Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
55 views21 pages

SIG Azure Install Guide (En)

The document is an installation guide for the Clearswift Secure ICAP Gateway version 5.7.0 on Microsoft Azure, detailing prerequisites, configuration steps for a virtual machine, and installation procedures. It includes information on setting up the VM, configuring network settings, and installing the software from Clearswift repositories. The guide is intended for administrators and covers essential steps for a successful installation on a cloud-hosted platform.

Uploaded by

itlabuse1234
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views21 pages

SIG Azure Install Guide (En)

The document is an installation guide for the Clearswift Secure ICAP Gateway version 5.7.0 on Microsoft Azure, detailing prerequisites, configuration steps for a virtual machine, and installation procedures. It includes information on setting up the VM, configuring network settings, and installing the software from Clearswift repositories. The guide is intended for administrators and covers essential steps for a successful installation on a cloud-hosted platform.

Uploaded by

itlabuse1234
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

Clearswift Secure ICAP Gateway

Version 5.7.0

Installation Guide
(on Microsoft Azure)
Copyright Terms and Conditions
Copyright © Fortra, LLC and its group of companies. All trademarks and registered
trademarks are the property of their respective owners.
The content in this document is protected by the Copyright Laws of the United
States of America and other countries worldwide. The unauthorized use and/or
duplication of this material without express and written permission from Fortra is
strictly prohibited. Excerpts and links may be used, provided that full and clear
credit is given to Fortra with appropriate and specific direction to the original
content.
202403270624
Contents
Copyright Terms and Conditions ii
Contents iii
1. About this guide 5
1.1 Who is this guide for? 5
2. Before installing 6
2.1 Types of installation 6
2.2 Prerequisites 6
Browser support 6
3. Configure a virtual machine using Microsoft Azure 7
3.1 Create the VM 7
3.2 Configure the basic settings 7
Project Details 7
Instance details 7
Administrator account 8
Inbound port rules 8
3.3 Configure the disk settings 8
Disk options 9
Data disks 9
3.4 Configure the networking settings 9
Network interface 9
Load balancing 10
3.5 Configure the additional settings 10
3.6 Review and create the VM 10
Generate new key pair 11
3.7 Configure public IP address and DNS name 11
3.8 Increase the disk size 11
3.9 Enlarge the OS partition 12
4. Install Clearswift Secure ICAP Gateway 15
4.1 Install from the Clearswift online repositories 15
4.2 Configure your Red Hat Enterprise Linux installation 16
Enable online repositories 16
Create administrator accounts 17
4.3 Configure Secure ICAP Gateway 18
4.4 Configure update repositories 18
4.5 How to change your network settings 18
5. Upgrade 20
Contact Fortra 21
Fortra Support Portal 21
1. About this guide
This guide provides information for administrators installing Clearswift Secure
ICAP Gateway onto a virtual machine. It covers the procedures and requirements
necessary for a full installation.

1.1 Who is this guide for?


This guide is intended for use by:
n Customers installing Clearswift Secure ICAP Gateway version 5.7.0 on the
Microsoft Azure platform.

-5-
2. Before installing
This section outlines prerequisites and considerations you need to make before
installing the cloud-hosted Secure ICAP Gateway.
The Gateway runs on 64 bit Red Hat Enterprise Linux (RHEL) 7.9.

2.1 Types of installation


You can install Secure ICAP Gateway on a virtual machine using Microsoft Azure.
Note that:
n This guide covers the installation of a new instance of Secure ICAP
Gateway on a Microsoft Azure platform only. It does not cover installation on
the Azure Classic Portal.
For alternative installation types, please refer to the Installation & Getting
Started Guide.

The use of online repositories will download updates to your


system. Microsoft will charge your Azure account for these
transfers.

