Satp Installation Guide 3.2
Satp Installation Guide 3.2
Satp Installation Guide 3.2
Legal Notice
Copyright © 2018 Symantec Corporation. All rights reserved.
Symantec, the Symantec Logo, the Checkmark Logo and are trademarks or registered trademarks of
Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks
of their respective owners.
This Symantec product may contain third party software for which Symantec is required to provide attribution
to the third party (“Third Party Programs”). Some of the Third Party Programs are available under open
source or free software licenses. The License Agreement accompanying the Software does not alter any
rights or obligations you may have under those open source or free software licenses. Please see the
Third Party Legal Notice Appendix to this Documentation or TPIP ReadMe File accompanying this Symantec
product for more information on the Third Party Programs.
The product described in this document is distributed under licenses restricting its use, copying, distribution,
and decompilation/reverse engineering. No part of this document may be reproduced in any form by any
means without prior written authorization of Symantec Corporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS,
REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE
DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY
INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL
DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS
DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO
CHANGE WITHOUT NOTICE.
The Licensed Software and Documentation are deemed to be commercial computer software as defined
in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer
Software - Restricted Rights" and DFARS 227.7202, et seq. "Commercial Computer Software and
Commercial Computer Software Documentation," as applicable, and any successor regulations, whether
delivered by Symantec as on premises or hosted services. Any use, modification, reproduction release,
performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government
shall be solely in accordance with the terms of this Agreement.
Symantec Corporation
350 Ellis Street
Mountain View, CA 94043
https://www.symantec.com
Symantec Support
All support services will be delivered in accordance with your support agreement and the
then-current Enterprise Technical Support policy.
Index .................................................................................................................... 80
Chapter 1
About Symantec Advanced
Threat Protection Platform
This chapter includes the following topics:
ATP: Network Processes the network stream in real time across all Internet ports and protocols
and passes it through various filters and detection engines. ATP can detect events
on unmonitored endpoints as traffic passes through the scanner. Since ATP
doesn't have Symantec Endpoint Protection agent's information, ATP cannot
provide all of the information about the endpoint. Such information includes the
user name, last check-in, or Symantec Endpoint Protection Manager group.
ATP: Endpoint Gathers the information by proxying communications between Symantec Endpoint
Protection clients and Symantec and by leveraging Symantec Endpoint
Protection’s Endpoint Detection and Response (EDR) functionality.
ATP: Email Integrates with Symantec Email Security.cloud to uncover the attacks that enter
your organization through email.
ATP: Roaming Collects the events from Symantec ATP: Roaming and correlates them with
events from your other integrated control points.
ATP uses Synapse™ to correlate network event data with email event data, web event data,
and endpoint event data. The Synapse correlation engine automatically matches events with
Symantec Endpoint Protection, Email Security.cloud, Web Security.cloud, and ATP to reduce
About Symantec Advanced Threat Protection Platform 8
About Symantec Advanced Threat Protection (ATP)
the volume of security alerts. As incidents are detected, they are correlated with other incidents
discovered on your network to show overall attack patterns and prioritize the most significant
threats.
ATP employs the following detection technologies:
Vantage Vantage is a signature-based detection engine that finds threats in the network
stream.
Insight Insight accesses the world’s largest reputation database and has reputation
intelligence on over 8 billion files. Insight is a Symantec-owned reputation request
service for Insight reputation queries. This service gathers information about the
Windows executable files that are observed on endpoints.
Mobile Insight Mobile Insight performs similar analyses for Android applications as Insight does
for Windows executable files. In addition to tackling malware detection, Mobile
Insight also detects privacy and performance issues in mobile apps.
Antivirus engine The Antivirus engine is a signature-based technology that detects malware.
Blacklists and Symantec global blacklist and whitelist feeds, which are updated on ATP
Whitelists appliances regularly, accelerate detection and optimize performance. You can
also create custom blacklists and whitelist that you maintain through ATP.
SONAR Symantec Endpoint Protection includes Symantec Online Network for Advanced
Response (SONAR) technology for process behavior detection and remediation.
However, Symantec Endpoint Protection provides no insight into these details.
When you integrate ATP and Symantec Endpoint Protection, ATP can provide
insight into SONAR detections. SONAR detects the system changes that have
occurred on your managed endpoints, the order that they occurred, and related
file attributes. This information gives you greater visibility into the activity that
occurs in your environment.
Suspicious file ATP uses a file classifier to analyze files with unknown dispositions. The file
classifier classifier breakdowns files by their attributes to determine if the file is good or
malicious. The classifier uses the decision trees that are trained with millions of
files.
■ System requirements for ATP integration with Symantec Endpoint Protection management
interfaces and embedded databases
Note: These requirements differ based on whether you use ATP's Endpoint Data Recorder
feature. Endpoint Data Recorder lets you search for and collect data from your endpoints,
which is then stored in ATP's database. As such, ATP requires more system resources and
storage space when Endpoint Data Recorder is enabled.
Note: To avoid over-commitment of resources, you must reserve the required resources on
your ATP virtual appliance computer. You must reserve 48 GB of memory and at least 12 GHz
of CPU before you start the VMware computer for the first time.
For more information, see https://support.symantec.com/en_US/article.TECH249635.html.
Disk space 1.5 TB (1 TB hard disk in addition to the VM's existing 500 GB
hard disk)
CPU 12 Cores
Memory 48 GB
Table 2-2 Network interface requirements for the VMware ESXi host
Inline Block or Inline Monitor 3 (1 Management, 1 LAN, 1 WAN) 3 (1 Management, 1 LAN, 1 WAN)
(all-in-one or network scanner)
System Requirements 12
Browser requirements for ATP Manager
Table 2-2 Network interface requirements for the VMware ESXi host (continued)
Refer to your VMware documentation for VMware system requirements and configuration of
virtual machines.
