": "ProxySG Snapshot Import", "DiskImageSize": 0.0,

SGOS on AWS Deployment Guide 13 "Progress": "3", "UserBucket": { "S3Bucket": "proxysg-images", "S3Key": "ProxySG_SWG_AWS_193348.vhd" }, "StatusMessage": "pending" }, "Description": "ProxySG Snapshot Import", "ImportTaskId": "import-snap-fgxcnc3v" } Wait for the snapshot to be created. To view its progress, use the describe-import-snapshot-tasks command: $ aws ec2 describe-import-snapshot-tasks --import-task-ids SNAPSHOT_IMPORT_TASK_ ID where SNAPSHOT_IMPORT_TASK_ID is the identifier that AWS uses to track the snapshot creation task; look for the ImportTaskId key in the output. In this example, the identifier is import-snap-fgxcnc3v. Example: $ aws ec2 describe-import-snapshot-tasks --import-task-ids import-snap-fgxcnc3v 3. Confirm that the snapshot is created. Look for the Status key in the output; it should read "completed", as in the following example: { "ImportSnapshotTasks": [ { "SnapshotTaskDetail": { "Status": "completed", "Description": "ProxySG Snapshot Import", "Format": "VHD", "DiskImageSize": 430756352.0, "SnapshotId": "snap-87af1b61", "UserBucket": { "S3Bucket": "proxysg-images", "S3Key": "ProxySG_SWG_AWS_193348.vhd"

14 SGOS on AWS Deployment Guide } ] } }, } "Description": "ProxySG Snapshot Import", "ImportTaskId": "import-snap-fgxcnc3v" 4. Register the snapshot as the AMI you will use to launch EC2 instances: $ aws ec2 register-image --name "AMI_NAME" --description "VHD_NAME" --architecture x86_64 --root-device-name "/dev/sda1" --virtualization-type hvm --block-devicemappings "[{\"DeviceName\": \"/dev/sda1\",\"ebs\":{\"snapshotid\":\"snapshot_id \",\"VolumeSize\":100,\"DeleteOnTermination\":true,\"VolumeType\":\"io1\",\"Iops\" :300}}]" where AMI_NAME is the AMI name. Create user-friendly, memorable AMI names to help identify the AMI if you use the AWS web console to launch your EC2 instances. Example: $ aws ec2 register-image --name "Lab_1" --description "ProxySG_SWG_AWS_193348.vhd" --architecture x86_64 --root-device-name "/dev/sda1" --virtualization-type hvm -- block-device-mappings "[{\"DeviceName\": \"/dev/sda1\",\"ebs\": {\"SnapshotId\":\"snap- 87af1b61\",\"VolumeSize\":100,\"DeleteOnTermination\":true,\"VolumeType\":\"io1\", \"Iops\":300}}]" The block device mappings specify the default EBS volume to be used as the root volume. You can change the volume type when you create and launch the EC2 instance. When the snapshot is registered successfully, the CLI returns the AMI identifier: { "ImageId": "ami-8ba466e6" }

SGOS on AWS Deployment Guide 15 Step 3: Deploy the Instance After you import and register the AMI, deploy the instance through the AWS Management Console. To complete this step, you require the user data file. 1. Log in to the AWS Management Console: a. Open a web browser window/tab. b. Go to the following URL: https://console.aws.amazon.com. The browser displays the AWS Management Console. 2. In the AWS Management Console, select Services > EC2. The browser displays the EC2 Dashboard. 3. In the Create Instance section, click Launch Instance. The browser opens a wizard to guide you through the import process. 4. On the left menu on the EC2 dashboard, select My AMIs. a. Step 1: Select the AMI and click Select. b. Step 2: Choose a supported instance type: t2.large m4.large (recommended) t2.medium c4.large Refer to"appendix A: Supported Configurations" on page 28 for more information. Click Next: Configure Instance Details. c. Step 3: (Optional) Specify networks/subnets in your AWS region and assign the instance to a placement group. (Required) Expand the Advanced Details section. Beside User data, select As file. Browse to the location where you saved the user data file that you created and select it. Do not select Input is already base64 encoded. Click Next: Add Storage. d. Step 4: Specify storage settings:

