30
Symantec™ Web Security Deployment Guide

Symantec™ Web Security Deployment Guide · PDF fileSymantec™ Web Security Deployment Guide ... gateway or on a mail server, provided that You have a license to the Software for

Embed Size (px)

Citation preview

Page 1: Symantec™ Web Security Deployment Guide · PDF fileSymantec™ Web Security Deployment Guide ... gateway or on a mail server, provided that You have a license to the Software for

Symantec™ Web Security Deployment Guide

Page 2: Symantec™ Web Security Deployment Guide · PDF fileSymantec™ Web Security Deployment Guide ... gateway or on a mail server, provided that You have a license to the Software for

Symantec™ Web Security Deployment GuideThe software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

Documentation version 2.5

Copyright NoticeCopyright 1996–2002 Symantec Corporation. All Rights Reserved.

Any technical documentation that is made available by Symantec Corporation is the copyrighted work of Symantec Corporation and is owned by Symantec Corporation.

NO WARRANTY. The technical documentation is being delivered to you AS-IS, and Symantec Corporation makes no warranty as to its accuracy or use. Any use of the technical documentation or the information contained therein is at the risk of the user. Documentation may include technical or other inaccuracies or typographical errors. Symantec reserves the right to make changes without prior notice.

No part of this publication may be copied without the express written permission of Symantec Corporation, 20330 Stevens Creek Blvd., Cupertino, CA 95014.

TrademarksSymantec and the Symantec logo are registered trademarks of Symantec Corporation and its subsidiaries. Symantec Web Security, AutoLock, AutoAlert, Dynamic Document Review, and Bloodhound are trademarks of Symantec Corporation and its subsidiaries. Sun, Sun Microsystems, the Sun logo, Solaris, Java, Netra, iPlanet and all iPlanet-based trademarks and logos are trademarks or registered trademarks of Sun Microsystems, Inc., in the United States and other countries. SPARC is a registered trademark of SPARC International, Inc. Products bearing SPARC trademarks are based on an architecture developed by Sun Microsystems, Inc. Apple and Macintosh are trademarks of Apple Computer, Inc., registered in the United States and other countries. Microsoft, Windows, Windows NT, Active Directory, and the Windows logo are registered trademarks or trademarks of Microsoft Corporation in the United States and other countries. IBM and SecureWay are registered trademarks of IBM in the United States. FireWall-1 and Check Point are trademarks or registered trademarks of Check Point Software Technologies Ltd. Netscape Navigator is a registered trademark of Netscape Communications Corporation in the United States and other countries. Intel and Pentium are registered trademarks of Intel Corporation. Adobe, Acrobat, and Acrobat Reader are trademarks of Adobe Systems Incorporated.

THIS PRODUCT IS NOT ENDORSED OR SPONSORED BY ADOBE SYSTEMS INCORPORATED, PUBLISHERS OF ADOBE ACROBAT.

Other brands and product names mentioned in this manual may be trademarks or registered trademarks of their respective companies and are hereby acknowledged.

Printed in the United States of America. 10 9 8 7 6 5 4 3 2 1

Page 3: Symantec™ Web Security Deployment Guide · PDF fileSymantec™ Web Security Deployment Guide ... gateway or on a mail server, provided that You have a license to the Software for

SYMANTEC SOFTWARE LICENSE AGREEMENT ENTERPRISE ANTIVIRUS SOFTWARE

THIS LICENSE AGREEMENT SUPERSEDES THE LICENSE AGREEMENT CONTAINED IN THE SOFTWARE INSTALLATION AND DOCUMENTATION.

SYMANTEC CORPORATION AND/OR ITS SUBSIDIARIES ("SYMANTEC") IS WILLING TO LICENSE THE SOFTWARE TO YOU AS AN INDIVIDUAL, THE COMPANY, OR THE LEGAL ENTITY THAT WILL BE UTILIZING THE SOFTWARE (REFERENCED BELOW AS "YOU OR YOUR") ONLY ON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS OF THIS LICENSE AGREEMENT. READ THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT CAREFULLY BEFORE USING THE SOFTWARE. THIS IS A LEGAL AND ENFORCEABLE CONTRACT BETWEEN YOU AND THE LICENSOR. BY OPENING THIS PACKAGE, BREAKING THE SEAL, CLICKING ON THE "AGREE" OR "YES" BUTTON OR OTHERWISE INDICATING ASSENT ELECTRONICALLY, OR LOADING THE SOFTWARE, YOU AGREE TO THE TERMS AND CONDITIONS OF THIS AGREEMENT. IF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS, CLICK ON THE "I DO NOT AGREE", "NO" BUTTON, OR OTHERWISE INDICATE REFUSAL AND MAKE NO FURTHER USE OF THE SOFTWARE.

1. License.The software and documentation that accompanies this license (collectively the "Software") is the proprietary property of Symantec or its licensors and is protected by copyright law. While Symantec continues to own the Software, You will have certain rights to use the quantity of the Software for which You have paid the applicable license fees after Your acceptance of this license. This license governs any releases, revisions, or enhancements to the Software that the Licensor may furnish to You. Except as may be modified by an applicable Symantec license certificate, license coupon, or license key (each a "License Module") that accompanies, precedes, or follows this license, Your rights and obligations with respect to the use of licensed copies of this Software are as follows:

You may:A. use the Software in the manner described in the Software documentation and in accordance with the License Module. If the Software is part of an offering containing multiple Software titles, the aggregate number of copies You may use may not exceed the aggregate number of licenses indicated in the License Module, as calculated by any combination of licensed Software titles in such offering. Your License Module shall constitute proof of Your right to make such copies. If no License Module accompanies, precedes, or follows this license, You may make one copy of the Software You are authorized to use on a single machine; B. make one copy of the Software for archival purposes, or copy the Software onto the hard disk of Your computer and retain the original for archival purposes;C. use the Software on a network or to protect a network such as at the gateway or on a mail server, provided that You have a license to the Software for each computer that can access the network; D. after written consent from Symantec, transfer the Software on a permanent basis to another person or entity, provided that You retain no copies of the Software and the transferee agrees to the terms of this license; and