See “System requirements for physical appliance installation” on page 10.
See “Installation workflow” on page 20.
See “Preinstallation checklist” on page 14.
Browser Version
■ Preinstallation checklist
■ Installation workflow
■ Proxy recommendations
Preinstallation checklist
Table 3-1 lists the actions to complete and the information to have ready before you install a
physical appliance or virtual appliance.
Action/Item Description
Verify system requirements. You can install Symantec Advanced Threat Protection (ATP) as a physical
appliance or virtual appliance. Physical and virtual appliances can co-exist
within the same enterprise network.
Action/Item Description
For initial setup, have a computer The computer that you use to configure the appliance must have access to
available with an Ethernet port and with the management network the ATP device is on. For example, by connecting
web browser access to: to a switch or router. If you set up a physical appliance, the computer also
must have network access to the iDRAC.
■ The management port network.
■ The iDRAC (physical appliance
only).
Open required ports on the firewall and Make sure that the necessary ports are open on your firewall and other
other network devices. network devices to allow traffic from or to the ATP device. For example,
HTTP 80 and HTTPS 443.
Have Ethernet cables (up to four normal The number and types of cables depends on your network configuration and
cables and two crossover cables) the number of LAN and WAN ports on the appliance.
available.
You may need crossover cables for an Inline deployment.
See “Where to place the appliance in your network for best results”
on page 31.
Download virtual image files (virtual Download the virtual image files from https://fileconnect.symantec.com/ into
appliance only). a single directory that you can access from your VMware application.
Choose the IP address, subnet mask, The integrated Dell Remote Access Controller (iDRAC) on the physical
gateway address, and password for appliance provides console access to the appliance. Although integrated,
iDRAC. iDRAC is a separate device that requires its own network address to function.
The password is required to access the iDRAC's browser-based interface.
Physical appliance only.
Choose an administrator password for You specify a new, secure password for the administrator user that you enter
ATP. when you start bootstrap. This administrator user and password is for the
system console. For example, console access to use bootstrap and the
command-line interface.
Note: No recovery mechanism for this account information exists. Make
certain to safeguard this information for future use.
Planning for installation 16
Preinstallation checklist
Action/Item Description
Choose the operating configuration If one appliance is installed, it operates in all-in-one mode. The appliance
(role): performs all system functions, including scanning network traffic. In this role,
you cannot have the additional network scanners that point to this appliance.
■ All-in-one
■ Management platform If two or more appliances are installed, one appliance can serve as a
■ Network scanner management platform and all other appliances serve as network scanners.
The management platform hosts ATP Manager, centralizes management
functions, stores all detection incidents and convicted files, and communicates
administrative actions. Network scanner appliances monitor traffic and detect
incidents.
Action/Item Description
Choose the operating mode and connect The operating modes are as follows:
the cables for the desired operating
■ Tap
mode for an all-in-one appliance or
Tap mode monitors traffic in real time. Tap mode requires a dedicated
network scanner appliance.
tap device or a span port on a switch.
■ Inline Block
Inline Block mode blocks malicious files and traffic in real time.
■ Inline Monitor
Inline Monitor mode detects malicious files and traffic in real time, but
does not block.
Note: Inline Block and Inline Monitor modes are not recommended for virtual
appliances because bypass mode is not available. If the appliance has an
issue, network activity may be interrupted.
Because the network cabling configuration is different for the inline modes
versus tap mode, decide the mode before setting up the ATP physical
appliance. You should also decide on the mode before you map the virtual
adapters to physical ones for a virtual appliance.
After you complete the cabling, you enable scanning in ATP Manager for
each network scanner or all-in-one device. (Management platform devices
do not scan.) You must ensure that the cable configuration or virtual adapter
mapping is compatible with your chosen operating mode.
See “Where to place the appliance in your network for best results”
on page 31.
Planning for installation 18
Preinstallation checklist
Action/Item Description
Choose network settings for the Specify an IPv4 address for each of the following settings.
appliance.
■ Static IP address for the management port
■ Network mask
■ Gateway IP address
■ Primary name server
■ (optional) Secondary name server
■ Static routes, depending on your network configuration
■ NTP server
■ Active Directory server
For each appliance, you need one or more static IP addresses (and
associated subnet mask, default gateway, and DNS addresses for each IP
address). This requirement is contingent upon your configuration:
If the appliance operates in Inline Block mode, you configure static routes
to deliver blocking pages to endpoints when websites or files are blocked.
Depending on your network topology, you may also need to configure static
routes to the network where management computers are connected to enable
these computers to access ATP Manager.
Accurate time is critical to the proper functioning of ATP. Setting the Network
Time Protocol (NTP) server ensures that the appliance has an accurate time
to indicate when detections occur. An NTP server is also necessary for
Synapse correlation.
Action/Item Description
Choose a descriptive name for the host. You specify the descriptive host name during bootstrap. The descriptive host
name you choose displays in ATP Manager under Settings > Appliances
and lets you more easily identify appliances in the list.
Choose a password to encrypt the To ensure that data is transferred securely between the management platform
management platform-to-network and its scanners, you specify a password for the communications channel.
scanner communication channel. The management platform and all its scanners must have the same
password. For security reasons, this password should be different from the
default administrator password.
Make sure that the license file is Make sure you can browse to and select the Symantec license file from the
accessible. computer you use to run the setup wizard. A valid license file is required for
installation.
Choose a user name, password, display A user name and password for an ATP Manager administrative account
name, and email address for the initial provides access to ATP Manager. The email address is required to receive
ATP Manager administrative user. communications and reports. The initial user can create additional users,
including additional administrators.
Create an account on an The server uses this account to email notifications, reports, and new
SMTP-compatible mail server for passwords to ATP Manager users and other recipients. You can enter the
notifications and reports from ATP to account information in the setup wizard, or you can choose to enter this
administrators and security operations information later in ATP Manager.
personnel.