16 SGOS on AWS Deployment Guide For the default Root volume, specify a single EBS volume 100 GiB in size. For Volume Type, select Magnetic or Provisioned IOPS SSD (I01) for Volume Type. Symantec recommends that if you select Provisioned IOPS, set the IOPS to 300. Click Next: Tag Instance. e. Step 5: If a keypair is not already set up, add one. The wizard will prompt you to specify a keypair when you launch the instance. Click Next: Configure Security Group. f. Step 6: Create a new security group or select an existing one. Security groups allow you to control the inbound connections to, and outbound connections from, your EC2 instance. Click Review and Launch. g. Step 7: Review the instance settings. Make corrections as needed. 5. Launch the instance using your preferred method: In the Management Console: a. Click Launch to launch the instance. b. When prompted, select the appropriate keypair, accept the acknowledgment, and click Launch Instance. The browser displays the Launch Status page. Using EC2 CLI: Issue the ec2-run-instances command. For details, refer to http://docs.aws.amazon.com/awsec2/latest/commandlinereference/ec2-clt.pdf. Using AWS CLI: Issue the aws ec2 run-instances command. For details, refer to http://docs.aws.amazon.com/cli/latest/reference/ec2/run-instances.html. 6. In the "Your instances are now launching" message box, click the link to the instance. The browser displays the Instances page. 7. Under Instance State, look for a status icon and an indication of the number of checks passed. If the instance launched successfully, you should see a green icon and "2/2 checks passed". If fewer than two checks passed (as follows), refer to the tabs at the bottom of the page. Click Status Checks to determine which check(s) failed, and troubleshoot the problem(s) as suggested. In the following example, the Instance Status Checks report a failure and provide a link for troubleshooting.

SGOS on AWS Deployment Guide 17 8. Repeat the previous steps as needed to set up additional instances. You might want to set up a load balancer for multiple instances. Do so after you have verified the connectivity and license validity for all instances. For ELB setup instructions, see "Step 7: (Optional) Configure Load Balancing" on page 21.

18 SGOS on AWS Deployment Guide Step 4: Verify the Instance After you create the instance, verify that you can access it through SSH and the ProxySG Management Console. To complete this step, you require the private key (PEM file) and/or the login credentials that you used to generate the user data file. 1. On the EC2 Dashboard, select Instances > Instances. Locate the instance. 2. Make sure that the Instance State says "running" and that Status Checks says "2/2 checks passed". If fewer than two checks passed, refer to the Status Checks tab to determine which check(s) failed, and troubleshoot the problem(s) as suggested. 3. Select the instance, right-click, and click Connect. Connect to the instance using a standalone SSH client, such as PuTTY. Follow the instructions on the dialog: 4. Access the ProxySG Management Console using the instance's AWS-assigned private IP or public IP address (depending on your security group settings) and your login credentials. With the instance selected, click the Description tab to determine the AWS-assigned network settings.

SGOS on AWS Deployment Guide 19 Step 5: Install the License After you verify that you can access the instance, install and verify your license. The SGOS on AWS license contains data that is used to uniquely identify the virtual appliance. 1. In the ProxySG Management Console, select Maintenance > Licensing > Install. 2. Click Retrieve. The console displays a dialog. 3. In the dialog: a. Enter your MySymantec credentials. b. Click Request License. The console displays a Confirm License Install dialog. c. Click OK to begin license retrieval. 4. (Optional) Click Show results to verify a successful retrieval. If any errors occur, verify that you are connected to the Internet. 5. Click Close. Verify that there are no license errors. If the license is invalid, select the instance in the EC2 Dashboard and look at the Description tab. If the selected instance type is not one that SGOS on AWS supports, perform step 5 of "Make sure that a supported instance type is selected." on page 26 ("Troubleshoot SGOS on AWS" on page 25, Troubleshoot Licensing Errors section). See "Appendix A: Supported Configurations" on page 28 to determine the supported instance types. After you validate the license installation, you do not have to reboot or shut down the appliance.