E. use the Software in accordance with any additional permitted uses set forth in Section 8, below.

You may not:A. copy the printed documentation which accompanies the Software; B. sublicense, rent or lease any portion of the Software; reverse engineer, decompile, disassemble, modify, translate, make any attempt to discover the source code of the Software, or create derivative works from the Software; C. use a previous version or copy of the Software after You have received a disk replacement set or an upgraded version. Upon upgrading the Software, all copies of the prior version must be destroyed; D. use a later version of the Software than is provided herewith unless You have purchased corresponding maintenance and/or upgrade insurance or have otherwise separately acquired the right to use such later version;E. use, if You received the software distributed on media containing multiple Symantec products, any Symantec software on the media for which You have not received a permission in a License Module; F. use the Software in any manner not authorized by this license; norG. use the Software in any manner that contradicts any additional restrictions set forth in Section 8, below.

2. Content Updates:Certain Symantec software products utilize content that is updated from time to time (antivirus products utilize updated virus definitions; content filtering products utilize updated URL lists; some firewall products utilize updated firewall rules; vulnerability assessment products utilize updated vulnerability data, etc.; collectively, these are referred to as "Content Updates"). You may obtain Content Updates for any period for which You have purchased upgrade insurance for the product, entered into a maintenance agreement that includes Content Updates, or otherwise separately acquired the right to obtain Content Updates. This license does not otherwise permit You to obtain and use Content Updates.

3. Limited Warranty:Symantec warrants that the media on which the Software is distributed will be free from defects for a period of sixty (60) days from the date of delivery of the Software to You. Your sole remedy in the event of a breach of this warranty will be that Symantec will, at its option, replace any defective media returned to Symantec within the warranty period or refund the money You paid for the Software. Symantec does not warrant that the Software will meet Your requirements or that operation of the Software will be uninterrupted or that the Software will be error-free.

THE ABOVE WARRANTY IS EXCLUSIVE AND IN LIEU OF ALL OTHER WARRANTIES, WHETHER EXPRESS OR IMPLIED, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS. THIS WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS. YOU MAY HAVE OTHER RIGHTS, WHICH VARY FROM STATE TO STATE AND COUNTRY TO COUNTRY.

Page 4: Symantec™ Web Security Deployment Guide · PDF fileSymantec™ Web Security Deployment Guide ... gateway or on a mail server, provided that You have a license to the Software for

4. Disclaimer of Damages:

SOME STATES AND COUNTRIES, INCLUDING MEMBER COUNTRIES OF THE EUROPEAN ECONOMIC AREA, DO NOT ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES SO THE BELOW LIMITATION OR EXCLUSION MAY NOT APPLY TO YOU.

TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW AND REGARDLESS OF WHETHER ANY REMEDY SET FORTH HEREIN FAILS OF ITS ESSENTIAL PURPOSE, IN NO EVENT WILL SYMANTEC BE LIABLE TO YOU FOR ANY SPECIAL, CONSEQUENTIAL, INDIRECT OR SIMILAR DAMAGES, INCLUDING ANY LOST PROFITS OR LOST DATA ARISING OUT OF THE USE OR INABILITY TO USE THE SOFTWARE EVEN IF SYMANTEC HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

IN NO CASE SHALL SYMANTEC'S LIABILITY EXCEED THE PURCHASE PRICE FOR THE SOFTWARE. The disclaimers and limitations set forth above will apply regardless of whether You accept the Software.

5. U.S. Government Restricted Rights:RESTRICTED RIGHTS LEGEND. All Symantec products and documentation are commercial in nature. The software and software documentation are "Commercial Items", as that term is defined in 48 C.F.R. section 2.101, consisting of "Commercial Computer Software" and "Commercial Computer Software Documentation", as such terms are defined in 48 C.F.R. section 252.227-7014(a)(5) and 48 C.F.R. section 252.227-7014(a)(1), and used in 48 C.F.R. section 12.212 and 48 C.F.R. section 227.7202, as applicable. Consistent with 48 C.F.R. section 12.212, 48 C.F.R. section 252.227-7015, 48 C.F.R. section 227.7202 through 227.7202-4, 48 C.F.R. section 52.227-14, and other relevant sections of the Code of Federal Regulations, as applicable, Symantec's computer software and computer software documentation are licensed to United States Government end users with only those rights as granted to all other end users, according to the terms and conditions contained in this license agreement. Manufacturer is Symantec Corporation, 20330 Stevens Creek Blvd., Cupertino, CA 95014, United States of America.

6. Export Regulation:Export, re-export of this Software is governed by the laws and regulations of the United States and import laws and regulations of certain other countries Export or re-export of Software to any entity on the Denied Parties List and other lists promulgated by various agencies of the United States Federal Government is strictly prohibited.

7. General:If You are located in North America or Latin America, this Agreement will be governed by the laws of the State of California, United States of America. Otherwise, this Agreement will be governed by the laws of England. This Agreement and any related License Module is the entire agreement between You and Symantec relating to the Software and: (i) supersedes all prior or contemporaneous oral or written communications, proposals and representations with respect to its subject matter; and (ii) prevails over any conflicting or additional terms of any quote, order, acknowledgment or similar communications between the parties. This Agreement shall terminate upon Your breach of any term contained herein and You shall cease use of and destroy all copies of the Software. The disclaimers of warranties and damages and limitations on liability shall survive

termination. The original of this Agreement has been written in English and English is the governing language of this Agreement. This Agreement may only be modified by a License Module which accompanies this license or by a written document which has been signed by both You and Symantec. Should You have any questions concerning this Agreement, or if You desire to contact Symantec for any reason, please write to: (i) Symantec Customer Service, 555 International Way, Springfield, OR 97477, U.S.A. or (ii) Symantec Customer Service Center, PO BOX 5689, Dublin 15, Ireland.

