- ) $-* )*-+*-/  - . -1 . /# -$"#/ /* (& #)" . /* /#$. *0( )/ ) /* /# +-*0/.  .-$ # - $) 2$/#*0/ )*/$ :  !*-
$)./''$)" ) 0.$)" /# .*!/2- 7 +' . - 1$ 2 /# - ( Z$' .7 - ' . )*/ .7 ) /# '/ ./ 1 -.$*) *! /# ++'$' 0. - *0( )//$*)7
2#$#- 1$'' !-*(/# - )$-* .$/ /9
!--)6990007-+'&"+(7(&9(0'%(
Trend Micro, the Trend Micro t-ball logo, Deep Security, Control Server Plug-in, Damage Cleanup Services, eServer Plug-in, InterScan,
Network VirusWall, ScanMail, ServerProtect, and TrendLabs are trademarks or registered trademarks of Trend Micro, Incorporated. All
other product or company names may be trademarks or registered trademarks of their owners.
*0( )/1 -.$*)9L:3
*0( )/)0( -9TRMLLGLPKTML
 ' . / 9*1 ( -MKLP
*0( )/last updated: January 19, 2017
Table of Contents
Introduction ................................................................................................................................ 5
About This Document...................................................................................................................................................................... 6
About Deep Security ....................................................................................................................................................................... 8
What's New ................................................................................................................................................................................ 11
System Requirements ................................................................................................................................................................... 14
Preparation ............................................................................................................................... 19
What You Will Need (VMware NSX) ................................................................................................................................................. 20
Database Considerations ............................................................................................................................................................... 23
Installation ................................................................................................................................ 25
Installing the Deep Security Manager .............................................................................................................................................. 26
Manually Installing the Deep Security Agent..................................................................................................................................... 33
Installing and Configuring a Relay-enabled Agent.............................................................................................................................. 44
Deploying Agentless Protection in an NSX Environment...................................................................................................................... 45
Installing the Deep Security Notifier ................................................................................................................................................ 58
Automated Policy Management in NSX Environments ........................................................................................................................ 60
Upgrading ................................................................................................................................. 64
Upgrading to Deep Security 9.6 SP1 in an NSX Environment .............................................................................................................. 65
Upgrading from a pre-9.6 vShield to a 9.6 SP1 NSX Environment........................................................................................................ 68
Appendices ................................................................................................................................ 72
Silent Install of Deep Security Manager ........................................................................................................................................... 73
Deep Security Manager Settings Properties File ................................................................................................................................ 75
Deep Security Manager Memory Usage ............................................................................................................................................ 81
Deep Security Virtual Appliance Memory Usage ................................................................................................................................ 82
Deep Security Manager Performance Features .................................................................................................................................. 84
Creating an SSL Authentication Certificate ....................................................................................................................................... 85
Minimum VMware Privileges for DSVA Deployment (NSX) .................................................................................................................. 88
Installing a vSphere Distributed Switch ........................................................................................................................................... 89
Preparing ESXi servers .................................................................................................................................................................. 90
Installing the Guest Introspection Service ........................................................................................................................................ 91
Creating NSX Security Groups ........................................................................................................................................................ 93
Enable Multi-Tenancy .................................................................................................................................................................... 95
Multi-Tenancy (Advanced) ........................................................................................................................................................... 103
Installing a Database for Deep Security (Multi-Tenancy Requirements) .............................................................................................. 105
Uninstalling Deep Security from your NSX Environment ................................................................................................................... 109
Introduction
About This Document
Deep Security Installation Guide (VMware NSX)
#$.*0( )/ .-$ ./# $)./''/$*))*)Z$"0-/$*)*!/# .$ + 0-$/4.*!/2- *(+*) )/.:
L: #  + 0-$/4)" -
M: #  + 0-$/4$-/0'++'$)
N: #  + 0-$/4" )/@2$/# '4!0)/$*)'$/4A
O: #  + 0-$/4*/$Z$ -
#$.*0( )/*1 -.9
L: 4./ ( ,0$- ( )/.
M: - +-/$*)
N: /. *)Z$"0-/$*)"0$ '$) .