20 SGOS on AWS Deployment Guide Step 6: Disassociate User Data from the Instance After you verify that the instance boots successfully, Symantec recommends that you dissociate the user data from it. Doing so allows you to change your console username, console password, and enable password using standard methods through the SGOS Management Console and CLI commands and these changes persist after instance restarts. 1. Stop the instance. In the Instances list, select an instance and right click. On the menu, select Instance State > Stop. 2. Verify the instance state. In the Instance State column, look for a red icon and the status "stopped". 3. Select the instance again and right click. On the menu, select Instance Settings > View/Change User Data. On the dialog that appears, replace the contents of the User Data field with two sets of quotation marks, as follows: "" Deleting the contents of the User Data field does not disassociate user data from the instance; it only reverts to the user data that was associated with the instance when it was first launched. 4. Click Save to save your changes. 5. Restart the instance. Select the instance again and right click. On the menu, select Instance State > Start. For details on changing user data, refer to AWS documentation: http://- docs.aws.amazon.com/awsec2/latest/userguide/ec2-instance-metadata.html#instancedata-add-user-data For details on changing usernames and passwords in SGOS, refer to the SGOS Administration Guide and the Command Line Interface Referenceat MySymantec: https://support.symantec.com/content/unifiedweb/en_us/documentation.html?prodrefkey=1145522

SGOS on AWS Deployment Guide 21 Step 7: (Optional) Configure Load Balancing This section assumes an understanding of AWS ELBs. Refer to AWS documentation for details: http://docs.aws.amazon.com/elasticloadbalancing/latest/developerguide/elastic-load-balancing.html To deploy an AWS ELB in front of multiple SGOS instances: 1. In the AWS Management Console, select Load Balancing > Load Balancers. 2. Click Create Load Balancer. The console displays a setup wizard. Specify the following: a. Step 1: Define Load Balancer - Enter the appropriate details. For listener configuration, see "Configure a Listener" below. b. Step 2: Assign Security Groups - This is an optional step; specify groups as required for your deployment. c. Step 3: Configure Security Settings - Skip this step; it is not applicable in this release. d. Step 4: Configure Health Check - Enter the appropriate details. See "Configure Health Checks" on the next page. e. Step 5: Add EC2 Instances - Select the instances for the load balancer. f. Step 6: Add Tags - This is an optional step; add tags as needed for your deployment. g. Step 7: Review - Review the load balancer settings. Make any required changes, and then click Create to create the load balancer. Configure a Listener You can configure an ELB to perform layer 4 load balancing and pass traffic through to the SGOS instances. Specify the protocol and port on which the instances are configured to intercept traffic. For example, if you enabled explicit interception on port 8080, use the following settings: Load Balancer Protocol: TCP Load Balancer Port: 8080 (same as instance port) Instance Protocol: TCP; this is automatically selected when you specify TCP for the load balancer protocol Instance Port: 8080

22 SGOS on AWS Deployment Guide Configure Health Checks For the ELB to monitor the health of the SGOS instances, configure it to TCP ping a socket to which the instances respond. The Instance Port that is configured for Load Balancer listener can serve as this listening socket. The example in "Configure a Listener" on the previous page uses TCP port 8080 for the load balancing listener; thus, in this case, use the following settings: Ping Protocol: TCP Ping Port: 8080 You do not have to change the default settings under Advanced Details.

