Mykonos Web Security 4.5.1 User Guide

Mykonos Web Security 4.5.1 User Guide

Mykonos Web Security 4.5.1 User Guide Mykonos Web Security 4.5.1 User Guide This guide provides an overview of the Mykonos Web Security system, explains its functions, and includes directions for deploying and configuring the appliance for use in a network. It also outlines how to properly use the software included. Other Documentation Formats viii 1. Introduction 1 1.1. Overview ................................................................................................................................. 1 1.1.1. Summary ...................................................................................................................... 1 1.1.2. Why is it Unique as a Security Product? ........................................................................ 1 1.1.3. What Does the Software Do? ........................................................................................ 1 1.1.4. What traffic does it inspect? .......................................................................................... 2 1.1.5. How is it managed? ...................................................................................................... 2 1.2. Major Components .................................................................................................................. 2 1.3. Features ................................................................................................................................. 3 1.4. Support ................................................................................................................................... 3 2. Deployment Overview 4 2.1. Appliance Network Placement .................................................................................................. 4 2.1.1. Between Firewall and Web Servers ............................................................................... 4 2.2. Options for Load-Balanced Environments ................................................................................. 5 2.3. SSL Traffic Consideration ........................................................................................................ 5 2.4. Limitations ............................................................................................................................... 6 2.5. Hardware Requirements for Mykonos ....................................................................................... 6 3. Appliance Installation 7 3.1. Mykonos Terminology .............................................................................................................. 7 3.2. Initial Setup ............................................................................................................................. 7 3.2.1. Changing the Password ................................................................................................ 8 3.3. First Time Configuration ........................................................................................................... 8 3.4. TUI Steps ............................................................................................................................... 8 3.4.1. Network Configuration ................................................................................................... 8 3.5. Licensing ............................................................................................................................... 15 3.6. Creating a Test Configuration ................................................................................................. 16 3.6.1. Initial Configuration and Testing ................................................................................... 17 3.6.2. Larger-Scale Testing ................................................................................................... 17 4. Configuring Mykonos Web Security 18 4.1. Configuration Wizard .............................................................................................................. 18 4.1.1. Wizard: Backend Servers ............................................................................................ 19 4.1.2. Wizard: Backend Server Configuration ......................................................................... 19 4.1.3. Wizard: SMTP Servers ................................................................................................ 20 4.1.4. Wizard: Alert Service .................................................................................................. 21 4.1.5. Wizard: Backup Service .............................................................................................. 21 4.1.6. Wizard: Alerts via SNMP ............................................................................................. 22 4.1.7. Wizard: Alerts via email ............................................................................................... 23 4.1.8. Wizard: Confirmation Page .......................................................................................... 24 4.2. Verify the Installation .............................................................................................................. 25 4.3. Health Check URL ................................................................................................................. 25 4.4. What's Next? ......................................................................................................................... 25 4.5. Basic vs. Expert Configuration ................................................................................................ 26 4.5.1. Global Configuration .................................................................................................... 27 4.5.2. Services ..................................................................................................................... 28 4.5.3. Processor Configuration .............................................................................................. 28 4.5.4. Application Profiles ...................................................................................................... 29 4.6. Configuration Import / Export .................................................................................................. 31 4.7. Configuring SSL .................................................................................................................... 32 iii 4.7.1. Enabling SSL to the Client .......................................................................................... 32 4.7.2. Enabling SSL to the backend ...................................................................................... 32 4.8. Clustering .............................................................................................................................. 32 4.8.1. Node Types ................................................................................................................ 33 4.8.2. Setting up Clustering ................................................................................................... 33 4.8.3. Updating the Cluster ................................................................................................... 37 4.9. High Availability ..................................................................................................................... 37 4.9.1. Configuring HA ........................................................................................................... 38 4.9.2. Updating with HA ........................................................................................................ 41 5. Managing the Appliance 43 5.1. Restart/Shutdown .................................................................................................................. 43 5.2. System Updates .................................................................................................................... 43 5.3. System Statistics ................................................................................................................... 45 5.3.1. Master-Slave Mode ..................................................................................................... 49 5.4. Troubleshooting and Maintenance .......................................................................................... 49 5.4.1. Managing Services ...................................................................................................... 49 5.4.2. Viewing Logs .............................................................................................................. 51 5.5. Backup and Recovery ............................................................................................................ 52 5.5.1. Restoring System Configuration from Backup ............................................................... 53 5.5.2. Backing up and Restoring Console Data ...................................................................... 54 6. Processor Reference 56 6.1. Complexity Definitions ............................................................................................................ 56 6.2. Security Processors ............................................................................................................... 57 6.3. Honeypot Processors ............................................................................................................. 57 6.3.1. Access Policy Processor ............................................................................................. 57 6.3.2. Ajax Processor ..........................................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    410 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us