Download Deep Security 7.5 SP1 Installation Guide

Transcript
Appendix A: The Virtual Appliance and the Coordinated
Approach using Deep Security Agents
The Virtual Appliance
The Deep Security Virtual Appliance provides Anti-Malware, Firewall, Intrusion Detection/Prevention,
Application Control, and Web Application protection services to Virtual Machines without requiring the
presence of an in-guest Agent. The Virtual Appliance uses VMware's VMsafe-NET API to intercept network
traffic at the hypervisor. It is supported on VMware vSphere 4 (Requires vCenter 4.1 and ESX 4.1).
Security policies are applied per virtual machine.
The Virtual Appliance provides some distinct security advantages over scenarios with an in-guest Agent:
The Appliance is isolated from the guest. The guest can operate with only the minimum required
software being installed.
Short-lived and reverted machines for which administrator time may not have been allocated for
installing security software can easily and quickly be protected.
Virtual machines and other Appliances whose operating systems are not directly accessible can be
protected, even those machines being managed by other administrators.
The Deep Security Virtual Appliance simplifies deployment. There is no need to remotely install Agent
software on the virtual machine. Connectivity to the virtual machine from Deep Security is not required.
The Coordinated Approach
Using the Virtual Appliance to protect virtual machines doesn't preclude the use of Deep Security Agents for
virtual machines on the same host. This coordinated approach provides the following benefits:
Allows you to implement the additional Integrity Monitoring and Log Inspection modules on the
virtual machine.
Recommendation Scans can be run on the virtual machines.
Provides mobility to the virtual machines. They can be moved between data centers or cloud
providers and the protection moves with them.
Performance improvement. While the Deep Security Agent is active on the virtual machine, the
Virtual Appliance automatically passes traffic through to the Agent.
For the Coordinated Approach to be implemented for a particular protection module, both the Agent and
the Appliance have to implement that protection. The following table shows the Deep Security protection
modules that can make use of the Coordinated Approach:
Supported by
Appliance
Supported by Agent
Coordinated
Approach Available
Anti-Malware
Yes
No
No
Firewall
Yes
Yes
Yes
Deep Packet Inspection
Yes
Yes
Yes
Integrity Monitoring
No
Yes
No
Log Inspection
No
Yes
No
If you install an Agent on a virtual machine that was previously being protected only by a Deep
Security Virtual Appliance, the virtual machine will have to be activated again from the Manager to
register the presence of the Agent on the computer.
30