SGOS on AWS Deployment Guide 23 Back up and Restore an Instance of SGOS In case you need to revert or restore your SGOS instance to an earlier state, you should create a snapshot of your SGOS instance. When you create a snapshot in an AWS environment, the AWS environment saves the snapshot to S3, which backs up the contents of your Amazon Elastic Book Store (EBS) volume. Snapshots are incremental; that is, subsequent snapshots include only contents that differ from previous snapshots. Create a Snapshot to Back up Your SGOS Instance This section provides steps for creating a snapshot of your SGOS instance using your AWS console or preferred CLI tool. To create a snapshot of your SGOS instance from your AWS console: 1. In the EC2 Dashboard, under Elastic Block Store, select Snapshots. 2. Click Create Snapshot. 3. In the Create Snapshot dialog: a. Select the volume for which you want to create the snapshot b. Enter a name and description for the snapshot. c. Click Create. To create a snapshot using your preferred CLI tool: In the EC2 CLI: ec2-create-snapshot For details, refer to http://docs.aws.amazon.com/awsec2/latest/commandlinereference/ec2-clt.pdf. In the AWS CLI: create-snapshot For details, refer to http://docs.aws.amazon.com/awsec2/latest/userguide/ebs-creating-snapshot.html. Using AWS Tools for Windows PowerShell: New-EC2Snapshot For details, refer to http://docs.aws.amazon.com/powershell/latest/reference/items/amazon_elastic_compute_ Cloud_cmdlets.html. Restore an Instance of SGOS from a Snapshot This section provides the steps for reverting or restoring an instance from a snapshot using your AWS console or preferred CLI tool. To revert or restore an instance: 1. Create an AMI from a snapshot of an SGOS instance. 2. Deploy the newly registered AMI. Create an AMI from a Snapshot of an SGOS Instance This section provides steps for creating an AMI from a snapshot using your AWS console or preferred CLI tool.

24 SGOS on AWS Deployment Guide To create an AMI from a snapshot from your AWS console: 1. In the EC2 Dashboard, under Elastic Block Store, click Snapshots. 2. In the list of snapshots, select the snapshot you want to create an AMI from. 3. Click Actions > Create Image. 4. In the Create Image from EBS Snapshot dialog, enter information in the following fields: a. Architecture: Select x86_64 for 64-bit. b. Root device name: Enter the name for the root volume. c. RAM disk ID: Use the default. d. Virtualization: Select Hardware-assisted virtualization. e. Kernel ID: Use the default. f. (Optional) Block Device Mappings: You can add new volumes or expand the size of the root volume for your AMI. 5. Click Create. To create an AMI from a snapshot using your preferred CLI tool: In the EC2 CLI: ec2-create-image For details, refer to http://docs.aws.amazon.com/awsec2/latest/commandlinereference/ec2-clt.pdf. In the AWS CLI: create-image For details, refer to http://docs.aws.amazon.com/cli/latest/reference/ec2/create-image.html. Using AWS Tools for Windows PowerShell: New-EC2Image For details, refer to http://docs.aws.amazon.com/powershell/latest/reference/items/new-ec2image.html. Deploy the Newly Registered AMI You deploy snapshots the same way that you deploy new instances. For the full steps on deploying an instance, see "Step 3: Deploy the Instance " on page 15.

SGOS on AWS Deployment Guide 25 Troubleshoot SGOS on AWS If you experience errors or issues using SGOS on AWS, and have already checked the SGOS Release Notes, refer to the following troubleshooting steps. General Troubleshooting Steps Possible Troubleshooting Step Monitor instance health checks. Take screenshots of the instance console. Details Look for problems under Status Checks: 1. In the EC2 Dashboard, under Instances, select Instances. The page displays all instances. 2. For the instance you are troubleshooting, under Instance State, look for a status icon and an indication of the number of checks passed. If there are no issues, you should see a green icon and "2/2 checks passed". 3. If fewer than two checks passed, refer to the tabs at the bottom of the Instances page for details. Click Status Checks to determine which check(s) failed, and troubleshoot the problem(s) as suggested. AWS does not provide serial or VGA access to instances, but it allows you to generate console screenshots. To help diagnose issues, you can take these screenshots at any time while the instance is running. 1. In the EC2 Dashboard, under Instances, select Instances. The page displays all instances. 2. Select the instance and right click. 3. On the menu, select Instance Settings > Get Instance Screenshot. The browser opens a new page with a static image of the console. 4. While troubleshooting, you can: Click Refresh to generate newer console screenshots. Right click and save screenshot images to save the information.