Have additional setup information The setup wizard is complete for a management platform appliance or
available to enter in ATP Manager. all-in-one appliance. The wizard appears after you create the first
administrator account. After you complete the setup wizard, you are prompted
to log on using this new administrator account.
Action/Item Description
If you use proxies, each ATP appliance must have the IP addresses of
existing proxies.
Have internal subnet list available. You specify your internal subnets in ATP Manager after you run the setup
wizard.
Installation workflow
Table 3-2 provides the workflow for installing a Symantec Advanced Threat Protection (ATP)
physical appliance or virtual appliance.
1 Complete all items in the preinstallation Completing the preinstallation checklist ensures that you
checklist. have everything you need to install the physical appliance
or virtual appliance. It also ensures that your firewall is
prepared to allow proper operation.
2 Install the appliance. ■ For a physical appliance, install the hardware in a rack,
and connect the network cables and power cables.
See “Installing the 8840 appliance” on page 43.
See “Installing the 8880 appliance” on page 45.
■ For a virtual appliance, deploy the OVA template on the
ESXi host, map the ports, and connect the network
cables.
See “Installing the virtual appliance” on page 57.
Table 3-2 ATP physical appliance or virtual appliance installation workflow (continued)
3 Set up the iDRAC. The integrated Dell Remote Access Controller (iDRAC) on
a physical appliance provides remote access to the console.
Physical appliances only.
When you set up the iDRAC, you assign a static IP address
to the iDRAC management port. Although you can use
DHCP to configure the iDRAC, a best practice is to use a
static IP address.
4 Run bootstrap. Bootstrap begins automatically the first time that you log on
to the console on a physical appliance or virtual appliance
(logon: admin, password: symantec).
5 Run the status_check command to test the In the appliance console, run the command status_check
network connectivity. to determine if the network connectivity has been set up
properly. The command lists all of the items that are checked
and the status of whether each item is successful or not.
6 Run the setup wizard. After bootstrap is complete, open a web browser and type
https://<management port static IP address> to access ATP
Management platform or all-in-one appliances
Manager and start the setup wizard (logon: setup, password:
only.
symantec). This setup wizard logon is not available after
you complete the setup wizard.
Note: Make certain to use the HTTPS protocol when typing
the address to access ATP Manager.
Table 3-2 ATP physical appliance or virtual appliance installation workflow (continued)
7 Complete the configuration in ATP Manager. After you exit the setup wizard, you log on to ATP Manager.
You complete the setup from the Settings tab in ATP
Management platform or all-in-one appliances
Manager.
only.
When specifying the configuration options, first navigate to
the Settings > Global page and configure settings in the
order in which they appear on the page. Next, go to the
Settings > Appliances page and apply the configuration
settings in the order in which they appear on that page.
8 Enable scanning on all-in-one or network Before you enable scanning, at a minimum you should do
scanner devices. the following tasks:
For all configurations except management ■ Configure the SEPM Controller connection, if you intend
platform. to use Symantec Endpoint Protection with ATP.
■ Configure Internal Network settings to enable the
appliance to determine what traffic is internal and what
traffic originates from an external source.
■ Define Static Routes. If the appliance operates in Inline
Block mode, you configure static routes to deliver
blocking pages to endpoints when websites or files are
blocked. Depending on your network topology, you might
also need to configure static routes to the network where
management computers are connected. This task lets
these computers access ATP Manager.
■ Configure Network Proxy and Enterprise Proxy settings,
if these proxies are present in the environment.
Table 3-2 ATP physical appliance or virtual appliance installation workflow (continued)
Operating roles
You can deploy the physical appliance or virtual appliance as a management platform, network
scanner, or all-in-one device. You assign the operating role when you run bootstrap on the
appliance. These roles have the following functionality:
Network scanner If two or more appliances are installed, all devices except the
management platform should be deployed as network
scanners. Each network scanner can monitor traffic on a
different network and send its incident data to the management
platform. Depending on the operating mode, the network
scanner may block malicious traffic in real time.
Note: An all-in-one device cannot function as a management platform for network scanners.
Only an appliance that is assigned the management platform role can manage a network
scanner.
The roles you choose depend upon the throughput of network traffic. For small to medium-sized
installations, you should have one appliance running in the all-in-one role. For larger
installations, you would install multiple appliances with one acting in the management platform
role and the remaining appliances acting as network scanners.
See “Running bootstrap to configure the appliance” on page 62.
To change the operating role of a physical appliance or virtual appliance after initial installation,
you must reinstall the appliance software.
Bypass (Inline mode failsafe) An ATP physical appliance that is Same as Inline Block or Inline Monitor
configured for Inline mode automatically
switches to bypass mode if the
appliance cannot function. It also
switches to bypass mode if it is turned
off. In bypass mode, Internet traffic
continues to flow through the LAN port
and WAN port, but no blocking or
monitoring occurs. Normal operations
resume when you restart the appliance
or reenable scanning.
You choose the operating mode for an all-in-one device or network scanner from ATP Manager.
A management platform operates in management platform mode automatically.
See “About network configurations and port connections” on page 29.
See “Where to place the appliance in your network for best results” on page 31.
Hardware versus virtual Make this decision based on your current infrastructure. Users
with extensive VMware investment might want to use virtual
appliances. Users with little or no VMware investment should
use hardware.
Available bandwidth The hardware solutions have higher throughput than virtual
solutions.
Total endpoints in the organization While each deployment varies, R220 and R330 have a capacity
of approximately 10K simultaneous connections. R720 and
R730s can support 25K simultaneous connections. These
numbers are for inline mode. In Tap mode, hardware can
support approximately twice the number of connections as
inline. VMs can handle 2K simultaneous connections.
