V14.2 Vmware Installation Guide
V14.2 Vmware Installation Guide
Contents
Imperva SecureSphere Virtual Appliance on VMWare ESXi Server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
SecureSphere VM Specifications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Important Notes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Deployment Modes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Transparent Bridge Mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Sniffing Mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Reverse Proxy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Reverse Proxy - Bridge. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Reverse Proxy - One Arm. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Management Server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Obtaining the Software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Deploying the Software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Configuring the Virtual NICs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Native VMware vSwitch. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Cisco Nexus 1000V Series Switches. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Adding Virtual NICs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Configuring Disk Space. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Configuring Memory. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Reserving Memory. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Balloon State. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Configuring the OVF for non-vCenter Deployments. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
SecureSphere First-Time Login. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Performing First-Time Login for the Management Server (MX). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
First-Time Login for the Gateway. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
SecureSphere Installer Wizard. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Confirming the Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
VMotion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Protected Servers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Management Servers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Gateways. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Snapshot. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Cloning. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Frequently Asked Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
57589 Imperva SecureSphere Virtual Appliance on VMWare ESXi Server Last modified: 2/7/2017 12:46:57 PM
Introduction
A virtual machine is a software implementation of a physical machine. Software running in the virtual machine is
unaware of the virtualization layer separating it from the physical machine. Virtualization enables, for example, a
single physical machine to host multiple guest virtual machines, each of which runs a different operating system,
called guest operating systems, under whose control any number of software applications run. The virtual machines
are isolated from each other, though they can, if required, communicate with each other through the network, exactly
as if they were separate physical machines.
Virtualization has become increasingly widely-used in recent years because it enables improved usage of resources
and significant savings in hardware and other operational costs.
Also, organizations with strict policies regarding the types of network equipment installed on their premises will often
prefer to deploy solutions as software on their own approved hardware. Imperva SecureSphere Virtual Appliance
enables these organizations to obtain the benefits of SecureSphere while conforming to their network equipment
policies.
In addition, virtual environments enable organizations to scale resources beyond those available to SecureSphere
physical appliances. The need to do this typically arises in high-volume audit environments, where virtualization
enables organizations to greatly expand the resources available for auditing, alerts and profiling.
SecureSphere VM Specifications
A fully-functional version of a SecureSphere appliance is available for virtual environments.
Notes:
The minimum requirements for the physical host machine are shown in the table below.
Component Requirement
Notes:
The minimum requirements for the physical host machine - per SecureSphere virtual appliance - are shown in the
table below.
Specification
Management
Gateways
Server
CPU 8 4 2 2 4
Memory 16 GB 8 GB 4 GB 4 GB 8 GB
Minimum Disk
250 GB 160 GB 160 GB 160 GB 160 GB
Space1
Notes:
• The memory values represent the minimum requirement for each machine. Less memory is not supported.
• Adding memory is supported only with the VM150 model - i.e for the MX only. The maximum memory supported is
32Gb. Attempting to change the memory with any other model is not supported and can lead to supportability
issues.
• Changing the number of CPUs is supported only with VM150 model - i.e for the MX only. Attempting to change the
CPU with any other model is not supported and can lead to supportability issues.
1. The number given here is for WAF appliances. File Security and Database Security products may require more
space for audit files. For information on how to change the disk allocation, see Configuring Disk Space.
The Imperva products supported by each SecureSphere virtual appliance are shown in the table below.
Specification
Management
Gateways
Server
Performance assurance testing for the above VM models were conducted based on an appliance with the following
hardware specifications:
Important Notes
With ESX 5.5, working on snapshots or changing the number of virtual CPUs once SecureSphere on VMware is running
will cause performance issues.
Deployment Modes
Imperva SecureSphere Virtual Appliance supports the same deployment modes as the physical SecureSphere
appliances:
High availability deployments are available exactly as with physical appliances. See the SecureSphere
Administration Guide for details.