26 SGOS on AWS Deployment Guide Possible Troubleshooting Step Check the AWS security group settings and group membership for the affected instance. Details Security group settings should allow communication with Symantec servers, including the licensing server. Refer to AWS documentation for details on security groups. Change security group membership: 1. In the EC2 Dashboard, under Instances, select Instances. The page displays all instances. 2. Select the instance and right click. 3. On the menu, select Networking > Change Security Groups. 4. On the dialog that appears,select or clear security groups as needed. 5. Click Assign Security Groups. Edit security group settings: 1. In the EC2 Dashboard, under Network & Security, select Security Groups. 2. Select the security group, right click, and select Edit inbound rules or Edit outbound rules. 3. On the dialog that appears, add, remove, or configure rules as needed. 4. Click Save. Troubleshoot Licensing Errors Possible Troubleshooting Step Make sure that a supported instance type is selected. Details See "Appendix A: Supported Configurations" on page 28 to determine supported instance types. Then, verify that a supported instance type is selected: 1. In the EC2 Dashboard, under Instances, select Instances. The page displays all instances. 2. Select the instance and right click. 3. On the menu, select Instance Settings> Change Instance Type. 4. On the dialog that appears, make sure that a supported instance type is selected. 5. If the selected instance type is not one that SGOS on AWS supports: a. Stop the instance. In the Instances list, select an instance and right click. On the menu, select Instance State > Stop. b. Verify the instance state. In the Instance State column, look for a red icon and the status "stopped". c. Select the instance and right click. On the menu, select Settings > Change Instance Type. d. On the dialog, select a supported type. e. Click Apply to save your changes. f. Restart the instance. Select the instance again and right click. On the menu, select Instance State > Start.

SGOS on AWS Deployment Guide 27 Possible Troubleshooting Step Check the AWS security group settings and group membership for the affected instance. Details Security group settings should allow communication with Symantec servers, including the licensing server. Refer to AWS documentation for details on security groups. Change security group membership: 1. In the EC2 Dashboard, under Instances, select Instances. The page displays all instances. 2. Select the instance and right click. 3. On the menu, select Networking > Change Security Groups. 4. On the dialog that appears,select or clear security groups as needed. 5. Click Assign Security Groups. Edit security group settings: 1. In the EC2 Dashboard, under Network & Security, select Security Groups. 2. Select the security group, right click, and select Edit inbound rules or Edit outbound rules. 3. On the dialog that appears, add, remove, or configure rules as needed. 4. Click Save. Troubleshoot Credentials Errors Possible Troubleshooting Step Apply new user data. Change instance user data. Details If problems arise from lost credentials: 1. Disassociate user data. See "Step 6: Disassociate User Data from the Instance" on page 20. 2. While the instance is stopped, generate new user data. See step 7 in "Step 1: Complete Prerequisite Tasks" on page 8. 3. Select the instance again and right click. On the menu, select Instance Settings > View/Change User Data. Copy and paste the user data into the User Data field on the dialog that appears, and then click Save. 4. Restart the instance. Select the instance again and right click. On the menu, select Instance State > Start. If problems arise from compromised credentials: 1. Verify that no user data is associated with the instance. See "Step 6: Disassociate User Data from the Instance" on page 20. 2. Log in to the instance through SSH. 3. Issue the appropriate CLI commands to change the passwords. See the commands listed in the "AWS User Data" on page 30 section in "Appendix B: Metadata and User Data Reference" on page 29.

28 SGOS on AWS Deployment Guide Appendix A: Supported Configurations SGOS on AWS supports the following configurations. Configuration Settings Instance Type Supported Values SGOS on AWS supports the following instance types: t2.large m4.large (recommended) t2.medium c4.large Symantec recommends that you use the m4.large type for the best price-to-performance ratio. Using unsupported instance types is not recommended and could result in error messages and other unintended behavior. Depending on the AWS EC2 Instance Type and virtual appliance model you use, the ProxySG appliance's licensing health status might indicate a Warning. In addition, the Configured Memory statistic (in the Management Console, select Maintenance > Health Monitoring > Licensing) displays a notification that the appliance has under-provisioned memory. This is expected behavior and means that the configured virtual memory is lower than the 8 GB allowed by the license. Under-provisioned memory reduces the maximum number of connections, but it does not invalidate the license. Storage Settings Network Settings Refer to AWS documentation for more information on instance types, including virtual memory specifications: https://aws.amazon.com/ec2/instance-types/ For the default Root volume, specify a single EBS volume 100 GiB in size. For Volume Type, select Magnetic or Provisioned IOPS SSD (I01) for Volume Type. Symantec recommends that if you select Provisioned IOPS, set the IOPS to 300. Refer to AWS documentation for more information on volume types: http://- docs.aws.amazon.com/awsec2/latest/userguide/ebsvolumetypes.html You can specify multiple network interfaces if needed; however, at least one interface must have a public IP address. Symantec recommends a single network interface for both management and traffic.