Simple port span/tap This configuration monitors the traffic Port on your Connect Not used
between the endpoints and the Internet, but LAN switch Monitor1 to
does not block file transfers or websites. network tap
Internet-bound traffic is copied to the switch or port on
port using port mirroring that is configured your LAN
on the switch itself. switch that is
set to span
This configuration uses two monitor ports
mode
and one management connection. This
setup is easy and is useful as an initial test
of ATP.
Port span/tap with This configuration uses two monitor ports Port on your Connect Connect
multiple monitor ports and one management connection. Extra LAN switch Monitor1 to Monitor2 to
monitor ports allow the same appliance to network tap network tap
connect to multiple switches from different or port on or port on
subnets. This configuration does not block your LAN your LAN
file transfers or websites. switch that is switch that is
set to span set to span
mode mode
Simple inline You can block file transfers and websites Port on your Internet Port on your
using this configuration. LAN switch firewall LAN LAN switch
port
Inline configuration requires more network
connections than port span/tap. Ideally, you
should deploy ATP inline between the client
and the firewall. If you use a proxy, you
should connect the ATP appliance should
between the client and the proxy.
Inline with two firewalls, You can connect two ATP appliances to two Port on your Internet Port on your
two proxies, and two ATP firewalls as part of a high-availability LAN switch firewall LAN LAN switch
appliances environment. You can configure the firewalls port
in active/active failover or active/standby
failover. Configure the ATP appliances
identically except for the network settings.
Both appliances should be connected to the
same management platform.
Planning for installation 31
Where to place the appliance in your network for best results
Management platform In a management platform configuration, an Port on your Not used Not used
appliance is configured to manage other LAN switch
appliances. This appliance does not scan,
so it requires only a management
connection.
See “Where to place the appliance in your network for best results” on page 31.
If you want ATP to reach the Internet through a proxy server, you must treat the appliance as
a trusted device and disable authentication. ATP does not support passing Basic Authentication
credentials to the proxy. ATP supports Basic or Simple Password Authentication to the proxy.
You can use the management port for any of the following:
■ To access ATP Manager.
■ For communication to Symantec's servers (e.g., LiveUpdate, cloud-based sandboxing,
Insight, telemetry, etc.).
■ To facilitate communication to Symantec Endpoint Protection Manager and endpoints for
the endpoint proxy.
The management network should not be open to the Internet as a whole. If you need access
to the management network from outside, a VPN or short-lived Remote Desktop connection
is recommended.
In Inline mode, the management port must be on a different subnet from the Inline interface.
The following figures show examples of network configurations. You can use the ATP 8840,
8880, or virtual appliance in any of these configurations.
You might need crossover cables for Inline deployment if devices connected to WAN port and
LAN port don't have automatic MDI/MDI-X configuration.
Internet
Firewall
Mgmt
Access point
Internet
Firewall Firewall
Corporate
LAN
Access point
Internet
Firewall
Mgmt
Corporate
LAN
Access point
Figure 3-4 Inline with firewalls, proxies, and appliances, including a management platform
Internet
Proxy Proxy
Server Server
Firewall Firewall
Switch Switch
Mgmt Mgmt
ATP: Network
CIU
Corporate
LAN
Mgmt
Access point
Table 3-6 describes the ports that ATP uses for communications, content updates, and
interactions with Symantec.cloud detection services.
Back up FTP; SSH 20 TCP, UDP Management Configured FTP server: FTP ports
platform or backup 20, 21.
21 TCP
all-in-one storage
SSH server: SSH port
22 TCP, UDP appliances server
22.
(Internal
traffic)
Email notifications SMTP 25 TCP Management SMTP server Communication with the
platform or SMTP server.
587 TCP (Internal
all-in-one
traffic)
appliance
Symantec cloud detection, If endpoint 443 TCP All ATP Symantec Cloud service queries
analysis, and correlation data appliances and telemetry data
(External
services and telemetry services recorder exchanges.
traffic)
enabled
If the endpoint data
If endpoint recorder is enabled
data Symantec Endpoint
recorder Protection sends
disabled conviction events directly
to ATP.
Planning for installation 39
Required firewall ports
Antivirus and intrusion HTTPS HTTP 8080 Symantec ATP Information about the
prevention conviction TCP or HTTPS Endpoint management files and the network
information 443 TCP Protection platform traffic that Symantec
clients Endpoint Protection
HTTP 80 TCP
detects.
or HTTPS
8443 TCP
Antivirus and intrusion HTTPS 443 TCP ATP Symantec Information about files
prevention conviction management (External and the network traffic
HTTP 80
information platform traffic) that Symantec Endpoint
Protection detects.
Product updates HTTPS 443 TCP All Symantec Finds and delivers new
appliances versions of ATP.
(External
traffic)
ATP Manager HTTPS 443 TCP Client Management ATP Manager access for
connecting to platform or an all-in-one appliance
manage an all-in-one or management platform.
appliance appliance
(Internal
traffic)
(Internal
traffic)
Synapse Symantec Endpoint JDBC 1433 TCP Management Symantec Required if using the
Protection Manager connection (default) platform or Endpoint Microsoft SQL Server for
with Microsoft SQL Server all-in-one Protection Symantec Endpoint
(optional) appliance Manager Protection Manager and
Microsoft Synapse. Symantec
SQL Server Endpoint Protection
Manager administrators
(Internal
can configure a different
traffic)
port for this
communication.
Planning for installation 40
Required firewall ports
Blocking page (Inline Block HTTP 8080 TCP Network Protected Sends the blocking page
mode only) scanner endpoints when content is blocked
at an endpoint. Not
(Internal
required for Inline
traffic)
Monitor or Tap/Span
modes.
Synapse Symantec Endpoint HTTPS 8081 TCP Management Symantec Required if using the
Protection Manager connection (default) platform or Endpoint embedded database for
with Embedded DB (optional) all-in-one Protection Synapse connection to
appliance Manager Symantec Endpoint
server Protection Manager.
