Installation of RHEL 5 for Tenable SecurityCenter Evaluation

Similar documents
Tenable Hardware Appliance Upgrade Guide

July 18, (Revision 3)

Clearswift SECURE Gateway Installation & Getting Started Guide. Version 4.3 Document Revision 1.0

NetXplorer. Installation Guide. Centralized NetEnforcer Management Software P/N D R3

Red Hat Operating System Installation Tips

Clearswift SECURE Gateway Installation & Getting Started Guide. Version Document Revision 1.0

Installation & Getting Started Guide. Version Document Revision 1.0

Log Correlation Engine 4.0 High Performance Configuration Guide

HySecure Quick Start Guide. HySecure 5.0

Clearswift SECURE Gateway Installation & Getting Started Guide. Version Document Revision 1.0

RHEL 5 Essentials. Red Hat Enterprise Linux 5 Essentials

Log Correlation Engine 4.0 Statistics Daemon Guide. August 13, 2012 (Revision 1)

NEC ESMPRO Agent Extension Installation Guide

Cisco Business Edition 6000 Installation Guide, Release 10.0(1)

Notes for Installing RedHawk Linux 7.0 with Red Hat Enterprise Linux 7.0. Installation Notes. March 22 nd, 2015

How-to Guide: Tenable Nessus for Microsoft Azure. Last Updated: April 03, 2018

Tenable Network Security Support Portal. November 9, 2010 (Revision 8)

Log Correlation Engine 4.2 Quick Start Guide. September 4, 2014 (Revision 3)

How-to Guide: Tenable.io for Microsoft Azure. Last Updated: November 16, 2018

SkyPilot OS Installation: Fedora Core 5

SecurityCenter 5.1 Upgrade Guide. November 12, 2015 (Revision 2)

Installation of OEL5.4 in windows machine (64 bit)

NEC ESMPRO Agent Extension

SecurityCenter Upgrade Guide. July 21, 2015 (Revision 1)

Clearswift SECURE ICAP Gateway Installation & Getting Started Guide. Version Document Revision 1.0

Installing the Cisco Unified MeetingPlace Web Server Software

Installation & Getting Started Guide. Version Document Revision 1.0

Clearswift SECURE Gateway Installation & Getting Started Guide. Version Document Revision 1.0

1) Use either Chrome of Firefox to access the VMware vsphere web Client.

SecurityCenter 4.8.x Upgrade Guide. December 16, 2014 (Revision 1)

SECURE Gateway with Microsoft Azure Installation Guide. Version Document Revision 1.0

SecurityCenter 5.5.x User Guide. Last Revised: June 19, 2018

How-to Guide: Tenable Nessus for BeyondTrust. Last Revised: November 13, 2018

SecurityCenter 5.0 SCAP Assessments. May 28, 2015 (Revision 2)

Clearswift Gateway Installation & Getting Started Guide. Version 4.1 Document Revision 1.4

Redhat OpenStack 5.0 and PLUMgrid OpenStack Networking Suite 2.0 Installation Hands-on lab guide

SANS Institute - Operations Essentials. Operating System Installation Guidelines. Windows XP Professional Installation. Creating Boot Disks

INSTALLING INSTALLING INSTALLING

How to Use This Lab Manual

INSTALLING INSTALLING INSTALLING

Red Hat Network Satellite 5.0.0: Virtualization Step by Step

Clearswift SECURE Gateway Installation & Getting Started Guide. Version Document Revision 1.0

INSTALLING INSTALLING INSTALLING

Tenable Common Criteria Evaluated Configuration Guide. October 29, 2009 (Revision 4)

Tenable.io for Thycotic

Cisco Business Edition 6000 Installation Guide, Release 10.6

StoneGate SSL VPN Release Notes for Version 1.2.1

Installation & Getting Started Guide. Version Document Revision 1.0

Parallels Server 5 Bare Metal

Installation. Power on and initial setup. Before You Begin. Procedure

Dell EqualLogic Red Hat Enterprise Linux 6.2 Boot from SAN

StoneGate SSL VPN Release Notes for Version 1.2.0

Nessus 7.0 User Guide. Last Updated: February 05, 2018

Cisco UCS C-Series. Installation Guide

MediaSense Installation

Dell Statistica. Statistica Enterprise Server Installation Instructions

IBM Storage Configuration Manager Planning, Installation, and Configuration Guide

SUSE Cloud Admin Appliance Walk Through. You may download the SUSE Cloud Admin Appliance the following ways.