From SecureSphere’s viewpoint, it is bridging its own virtual NICs, which are mapped to the hypervisor’s virtual
switches. The virtual switches are mapped to physical NICs by the hypervisor. SecureSphere is unaware of the
physical NICs. All of SecureSphere’s internal configuration is performed in terms of the virtual NICs.
Note: The fail-open (or bypass) feature is implemented in hardware and is therefore
unavailable in virtual deployments.
The protected servers can be on other physical machines or on the same host machine with Imperva SecureSphere
Virtual Appliance.
The SecureSphere gateway must also be connected to a SecureSphere management server, either on the same
physical machine or on another machine.
Other applications, including other instances of SecureSphere, can run in the same hypervisor on the same physical
machine. For example, it is possible to run a SecureSphere management server and any number of SecureSphere
gateways (resources permitting) in the same hypervisor. All the instances of Imperva SecureSphere Virtual Appliance
are isolated from each other by the hypervisor and do not interfere with each other, though they can communicate
with each other over the network, exactly as if they were on separate physical appliances.
The SecureSphere gateway must also be connected to a SecureSphere management server, either on the same
physical machine or on another machine.
Sniffing Mode
In a SecureSphere sniffing gateway deployment, traffic does not pass through the gateway but is copied (mirrored) to
it for analysis. The SecureSphere sniffing gateway can prevent malicious traffic from reaching the protected servers by
issuing TCP resets to the servers via the blocking interface.
The SecureSphere sniffing gateway must also be connected to a SecureSphere management server, either on the
same physical machine or on another machine.
The protected server can also be virtual servers running on the same hypervisor. One possible configuration like this is
shown in the following figure.
Reverse Proxy
In a Reverse Proxy, traffic intended for a Web server first passes through the Reverse Proxy.
For information about configuring Reverse Proxy deployments, see the Topologies and Deployment chapter in the
SecureSphere Administration Guide.
In the "Bridge" Reverse Proxy deployment, the SecureSphere gateway’s topology is similar to that of a bridge. For
more information, see Transparent Bridge Mode.
In a "one arm" Reverse Proxy deployment, the virtual appliance’s inbound and outbound interfaces are the same. In
the configuration shown below, the protected servers are virtual servers on the same hypervisor, but this is only one
possible configuration. The protected servers can be physical servers, or they can be virtual servers on the same or
different hypervisors.
Management Server
The SecureSphere gateways managed by the virtual MX can be on other physical machines (as in the figure above) or
on the same host machine with SecureSphere MX (as in the figure below).
The SecureSphere MXs managed by the virtual SOM can be on other physical machines (as in the figure above) or on
the same host machine with SecureSphere SOM (as in the figure below).
Note: Your "Welcome Imperva SecureSphere Customer" email includes a username and password
that enable you to access the Imperva FTP site.
Edition Location
Note: There is only one OVF in this directory, and it is for all products and
SOM 64 bit models.
Note: Standard SecureSphere VM can only be deployed on ESX managed by VCenter. For
instructions on deploying the .ovf in a non-VCenter environment, see Configuring the OVF for non-
vCenter Deployments.
To deploy Imperva SecureSphere Virtual Appliance using the VMware vSphere Client:
Configuration
After installing the SecureSphere virtual machine, you must configure the interfaces, as described in the following
sections.
Note: SecureSphere on VMware only supports the Ethernet Adapter Type VMXNET 3.
• Overview
• Native VMware vSwitch
• Cisco Nexus 1000V Series Switches
Overview
For some examples of how SecureSphere’s virtual NICs must be configured in various SecureSphere deployments, see
Deployment Modes.
When Imperva SecureSphere Virtual Appliance is installed, four (4) virtual NICs (Network adapter 1, Network adapter
2, Network adapter 3, and Network adapter 4) are created. Each of these virtual NICs corresponds to one of
SecureSphere’s internal interfaces (eth0, eth1 etc.), as shown in the following figure, and is automatically assigned a
MAC address.