(Internal
traffic)
Synapse Symantec Endpoint HTTPS 8446 TCP Management Symantec Required if connecting to
Protection Manager connection (default) platform or Endpoint the Symantec Endpoint
with the Symantec Endpoint all-in-one Protection Protection Manager
Protection Manager web appliance Manager server for executing
services Remote Management Server management operations.
and Monitoring (RMM) service For example, adding or
(optional) removing items from the
blacklist or placing an
endpoint under
quarantine.
Planning for installation 41
Proxy recommendations
See “Where to place the appliance in your network for best results” on page 31.
See “Installation workflow” on page 20.
Proxy recommendations
The following are Symantec's proxy recommendations:
Planning for installation 42
Proxy recommendations
Management traffic This proxy traffic does not support SSL interception. If the proxy server has SSL
from ATP to Symantec interception enabled, customers must create a policy to let Symantec traffic
back-end servers bypass. Such a policy prevents the proxy from inspecting Symantec traffic,
thereby reducing resource demands.
Chapter 4
Installing a physical
appliance
This chapter includes the following topics:
iDRAC
4 Plug an Ethernet cable into the management port and connect the other end to your
Management network.
Mgmt port
iDRAC
Mgmt
5 For Tap mode, you can connect the Monitor1 port to a Tap/Span port on a switch or router.
For a management platform, do not make this connection.
For an appliance to operate in Inline Block or Inline Monitor mode, connect the WAN port
to the server that hosts the firewall.
WAN
INLINE:
TAP: WAN
Monitor1 LAN
Monitor2
6 Connect the LAN port to the corporate LAN for Inline Block or Inline Monitor mode. Connect
it to a Tap/Span port on a switch or router for Tap mode. For a management platform, do
not make this connection.
If the appliance is deployed in Inline Block or Inline Monitor mode, bypass mode starts
operating.
LAN
INLINE:
TAP: WAN
Monitor1 LAN
Monitor2
Installing a physical appliance 45
Installing the 8880 appliance
5 7
2
3 Plug an Ethernet Cable into the iDRAC port on the back of the server on the left. Then
connect the other end to a LAN switch on your network. Enable the iDRAC using either
the front panel display or an attached monitor and keyboard.
See “Configuring the iDRAC (8880 appliance only)” on page 49.
See “Configuring the iDRAC using a monitor, keyboard, and optional mouse” on page 50.
4 Plug an Ethernet cable into the management port and connect the other end to the network.
Mgmt port
6
INLINE: WAN1 LAN1 WAN2 LAN2
TAP: Monitor1 Monitor 2 Monitor3 Monitor 4
5 7
2
5 For an appliance to operate in Inline Block or Inline Monitor mode, connect the WAN port
to the server that hosts the firewall. For Tap mode, you can connect this port to a Tap/Span
port on a switch or router. You may optionally connect the WAN2 port. In Tap mode, you
can use either port for monitoring traffic.
WAN1
INLINE:
TAP: WAN1
Monit or1 LAN1
Monit or2 WAN2
Monit or3
6
INLINE: WAN1 LAN1 WAN2 LAN2
TAP: Monitor1 Monitor 2 Monitor3 Monitor 4
5 7
2
Installing a physical appliance 47
Installing the 8880 appliance
6 Connect the LAN port to the corporate LAN for Inline Block or Inline Monitor mode. Connect
it to a Tap/Span port on a switch or router for Tap mode. You may optionally connect the
LAN2 port.
If the appliance is deployed in Inline Block or Inline Monitor mode, bypass mode starts
operating.
LAN1
INLINE:
TAP: WAN1
Monit or1 LAN1
Monit or2 WAN2
Monit or3
6
INLINE: WAN1 LAN1 WAN2 LAN2
TAP: Monitor1 Monitor 2 Monitor3 Monitor 4
5 7
2
7 Open a browser from a computer that is on the same network as the appliance and enter
https://<iDRAC management port static IP address>. The iDRAC default logon is root;
the password is calvin. From the iDRAC management utility, open a console to the
appliance. Log on with the user name admin and the password symantec to start the
bootstrap process. After you complete and accept the bootstrap configuration, the system
restarts.
See “Running bootstrap to configure the appliance” on page 62.
8 (Required for management platform and all-in-one) Open a browser, and then type
https:// <ATP management port static IP address>.
13 The display asks if you want to set up DNS. Setting up DNS is recommended. Performing
this task lets you program network resources on the iDRAC based on DNS names, rather
than requiring you to enter IP addresses.
To set up DNS, highlight Yes and press ✓ . Go to Step 14.
If you do not want to set up DNS, highlight No and press ✓ . Then highlight Save and
press ✓ . Configuration is complete.
14 The iDRAC displays the default address of the primary DNS server (D1). Use the
instructions in steps 5 and 6 to modify values as needed.
15 The iDRAC then displays the default address for an alternate DNS server (D2). An alternate
server is optional, but provides redundancy in case the primary DNS server fails. Use the
instructions in steps 5 and 6 to modify values as needed. If you do not want to configure
an alternate server, set all values to zeros.
16 When you are prompted to Save, highlight Yes and press ✓.
Note: Settings are not applied until you press Yes to save. If you walk away from the
appliance before you save the settings, the display eventually times out and all unsaved
configuration changes are lost.
For more information on the iDRAC, refer to the Integrated Dell Remote Access Controller
documentation at http://dell.com/support/manuals.
See “About the iDRAC on the physical appliance” on page 48.
See “Configuring the iDRAC using a monitor, keyboard, and optional mouse” on page 50.
9 (Optional) Enter the IP addresses for the Static Preferred DNS Server and the Static
Alternate DNS Server.
Setting up DNS allows the iDRAC to access network resources using DNS names, instead
of IP addresses. If you do not use DNS, go to step 11.