2.2 Prerequisites
Before installing, ensure that you have the following:
n A valid Microsoft Azure account
n Your subscription details
Browser support
Secure ICAP Gateway supports connections using TLS 1.2 ciphers and has been
tested with the following browsers:
n Mozilla Firefox - latest
n Google Chrome - latest
n Microsoft Edge (Windows 10)

-6-
3. Configure a virtual machine using Microsoft
Azure
The following steps show you how to create the Azure virtual machine (VM)
required to host Secure ICAP Gateway using the Microsoft Azure Management
Portal.

For detailed instructions on using external resources, such as the


Microsoft Azure Management Portal, refer to the appropriate
documentation by the providers. Fortra is not responsible for
changes to any of the procedure steps described.

3.1 Create the VM


1. Sign in to the Microsoft Azure Management Portal.
2. From the hub menu, click Create a resource (+).
3. From the Categories, select Compute.
4. From the Marketplace, select a virtual machine.

3.2 Configure the basic settings


Use the Basics side menu to configure the details of your virtual machine.
Project Details
1. Select your Subscription.
2. Select your Resource group.
Instance details
1. Enter your Virtual machine name. This cannot be changed once the VM has
been created.
2. Select the nearest data center for your Region. You will need this information
in order to log in to the machine later.

Some regions might have limitations on available disk types and


disk sizes. For more information on what is available, see
https://azure.microsoft.com/en-us/regions/.

3. Set Availability options as per the current policy of your organization.


4. Under Image, click See all images. In the Marketplace, search for Red Hat.
From the Red Hat Enterprise Linux blade, select a Red Hat Enterprise Linux

-7-
7.9 option.
5. Select Run with Azure Spot discount as per the current policy of your
organization.
6. From the Size drop-down menu, click See all sizes to select the VM size. We
recommend a VM with 16 GB of RAM, such as Standard_E2s_v5 or similar for
production use.
Administrator account
For the Authentication type, select either SSH public key or Password.
If you selected SSH public key:
n Enter User name.
n Select the SSH public key source as Generate new key pair. If required,
you can use an existing key that you have previously generated from the
drop-down menu.
n Enter Key pair name.

The SSH key pair is generated and made available as a .pem


file that can be downloaded once the VM has been created.

If you selected Password:


n Enter User name and Password. Ensure that your password satisfies the
Microsoft's password requirements.
Inbound port rules
Unless otherwise required by your organizational policy, the settings in this section
can be left to the default. You can use the Networking tab to create access rules
for known IP addresses.
Click Next: Disks to continue.

At this point, you can click Review + create to review the basic
configuration and create the VM.
However, you will need to go back and configure Disks, Networking
and Management options later. Our recommendation is to configure
these options prior to using Review + create.

3.3 Configure the disk settings


Use the Disks tab to configure the disk options and data disks of your virtual
machine.

-8-
Disk options
Configure OS disk type and Encryption type to the settings recommended by
your organization.

Microsoft Azure virtual machines are automatically given a default


disk size of 64 GB.

Data disks
If required, additional disks can be added or existing disks can be attached to this
VM. For detailed instructions, refer to the appropriate Azure documentation.
Click Next: Networking to continue.

3.4 Configure the networking settings


Use the Networking tab to configure the network interface options of your virtual
machine.
Network interface
1. From the Virtual network drop-down menu, select an existing virtual network.
Alternatively, click Create new to add a new one.
2. Select a virtual network as the Subnet. The default network location is
10.0.0.0/24. This is used internally and is not the public IP address that you
will use to access your VM. This is specified by Public IP Address, which
enables you to customize a name for access to the machine.

This is currently a dynamic IP address and will need amending


to a static IP address later in the installation.

3. For Network Security Group, we recommend adding an Advanced level with


firewall rules, configured as follows:
Priority Name Port Protocol Source Destination

<Your IP
1000 Allow-ssh 22 TCP VirtualNetwork
address>

Allow-admin- <Your IP
1010 443 TCP VirtualNetwork
ui-access address>

Allow-cockpit- <Your IP
1020 9090 TCP VirtualNetwork
access address>

1030 Allow-smtp-in 25 TCP Anywhere VirtualNetwork

-9-
To configure the Firewall ports and protocols for the product you
are installing, see Firewall ports in the Online Help.