VMware automatically assigns each of SecureSphere’s virtual NICs to one of VMware’s vSwitches (virtual switches).
Because it is unlikely that VMware’s automatic assignments will meet your needs, you will probably have to change
these assignments.
You need to map each SecureSphere internal interface (eth0, eth1, etc.) to a VMware vSwitch, as shown in the
following figure.
The Virtual Switch can in turn be mapped to a physical NIC, depending on the topology.
Table 4: Mapping
map to
SecureSphere internal
Virtual NIC based on MAC addresses
interface
Write the MAC addresses down, as you will need this information later.
In Figure 10 below, there are six (6) physical NICs: vmnic0 through vmnic5.
Each SecureSphere internal interface (eth0, eth1 etc.) corresponds to the virtual switch with the same MAC
address.
8. In the VMware vSphere client, select the Imperva SecureSphere Virtual Appliance you have just installed.
9. Click the Configuration tab.
10. Under Hardware, click Networking.
11. Select the Virtual Appliance in the tree on the left and assign each Network Adapter to a Network Connection
(see the figure below), based on the results of the ifconfig command you ran earlier.
For each virtual NIC, define a port group and assign the virtual NIC to the port group (see the figure above).
Both port groups and virtual switches are listed under Network Connection.
You need to match the internal SecureSphere interfaces (eth0, eth1, etc.) to the Virtual Appliance network
adapters with the same MAC addresses. Then, based on the deployment (bridge, sniffing, etc.), you assign each
network adapter to a network connection.
12. If required (see Adding Virtual NICs), add a virtual NIC (network adapter) to the Imperva SecureSphere Virtual
Appliance.
13. For virtual NIC in sniffing or in-line mode set the port group to which it is assigned to Accept for Promiscuous
Mode, MAC Address Changes and Forged Transmits (see the figure below). If in Reverse Proxy mode, only the
Promiscuous Mode should be marked as Accept. If not set as defined here, the virtual switch will not pass
traffic through to SecureSphere.
Note: When working with VDS (virtual distributed switch), all port groups associated with
SecureSphere virtual machine should be set to Accept for Promiscuous Mode, MAC Address Changes
and Forged Transmits.
14. In impcfg, configure the SecureSphere’s internal interfaces (eth0, eth1, etc.) accordingly.
EXAMPLE:
Figure 1 in the section Transparent Bridge Mode shows Imperva SecureSphere Virtual Appliance configured in
transparent bridge mode.
Suppose you want to configure the appliance as a bridge between eth2 (facing the internet) and eth3 (facing the
protected network). The names eth2 and eth3 are SecureSphere’s internal names for the interfaces, but VM does not
recognize these names. You have to assign eth2 to the VM network adapter facing the internet, and eth3 to the VM
network adapter facing the protected network. You do this based on the MAC addresses.
When the Imperva SecureSphere Virtual Appliance was installed, VM assigned a MAC address to each of
SecureSphere’s internal interfaces (eth0, eth1, etc.). You can find out what these MAC addresses are using the ifconfig
command.
Each VM network adapter has a MAC address and is assigned to a VM Network Connection, so it serves to connect the
internal SecureSphere interface with the outside world.
An internal SecureSphere interface corresponds to the VM network adapter with which it shares a MAC address. You
can see the VM network adapter’s MAC address and the Network Connection to which it is assigned in the ESX GUI (see
the figure above).
In this way, you can determine which VM network adapter to assign to the Network Connection facing the internet,
and which to assign to the Network Connection facing the protected network.
Configuring an environment that includes a Cisco Nexus virtual switch is similar to the configuration described in the
previous section, but there are some important differences.
In this topology, traffic from the internet is routed directly to the Web server. By adding a SecureSphere Virtual
Gateway to the topology, the Web server will be protected.