8. Additional Restrictions for Specified Software:A. If the Software You have licensed is a specified Symantec AntiVirus™ for a third party product or platform, You may only use that specified Software with the corresponding product or platform. You may not allow any computer to access the Software other than a computer using the specified product or platform. In the event that You wish to use the Software with a certain product or platform for which there is no specified Software, You may use Symantec AntiVirus Scan Engine.

B. If the Software you have licensed is Symantec AntiVirus for NetApp® Filer the following additional use(s) and restriction(s) apply:i)You may use the Software only with a NetApp Filer server;ii)You may use the Software only with files accessed through a NetApp Filer; andiii)You may not use the Software on a server that exceeds the specified capacity set forth in Your License Module.

C. If the Software you have licensed is Symantec AntiVirus for Web Servers, the following additional use(s) and restriction(s) apply:i)You may use the Software only with files that are received from third parties through a web server;ii)You may use the Software only with files received from less than 10,000 unique third parties per month; andiii)You may not charge or assess a fee for use of the Software for Your internal business.

D. If the Software You have licensed is Symantec Web Security, independent of version or operating platform designation, upon the expiration of Your right to acquire Content Updates, the filtering definitions corresponding with all previous Content Updates will be entirely deleted and will no longer be available for use with the Software. Upon the expiration of Your right to acquire Content Updates, access to updated virus definitions will no longer be available, however, You may continue to use virus definitions previously acquired.

E. If the Software You have licensed is Symantec AntiVirus Corporate Edition, You may not use the Software on or with devices on Your network running embedded operating systems specifically supporting network attached storage functionality without separately licensing a version of such Software specifically licensed for a specific type of network attached storage device under a License Module.

F. If the Software You have licensed is Symantec AntiVirus for EMC® Celerra™ File Server, You may use the Software only with EMC Celerra servers and only if You have a license to the Software for each Celerra AntiVirus Agent (CAVA) associated with each such server. You may not allow any computer to access the Software other than an EMC Celerra server.-----------------------------

Page 5: Symantec™ Web Security Deployment Guide · PDF fileSymantec™ Web Security Deployment Guide ... gateway or on a mail server, provided that You have a license to the Software for

NetApp is a registered trademark of Network Appliance, Inc. in the U.S. and other countries.

EMC and Celerra are trademarks or registered trademarks of EMC Corporation in the U.S. and other countries.

Page 6: Symantec™ Web Security Deployment Guide · PDF fileSymantec™ Web Security Deployment Guide ... gateway or on a mail server, provided that You have a license to the Software for

Contents

Deploying Symantec™ Web Security 2.5Using Symantec Web Security ......................................................................... 8Symantec Web Security deployment modes ................................................... 9

Deploying Symantec Web Security as a proxy within a network ........... 9Symantec Web Security as a firewall plug-in that supports CVP ......... 10

General deployment guidelines ...................................................................... 11Server sizing ............................................................................................. 11DNS setup ................................................................................................ 12Accompanying router/firewall settings .................................................. 13Browser settings ....................................................................................... 13

Specific deployment options and guidelines ................................................. 14Proxy deployment ................................................................................... 15Deployment as a CVP resource .............................................................. 16Proxy versus CVP .................................................................................... 17Deployment as a downstream proxy ...................................................... 20Deployment upstream of a NAT device ................................................. 22Multiple proxy deployment .................................................................... 24

Other deployment-related options ................................................................ 26Automatic browser configuration capabilities ....................................... 26Transparent proxy capabilities ............................................................... 26

Index

Page 7: Symantec™ Web Security Deployment Guide · PDF fileSymantec™ Web Security Deployment Guide ... gateway or on a mail server, provided that You have a license to the Software for

Deploying Symantec™ Web Security 2.5

This chapter includes the following topics:

■ Using Symantec Web Security

■ Symantec Web Security deployment modes

■ General deployment guidelines

■ Specific deployment options and guidelines

■ Other deployment-related options

Page 8: Symantec™ Web Security Deployment Guide · PDF fileSymantec™ Web Security Deployment Guide ... gateway or on a mail server, provided that You have a license to the Software for

8 Deploying Symantec™ Web Security 2.5Using Symantec Web Security

Using Symantec Web SecuritySymantec Web Security protects your Web traffic (HTTP/FTP) by scanning for viruses and inappropriate content using leading antivirus and filtering technologies at the gateway. Symantec Web Security combines heuristic safety-net technologies with list-based techniques to protect against known and unknown virus threats and nonbusiness-related Web sites.

Symantec Web Security is available in three variations: a dedicated gateway virus scanner, a dedicated Web content filter, or an integrated antivirus and Web content filtering solution. The same executable is delivered for all three variants, with the different levels of functionality activated by different license keys. The Symantec Web Security Implementation Guide provides details on using the software.

This document helps you deploy Symantec Web Security on your network. It covers the basic deployment options, as well as the issues associated with each option.

This document addresses three general topics:

■ How Symantec Web Security operates and the basic steps needed to ensure that it installs and runs smoothly, including the necessary DNS settings and the importance of proper server sizing.

■ How Symantec Web Security can be used within your network, including the available deployment options (stand-alone proxy, CVP resource, and so on).

■ Other tools and capabilities that exist to aid in the deployment, including the use of built-in capabilities (like the transparent proxy capability) and existing administrative tools for aiding in the deploying and maintaining of Symantec Web Security.

This document is not a detailed discussion of Symantec Web Security features. Detailed user information is contained in the Symantec Web Security Implementation Guide. Similarly, this document does not provide detailed configuration information about specific deployment-related devices (for example, how to configure your router to redirect packets to a designated proxy server). Wherever possible, links to documents that contain more detailed information are included.

Since Symantec Web Security is available in three variations, any discussions in this document pertaining to functions performed by Symantec Web Security in various deployment scenarios assume that the specific function being described (either virus scanning or Web content filtering) is available in the variation that you are deploying.

Page 9: Symantec™ Web Security Deployment Guide · PDF fileSymantec™ Web Security Deployment Guide ... gateway or on a mail server, provided that You have a license to the Software for

9Deploying Symantec™ Web Security 2.5Symantec Web Security deployment modes

This document is updated periodically with the latest information on deployment options, tools, and operating tips available for Symantec Web Security. Check with a Symantec sales or technical support representative for the latest information.