4. Unless otherwise required by your organizational policy, the Accelerated


networking setting can be left to the default.
Load balancing
Unless otherwise required by your organizational policy, the Load balancing
setting can be left to the default.
Click Next: Management to continue.

3.5 Configure the additional settings


The Management, Advanced, Monitoring and Tags tabs are available to
configure further options for your virtual machine.
n Management and Monitoring: Use these tabs to configure management
and monitoring options for your VM.
n Advanced: Use this tab to add additional configuration, agents, scripts or
applications as well as host and capacity reservations.
n Tags: Use this tab to define name/value pairs that enable you to categorize
resources for use in the user interface.

When you review the options on these tabs, refer to your


organization's current policy and recommendations.

When ready, click Review + create.

3.6 Review and create the VM


Use the Review and Create tab to check that your settings are correct and
validation has passed. Once satisfied with your configuration, you can create the
virtual machine.
1. Scroll through the page to review the current configuration of your VM. If any
settings need amending, click Previous until you arrive at the tab in which the
setting is defined.
2. Click Next to return to the Review and Create tab.
3. Once satisfied, click Create to create the VM.

- 10 -
Generate new key pair
If you selected to access the VM using a newly generated SSH public key in the
Basic settings tab, you are now prompted to download the new key.
1. Click Download private key and create resource.
2. When prompted, save the .pem file to a safe location using Windows Explorer.

3.7 Configure public IP address and DNS name


In the All resources section, the details of configured virtual machines are
displayed.
1. Click your VM name and review its Overview page.
2. From the Settings menu, select Networking.
3. In the Networking Overview page, click the hyperlink next to NIC Public IP to
display the properties of the NIC Public IP.
4. From the Settings menu, select Configuration.
5. Change Assignment from Dynamic to Static.
6. Enter the text for the DNS name label.
7. Click Save.

3.8 Increase the disk size


Microsoft Azure virtual machines are automatically given a default disk size of 64
GB.

The root and /opt partitions should be a minimum of 20 GB.


/var should use a minimum of 120 GB for test environments and
200 GB for production environments.

When you have created and configured your VM using the Microsoft Azure
Management Portal, you need to stop the VM and resize the disk.
You must wait for provisioning to finish, then:
1. Stop the VM.
2. Increase the disk size of the OS disk from the Portal. It is recommended that
your disk size is large enough to accommodate two 20 GB partitions for root
and /opt, and 200 GB for /var.

Other partitions (e.g. usr, temp, home, boot) may already be


using up to 20 GB of disk space.

- 11 -
3. Start the VM.

3.9 Enlarge the OS partition


After increasing the disk size, you will need to resize the disk from the default size
in Azure.
Follow the instructions at https://docs.microsoft.com/en-us/azure/virtual-
machines/linux/resize-os-disk-gpt-partition for RHEL systems.
When the virtual machine has restarted, perform the following steps:
1. Access your VM as a root user by using the following command.

#sudo su

2. Use the lsblk command to determine which logical volume (LV) is mounted
on the root of the file system. In the example below, it would be rootvg-
rootlv in sda4 which is currently reported as 63 GB.

3. Use the pvscan command to determine which disk and partition holds the LVM
physical volume or volumes (PV) in the volume group named rootvg. Note the
size and free space listed between the brackets ([ and ]).

4. Expand the partition that contains this PV by using growpart, the device name,
and the partition number. This expands the specified partition to use all the free
contiguous space on the device.

- 12 -
5. Use the lsblk command again to verify that the partition has been resized as
expected. In the example below, sda4 has changed from 63 GB to 127 GB.

6. By using the pvresize command, expand the PV and use the rest of the newly
expanded partition.

7. Use the pvscan command again to verify that the new size of the PV is as
expected. Compare the new size to the original [size / free] values.