10 Press Tab to highlight Back, then press Spacebar.
11 Press Tab to highlight Finish, then press Spacebar.
12 Press Spacebar to select Yes to save changes.
13 Press Spacebar to select OK in the Success dialog box.
14 Press Spacebar until Exit is highlighted, and then press Spacebar to confirm that you
want to exit and restart the iDRAC.
15 Open a browser and enter the iDRAC IP address to display the iDRAC logon screen.
16 Log on to the iDRAC with the ID root and the password calvin.
17 At the prompt, change the root password.
For more information on the iDRAC, refer to the Integrated Dell Remote Access Controller
documentation at http://dell.com/support/manuals.
See “About the iDRAC on the physical appliance” on page 48.
See “Configuring the iDRAC (8880 appliance only)” on page 49.
Chapter 6
Installing a virtual
appliance
This chapter includes the following topics:
Warning: ATP does not support inline mode for the virtual appliance. As such, you run a risk
when you deploy a virtual appliance in inline mode because there is no bypass ability.
Installing a virtual appliance 53
About virtual appliance installation
The figures in this section depict the ports that are mapped one-to-one with physical network
interface cards (NICs). But ATP virtual appliances are compatible with other configurations,
such as distributed virtual networks.
When you deploy the OVA, map each virtual adapter to your network.
Installing a virtual appliance 54
About virtual appliance installation
ESXi
Virtual
Network adapters
Virtual
switches
Physical ports
on EXSi host
Corporate
LAN
to SPAN/TAP to SPAN/TAP
port on LAN Switch port on LAN Switch
Installing a virtual appliance 55
About virtual appliance installation
For an all-in-one virtual appliance or network scanner virtual appliance that operates in Inline
Block or Inline Monitor mode, you need three virtual switches. You need one each for the
Management, WAN, and LAN interfaces. Figure 6-2 shows the network pathway. It runs from
the virtual network adapters to the physical ports and connections to the network for an Inline
Block or Inline Monitor configuration through the virtual switches.
ESXi
Virtual
Network
adapters
Virtual
switches
Physical ports
on EXSi host
Corporate Corporate
LAN LAN
Firewall
For a management platform, you need only one virtual switch for the Management interface.
To configure each virtual adapter and associate it with a physical port, follow the instruction
in the VMware documentation. But set certain values for the ATP virtual appliance.
See “About configuring virtual switches for virtual appliances” on page 56.
Installing a virtual appliance 56
About configuring virtual switches for virtual appliances
Table 6-1 Virtual switch properties for Tap mode Monitor interfaces
Property Value
Failback No
Notify Switches No
Devices operating in Tap mode also require a virtual switch for the Management interface.
Installing a virtual appliance 57
Installing the virtual appliance
Table 6-2 Virtual switch properties for LAN and WAN interfaces
Property Value
Failback No
Notify Switches No
Devices operating in Inline Block or Inline Monitor mode also require a virtual switch for the
Management interface.
Note: Installation of the ISO is not supported for a virtual appliance. In addition, Symantec
Advanced Threat Protection (ATP) does not support the creation of an OVA template from the
ATP template. You must deploy the unaltered OVA template.
Installing a virtual appliance 58
Installing the virtual appliance
Note: The Destination Networks that are shown are examples only.
8 From the Destination Networks menu, choose a network for each Source Network adapter
as follows:
Monitor1_WAN ■ For Inline Block or Inline Monitor mode on an all-in-one device or network
scanner, choose the WAN network that you want to protect.
■ For Tap mode on an all-in-one device or network scanner, choose a network
that you want to monitor. This network must be connected to a Tap or Span
port on the network switch.
■ For a management platform, you can map Monitor1_WAN to any network.
Only the management port is active when an appliance operates as a
management platform.
Installing a virtual appliance 60
Installing the virtual appliance
Monitor2_LAN ■ For Inline Block or Inline Monitor mode on an all-in-one device or network
scanner, choose the LAN network that you want to protect.
■ For Tap mode on an all-in-one device or network scanner, choose an
additional network that you want to protect. This network must be connected
to a Tap or Span port on the network switch.
If you do not want to make this connection, map Monitor2_LAN to any
network. After you complete the OVA deployment, edit the virtual appliance
settings in VMware vSphere Client to disconnect Network adapter 3. Refer
to the VMware documentation for instructions.
■ For a management platform, you can map Monitor2_LAN to any network.
Only the management port is active when an appliance operates as a
management platform.
Note: For all-in-one devices and network scanner devices, do not map Monitor1_Wan
and Monitor2_Lan to the same network. This configuration might cause bridge-looping,
and packets may not properly be sent to the network.
9 Reminder: If you have not already done so, you must reserve the required resources on
your ATP appliance virtual machine. You must reserve 48 GB of memory and at least 12
GHz CPU before you start the VMware computer for the first time.
10 In VMware vSphere Client, start the newly-created virtual appliance.
11 Open a console to the appliance and log on with the user name admin and the password
symantec to start bootstrap. After you complete and accept the bootstrap configuration,
the appliance restarts.
See “Running bootstrap to configure the appliance” on page 62.
12 From a computer that is on the same network as the appliance management port, open
a browser, and type https://<management port static IP address>.
For example, type https://10.10.10.10 if you specified an IP address of 10.10.10.10
during bootstrap.
Required for management platform and all-in-one.
13 In ATP Manager, type the user name setup and password symantec to start and run the
setup wizard.
Required for management platform and all-in-one.
14 If you install a management platform or all-in-one appliance, log on to ATP Manager to
complete the installation. If you install a network scanner, log on to ATP Manager on the
management platform that controls the network scanner to complete the installation.
See “About virtual appliance installation” on page 52.
Chapter 7
Running bootstrap
This chapter includes the following topics:
3 For each prompt, type a response and then press Enter to specify the required information.
The following table describes the bootstrap prompts:
Select one of the following appliance roles. 1 = Type the number that corresponds to the role
Management platform ..., 2 = Network scanner for this appliance. The prompt describes each
..., 3 = All-in-one ... []? of the roles available.