How-to Guide: Tenable.io for Lieberman. Last Revised: August 14, 2018

Nokia Intrusion Prevention with Sourcefire Appliance Quick Setup Guide. Sourcefire Sensor on Nokia v4.8

SecurityCenter 5.4 User Guide. Last Revised: December 01, 2017

TECHILA WORKER INSTALLATION GUIDE LINUX ADMINISTRATOR GUIDE

Enterprise License Manager User Guide, Release 9.1(1)

Plexxi HCN Plexxi Connect Installation, Upgrade and Administration Guide Release 3.0.0

Deploying Cisco UCS Central

HPE VMware ESXi and vsphere 5.x, 6.x and Updates Getting Started Guide

Smart Call Home Deploying thetransport Gateway on Cisco Unified Computing System and Red Hat Linux

CompTIA Linux+ Guide to Linux Certification Fourth Edition. Chapter 2 Linux Installation and Usage

The following table lists the supported upgrade paths to Cisco Finesse Release 11.5(1).

Recovery Guide for Cisco Digital Media Suite 5.4 Appliances

Installation of Cisco HCM-F

Clearswift SECURE Exchange Gateway Installation & Getting Started Guide. Version Document Revision 1.0

Plexxi Control Installation, Upgrade and Administration Guide Release 3.2.0

Videoscape Distribution Suite Software Installation Guide

Installing SmartSense on HDP

Parallels Server 4.0 for Mac Bare Metal Edition

System Manager Unit (SMU) Hardware Reference

SonicWall Security 9.0.6

Rapid Recovery License Portal Version User Guide

HP VMware ESXi and vsphere 5.x and Updates Getting Started Guide

AsteriskNow IPTables Firewall Configuration

QuickStart Guide for Managing Computers. Version

SonicWall SMA 8200v. Getting Started Guide

Veritas System Recovery 18 Linux Edition: Quick Installation Guide

HP StorageWorks Performance Advisor. Installation Guide. Version 1.7A

Cisco UCS Performance Manager Installation Guide

Cisco Business Edition 7000 Installation Guide, Release 11.5

Collaboration Management Suite. Installation manual

Installing Enterprise Switch Manager

QuickStart Guide for Managing Computers. Version 9.73

GB-Ware. Quick Guide. Powered by: Tel: Fax Web:

Installation Guide. Scyld ClusterWare Release g0000. December 18, 2013

Virtual Appliance User s Guide

INSTALLING INSTALLING INSTALLING

VMware vsphere 5.5: Install, Configure, Manage Lab Addendum. Lab 3: Configuring VMware ESXi

KYOCERA Net Admin Installation Guide

Installing Cisco StadiumVision Director Software from a DVD

Nokia Intrusion Prevention with Sourcefire. Appliance Quick Setup Guide

QuickStart Guide for Managing Computers. Version 9.32

Product Support Notice

Transcription:

Installation of RHEL 5 for Tenable SecurityCenter Evaluation These instructions are for the installation of Red Hat Enterprise Linux (RHEL) 5 in preparation for installing Tenable SecurityCenter 4.4 for evaluation purposes. They are not a replacement for Red Hat documentation and/or a skilled Red Hat professional to perform a production installation of Tenable Network Security software running on RHEL 5. Tenable Network Security provides these procedures as suggested procedures and does not warrant that the instructions are complete and/or correct. UNDER NO CIRCUMSTANCES WILL TENABLE BE LIABLE TO YOU OR ANY OTHER PERSON OR ENTITY FOR INDIRECT, INCIDENTAL, CONSEQUENTIAL, SPECIAL, EXEMPLARY OR PUNITIVE DAMAGES (INCLUDING LOST PROFITS, ANY DAMAGES RESULTING FROM LOSS OF DATA, SECURITY BREACH, PROPERTY DAMAGE, LOSS OF REVENUE, LOSS OF BUSINESS OR LOST SAVINGS), ARISING OUT OF OR IN CONNECTION WITH THESE INSTRUCTIONS, THE PERFORMANCE OF THE SOFTWARE OR TENABLE S PERFORMANCE OF SERVICES OR OF ANY OTHER OBLIGATIONS RELATING TO THESE INSTRUCTIONS, WHETHER OR NOT TENABLE HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. YOU ARE SOLELY RESPONSIBLE AND LIABLE FOR VERIFYING THE SECURITY, ACCURACY, AND ADEQUACY OF ANY OUTPUT FROM THE SOFTWARE, AND FOR ANY RELIANCE THEREON. The instructions are for installing on a 32-bit i386 networked or standalone host, with or without access to the Internet, that can be dedicated to an evaluation of SecurityCenter and whose single hard drive can be wiped clean by a new operating system installation. Please note that if the host does not have access to the Internet these instructions do not cover manually patching and updating RHEL 5 and your installation is unlikely to be up to date with the latest RHEL 5 software revisions. These instructions will also work on 64-bit x86_64 systems by simply changing references from i386 architecture to x86_64 architecture.