8. By using the output from the previous step, increase the size of the root
partition as necessary. For example, if the root is currently 2 GB, run the
following command to increase by 18 GB to 20 GB.

# lvresize -r -L +18G /dev/mapper/rootvg-rootlv

The root and /opt partitions should be a minimum of 20 GB.


/var should use a minimum of 120 GB for test environments
and 200 GB for production environments.

9. Repeat the previous step to increase the size of the /opt and /var partitions
as necessary. For example, if the /opt is currently 2 GB and the /var is 8 GB,

- 13 -
run the following commands to increase the sizes:

# lvresize -r -L +18G /dev/mapper/rootvg-optlv


# lvresize -r -L +192G /dev/mapper/rootvg-varlv

10. Use the following commends to verify whether the logical volumes have an
increased file system size.

#df -Th /
#df -Th /opt
#df -Th /var

- 14 -
4. Install Clearswift Secure ICAP Gateway
You can install the Clearswift Secure ICAP Gateway software using the following
instructions.

4.1 Install from the Clearswift online repositories


To install Secure ICAP Gateway from repositories hosted online by Clearswift, you
will need the Internet access to those repositories.
1. Assume root role at the command line.

When downloading and installing files, we recommend that you


check the downloaded file can be verified against the vendor
public key.

2. Download the packages containing the online repository configuration files.


Click below to open a page from where the commands can be individually
copied and pasted into your terminal:

curl -Of https://products.clearswift.net/rhel7/sig/cs-rhel7-


mirrors-22.02.04.rpm

curl -Of https://products.clearswift.net/rhel7/sig/cs-rhel7-


sig-repo-22.01.04.rpm

3. Download and install the Clearswift GPG public key:

rpm --import https://products.clearswift.net/RPM-GPG-KEY-


Clearswift

4. Verify the downloaded packages:

rpm --checksig --verbose cs-*.rpm

This will display the results below, where all checks respond with OK:

cs-rhel7-sig-repo-22.01.04.rpm:

Header V3 RSA/SHA256 Signature, key ID 9c75f096: OK


Header SHA1 digest: OK (cb3e7e95769f914aba6e5f2c2bec22edd8df29a9)
V3 RSA/SHA256 Signature, key ID 9c75f096: OK
MD5 digest: OK (4ca922d2ae4b6925e2ddb632d990a2ae)

- 15 -
cs-rhel7-mirrors-22.02.04.rpm:

Header V3 RSA/SHA256 Signature, key ID 9c75f096: OK


Header SHA1 digest: OK (172adf48c2225a2b7f433584ce6705655ad47137)
V3 RSA/SHA256 Signature, key ID 9c75f096: OK
MD5 digest: OK (55a611db509e4cf522bf98f93ec3d7b3)

5. Move Microsoft Update Repos from /etc/yum.repos.d/ directory:

mv /etc/yum.repos.d/rh-cloud.repo /var/tmp

6. Manually install the downloaded repository file packages:

yum -y localinstall cs-*.rpm

7. Remove rsyslog:

yum -y remove rsyslog

8. Install the required product using the following command:

yum install -y cs-sig --enablerepo=cs-*,ext-cs-*

This command temporarily enables access to the online repositories, and


installs Secure ICAP Gateway.

If this step fails due to additional conflicts, you might need to


remove the conflicting packages first using:
yum remove <package name>

4.2 Configure your Red Hat Enterprise Linux installation


If you used an SSH key when you created the Azure virtual machine, you will need
to set a user password, using the following command:

passwd <username>

Enable online repositories


Enable the online repositories using Red Hat Cockpit.
1. To access the Cockpit administration user interface, open a supported web
browser and enter the IP address of your Secure ICAP Gateway, on port 9090:
https://<ip-address>:9090