Symantec Web Security deployment modesSymantec Web Security can be deployed as a proxy within a network or as a plug-in to a firewall compliant with Content Vectoring Protocol (CVP).

Deploying Symantec Web Security as a proxy within a networkSymantec Web Security receives all outbound HTTP, HTTPS, and FTP requests from client computers within the network, since users’ Web browsers have been configured to send those requests to the Symantec Web Security proxy.

Symantec Web Security processes the requests to determine if the content is appropriate in accordance with the Web browsing policies set by the administrator.

One of the following occurs:

■ If the requests are allowed, Symantec Web Security issues the requests to the Internet.

■ Symantec Web Security denies the requests and the requests are prevented from going any further, and the requesting clients are notified.

Symantec Web Security receives the inbound HTTP, HTTPS, and FTP traffic and scans it for viruses and inappropriate content. Only allowed Web content and virus-free files are returned to the requesting clients.

Page 10: Symantec™ Web Security Deployment Guide · PDF fileSymantec™ Web Security Deployment Guide ... gateway or on a mail server, provided that You have a license to the Software for

10 Deploying Symantec™ Web Security 2.5Symantec Web Security deployment modes

Deploying Symantec Web Security as a proxy within a network is illustrated in the following figure.

Symantec Web Security as a firewall plug-in that supports CVPYou can deploy Symantec Web Security as a CVP resource (or plug-in) to a CVP-compliant firewall as follows.

All inbound HTTP, HTTPS, and FTP traffic received by the firewall is passed using CVP to the designated CVP resource running Symantec Web Security for virus and content scanning. Symantec Web Security may be running on the same server as the firewall or on a separate server.

Symantec Web Security passes only the allowed and virus-free files back to the firewall. The allowed and virus-free files are passed to the client computer, and the filtered files are passed to the requesting users.

Symantec Web Security

All Web-based traffic (HTTP, HTTPS, FTP)

Corporate firewall

Page 11: Symantec™ Web Security Deployment Guide · PDF fileSymantec™ Web Security Deployment Guide ... gateway or on a mail server, provided that You have a license to the Software for

11Deploying Symantec™ Web Security 2.5General deployment guidelines

Deploying Symantec Web Security as a plug-in to a CVP-compliant firewall is illustrated in the following figure.

General deployment guidelinesThis section discusses general guidelines that should be followed regardless of which deployment mode you choose. In additon, each deployment option is discussed in greater detail, including the advantages and disadvantages of each option.

See “Specific deployment options and guidelines” on page 14.

Server sizingIt is critical that the servers running Symantec Web Security are correctly sized to process the volume of anticipated Web traffic based on the number of users that might make simultaneous Web requests. Generally, about 20-40% of the total number of desktops/nodes within a network are making simultaneous requests. However, there are situations and organizations where this percentage is significantly higher. Sustained traffic loads of 1000 (or more) simultaneous users require more than one server running Symantec Web Security for optimal performance and redundancy. Symantec system engineers and technical support staff can provide you with recommendations for processor speed, RAM, and hard disk configurations based on your anticipated or observed Web traffic.

Symantec Web Security

CVP-compliant firewall

All Web-based traffic (HTTP, HTTPS, FTP)

CVP

Page 12: Symantec™ Web Security Deployment Guide · PDF fileSymantec™ Web Security Deployment Guide ... gateway or on a mail server, provided that You have a license to the Software for

12 Deploying Symantec™ Web Security 2.5General deployment guidelines

The examples in this document illustrate single-server deployment. You have the choice of running multiple Symantec Web Security servers and deploying them using one of the following methods:

■ Fully centralized deployments: Use one or more appropriately-sized Symantec Web Security servers at a central location that proxy and process requests. For example, an entire company or school district.

■ Fully distributed deployments: Require an appropriately-sized Symantec Web Security server at each end-user site. For example, at branch office locations or schools within a district.

■ Hybrid deployments: Mix the fully centralized and fully distributed approaches that involve placing dedicated and appropriately-sized servers at each of the end-user sites where the heaviest Internet traffic is expected, while lower-traffic sites proxy through servers located at a central site to complete the picture.

Deciding whether to use a fully centralized or fully distributed deployment is usually driven by the available bandwidth that connects the end-user sites and the point where the Internet connection is established. Cost is also a factor, which usually results in considering the hybrid deployment as a middle ground solution.

DNS setupProper DNS setup is critical to operating Symantec Web Security. Improperly configured DNS settings are responsible for a large number of installation and performance-related issues.

For more information, see the Symantec Web Security Implementation Guide.

The DNS server that is referenced/used by the server running Symantec Web Security must contain the following records:

■ An A (address) record that maps the Symantec Web Security server’s host name to its IP address. Each Symantec Web Security server requires an A record.

■ A PTR (pointer) record that maps the Symantec Web Security server’s IP address to its host name, including the domain name. Each Symantec Web Security server requires a PTR record.

To ensure that the DNS server entries are configured properly for each Symantec Web Security server being deployed, you must issue two nslookup commands:

■ A command on the Symantec Web Security server’s hostname to ensure that the address records are in effect.

Page 13: Symantec™ Web Security Deployment Guide · PDF fileSymantec™ Web Security Deployment Guide ... gateway or on a mail server, provided that You have a license to the Software for

13Deploying Symantec™ Web Security 2.5General deployment guidelines

■ A second command on the Symantec Web Security server’s IP address to ensure that the corresponding pointer records are in effect.

You should always be able to resolve both the Symantec Web Security server names as well as the corresponding IP addresses from computers other than the Symantec Web Security servers.

Accompanying router/firewall settingsSymantec Web Security can be configured to prevent unwanted Web traffic and viruses from entering your network. To prevent users from bypassing the content filtering and virus scanning settings/policies you have selected, enact appropriate rules (access lists) at the router and/or firewalls within your network. Configure your router or firewall so that it processes only HTTP, HTTPS, and FTP requests that originate from the Symantec Web Security server.