O: )./''$)"/#  + 0-$/4)" -()" ( )/*).*'
P: )./''$)" '4; )'  + 0-$/4" )/
Q: )/ "-/$)" + 0-$/42$/#2-  )1$-*)( )/
R: (+' ( )/$)" + 0-$/4+-*/ /$*)0.$)" + 0-$/4-*/ /$*)*'$$ .) *(( )/$*)).
S: 0$ '$) .!*-(*)$/*-$)")($)/$)$)"4*0- + 0-$/4$)./''/$*)
Intended Audience
#$. *0( )/ $. $)/ )  !*- )4*) 2#* 2)/. /* $(+' ( )/ " )/' ..  +  0-$/4 +-*/ /$*) $) 2-  )1$-*)( )/: #
$)!*-(/$*) $. $)/ )  !*- 3+ -$ )  .4./ ( ($)$./-/*-. 2#* - !($'$- 2$/# 1$-/0' (#$) / #)*'*"4 ) 1$-/0' / )/ -
*+ -/$*).: #$. *0( )/ ..0( . !($'$-$/4 2$/# 2- )!-./-0/0- P:37 $)'0$)" 2- 7 2- $7 1 )/ -  -1 -7 ) /#
1+# -  '$ )/:
Deep Security 9.6 SP1 Installation Guide (VMware NSX) About This Document
6
Other Deep Security Documentation
*0 ) Z$) */# -  +  0-$/4 *0( )//$*)7 $)'0$)" )./''/$*) 0$ . !*- */# - +'/!*-(. ) ($)$./-/*- *0( )//$*) /
#//+9>>*.:/- )($-*:*(> );0.> )/ -+-$. > +;. 0-$/4:.+3: ) $/$*)7  +  0-$/4 )" - $)'0 . # '+ .4./ ( /#/ $. 1$''
!-*(2$/#$)/#  + 0-$/4)" -*).*' :
Deep Security 9.6 SP1 Installation Guide (VMware NSX) About This Document
7
About Deep Security
 +  0-$/4 +-*1$ . 1)  . -1 - . 0-$/4 !*- +#4.$'7 1$-/0'7 ) '*0 . -1 -.: / +-*/ /. )/ -+-$. ++'$/$*). ) / !-*(
- # . ) 0.$) .. $.-0+/$*). 2$/#*0/ - ,0$-$)" ( -" )4 +/#$)": #$. *(+- # ).$1 7  )/-''4 ()"  +'/!*-( # '+. 4*0 .$(+'$!4
. 0-$/4 *+ -/$*). 2#$' )'$)" - "0'/*-4 *(+'$) )  ' -/$)" /#  *! 1$-/0'$5/$*) ) '*0 +-*% /.: # !*''*2$)" /$"#/'4
$)/ "-/  (*0' . .$'4 3+) /# +'/!*-( /* ).0- . -1 -7 ++'$/$*)7 ) / . 0-$/4 -*.. +#4.$'7 1$-/0'7 ) '*0 . -1 -.7 .
2 ''.1$-/0' .&/*+.:
Protection Modules
Anti-Malware
'- +-, 0"-! 0+ '/"+('&'-, (+  '-%,, )+(--"('5 (+ )+(/", '  '- -( ' )!2,"% ,+/+, ' /"+-.% ,$-(),7
)/ "-/ . ) 2 2- 1#$ ' )+*$)/ . /* +-*1$ " )/' .. )/$;('2- +-*/ /$*) !*- 2- 1$-/0' (#$) . 2$/# 5 -* $);"0 ./
!**/+-$)/:  '+. 1*$ . 0-$/4 -*2);*0/. *((*)'4 . ) $) !0'' .4./ ( .). ) +// -) 0+/ .: '.* +-*1$ . " )/;.  )/$;('2-
/* +-*/ / +#4.$' . -1 -.7 4+ -; )  );.  1$-/0' . -1 -.7 +0'$ '*0 . -1 -. . 2 '' . 1$-/0'  .&/*+.: **-$)/ . +-*/ /$*)
2$/# */# " )/' .. ) " )/;.  !*-( !/*-. /* +-*1$ +/$1 . 0-$/4 /*  ! ) 1$-/0' . -1 -. . /# 4 (*1  /2 ) /# /  )/ -
)+0'$'*0:
Web Reputation
+'"+().--"('+/"%($,,,-(&%""(.,0,"-,7
- ) $-* ..$"). - +0//$*) .*- .  *) !/*-. .0# . 2 .$/ H. " 7 #$./*-$' '*/$*) #)" . ) $)$/$*). *! .0.+$$*0.