- 16 -
2. Login using the administrator credentials, ensuring you have selected the
Reuse my password for privileged tasks option.
3. Navigate to Clearswift. From Product Actions > Enable online repositories,
click Enable.
Create administrator accounts
Before you start using your Secure ICAP Gateway, we strongly recommend the
following actions:
n Create a new administrator account to administer Secure ICAP Gateway
n Disable the root user account as a security precaution
This can be achieved using Red Hat Cockpit.
1. To access the Cockpit administration user interface, open a supported web
browser and enter the IP address of your Secure ICAP Gateway, on port 9090:
https://<ip-address>:9090
2. Login using the administrator credentials, ensuring you have selected the
Reuse my password for privileged tasks option.
3. Navigate to Accounts > Create New Account.
n Enter the name of the new administrator account and a strong password.
4. Click the new administrator account and enable the following role and policy:
n Enable the Server Administrator role.
n Select Never lock account. In the Account Expiration dialog, select
Never lock account and click Change.
n Select Never expire password or the date on which the password will
expire. In the Password Expiration dialog, select Never expire
password and click Change.
5. Log out of Cockpit and log back in using the new administrator credentials,
ensuring you have selected the Reuse my password for privileged tasks
option.
6. Navigate to Accounts and click the root user.
n Select the Lock Account option to disable the root user.

It is good practice to create a secondary administrator


account, just in case the password of the primary
administrator account is lost. This can be achieved by
repeating steps 4 and 5.

7. Navigate to System and Restart the Gateway.

- 17 -
4.3 Configure Secure ICAP Gateway
On restart, you will need to complete the Secure ICAP Gateway Installation
Wizard.
1. To access the Secure ICAP Gateway interface, open a supported web browser
and enter the IP address of your Gateway:
https://<ip-address>/Appliance
2. Secure ICAP Gateway Installation Wizard is displayed.
3. Complete the wizard and click Apply.
4. The system might take around 5-10 minutes to apply the settings before you
can use Secure ICAP Gateway. We recommend visiting the First Steps topic in
the Online Help when the interface is accessible.

4.4 Configure update repositories


By default, the Clearswift online repositories are disabled after installation.
Switching from offline to online repositories gives access to Red Hat security fixes,
normally within 24 hours of their publication and subsequent testing to ensure
there are no compatibility issues. We recommend this for most installations.

The use of online repositories will download updates to your


system. Microsoft will charge your Azure account for these
transfers.

4.5 How to change your network settings


1. Use Red Hat Cockpit to configure an IP address.
2. Deploy network changes.
3. Use the Microsoft Azure Management Portal to set a static IP address to match
the configuration.
4. Try to reconnect to your system after a few minutes.
Note that:
n The IP Address must belong to the Virtual network range you created
earlier.
n Double check your settings before applying network configuration, as it is
possible to lose connection with your virtual machine. Contact our Support if
this occurs.
n Deploy network changes in Cockpit first, before replicating them in the
Microsoft Azure Management Portal.

- 18 -
n The first IP address in your Virtual network range is your network gateway.
n After modifying your VM's IP address in the Microsoft Azure Management
Portal, allow up to five minutes for Azure to apply the change. Azure might
reboot your VM during this process.

- 19 -
5. Upgrade
If you are upgrading the current version of your Secure ICAP Gateway on
Microsoft Azure, please refer to the Installation and Getting Started Guide for
detailed instructions.

- 20 -
Contact Fortra
Please contact Fortra for questions or to receive information about Secure ICAP
Gateway. You can contact us to receive technical bulletins, updates, program
fixes, and other information via email or Internet.

Fortra Support Portal


For additional resources, or to contact Technical Support, visit the Fortra Support
Portal.
For support issues, please:
n Check this guide's table of contents and topics for information that
addresses your concern.
n Check the Knowledge Base in the Fortra Support Portal for information that
addresses your concern.
n Gather and organize as much information as possible about the problem,
including job/error logs, screenshots or anything else to document the issue.

- 21 -

You might also like