The fully distributed or hybrid deployment options described previously require using multiple Symantec Web Security servers distributed throughout the network. Settings can be added to prevent users from attempting to proxy through other Symantec Web Security servers within the network, since those servers might be enforcing less restrictive filtering and virus-scanning settings than the server the user should be using.

Additional settings to prevent users from switching to other Symantec Web Security servers are unnecessary in situations where multiple Symantec Web Security servers are intended to balance the traffic load from all users via a third-party load-balancing mechanism.

When such settings are enabled, an FTP request issued from a command line results in the request not being processed, since it does not originate from the Symantec Web Security server. If the proper settings are in place in the Web browser, visiting and downloading data from an FTP site from within a browser results in the request being processed and scanned for content and viruses by Symantec Web Security.

These settings should always be enabled, regardless of the means by which Web requests are being directed to the server running Symantec Web Security (for example, whether you are using browser-based redirection of requests, or the available transparent proxying capabilities in Symantec Web Security).

Browser settingsIn the proxy or CVP deployment modes, the HTTP, HTTPS, and FTP requests issued by users must be directed toward the server running Symantec Web Security.

Page 14: Symantec™ Web Security Deployment Guide · PDF fileSymantec™ Web Security Deployment Guide ... gateway or on a mail server, provided that You have a license to the Software for

14 Deploying Symantec™ Web Security 2.5Specific deployment options and guidelines

In the proxy deployment, all HTTP, HTTPS, and FTP requests issued by users must be directed to the Symantec Web Security proxy server. This is accomplished using either browser redirection or transparent proxy.

Browser redirectionBrowser redirection involves configuring each client browser to use the Symantec Web Security server as the HTTP, HTTPS, and FTP proxy. These settings can be made manually or by using automatic browser configuration provided by administration toolkits, such as the Internet Explorer Administration Kit.

Transparent proxyTransparent proxying involves using the transparent proxy capabilities available in Symantec Web Security, in conjunction with associated software, to pass each client’s HTTP, HTTPS, and FTP requests to the Symantec Web Security servers without having to explicitly set each client browser to point at the Symantec Web Security server.

Note: This option is available only when running Symantec Web Security on a Solaris® operating system.

Browser settings and CVPWhen deploying Symantec Web Security as a CVP resource, it is not required that Web browser settings be changed to specify the Symantec Web Security server as the HTTP, HTTPS, and FTP proxy. The firewall performs the redirection of data to Symantec Web Security. While this appears to be a convenient and time-saving feature, it increases the processing load on the firewall and reduces the effectiveness of the content filter.

Even in deployments where Symantec Web Security is being used as a CVP resource, it can also be accessed as a proxy (both the proxy and CVP functionality are always available), so that after Symantec Web Security is deployed as a CVP resource, users can be made to transition over time to the higher-performing proxy implementation (using browser redirection to point to the Symantec Web Security server) without reinstalling or reconfiguring Symantec Web Security.

Specific deployment options and guidelinesThis section covers the proxy and CVP deployment options in greater detail, including primary advantages and disadvantages associated with each option.

Page 15: Symantec™ Web Security Deployment Guide · PDF fileSymantec™ Web Security Deployment Guide ... gateway or on a mail server, provided that You have a license to the Software for

15Deploying Symantec™ Web Security 2.5Specific deployment options and guidelines

Proxy deploymentIn proxy deployment, all unfiltered client HTTP, HTTPS, and FTP requests are directed to the Symantec Web Security server using the browser redirection or transparent proxy method.

The Symantec Web Security server applies initial filtering on the outbound request to ensure it is allowed in accordance with the settings for the user or client issuing the request.

One of the following occurs:

■ If the request is denied, it goes no further than the Symantec Web Security server, and a denial message is issued to the client.

■ If the request is allowed, the Symantec Web Security server issues the filtered request to the Internet.

If the filtered request is allowed, the request goes to the Internet, returns through the firewall, and is routed back to the Symantec Web Security server.

The Symantec Web Security server applies additional scanning for viruses and filtering for content before delivering the virus-free and appropriate content to the client that issued the request.

A Symantec Web Security server deployed in proxy mode is illustrated in the following figure.

Symantec Web Security

Client

Firewall or router

Unfiltered

Filtered

Page 16: Symantec™ Web Security Deployment Guide · PDF fileSymantec™ Web Security Deployment Guide ... gateway or on a mail server, provided that You have a license to the Software for

16 Deploying Symantec™ Web Security 2.5Specific deployment options and guidelines

Deployment as a CVP resourceIn CVP deployment, all unfiltered client HTTP, HTTPS, and FTP requests arrive at the CVP-compliant firewall.

An unfiltered request is made to the Internet. The resulting inbound unfiltered data is routed by the firewall to the Symantec Web Security server via CVP.

Symantec Web Security scans the data to ensure that it is virus-free and allowed in accordance with the browsing policy set for the user issuing the request.

After scanning, one of the following occurs:

■ Symantec Web Security delivers the filtered virus-free and appropriate content back to the firewall.

■ Symantec Web Security issues a denial notification.

The firewall routes the virus-free and appropriate content back to the client that issued the request.

A Symantec Web Security server deployed as a CVP resource is illustrated in the following figure.

CVP-compliant firewall

Symantec Web Security

Client

Unfiltered

Filtered

Page 17: Symantec™ Web Security Deployment Guide · PDF fileSymantec™ Web Security Deployment Guide ... gateway or on a mail server, provided that You have a license to the Software for

17Deploying Symantec™ Web Security 2.5Specific deployment options and guidelines

Proxy versus CVPBased on traffic flow for proxy and CVP deployment, there are several reasons for choosing proxy deployment.

Proxy deployment advantagesClient requests are initially processed at the proxy, allowing Web browsing policies to be enforced at the earliest possible opportunity. The only requests that proceed further than the Symantec Web Security proxy are those that have already been filtered for content. This “first pass” on the outgoing requests ensures that only requests that are in compliance with the browsing policy actually make it out to the Internet and use the available bandwidth on your network.