1. Install RHEL 5.x For the evaluation, you will need a licensed version of RHEL 5 so you can download and burn to DVD the bootable installation ISO image. While these instructions are written using a DVD installation, they can be completed with other installation methods. Please note that details for those potential methods are not described as part of this document. If your organization does not currently have a license for RHEL 5, you can obtain a 30-day trial of RHEL 5 from Red Hat. However, please note that a production release of Tenable s SecurityCenter 4.4 is only supported on a fully licensed, nontrial version of RHEL with Red Hat Network support and software updates or CentOS with the latest patches. To contact Red Hat about a 30 day trial version of RHEL 5 please visit: https://www.redhat.com/products/enterprise-linux/server/download.html When you receive an email from Red Hat about activating your trial version, please follow the instructions very carefully to activate your evaluation subscription and download a Red Hat solution. The registration number alone contained in the email is not enough to successfully install a 30-day trial version of RHEL 5. Please note that the registration number and your installation number for use during these installation instructions are not the same. The installation number can be retrieved by looking up your subscription data on Red Hat s website. When you are ready to download the ISO from the website downloads section choose Red Hat Enterprise Linux (v. 5 for 32-bit x86). If installing on a VMware virtual machine, do not use the Easy Install option provided when mounting the DVD ISO image, as it automatically installs additional unnecessary software. Instead choose I will install the operating system later and then choose Customize Hardware to edit the hardware settings and select the RHEL DVD ISO image. 2

1.1. Insert the RHEL 5 DVD into the DVD-ROM drive and power on the server. At the first installation screen press the Enter key to choose graphical mode. 1.2. You can choose to test the installation DVD before beginning installation or skip over the test (e.g., virtual installations from mounted ISO images) by clicking Skip. 3

1.3. Next, the RHEL 5 installer welcome screen is displayed. Click Next to proceed. 1.4. Choose the desired installation language and click Next. 4

1.5. Choose the desired keyboard layout and click Next. 1.6. Enter your installation number (not your registration number) and click OK. In the Red Hat web interface, this is listed as the subscription number. 5

1.7. Let the installer initialize the drive by clicking Yes. 1.8. Choose the defaults to Remove linux partitions on selected drives and create default layout and click Next. 6

1.9. Confirm the removal of all partitions by clicking Yes. 1.10. If this is a simple one NIC server using DHCP, ensure the network cable is plugged into the NIC and accept the defaults. Adjust the steps accordingly based on the available network settings and click Next. 7

1.11. Choose the correct region and click Next. 1.12. Set the root user password and click Next. 8

1.13. Ensure the options for Software Development and Web server are all not checked. Select Customize now. Click Next. 1.14. Ensure under Desktop Environments that the GNOME Desktop Environment and KDE Desktop Environments are not checked. Click on Applications. 9

1.15. Ensure under Applications that Editors is checked but that all other options are not checked. Click on Servers. 1.16. Ensure under Servers that all options are not checked including Printing Support. Click on Base System. 10

1.17. Ensure under Base System that only the Base option is selected. Click Next to continue. 1.18. When the installer has finished checking dependencies, click Next. 11

1.19. The installer will format the disk and install the required packages from the installation media. 1.20. At the successful installation confirmation screen take the media out of the DVD-ROM drive and then click Reboot. 12