SGOS on AWS Deployment Guide 29 Appendix B: Metadata and User Data Reference This section describes metadata and user data in AWS. AWS Metadata In AWS, each instance has access to metadata provided by the AWS infrastructure. Instance metadata is used to configure the running instance, such as some network settings. Because there is no serial console or VGA console access available for you to manually complete the initial configuration (as you would for a SWG VA, for example), the SGOS on AWS instance uses the metadata fields described in this section to configure itself. For details, see AWS documentation at http://docs.aws.amazon.com/awsec2/latest/userguide/ec2-instancemetadata.html. Data Description Metadata Version Introduced instance-id The ID of this instance. 1.0 instance-type The type of instance. 2007-08-29 public-keys/0/openssh-key Public key. Only available if supplied at instance launch time. Used to install as an authorized key for the default console username. network/interfaces/macs/mac/subnetid network/interfaces/macs/mac/vpcipv4-cidr-block The ID of the subnet in which the interface resides. Returned only for instances launched into a VPC. The subnet ID is used as a label applied to the network device. The CIDR block of the subnet in which the interface resides. Returned only for instances launched into a VPC. Used to calculate the primary DNS server of the instance. 1.0 2011-01-01 2011-01-01

30 SGOS on AWS Deployment Guide Data Description Metadata Version Introduced network/interfaces/macs/mac/subnetipv4-cidr-block network/interfaces/macs/mac/localipv4s The CIDR block of the subnet in which the interface resides. Returned only for instances launched into a VPC. Used to calculate the default gateway of the instance. The private IP addresses associated with the interface. Used to apply all IP address associated to the instance. 2011-01-01 2011-01-01 This metadata is reapplied to the virtual appliance at every restart; thus, avoid making changes using the following CLI commands because any changes you make are not permanent: CLI Command #(config) dns-forwarding edit primary Do not use this command because... Primary DNS servers for the proxy have already been configured by instance metadata. Specify additional DNS servers by editing the "alternate" group. #(config) ip-default-gateway Default gateway for the proxy has already been configured by instance metadata. #(config) interface adapter_ number:interface_number #(config) wccp If required, configure additional static routes. Default settings for the network adapters have already been configured by instance metadata. AWS does not support WCCP. AWS User Data User data is required during the first boot of the SGOS instance in AWS. User data is a JSON blob that allows the instance to self-configure parameters required to initialize the instance. Generate the user data at the MySymantec website: https://support.symantec.com/content/unifiedweb/en_us/keygenerator.html. The following is an example of the output: {"ICW_Params":{"BC_SerialNumber":"9999999999","BC_AdminUsername":"admin","BC_ConsolePassword":"$2a$12$UjBY3DkcED02Nn96w3l0qupscB81gyLorl8NnJWL84mhRVdmkd2r6","BC_ EnablePassword":"$2a$12$8l4GTA2N59F3NM52EmGc1uPhtZEORvXjJJXqu9XS.yw2Eka0FFnLu"}} Refer to the following descriptions of the user data fields:

SGOS on AWS Deployment Guide 31 Field BC_SerialNumber BC_AdminUsername BC_ConsolePassword BC_EnablePassword Description The serial number associated with the VM. The user name of the console user. A bcrypt hash of the console user's password. A bcrypt hash of the enable password. This user data is reapplied to the virtual appliance at every restart. If user data is associated with the instance, avoid making changes using the following CLI commands because any changes you make are not permanent: #(config) security enable-password password #(config) security hashed-enable-password hashed_password #(config) security password password #(config) security password hashed-password hashed_password #(config) security username name AWS User Data Security Instance user data can contain sensitive information and should not be shared. To prevent accidental exposure of the data, the proxy automatically installs the following policy when detects it is running in AWS: <Proxy> url.address=169.254.169.254 FORCE_DENY This policy is designed to prevent accidental exposure of instance user data and cannot be disabled.