The following figure shows a SecureSphere Virtual Gateway added to the topology.
Traffic from the internet is now routed to the SecureSphere Virtual Gateway, which routes the traffic to the Web server
over a bridge (eth1-eth2), and the Web server is now protected.
1. In the Cisco Nexus command line interface (CLI), add a private VLAN and a new port group (PortGroup1 -
Secure).
2. In the VMware vSphere client, connect the Web server to the new port group (Secure), for example, as shown in
the following.
3. In the VMware vSphere client, connect the SecureSphere Virtual Gateway to the port group to which the Web
serve was previously connected (UpLink) and to the new port group (Secure), for example, as shown in the
following figure.
57606 Cisco Nexus 1000V Series Switches Last modified: 2/4/2019 2:11:18 PM
1. In the VMware vSphere client, right-click the Imperva SecureSphere Virtual Appliance.
2. Stop the Imperva SecureSphere Virtual Appliance.
3. Select Edit Settings from the menu.
4. In the Virtual Machine Properties window, click Add.
5. Select Ethernet Adapter.
6. Configure the new virtual NIC.
7. Start on the Imperva SecureSphere Virtual Appliance.
8. Teardown and reboot the appliance using the following commands:
impctl teardown
impctl boot
Once SecureSphere has restarted, the additional virtual NICs are available.
Notes:
• Database and File Security Products require a minimum of 250 GB disk space. You
may require additional disk space for audit files. The larger your deployment the
more space should be made available.
• Only 80% of the total extra space capacity will be utilized, where the other 20%
will be reserved for upgrade purposes where snapshots can be stored.
impctl stop
impctl start
Configuring Memory
This procedure describes how to configure additional memory for your VMware Image.
Note: Adding memory is only available with the SecureSphere VM150 model.
1. In the VMware vSphere client, Power Off your Imperva SecureSphere Virtual Appliance.
2. Right-click the appliance, the choose Edit Settings.
3. In the Properties window, click the Hardware tab.
4. Click Memory, then type the amount of memory you want to add. Options include:
◦ 16GB: To add 16GB type 16384MB
◦ 32GB: To add 32GB type 32768MB
Reserving Memory
To prevent re-allocation of memory by ESX to its own use and leave the virtual appliance with insufficient memory,
SecureSphere reserves memory automatically.
1. In the VMware vSphere client, Power Off your Imperva SecureSphere Virtual Appliance.
2. Right-click again and choose Edit Settings.
3. In the properties window, click the Resources tab.
4. In the Resources tab, click Memory.
5. On the right side of the Resources tab, in the Resource Allocation section under Reservation, enter the
number of MB to reserve, as follows:
◦ To reserve 2GB, enter 2048.
◦ To reserve 4GB, enter 4096.
◦ To reserve 8GB, enter 8192
The following two values are only available with the SecureSphere VM150 model appliance, and only if you've
increased your memory allocation as described in Configuring Memory.
Balloon State
If adequate memory has not been properly reserved in advance, it may happen that ESX will not honor a
SecureSphere Virtual Gateway’s request for additional memory. If this occurs, the Gateway’s performance will be
degraded.
A system event is generated which indicates that the Virtual Gateway has entered the "balloon" state and specifies the
amount of additional memory required. Also, the status of the Virtual Gateway in the Gateways screen indicates that
it is in the balloon state.
To resolve the issue, the SecureSphere administrator must arrange for adequate memory to be reserved for the
ballooned Virtual Gateway. Once this is done, the Virtual Gateway will be allocated the memory it requires and its
performance will improve.
1. Edit the .ovf file by right-clicking on the file and opening in an editing utility such as Notepad++.
2. Delete out the opening and closing <property> tags and all the lines in between, as this content is supported
only when using a vCenter.
3. Deploy the edited .ovf. Then when running the FTL, be sure to enter the SecureSphere VM model you want to
deploy, for example, v2500 or v4500.