1.21. Do not interfere with the system reboot. 1.22. If you chose the base software package during the customization of the RHEL 5 installation packages in step 1.17, then the Setup Agent menu will automatically appear near the end of the system reboot. 13

1.23. Choose to run the Firewall configuration tool. Please note that if you make a mistake following the next few steps, it is still possible to run the Firewall configuration tool after logging on as root and entering /usr/bin/system-configsecuritylevel-tui or /usr/bin/setup from the command line. It is very important that SELinux and the firewall are configured correctly before installing SecurityCenter. 1.24. Switch SELinux to Permissive from Enforcing and click Customize. Optionally, disable SELinux altogether when the evaluation system will be in a protected environment and intrusion logging is not required. 14

1.25. Ensure the firewall allows incoming SSH and Secure WWW (HTTPS). If Nessus will be used on this system, under Other Ports enter 8834:tcp. Click OK. 1.26. Confirm the firewall settings by clicking OK. 1.27. Click Exit. 15

1.28. The reboot will complete. Sign on to the RHEL 5 host as root using the password you set during the installation in step 1.12. 1.29. If your RHEL 5 host does not have a connection to the Internet please go to step 1.37. Register your RHEL 5 host with the Red Hat Network. Enter /usr/bin/rhn_register. 1.30. Ensure you have the login credentials to the Red Hat website for managing your RHEL subscriptions. Click Next. 16

1.31. Enter the Red Hat credentials to manage your subscriptions via their Web site and click Next. 1.32. Enter a profile name that you can remember and click Next. 17

1.33. Choose the default to include RPM packages installed on this system in System Profile and click Next. 1.34. Click on Next to send the profile information to the Red Hat Network. 18

1.35. Run yum y update to ensure all the installation packages are up to date on your RHEL 5 host. 1.36. Run yum to install the following packages: Java Development Kit package or JRE (java-1.6.0-openjdk.i386) LibXSLT (libxslt.i386) Libtool-ltdl Install the packages using the following syntax: yum install y java libxslt libtool-ltdl. The command will install the required packages and their dependencies without prompting for confirmation. Omit the -y from the command to review the packages to be installed. 1.37. If your RHEL 5 host is not connected to the Internet, you will need to download these packages and their dependencies from Red Hat s website. If you require assistance, please contact your Tenable Sales Engineer. Please ensure that NTP (Network Time Protocol) is configured properly and that the time is synchronized between this SecurityCenter and any hosts that it will be communicating with. 19

2. Install Nessus Obtain a copy of the current Nessus RPM for your platform and transfer the Nessus RPM file to the target server. 2.1. SSH to the server, log in as root, change directory to where the Nessus RPM file is located, and then enter the following command (change the command based on the version of Nessus): # rpm -ivh Nessus-5.X.X-es5.i386.rpm 2.2. Start the nessusd service with the command service nessusd start at the command prompt. 2.3. Using a web browser, navigate to https://<ipaddress>:8834 and complete the installation. When asked for the Plugin Feed Registration, enter SecurityCenter for the Activation Code. 3. Install SecurityCenter Obtain a copy of the current SecurityCenter RPM package for your platform and transfer the SecurityCenter RPM file to the target server. SSH to the server, log in as root, change directory to where the SecurityCenter RPM file is located, and then enter the following command (change the command based on the version of SecurityCenter): # rpm -ivh SecurityCenter-X.X.X-es5.i386.rpm After completion, access the SecurityCenter user interface via a secure browser session: https://<ipaddress> Please contact your Sales Engineer for license keys and provide the fully qualified hostname of your newly installed RHEL server as obtained by using the output of the hostname command. 20

About Tenable Network Security Tenable Network Security, the leader in Unified Security Monitoring, is the source of the Nessus vulnerability scanner and the creator of enterprise-class, agentless solutions for the continuous monitoring of vulnerabilities, configuration weaknesses, data leakage, log management, and compromise detection to help ensure network security and FDCC, FISMA, SANS CSIS, and PCI compliance. Tenable s award-winning products are utilized by many Global 2000 organizations and Government agencies to proactively minimize network risk. For more information, please visit http://www.tenable.com/. GLOBAL HEADQUARTERS Tenable Network Security 7021 Columbia Gateway Drive Suite 500 Columbia, MD 21046 410.872.0555 www.tenable.com Copyright 2013. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc. 21