/$1$/$ .$.*1 - /#-*0"#('2-  #1$*-)'4.$.:
#   +0//$*) -1$ 9
? '*&.0. -.!-*( ..$)"*(+-*($. *-$)! / .$/ .
? '*&.0. -.!-*(*((0)$/$)"2$/#*((0)$/$*)6*)/-*'. -1 -.@6A0. 4-$($)'.
? '*&. ../*('$$*0.*($).- "$./ - 4-$($)'.!*-+ -+ /-/$)"4 --$(
Firewall
+,,-!--$,.+(2(.+)!2,"%'/"+-.%,+/+,7
 )/-'$5 . ()" ( )/ *! . -1 - Z$- 2'' +*'$4 0.$)" $;$- /$*)' .// !0' Z$- 2'': 0++*-/. 1$-/0' (#$) 5*)$)" ) +- 1 )/.  )$'
*!  -1$ //&.: -*1$ . -* *1 -" !*- '' ;.  +-*/**'. ) !-( /4+ . . 2 '' . Z$) ;"-$)  Z$'/ -$)" !*- +*-/. )  ) 
- .. .:
Intrusion Prevention
!"%,$'(0'/.%'+"%"-",+(&.'%"&"-1)%("-,.'-"%-!2')-!7
 '+. #$ 1 /$( '4 +-*/ /$*) "$)./ &)*2) ) 5 -*;4 //&.: . . 10') -$'$/4 -0' . /* .#$ ' &)*2) 10') -$'$/4 ;; !*- 3(+'
/#*. $.'*.  (*)/#'4 4 $-*.*!/ ;; !-*( ) 0)'$($/  )0( - *! 3+'*$/.: !! -. *0/;*!;/# ;*3 10') -$'$/4 +-*/ /$*) !*- *1 - LKK
++'$/$*).7 $)'0$)" /. 7 2 7 ($' )  . -1 -.: 0/*(/$''4  '$1 -. -0' . /#/ .#$ ' ) 2'4 $.*1 -  10') -$'$/$ . 2$/#$)
#*0-.7)) +0.# *0//*/#*0.).*!. -1 -.$)($)0/ .72$/#*0/.4./ (- **/:
', "',-0))%"-"('/.%'+"%"-",
Deep Security 9.6 SP1 Installation Guide (VMware NSX) About Deep Security
8
)' . *(+'$) 2$/#   ,0$- ( )/ Q:Q !*- /# +-*/ /$*) *! 2  ++'$/$*). ) /# / /#/ /# 4 +-* ..:  ! ). "$)./ 
$)% /$*). //&.7 -*..;.$/ .-$+/$)" //&.7 ) */# - 2  ++'$/$*) 10') -$'$/$ .: #$ '. 10') -$'$/$ . 0)/$' * Z$3 . )
*(+' / :
'-"O",&%""(.,,(-0+,,"' -!'-0(+$
)- . . 1$.$$'$/4 $)/*7 *- *)/-*' *1 -7 ++'$/$*).  ..$)" /# ) /2*-&:  )/$Z$ . ('$$*0. .*!/2-  ..$)" /# ) /2*-& ) - 0 .