In proxy mode deployment, filtering initially occurs on the outbound user request to ensure that it is allowed in accordance with the settings for the user issuing the request, and additional filtering occurs after the request is returned from the Internet to the firewall. During CVP deployment, a request is made to the Internet and the resulting inbound data is filtered only after being routed by the firewall to the Symantec Web Security server.

Proxy mode deployment of Symantec Web Security can work with any firewall, whether it is a CVP-compliant firewall or not. You can easily transition to the higher-performing proxy deployment even if Symantec Web Security is initially deployed as a CVP resource.

Page 18: Symantec™ Web Security Deployment Guide · PDF fileSymantec™ Web Security Deployment Guide ... gateway or on a mail server, provided that You have a license to the Software for

18 Deploying Symantec™ Web Security 2.5Specific deployment options and guidelines

The proxy deployment option is illustrated in the following figure.

CVP deployment optionCVP deployment is considered less involved than proxy deployment because client browsers do not require reconfiguration, as is required in proxy mode to point clients to the appropriate proxy. However, when Symantec Web Security is deployed in CVP mode, scanning of data for content and viruses occurs after the data is retrieved from the Internet, forcing your firewall to process a higher volume of traffic.

When a request is issued to the Internet by entering a hostname/URL in a user’s browser, CVP passes data to the Symantec Web Security server. This data is not the requested hostname/URL, but instead is the corresponding IP address obtained from a reverse DNS lookup performed by the CVP-compliant firewall. This reduces the effectiveness of any filter lists from any vendor because the IP addresses assigned to specific hosts are prone to change, and because of popular

Any firewall, including Symantec Raptor, Checkpoint FW1, and others

Filter or AV application (as proxy)

NetworkUnfiltered

Filtered

1. All traffic directed to proxyfirst

2. Inappropriate requests arefiltered out

3. Only valid traffic or requests are sent to the firewall

Page 19: Symantec™ Web Security Deployment Guide · PDF fileSymantec™ Web Security Deployment Guide ... gateway or on a mail server, provided that You have a license to the Software for

19Deploying Symantec™ Web Security 2.5Specific deployment options and guidelines

practices like virtual hosting (where several Web domains—each serving potentially different types of content—share a published/external IP address).

The CVP deployment option is illustrated in the following figure.

The sequence of events for both deployment options is summarized in Table 1-1.

Table 1-1 Need title hereXXX

Using CVP Using proxy

All user requests are passed to the firewall.

All user requests are passed to the proxy server.

All requested data is retrieved (before filtering).

All requests are filtered (first).

Data is passed to the filter or scanner for analysis.

Filtered requests are sent to the firewall.

Data is filtered or scanned. Data is retrieved from the Internet.

Checkpoint Firewall 1 using CVP

Network

CVP-compliant application

1. All requests are sent tothe firewall

2. All files are retrieved from the Internet first

3. All traffic is then sent toCVP-compliant application

4. Only clean and allowed data is passed through thefirewall

5. Allowed files are passedto the user

Unfiltered

Filtered

Page 20: Symantec™ Web Security Deployment Guide · PDF fileSymantec™ Web Security Deployment Guide ... gateway or on a mail server, provided that You have a license to the Software for

20 Deploying Symantec™ Web Security 2.5Specific deployment options and guidelines

With the advent of virtual hosting on the Internet, any Web filtering solution that relies solely on the list-based approach, and whose lists are comprised of IP addresses, is more prone to error from under- or over-filtering. In proxy or CVP mode, Symantec Web Security offers the list-based approach (with a database comprised of host names and IP addresses) and heuristics-based context-sensitive scanning in 14 languages to perform Web filtering.

Deployment as a downstream proxySymantec Web Security can be deployed as an initial, or downstream, proxy that receives HTTP, HTTPS, and FTP requests. After scanning, Symantec Web Securiy passes the data to an existing upstream proxy or caching appliance that might be on the network. This deployment is a slight variation of the standard proxy deployment.

All client HTTP, HTTPS, and FTP requests are directed to the Symantec Web Security server using the browser redirection or transparent proxy method.

As in standard proxy deployment, the Symantec Web Security server applies initial filtering on the outbound request.

One of the following occurs:

■ If the request is not allowed, it does not pass the Symantec Web Security server and a denial message is issued to the client.

■ If the request is allowed, the Symantec Web Security server passes the request to the next proxy by specifying the server name and port number of the upstream proxy in the proxy configuration section of Symantec Web Security’s administrative interface.

For more information, see the Symantec Web Security Implementation Guide.

The request goes out to the Internet, returns through the firewall, and is routed back to the Symantec Web Security server.

The Symantec Web Security server applies additional scanning for viruses and content before delivering the virus-free and appropriate content to the client that issued the request.

Filtered data is passed back to the firewall.

Filtered data is passed back to the proxy.

Data is passed to the user. Data is passed to the user.

Table 1-1 Need title hereXXX

Using CVP Using proxy

Page 21: Symantec™ Web Security Deployment Guide · PDF fileSymantec™ Web Security Deployment Guide ... gateway or on a mail server, provided that You have a license to the Software for

21Deploying Symantec™ Web Security 2.5Specific deployment options and guidelines

A Symantec Web Security server deployed as a downstream proxy is illustrated in the following figure.

Early versions of Symantec Web Security (including the initial release of Symantec Web Security 2.5) included a simple implementation of Web content caching. The caching feature was generally intended for use in environments in which the connection to the Internet is relatively slow (less than 128Kbps). If you are running a version of Symantec Web Security that includes the caching capability (in an environment with a high-speed Internet connection), it is recommended that the caching function be turned off—especially if the caching function is being performed by another device on the network, as illustrated in the previous figure.

If you are using Symantec Web Security downstream of or in conjunction with a dedicated, high-performance caching appliance, this option may help enhance performance.