Configure the management port. IPv4 Address Type a static IP for the management port. For
[]: a management platform or all-in-one
appliance, this IP address is used to access
ATP Manager from a browser.
IPv4 Netmask []: Type the network mask for the management
port IPv4 address.
Network scanner role only: IP address of the Type the management port IP address of the
Management Platform: management platform appliance that controls
this scanner.
Running bootstrap 64
Running bootstrap to configure the appliance
Management platform or network scanner roles only: Type a secure password to encrypt
Communication Channel password: communications between the management
platform and all its network scanners. This
password must be the same for the
management platform and all network
scanners. It should be different from the
management console password. Letters,
numbers, periods, underscores, and hyphens
are allowed, and the password can be up to
50 characters.
Management platform or network scanner roles only: To confirm the communication channel
Re-enter Communication Channel password: password, type it again and press Enter. If
the two passwords do not match, you are
prompted to type and retype the password
again.
Configure IPv4 static routes? [y/n] Type y to configure an IPv4 static route or n
to skip this configuration step. Static routes
may be required. For example, use static
routes to connect a network scanner to its
management platform.
Add another route? [y/n] After you configure an IPv4 static route, type
y in response to this prompt to configure an
additional IPv4 static route. Type n to go to
the next prompt.
What do you want to call this device? Type a name to identify this system in ATP
Manager. Letters, numbers, spaces, periods,
and hyphens are allowed, and the name can
be up to 50 characters.
Running bootstrap 65
Running bootstrap to configure the appliance
Set NTP server. []? Type the IP address of the NTP server.
4 When configuration is complete, the console displays the settings that you configured and
then prompts Save changes? [y/n]. Type y to save the configuration or n to reject it and
make changes.
If you type n, bootstrap restarts from the beginning. Most prompts display the previous
value you entered. Press Enter to accept the previous value (if present), or type a new
value to correct the entry.
When bootstrap is complete, the system restarts. After the restart, the console displays the
logon prompt. You are now ready to run the setup wizard.
You can re-run bootstrap (for example, to change certain IP addresses) after initial installation
from the CLI using the bootstrap command. You cannot re-run bootstrap to change the
operating role of the appliance.
Chapter 8
Running the setup wizard
This chapter includes the following topics:
Note: The appliance may take a few minutes to boot and start the required services before
the setup wizard can be run. If the IP address of the management port is not responsive, wait
a few minutes before attempting to connect and proceeding with the setup wizard.
Running the setup wizard 67
Running the setup wizard
Note: You must use the HTTPS protocol when you type the address of the setup wizard.
The HTTPS protocol is required.
6 Respond to the prompts on each screen to complete the mandatory configuration. Click
Next to go to the next screen, or click Previous to return to a screen you completed.
The following table describes the additional prompts in the setup wizard and how to
respond to them.
Upload License Click Browse to locate the license file, and select
the file. When you click Next, ATP uploads the
file.
SMTP Settings You can enter the SMTP settings in the setup
wizard, or you can check Skip adding SMTP
server configuration and specify the settings
later in ATP Manager.
7 Click Save.
8 Click Exit to end the setup wizard and display the ATP Manager logon screen.
Chapter 9
Completing installation
This chapter includes the following topics:
Note: Ensure that you use the HTTPS protocol to access ATP Manager.
3 For certain web browsers, you may need to configure a certificate security exception to
access ATP Manager.
Typically, this step is only required at the first logon per computer per session.
See “Configuring secure access to ATP Manager” on page 69.
Completing installation 71
Defining internal networks to ATP
Note: Use Default is not available until you configure the default internal network
configuration.
Note: In the bypass mode, the Ethernet cables on the LAN port and the WAN port are
interconnected. You must ensure that the total length of the interconnected cables does not
exceed the maximum Ethernet cable length. The Ethernet cable length per ANSI/TIA/EIA
cabling standards is 100m for Cat5e and Cat6. For more information on the Ethernet cable
length, refer the ANSI/TIA/EIA cabling standards.
3 Try to access the Internet from a computer in the LAN that the device monitors or protects.
You should be able to access the Internet. The bypass LEDs on the back of the ATP
appliance should be on, but not blinking.
4 In ATP Manager, click Settings > Appliances, select the device from the list. Then click
the toggle switch in the Scanning field to set scanning to the On position. Click Ok if a
warning dialog appears asking if you want to proceed.
5 Test ATP to ensure that it functions properly.
See “Testing ATP for successful monitoring or blocking” on page 73.
Warning: Rollback is not supported. You should perform a remote backup of your data before
you proceed with the upgrade.
■ During the upgrade procedure, your ATP installation is unavailable for normal operation.
The length of time the installation is down varies depending on the amount of migrated
data. In most cases, downtime is expected to be 4 hours or less.
■ Data migration to version 3.1 is more extensive than previous migrations. For this reason,
you should schedule the migration to occur during off-peak or non-operational hours.
■ You are asked to verify the upgrade.
■ The system health status displays Warning during the migration process.
■ Progress updates and error messages are available in the portal under Logging > System
Activity. The quick filter Features > Data Migration, provides data migration statistics.
Data migration during upgrade to ATP v.3.1 75
About the data migration process
■ See “About the data migration process” on page 75. This topic provides additional
information about service availability during the migration process, and the data migration
sequence.
■ Clear your browser cache after the upgrade.
Operational data
Operational data corresponds to entities in the system such as endpoints, files, domains, and
aggregates. This data is displayed on the dashboard event activity widget.
Operational data is migrated after the product is upgraded to version 3.1.0, but before the
product is restarted. When the ATP Manager is available after restart, the ATP admin can view
all entities and the dashboard, with the following exceptions:
■ Dashboard click-through to corresponding events are not available until migration of
non-operational data is in progress.