/# 10') -$'$/4 3+*.0- *!4*0-. -1 -.:
Integrity Monitoring
--,'+)(+-,&%""(.,'.'1)-!' ,-(O"%,',2,-&,+ ",-+2"'+%-"&7
-*1$ . ($)$./-/*-. 2$/# /# $'$/4 /* /-& */# 0/#*-$5  ) 0)0/#*-$5  #)" . ( /* /# $)./) : # $'$/4 /*  / /
0)0/#*-$5  #)" . $. -$/$' *(+*) )/ $) 4*0- '*0 . 0-$/4 ./-/ "4 . $/ +-*1$ . /# 1$.$$'$/4 $)/* #)" . /#/ *0' $)$/ /#
*(+-*($. *!)$)./) :
Log Inspection
+(/",/",""%"-2"'-("&)(+-'-,.+"-2/'-,.+""'%( O"%,7
+/$($5 . /# $ )/$Z$/$*) *! $(+*-/)/ . 0-$/4 1 )/. 0-$  $) (0'/$+' '*" )/-$ . -*.. /# /  )/ -: *-2-. .0.+$$*0. 1 )/. /*
 .4./ ( *-  )/-'$5  '*""$)" . -1 - !*- *-- '/$*)7 - +*-/$)" ) -#$1$)":  1 -" . ) )#) . *+ );.*0- .*!/2- 1$'' /
:
Deep Security Components
 + 0-$/4*).$./.*!/# !*''*2$)". /*!*(+*) )/./#/2*-&/*" /# -/*+-*1$ +-*/ /$*)9
? ) .+"-2 ' +7 /#  )/-'$5  ;.  ()" ( )/ *).*' 2#$# ($)$./-/*-. 0. /* *)Z$"0- . 0-$/4 +*'$4
) +'*4+-*/ /$*)/*/#  )!*- ( )/*(+*) )/.9/#  + 0-$/4$-/0'++'$) )/#  + 0-$/4" )/:
? ) .+"-2 "+-.% ))%"' $. . 0-$/4 1$-/0' (#$) 0$'/ !*- 2- 1+# - )1$-*)( )/. /#/ " )/' ..'4 +-*1$ .
)/$;'2- ) )/ "-$/4 *)$/*-$)" +-*/ /$*) (*0' . !*- 1$-/0' (#$) . $) 1#$ ' )1$-*)( )/: ) )  )1$-*)( )/7
/# )/$;'2- 7)/ "-$/4*)$/*-$)"7$- 2''7)/-0.$*)- 1 )/$*)7)  +0//$*)(*0' .- 1$'' " )/' ..'4:
? ) .+"-2  '- $. . 0-$/4 " )/  +'*4  $- /'4 *) *(+0/ - 2#$# +-*1$ . )/$;'2- 7  +0//$*)  -1$ 7
$- 2''7)/-0.$*)- 1 )/$*)7)/ "-$/4*)$/*-$)"7)*").+ /$*)+-*/ /$*)/**(+0/ -.*)2#$#$/$.$)./'' :
#  +  0-$/4 " )/ *)/$). %2 (.%7  '4; )'  " )/ $./-$0/ . *!/2- )  0-$/4 +/ .
/#-*0"#*0/4*0-) /2*-&*! + 0-$/4*(+*) )/.:
? ) .+"-2 (-"O"+ $. $)*2. 4./ ( -4 ++'$/$*) /#/ *((0)$/ . $)!*-(/$*) *) /# '*' *(+0/ - *0/ . 0-$/4
.//0. ) 1 )/.7 )7 $) /# . *!  '4; )'  " )/.7 '.* +-*1$ . $)!*-(/$*) *0/ /#  0-$/4 +/ .  $)" $./-$0/ 
!-*(/# '*'(#$) :
Deep Security Manager
 +  0-$/4 )" - @I/# )" -IA $. +*2 -!0'7  )/-'$5  2 ;.  ()" ( )/ .4./ ( /#/ ''*2. . 0-$/4 ($)$./-/*-. /* - /
) ()" *(+- # ).$1 . 0-$/4 +*'$$ . ) /-& /#- /. ) +- 1 )/$1 /$*). /& ) $) - .+*). /* /# (:  +  0-$/4 )" -
$)/ "-/ . 2$/# $!! - )/ .+ /. *! /# / )/ - $)'0$)" 2- 1 )/ - ) $-*.*!/ /$1 $- /*-4: * ..$./ $)  +'*4( )/ )
$)/ "-/$*) $)/* 0./*( - ) +-/) - )1$-*)( )/.7  +  0-$/4 #.  -1$  /#/ $. 3+*.  /* ''*2 !*- ) .47 ')"0" ;) 0/-'
( /#*/* 3/ -)''4 ../)+-*"-(($)"*)Z$"0-/$*).:
Deep Security 9.6 SP1 Installation Guide (VMware NSX) About Deep Security
9
Policies
*'$$ . - / (+'/ . /#/ .+ $!4 /# . //$)". ) . 0-$/4 -0' . /* *)Z$"0-  ) )!*-  0/*(/$''4 !*- *) *- (*- *(+0/ -.:
# . *(+/7 ()" ' -0' . /. (& $/ .$(+' /* +-*1$ *(+- # ).$1 . 0-$/4 2$/#*0/ /# )  /* ()" /#*0.). *! -0' .:  !0'/
*'$$ .+-*1$ /# )  ..-4-0' .!*-2$ -)" *!*((*)*(+0/ -*)Z$"0-/$*).:
Dashboard
# 0./*($5' 72 ;. (& .$/ .4/*,0$&'4)1$"/ )-$''*2)/*.+ $Z$$)!*-(/$*):/+-*1$ .9
? 3/ ).$1 .4./ (7 1 )/)*(+0/ -- +*-/$)"
? -+#.*!& 4( /-$.2$/#/- ).