73233 Configuring the OVF for non-vCenter Deployments Last modified: 11/26/2019 4:09:52 PM
1. If you are configuring a Gateway, make sure the Gateway’s Management Server (MX) is up and running.
2. Power on the virtual machine (the instance of SecureSphere) you have just installed. For instructions on
installing (deploying) the software, see Deploying the Software.
3. Open SecureSphere in a console window. You are prompted to login.
4. Complete first time login as required for the component you're installing as follows:
◦ First-Time Login for the Management Server (MX)
◦ First-Time Login for the Gateway
5. Once you've completed first time login and configuration, open an internet browser and navigate to the IP
address of the MX Server you configured via HTTPS. For example: https://<IP address of MX>:8083. The End User
License Agreement (EULA) is displayed.
6. Read the EULA, then click Accept. You are asked to configure an Admin password for the GUI.
7. Follow the instructions to set the GUI's Admin password. The Upload License window appears.
8. In the Upload License window, click the hyperlinked word here, as shown in the following:
9. Type your Enterprise License Code. You receive this from the "Welcome Imperva SecureSphere Customer"
email you had received after purchasing the product.
10. Type your email address. The license file will be sent to this email address as an attachment. The End User
License Agreement (EULA) is displayed.
11. Read the EULA, then enable the Accept checkbox.
12. Type the Verification strings as required.
13. Click Activate.
14. Check your email for the email with the license file, and when it arrives, save the license file.
15. Return to the Upload License window and click Browse to browse to the license file you just saved.
16. Click Upload.
17. Continue as prompted.
Note: Your "Welcome Imperva SecureSphere Customer" email includes the following
information:
To activate the appliance, you need to define the system configuration by performing the procedures below.
Notes:
• If you configure a DNS client during the first-time login, make sure you specify the IP address of
a real DNS server that is available during the setup.
• Some procedure steps include yes/no options. The selections that appear are examples only.
For any no selection, you may select yes and specify the related values. Note that the system
operates more efficiently when you select yes in procedures that are marked recommended.
• Some options are displayed only when specific selections are made in previous steps.
• For full descriptions of the configuration options, see Imperva On-Premises Administration
Guide.
• You can automate the first-time login process to configure the gateway in sniffing mode. For
more information, see Automating First Time Login in the Imperva On-Premises
Administration Guide.
• If installing as a SOM, use the First Time Login for Management Server (MX) procedure.
A numbered list of options to configure the appliance is displayed. Type 1 to configure a Management Server (MX), 2 to
configure a SOM, or 3 to configure network settings only then press Enter.
1. The configuration tool displays the default "management" interface for the appliance. On the Do you want to
change it? line, enter n.
2. On the IP Address [IP Address/CIDR] line, enter the IP address/number of bits. For example: 192.168.1.1/24
3. On the Do you want to set IPv6 Address as well? line, enter n.
To set the passwords for the Linux root and grub users:
1. On the Enter password line, enter a new password for the Linux root user. This password will also be used as
the grub bootloader password.
◦ Minimum password length: 7 characters
◦ Maximum password length: 14 characters
◦ The password may include letters, digits, and the following special characters: * ( ) - + = | # % ^ : / ~ . , [ _ ]
2. On the Re-enter password line, enter the same password again.
1. On the Enter password line, enter a new password for the administrative user.
◦ Minimum password length: 7 characters
◦ Maximum password length: 14 characters
◦ The password may include letters, digits, and the following special characters: * ( ) - + = | # % ^ : / ~ . , [ _ ]
2. On the Re-enter password line, enter the same password again.
1. Please select a continent or ocean is displayed, followed by a numbered list of areas. Enter the number for
your location, or enter 11 to specify a time zone using the Posix TZ format.
2. Please select a country is displayed, followed by a numbered list of countries. Enter the number for your
country.