■ Related entities and incidents are not available until the migration of non-operational data
is in progress.
Non-operational data
Non-operational data corresponds to historical events, incidents, command results, command
states, and system log. This data is migrated after the appliance is restarted after upgrade to
3.1.0. This data is migrated in three phases:
■ Phase 1
Data migration during upgrade to ATP v.3.1 76
About the data migration process
■ Phase 2
■ Migrates the live response events from the last 7 days.
■ The time to complete Phase 2 depends on size, but should complete in the first 2 days
to 5 days after the upgrade.
■ No additional services are enabled after this phase is complete.
■ Phase 3
■ Migrates all remaining indexes.
Note: The migration only moves indexes from the last 3 months.
Note: During the migration, ATP the System Health Indicator in the upper-right corner of ATP
Manager displays as yellow. When the migration is complete, this indicator displays as green.
See “Data migration during upgrade to Symantec Advanced Threat Protection v.3.1” on page 74.
Appendix A
Ports, connectors, and
indicators on the appliance
This appendix includes the following topics:
USB port You can use this port to attach a keyboard or a mouse to use for the
command-line interface.
WAN/Monitor1 Ethernet port In tap mode, connect the Monitor1 port to the network tap device or a
(ATP 8840) monitoring port on a switch for SPAN.
In inline mode, connect the WAN port to a switch toward your Internet
connection or to your firewall.
LAN/Monitor2 Ethernet port In tap mode, you may connect the Monitor2 port to the network tap device
(ATP 8840) or a monitoring port on a switch for SPAN.
In inline mode, connect the LAN port to a switch that is connected to your
internal network.
Ports, connectors, and indicators on the appliance 78
About appliance ports, connectors, and indicators
WAN1/Monitor1 Ethernet port In tap mode, connect the Monitor1 port to the network tap device or a
(ATP 8880) monitoring port on a switch for SPAN.
In inline mode, connect the WAN1 port to a switch toward your Internet
connection or to your firewall.
LAN1/Monitor2 Ethernet port In tap mode, you may connect the Monitor2 port to the network tap device
(ATP 8880) or a monitoring port on a switch for SPAN.
WAN2/Monitor3 Ethernet port In tap mode, you may connect the Monitor3 port to the network tap device
(ATP 8880) or a monitoring port on a switch for SPAN.
In inline mode, connect the WAN2 port to a switch toward your Internet
connection or to your firewall.
LAN2/Monitor4 Ethernet port In tap mode, you may connect the Monitor4 port to the network tap device
(ATP 8880) or a monitoring port on a switch for SPAN.
Management (Mgmt) Ethernet Connect the management port to a switch that is connected to your
port internal network.
The management port must have access to the following:
Power This connector provides power to the appliance. Your appliance may
have an extra, redundant power connector.
iDRAC Ethernet port You can connect the iDRAC port to a port on a switch or to a PC during
initial bring up.
Bypass NIC LED indicators Three pairs of LED indicators appear on the bypass NIC card.
The Link/Activity pair is solid green, and blinks green on activity when
bypass mode is off. It is off when bypass mode is on.
The Bypass pair is solid green when the appliance is running in bypass
mode, and is off when bypass mode is off.
A D
all-in-one device DHCP 21, 49–50
about 24 DNS server 18, 63
setting the role in bootstrap 63
antivirus 8 E
ATP
ESXi server 52, 54, 56, 58
about 7
ATP Manager 69
See also certificates F
See also password firewall 35
accessing 69–70
creating initial administrator account 68 I
screen resolution 12 iDRAC 10, 48–50
supported browsers 12 Inline Block/Monitor mode 25
See also bypass mode
B See also static routes
Blacklist 8 about 25–26
bootstrap 62 cable configurations 30, 55
browsers, supported 12 Insight 8
bypass mode internal networks 71
about 27 ISO file
NIC LED indicators 78 not supported for virtual appliance 57
testing 72
unavailable in virtual appliance 27, 52 L
license 68
C login credentials
cabling ATP Manager initial administrator 68
crossover 32 bootstrap 62
for Inline Block/Monitor mode 46 console 61, 63
for Tap/Span mode 32–33, 46 iDRAC 51, 61
physical appliance 43, 46 setup wizard 67
virtual appliance 58
certificates M
about 69 management network 32
third-party 69 management platform/network scanner
console access about 23
physical appliance 61 setting the role in bootstrap 63–64
virtual appliance 61 management port 32
Cynic 8 mirroring, in tap mode 30
Mobile Insight 8
Index 81
N T
network configuration diagrams 32, 54 Tap/Span mode
network scanner. See management platform/network about 28
scanner cable configurations 30, 32–33, 54
NIC card 27, 78 testing 73
NTP server 65 Targeted Attack Analytics 36
testing
O bypass mode 72
monitoring mode 73
operating mode 17
operating role 23
See also all-in-one device V
See also management platform/network scanner Vantage 8
changing the operating role 24 virtual appliance
OVA template 52, 57 about 52
installing 57
P system requirements 11
virtual adapters 53, 59
password
virtual switches 54, 56, 58
bootstrap 62
communications channel 64
console 61, 63 W
iDRAC 51, 61 web browsers
setup wizard 67 requirements 12
physical appliance screen resolution for ATP Manager 12
iDRAC 10, 48–50 supported 12
installing ATP 8840 43 Whitelist 8
installing ATP 8880 45
system requirements 10
ports
connections to 29
on firewall 35
on physical appliance 43, 46, 77
on virtual appliance 56
used by ATP 35
proxy server
placement in network 32
recommendations 41
S
setup wizard 66
SMTP 68
SONAR 8
static routes 18, 64
Symantec Advanced Threat Protection. See ATP
Symantec Email Security.cloud 7
Symantec Endpoint Protection 7
Synapse correlation
system requirements 13