?  /$'  1 )/'*".
? $'$/4/*.1 (0'/$+' + -.*)'$5 .#*-'4*0/.
Built-in Security
*' ;.   .. ''*2. (0'/$+' ($)$./-/*-. @. -.A7 # 2$/# $!! - )/ . /. *!  .. ) $/$)" -$"#/.7 /* $/ ) (*)$/*- $!! - )/
.+ /. *! /# .4./ ( ) -  $1 $)!*-(/$*) ++-*+-$/ /* /# (: $"$/' .$")/0- . - 0.  /* 0/# )/$/ .4./ ( *(+*) )/. ) 1 -$!4
/# $)/ "-$/4*!-0' .: ..$*) )-4+/$*)+-*/ /./# *)Z$ )/$'$/4*!$)!*-(/$*) 3#)"  /2 )*(+*) )/.:
Deep Security Virtual Appliance
#  +  0-$/4 $-/0' ++'$) -0). . 2- 1$-/0' (#$) ) +-*/ /. /# */# - 1$-/0' (#$) . *) /# .( $  -1 -7 #
2$/#$/.*2)$)$1$0'. 0-$/4+*'$4:
Deep Security Agent
#  +  0-$/4 " )/ @I/# " )/IA $. #$"# + -!*-() 7 .('' !**/+-$)/7 .*!/2- *(+*) )/ $)./''  *) *(+0/ - /* +-*1$
+-*/ /$*):
#  +  0-$/4 " )/ *)/$). %2 &(.% @*!! 4  !0'/A: / ' ./ *)  '4; )'  " )/ $. - ,0$-  $) )4  +  0-$/4
$)./''/$*) /* $./-$0/  0-$/4 ) *!/2- +/ . /#-*0"#*0/ 4*0-  +  0-$/4 ) /2*-&: *0 ) )' (0'/$+'  '4; )'  " )/.
)*-")$5 /# ($)/*#$ --#$'"-*0+./*(*-  !Z$$ )/'4$./-$0/ +/ ./#-*0"#*0/4*0-) /2*-&:
Deep Security Notifier
#  +  0-$/4 */$Z$ - $. $)*2. 4./ ( -4 ++'$/$*) /#/ *((0)$/ . /# .// *! /#  +  0-$/4 " )/ )  '4; )' 
" )/ /* '$ )/ (#$) .: # */$Z$ - $.+'4. +*+;0+ 0. - )*/$Z$/$*). 2# ) /#  +  0-$/4 " )/  "$). .)7 *- '*&. ('2- *-
 .. /* ('$$*0. 2  +" .: # */$Z$ - '.* +-*1$ . *).*' 0/$'$/4 /#/ ''*2. /# 0. - /* 1$ 2 1 )/. ) *)Z$"0- 2# /# - +*+;0+.
- $.+'4 :
Deep Security 9.6 SP1 Installation Guide (VMware NSX) About Deep Security
10
What's New
Deep Security 9.6 SP1
Increased NSX Policy Integration
? * ''*2 !*-   -/$Z$/$*)7  +  0-$/4 )" - ) )*2 *)Z$"0-  /* .4)#-*)$5 $/. +*'$$ . 2$/# : #$. - / .