3. Your selection and the local time are displayed. Next, Is the above information OK? is displayed followed by a
numbered yes/no list. Enter a number to indicate whether the information is correct.
Note: The process of applying the system configuration may take about 10 minutes. Do not reboot
the appliance during system configuration processing.
• On the Press <ENTER> to continue line, press Enter to apply the system configuration.
74313 Performing First-Time Login for the Management Server (MX) Last modified: 12/25/2019 2:08:27 PM
To activate the appliance, you need to define the system configuration by performing the procedures below.
Notes:
• If you configure a DNS client during the first-time login, make sure you specify the IP address of
a real DNS server that is available during the setup.
• Some procedure steps include yes/no options. The selections that appear are examples only.
For any no selection, you may select yes and specify the related values. Note that the system
operates more efficiently when you select yes in procedures that are marked recommended.
• Some options are displayed only when specific selections are made in previous steps.
• For full descriptions of the configuration options, see Imperva On-Premises Administration
Guide.
• You can automate the first-time login process to configure the gateway in sniffing mode. For
more information, see Automating First Time Login in the Imperva On-Premises
Administration Guide.
• If installing as a SOM, use the First Time Login for Management Server (MX) procedure as
described inFirst-Time Login for the Management Server.
A numbered list of options to configure the appliance is displayed as shown below. Type 3 to configure a gateway,
then press Enter.
1. The configuration tool displays the default "management" interface for the appliance. On the Do you want to
change it? line, enter n.
2. On the IP Address [IP Address/CIDR] line, enter the IP address/number of bits. For example: 192.168.1.1/24
3. On the Do you want to set IPv6 Address as well? line, enter n.
3. On the IP Address [IP Address/CIDR] line, enter the IP address/number of bits. For example: 192.168.5.5/24
4. On the Do you want to set IPv6 Address as well? line, enter n.
To set the passwords for the Linux root and grub users:
1. On the Enter password line, enter a new password for the Linux root user. This password will also be used as
the grub bootloader password.
◦ Minimum password length: 7 characters
◦ Maximum password length: 14 characters
◦ The password may include letters, digits, and the following special characters: * ( ) - + = | # % ^ : / ~ . , [ _ ]
2. On the Re-enter password line, enter the same password again.
1. On the Enter password line, enter a new password for the administrative user.
◦ Minimum password length: 7 characters
◦ Maximum password length: 14 characters
◦ The password may include letters, digits, and the following special characters: * ( ) - + = | # % ^ : / ~ . , [ _ ]
2. On the Re-enter password line, enter the same password again.
• On the Enter the Management Server's IP Address line, enter IPv4 Address. For example: 10.1.1.205
• A numbered list of gateway operation modes is displayed. Enter the number for your operation mode
preference.
1. Please select a continent or ocean is displayed, followed by a numbered list of areas. Enter the number for
your location, or enter 11 to specify a time zone using the Posix TZ format.
2. Please select a country is displayed, followed by a numbered list of countries. Enter the number for your
country.
3. Your selection and the local time are displayed. Next, Is the above information OK? is displayed followed by a
numbered yes/no list. Enter a number to indicate whether the information is correct.
Note: Note: The process of applying the system configuration may take about 5 minutes. Do not
reboot the appliance during system configuration processing.
• On the Press <ENTER> to continue line, press Enter to apply the system configuration.
74314 First-Time Login for the Gateway Last modified: 12/25/2019 2:13:40 PM
The SecureSphere Installer is an installation wizard that helps you set up your SecureSphere environment, which
includes one Management Server (MX) and several WAF Gateways.
The wizard helps you define the operational mode and networking configurations. You are able to observe the
progress of the installation and when the installation process ends the SecureSphere environment becomes
operational and is ready to process and inspect Web traffic.
Note: The SecureSphere Installer wizard is used instead of the First Time Login process and
therefore, must be deployed prior to it. Once the wizard is completed, it cannot be deployed again
on the same environment.