To turn the caching function off

1 In the Symantec Web Security Administrative interface, log on.

Existing proxy or caching server

All Web-based traffic (HTTP, HTTPS, FTP)

Firewall

Symantec Web Security

Page 22: Symantec™ Web Security Deployment Guide · PDF fileSymantec™ Web Security Deployment Guide ... gateway or on a mail server, provided that You have a license to the Software for

22 Deploying Symantec™ Web Security 2.5Specific deployment options and guidelines

2 On the System object, click Modify.

3 In the Modify System dialog box, click Cache Configuration.

4 Click Next.

5 In the Modifying Cache Configuration dialog box under Do not cache pages from the following hosts or domains, type a period (.).

6 Click Finish.

Deployment upstream of a NAT deviceBeginning with build 45 of Symantec Web Security 2.5, the product can also be deployed upstream of an existing device that performs Network Address

Page 23: Symantec™ Web Security Deployment Guide · PDF fileSymantec™ Web Security Deployment Guide ... gateway or on a mail server, provided that You have a license to the Software for

23Deploying Symantec™ Web Security 2.5Specific deployment options and guidelines

Translation (NAT), such as certain types of proxies and switches. This situation is illustrated in the following figure.

In this type of a deployment, the Symantec Web Security 2.5 server receives requests that appear to originate from the NAT device (instead of from the client computer that originally issued the request). Normally, in this configuration, Symantec Web Security would only be able to enforce a common, "blanket" filtering policy for all users, since it is not able to differentiate between users (given that each user is associated with the IP address from which the user issued the requests, and that IP address has now been obscured by the downstream NAT device). In order to preserve the ability to enforce per-user filtering policies in this type of a deployment, Symantec Web Security 2.5 requires the setting of the "Proxy Authentication" switch in the shared-configuration file. This feature is enabled by setting the value of the "IGearUseProxyAuth" variable to 1 in the shared-configuration file. When enabled, this feature prompts Symantec Web Security to respond to the NAT device with a standard "Proxy Authentication Required" message if the request made to Symantec Web Security did not contain a Proxy Authentication header. If the downstream NAT device is capable of passing the header on, this in turn prompts the user's browser to issue a log-in box (as opposed to the usual Symantec Web Security login screen). The user can

“downstream” NAT device

“upstream” Symantec Web Security 2.5 server

Firewall

All Web-based traffic (HTTP, HTTPS, ftp)

Page 24: Symantec™ Web Security Deployment Guide · PDF fileSymantec™ Web Security Deployment Guide ... gateway or on a mail server, provided that You have a license to the Software for

24 Deploying Symantec™ Web Security 2.5Specific deployment options and guidelines

then provide their Symantec Web Security login and password (via the log-in box), and the authentication process proceeds normally (i.e., the login and password provided are then checked against whichever user directory has been selected in Symantec Web Security). Filtering is then applied in accordance with the policy in place for that user.

It should be noted that when using this feature, the user login and password information is only transmitted to the Symantec Web Security server as base-64 encoded data. This provides a lower level of security than the full 128-bit encryption that is also available with Symantec Web Security (please refer to the Symantec Web Security Implementation Guide for details).

Multiple proxy deploymentSymantec Web Security can be deployed using multiple servers throughout your network in a fully distributed or hybrid manner. You can also install multiple Symantec Web Security servers at a central site to perform virus and content scanning for the entire organization (fully centralized deployment), perhaps behind a load-balancing switch. In either scenario, all single-server deployment options are still available (along with the advantages and disadvantages of each), and all single-server guidelines still apply. When Symantec Web Security is deployed properly and the servers are properly sized and placed, it can be scaled to meet the virus and content scanning needs of virtually any organization.

Symantec Web Security 2.5 is capable of communicating with certain external directory servers (please refer to the Symantec Web Security Implementation Guide for details). This effectively centralizes user and group management; system administrators can add users and groups in a single location, and have each Symantec Web Security 2.5 server automatically recognize the (centrally stored) user and group information, as well as any changes to the user/group population. This is true regardless of whether a single Symantec Web Security 2.5 server is deployed, or whether a number of Symantec Web Security 2.5 servers are deployed to handle the volume of Web traffic. It is precisely in deployments where multiple Symantec Web Security servers are deployed, however, that the centralized user management features (provided by the communication with

Page 25: Symantec™ Web Security Deployment Guide · PDF fileSymantec™ Web Security Deployment Guide ... gateway or on a mail server, provided that You have a license to the Software for

25Deploying Symantec™ Web Security 2.5Specific deployment options and guidelines

external directory servers) are most useful. This situation is illustrated in the following figure.

If you are considering multiserver deployment of Symantec Web Security, contact a Symantec sales or technical support staff representative to recommend the best deployment options based on your specific needs and network topology.

Regardless of the number of Symantec Web Security servers deployed, they can each be configured to query the same LDAP database. This means that user and group information need only be entered once, and maintained in that single database. Any additions, deletions, or modifications to the user population (or group affiliations) made on that directory server are automatically recognized by each of the Symantec Web Security servers. In fact, the only time that users or groups ever have to be "imported" into any given Symantec Web Security server is when it is necessary to apply a policy setting to that group that is different from the "system" setting. In most situations, filter policy is applied on a group basis. If this is the case, one would only need to import the different group names (without having to import any of the individuals belonging to the groups) into Symantec Web Security, and schedule their permissions accordingly (again, please refer to the Implementation Guide for details).

Symantec Web Security 2.5 servers

Directory Server (user authentication)

Corporate Firewall (any flavor)

All Web-based traffic (HTTP, HTTPS, ftp)

Page 26: Symantec™ Web Security Deployment Guide · PDF fileSymantec™ Web Security Deployment Guide ... gateway or on a mail server, provided that You have a license to the Software for

26 Deploying Symantec™ Web Security 2.5Other deployment-related options

It should be noted that Symantec Web Security provides the option for encrypting the user login and password data that is passed between each client and the Symantec Web Security servers. The data is then transmitted via SSL (Secure Sockets Layer). Additionally, the communication of the user login and password information between the Symantec Web Security servers and the LDAP servers (the dotted lines in the figure) can also be encrypted. These measures deter potential hackers within a network from obtaining authentication information that they may use to access other applications that might require the same (centrally stored) user credentials.