1. Using your browser, go to the address https://<IP address of the MX>:8181. The Welcome screen is displayed.
2. Login using the below credentials. The Management Configuration screen is displayed.
Username: admin
Password: ImpvWAF12
3. From the "Welcome Imperva SecureSphere Customer" email you had received after purchasing the product,
connect to the SecureSphere License Activation Portal and use the challenge key shown in the Management
Configuration screen to activate the product. An email containing your license is sent to the email address you
provided.
4. In Upload license, click Browse, navigate to where you have saved your SecureSphere license and select it.
5. [Optional] Under the Advanced section, define the Management server passwords, DNS, the Management
server parameters (Hostname, NTP Server Address and Time Zone), and set the server groups’s operation mode
(Simulation or Active).
6. Click Next. The Gateway Configuration screen is displayed.
7. In Group mode, select the operational mode (Bridge, Transparent Reverse Proxy or Reverse Proxy) for the entire
group of gateways you are installing.
8. If you are setting up a high availability environment, select the High availability check box.
9. In Group name, type a name for the group of gateways.
10. Under the Gateways List section, select gateways that were already recognized by the installer, or add your
own to the installation process.
Note: When adding gateway IPs that are from a different subnet than the MX’s, only one
gateway IP per subnet is required. The installer discovers any additional uninstalled gateways
in that subnet automatically
11. [Optional] Under the SSL Certificates section, configure the client certificate you want to upload in order to:
◦ Validate the backend web server SSL certificate in the gateway making sure that the web server is
authenticated.
◦ Validate the gateway client certificate in the web server making sure that the gateway is authenticated.
12. [Optional] Under the Advanced section, define the root user password, DNS, and the gateway parameters (NTP
Server Address and Time Zone).
13. Click Next. The Networking Setup screen is displayed according to your operational mode selection as follows:
◦ For Bridge, the Bridge Mode Configuration screen is displayed. This screen consists of adding IP
addresses to be protected by SecureSphere, adding the HTTP ports to be monitored and adding HTTPS
ports for SSL traffic.
◦ For Transparent Reverse Proxy, the Transparent Reverse Proxy Mode Configuration screen is displayed.
This screen consists of defining details of the Transparent Reverse Proxy network.
◦ For Reverse Proxy, the Reverse Proxy Mode Configuration screen is displayed. This screen consists of
defining decision rules that set up how to handle incoming Web traffic, and defining the network interface
IP management. These settings are meant for working in Reverse Proxy (RP) mode.
14. Click Install. The Installation screen is displayed. Installation begins and the overall status and result is
indicated in a status bar. For the MX and each gateway, you can see the installation status and result in a table,
where you can also perform actions in case of failure.
15. Click Next. The Installation Summary Report screen is displayed. This screen consists of a summary of the
installation results.
16. Click Open MX. The SecureSphere MX UI opens and you are asked to log in with the credentials you supplied
during installation.
To confirm that you have correctly configured the Imperva SecureSphere Virtual Appliance:
• Bridge: Disable the bridge’s interfaces and verify that the protected servers are unreachable. Enable the bridge’s
interfaces and verify that the protected servers are reachable.
• Other Configurations: Use the standard networking tools to confirm that the Imperva SecureSphere Virtual
Appliance is properly monitoring and/or intercepting traffic.
VMotion
VMware VMotion leverages the complete virtualization of servers, storage and networking to move an entire running
virtual machine instantaneously from one server to another. VMware VMotion uses VMware’s cluster file system to
control access to a virtual machine’s storage. During a VMotion, the active memory and precise execution state of a
virtual machine is rapidly transmitted over a high speed network from one physical server to another and access to
the virtual machines disk storage is instantly switched to the new physical host.
Since the network is also virtualized by VMware ESX, the virtual machine retains its network identity and connections,
ensuring a seamless migration process.