Other deployment-related optionsTwo methods can be used to aid in deploying Symantec Web Security in proxy mode. Both of these methods deal with how HTTP, HTTPS, and FTP requests from clients are redirected to the Symantec Web Security server.

Automatic browser configuration capabilitiesWeb browser settings, including proxy settings, can be automatically and centrally specified and distributed. Administrative tools are available for the most commonly used browser types (Internet Explorer® and Netscape Navigator/Communicator®). For example, Internet Explorer offers automatic browser configuration using the Internet Explorer Administration Kit (IEAK).

For more information, see the following sites:

■ http://www.microsoft.com/windows/ieak/en/deploy/Corp/default.asp

■ http://www.microsoft.com/TechNet/IE/reskit/ie5/part5/ch21auto.asp

■ http://home.netscape.com/eng/mozilla/2.0/relnotes/demo/proxy-live.html

Transparent proxy capabilitiesWhen deploying Symantec Web Security on a Solaris operating system, you can use the available transparent proxy capability to route requests to the Symantec Web Security server without specifying the proxy in each client browser. Instead, a feature of many modern routers is used that allows the default gateway (router) for the network to intercept Web traffic and redirect this data to the proxy server.

In addition to configuring Symantec Web Security to function in transparent proxy mode, the process also involves installing and configuring the available IP_Filter software to perform packet redirection to Symantec Web Security, as well as some router configuration.

Page 27: Symantec™ Web Security Deployment Guide · PDF fileSymantec™ Web Security Deployment Guide ... gateway or on a mail server, provided that You have a license to the Software for

27Deploying Symantec™ Web Security 2.5Other deployment-related options

The basic steps are listed as follows:

■ Enable transparent proxy support in Symantec Web Security using the Symantec Web Security administrative interface in the Modifying Proxy Configuration panel.

This enables Symantec Web Security to accept non-proxy requests.

For more information, see the Symantec Web Security Implementation Guide.

■ Install and configure IP_Filter so that it forwards packets to Symantec Web Security.

■ Configure your router to redirect packets originating from each client to the computer running IP_Filter (the server running Symantec Web Security).

Using transparent proxy services requires configuring a different set of rules on the router. In this case, an access list is used to select packets coming into the router that are destined for a Web or proxy server (port 80 or 8002). A policy route (or route map) is used to redirect those packets to the Symantec Web Security proxy. This prevents users from circumventing the Symantec Web Security proxy (for example, replacing the access lists).

Note: The IP_Filter software is available upon request from Symantec sales and technical support staff.

Once these steps are completed, the steps that a client’s request takes are as follows:

■ The unfiltered client request is sent to the router because no setting exists within the client browser to route it directly to the Symantec Web Security server. The router passes the unfiltered request to the Symantec Web Security server in accordance with the rules set on the router.

■ Symantec Web Security applies the initial scanning. As in standard proxy deployment, only allowed requests go further.

■ Allowed requests are sent through the router, and the data is retrieved from the Internet. The filtered data is routed to the Symantec Web Security server, where the next scan is performed.

■ The virus-free and appropriate content is delivered to the client that issued the request.

Page 28: Symantec™ Web Security Deployment Guide · PDF fileSymantec™ Web Security Deployment Guide ... gateway or on a mail server, provided that You have a license to the Software for

28 Deploying Symantec™ Web Security 2.5Other deployment-related options

The steps a client’s request takes when using transparent proxy capability are illustrated in the following figure.

Any packet redirection method (including transparent proxy and CVP) has a cost associated with it: increased load at the router or firewall. The increased load and accompanying reduced performance on the router or firewall must be weighed against the time, effort, and cost of manually reconfiguring browser settings.

The most effective method for reducing the router or firewall load is to use the browsers to send requests directly to the Symantec Web Security server. Packet redirection by transparent proxy is an effective means to quickly and transparently introduce the services provided by Symantec Web Security into your network. Ultimately, from a performance and router/firewall load standpoint, it is probably most efficient to utilize transparent proxy services as a temporary measure until browser reconfiguration (ideally, via automatic browser configuration settings) can be implemented.

Firewall or router

Symantec Web Security plus IP_Filter

Client

Unfiltered

Filtered

Page 29: Symantec™ Web Security Deployment Guide · PDF fileSymantec™ Web Security Deployment Guide ... gateway or on a mail server, provided that You have a license to the Software for

Index

Aaccess lists 13, 27address record 12

Ccaching proxy, turning off 21CVP

deployment 16deployment of Symantec Web Security using 10problems during deployment 18sequence of events during deployment 19setting Web browser using 14

Ddeployment

as downstream proxy 20factors in determining 12fully centralized 12fully distriburted 12hybrid 12upstream of a NAT device 22

deployment guidelines 11DNS

required records 12setup 12

downstream proxy, deployment as 20

Ffirewall settings 13FTP, request issued from a command line 13

IIP_Filter software, installing and configuring 26

Mmultiple servers

deployment using 12

using proxy deployment with 24when to add settings 13

NNAT device, deployment upstream of 22nslookup commands 12

Pproxy deployment 15

advantages of 17on a stand-alone server 9sequence of events during 19using multiple servers 24

PTR record 12

Rrouter settings 13

Sserver size

considerations 11number of users 11

Solaris, running Symantec Web Security on 14Symantec Web Security

as a firewall plug-in 10functions of 8Implementation Guide 8, 12proxy deployment within a network 9variations of 8

Ttransparent proxy capabilities, on Solaris Operating

System 26

Vvirtual hosting

definition of 19

Page 30: Symantec™ Web Security Deployment Guide · PDF fileSymantec™ Web Security Deployment Guide ... gateway or on a mail server, provided that You have a license to the Software for

30 Index

effect on list-based filtering 20

WWeb browser

automatic configuration capabilities 26redirection 14settings 13settings when used with CVP 14transparent proxy 14