If you need to move both the protected servers and the SecureSphere gateways, it is recommended that the protected
servers be moved first and then the SecureSphere gateways be moved.
• Protected Servers
• Management Servers
• Gateways
Protected Servers
VMotion of servers protected by SecureSphere is supported.
Management Servers
VMotion of SecureSphere management servers is supported.
Gateways
VMotion of SecureSphere gateways is supported, but note that this might cause up to 50 seconds downtime.
Snapshot
The VM snapshot feature is a mechanism for backing up applications and their data.
SecureSphere products (especially database products) typically generate large amounts of data, and snapshots can
quickly deplete available disk space as they grow in size. For this reason, it is recommended that you monitor the
snapshot size and if necessary, delete the snapshot file and redo the snapshot.
Cloning
Cloning of virtual Gateways, MX servers and SOM is not supported.
A. Fail-open (or bypass) is a hardware feature and is not available for Imperva SecureSphere Virtual Appliance.
Q. Is SSL-offloading supported?
A. Hardware-based SSL off-loading to hardware is not supported for Imperva SecureSphere Virtual Appliance, but
software-based SSL-offloading (to SecureSphere) is supported for Imperva SecureSphere Virtual Appliance.
A. No. This option is not currently available for Imperva SecureSphere Virtual Appliance.
Q. Can Imperva SecureSphere Virtual Appliances and physical SecureSphere appliances be deployed together?
A. Yes, you can freely mix physical SecureSphere appliances and Imperva SecureSphere Virtual Appliances, provided
that you have the proper licenses.
A. DB Agents can communicate with virtualized SecureSphere gateways in exactly the same way they communicate
with physical SecureSphere gateways. Also, DB Agents can be installed on hypervisors.
A. Yes, on ESX 4 and higher only. For information on how to do this, see Adding Virtual NICs.
A. No. Though for assistance with performance issues, please contact Imperva Support.
Follow this link to see the SecureSphere copyright notices and certain open source license terms:
https://www.imperva.com/sign_in.asp?retURL=/articles/Reference/SecureSphere-License-and-Copyright-Information
This document is for informational purposes only. Imperva, Inc. makes no warranties, expressed or implied.
No part of this document may be used, disclosed, reproduced, transmitted, transcribed, stored in a retrieval system,
or translated into any language in any form or by any means without the written permission of Imperva, Inc. To obtain
this permission, write to the attention of the Imperva Legal Department at: 3400 Bridge Parkway, Suite 200, Redwood
Shores, CA 94065.
Information in this document is subject to change without notice and does not represent a commitment on the part of
Imperva, Inc. The software described in this document is furnished under a license agreement. The software may be
used only in accordance with the terms of this agreement.
This document contains proprietary and confidential information of Imperva, Inc. This document is solely for the use
of authorized Imperva customers. The information furnished in this document is believed to be accurate and reliable.
However, no responsibility is assumed by Imperva, Inc. for the use of this material.
TRADEMARK ATTRIBUTIONS
All other brand and product names are trademarks or registered trademarks of their respective owners.
PATENT INFORMATION
The software described by this document is covered by one or more of the following patents:
US Patent Nos. 7,640,235, 7,743,420, 7,752,662, 8,024,804, 8,051,484, 8,056,141, 8,135,948, 8,181,246, 8,392,963,
8,448,233, 8,453,255, 8,713,682, 8,752,208, 8,869,279 and 8,904,558, 8,973,142, 8,984,630, 8,997,232, 9,009,832,
9,027,136, 9,027,137, 9,128,941, 9,148,440, 9,148,446 and 9,401,927.
Imperva Inc.
United States
• Website: http://www.imperva.com
Imperva-SecureSphere-v14.1-Virtual-Appliance-Installation-Guide-v1
To view the End User License and Service Agreement for this product, please visit http://www.imperva.com/Other/
LicenseAgreement
60620 End User License and Services Agreement Last modified: 7/19/2020 10:37:57 AM