(/#$)"   -1$ -*Z$' @2#$# 2 '' I++   -1$ -*Z$' I $)  +  0-$/4A !*- # *! /#  +  0-$/4 +*'$$ .: #
++  -1$ -*Z$' .- 1$'' .#*$ 2# )- /$)" 0-$/4*'$$ .:
? 1 '$5 '0 +-$)/. ) *)Z$"0-  2$/# $/# - )   0-$/4 -*0+ *- )   0-$/4 *'$4 /#/ 0. . ++   -1$
-*Z$' :#$.2$''- .0'/$). $)"/$1/ )..$") +-/$0'- + 0-$/4+*'$$ .:
Multi-factor Authentication with Google Authenticator
*0))*2 )' (0'/$;!/*-0/# )/$/$*)2# )'*""$)"$)/* + 0-$/4)" -:
Windows 10 Support
#  + 0-$/4" )/)+-*/ /*(+0/ -./#/- -0))$)"$-*.*!/$)*2.LK:
 '-%,,,.))(+-+*."+,'.)-+(&0+'",.++'-%2.'/"%%6
Real-Time Anti-Malware Support for Amazon Linux
 ';/$( )/$;'2- .0++*-/$.)*21$'' *)(5*)$)03:
Terms and Conditions
 + 0-$/4)" -) *)Z$"0- /*- ,0$- 0. -./* +/ -(.)*)$/$*). !*- '*""$)"$)/*/#  + 0-$/4)" -:
Report Classifications
#  +*-/.! /0- #.) 2*+/$*)/#/''*2.4*0/*'..$!4)(-&- +*-/.0.$)"9
? *+ - /
?  - /
? *)Z$ )/$'
? *-!Z$$'. )'4
? 2)!*- ( )/ ).$/$1 @A
? $($/ $./-$0/$*)
? )'..$Z$ 
? )/ -)'. )'4
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) What's New
11
Security Module Usage Cumulative Report
) 2 < 0-$/4 *0' ." 0(0'/$1 = - +*-/ 3/ ). /# 0-- )/  0-$/4 *0' ." - +*-/: # ) 2 - +*-/ +-*1$ . 0(0'/$1
/*/')/# /*/'$)'*&.*!LKK7*!/# +-*/ /$*)(*0' ./#/2 - /$1 *1 -/# *0-. *!.+ $Z$ /$( !-( :
Deep Security 9.6
VMware vSphere 6 Support
?  + 0-$/4T:Q)*2.0++*-/.1+# - Q:
? Q:L:O0++*-/))/ "-/$*)9
" )/' .. )/$;'2- 7 )/ "-$/4 *)$/*-$)"7 $- 2''7 )/-0.$*) - 1 )/$*)7 )  +0//$*) - 1$'' 2$/#
:
? 1P:P:O0++*-/9
" )/' ..)/$;'2- ))/ "-$/4*)$/*-$)"- 1$'' !*-1:
*($)  * 2$/# " )/' .. )/$;'2- ) )/ "-$/4 *)$/*-$)" ) " )/;.  .0++*-/ !*- $- 2''7 )/-0.$*)
- 1 )/$*)7  +0//$*)7)*").+ /$*):
SAP Protection For Linux
 +  0-$/4 #. $)/ "-/  /#  +/ - $)/* /#  +  0-$/4 " )/: #  +/ - 2*-&. . (' ..'4 2$/# /#   $)/ -! @'.*
- ! -- /*.;;M:KA:# $)/ -! $.1$'' $)++'$/$*).)+'/!*-(..0#. / 1 -7)$*-$:
#  +/ - #.  ) !0''4 $)*-+*-/  $) /*  +  0-$/4 T:Q . +-/ *! /#   / )/ -+-$. $)03 )  )/ -+-$. $)03 0$'.
)))*2 '$ ). $- /'4/#-*0"# + 0-$/4)" -:
IBM QRadar Support
 + 0-$/4))*2*0/+0/.4.'*"( .." .$)*"1 )/3/ ) *-(/@M:KA!*-$)/ "-/$*)2$/#-:
Real-Time Anti-Malware for CloudLinux
 ';/$( )/$;'2- $.1$'' *)'*0$)03R:
Additional Platform Support
 + 0-$/4T:Q..0++*-/!*-/# !*''*2$)"+'/!*-(.9
?  $)Q)R
? $)*2.MKLM -1 -*-
? '*0$)03R
? -' $)03R
? )/ -+-$. $)03LM
Deep Security 9.6 SP1 Installation Guide (VMware NSX) What's New
12
Deep Security Database Support for Oracle 12c
 + 0-$/4)" -)*2.0++*-/.-' LM!*-$/.&; )/. :
Active Directory Synchronization on Login
 20. -.- / $)/$1 $- /*-4))*2'*"$)/* + 0-$/4)" - !*- /# /$1 $- /*-44)/.&#. )-0):
Deep Security Relay Downloads from Trend Micro Download Center
) .$/0/$*). 2# - /#  +  0-$/4  '4 ))*/ $- /'4  .. /#  +  0-$/4 )" -7 /#  '4 ) )*2 *2)'* 0+/ . !-*( - )
$-**2)'* )/ -:
Minor Report Enhancements
#  0-$/4*0' 0." - +*-/)*2#.*'0().!*-/# *(+0/ --*0+)/# )./) 4+ @!*-2*-&'*.A:
Automatic Updates of Online Help
#  + 0-$/4*)'$) # '+))*2 0+/ . (' ..'4$) + 0-$/4)" -/#-*0"#) 2)'$)  '++&" :
Deep Security 9.6 SP1 Installation Guide (VMware NSX) What's New
13
Deep Security 9.6 SP1 Installation Guide (VMware NSX) System Requirements
14
System Requirements
Deep Security Manager
Minimum Memory: 8GB, which includes:
4GB heap memory
1.5GB JVM overhead
2GB operating system overhead
Minimum Disk Space: 1.5GB (5GB recommended)
Operating System:
Windows Server 2012 (64-bit), Windows Server 2012 R2 (64-bit) with latest service pack or
patch
Windows Server 2008 (64-bit), Windows Server 2008 R2 (64-bit) with latest service pack or
patch
Windows 2003 Server R2 SP2 (64-bit) with latest service pack or patch
Red Hat Linux 5/6/7 (64-bit)
If you are installing the AWS Marketplace version of Deep Security Manager, it must be installed
on an AWS Linux instance.
Database:
Oracle Database 12c
Oracle Database 11g, Oracle Database 11g Express
Microsoft SQL Server 2014, Microsoft SQL Server 2014 Express
Microsoft SQL Server 2012, Microsoft SQL Server 2012 Express
Microsoft SQL Server 2008, Microsoft SQL Server 2008 Express
Microsoft SQL Server 2008 R2, Microsoft SQL Server 2008 R2 Express
Notes:
SQL Server Express is not recommended for production systems, especially in multi-tenant
environments.
Azure SQL Database is not supported for use with a Deep Security Manager software installation. It is
only supported with the Deep Security Manager VM for Azure Marketplace.
Web Browser: Firefox 38+, Internet Explorer 9.x, Internet Explorer 10.x, Internet Explorer 11.x, Chrome 43+, Safari 6+.
(Cookies enabled.)
Monitor: 1024 x 768 resolution at 256 colors or higher
Deep Security Agent
Minimum Memory:
with Anti-Malware protection: 512MB
without Anti-Malware protection: 128MB
Minimum Disk Space:
with Anti-Malware protection: 1GB
without Anti-Malware protection: 500MB
with Relay functionality enabled: 8GB
Windows:
Windows Server 2012 (64-bit), Windows Server 2012 R2 (64-bit) - Full Server or Server Core with latest service pack
or patch
Windows 10 (32-bit and 64-bit)
Note:
$)*2.S:L@NM;$/)QO;$/A2$/#'/ ./. -1$ +&*-+/#
$)*2.S@NM;$/)QO;$/A2$/#'/ ./. -1$ +&*-+/#
$)*2.R@NM;$/)QO;$/A2$/#'/ ./. -1$ +&*-+/#
$)*2. -1 -MKKS@NM;$/)QO;$/A2$/#'/ ./. -1$ +&*-+/#
$)*2. -1 -MKKSM@QO;$/A2$/#'/ ./. -1$ +&*-+/#
$)*2.$./@NM;$/)QO;$/A2$/#'/ ./. -1$ +&*-+/#
$)*2. -1 -MKKNMM@NM;$/)QO;$/A2$/#'/ ./. -1$ +&*-+/#
$)*2.@NM;$/)QO;$/A2$/#'/ ./. -1$ +&*-+/#
"-!%2.'-"('%"-2'%6 ''QO;$/$)*2.1 -.$*).*1
? "'.16
 /P@NM;$/)QO;$/A
 /Q@NM;$/)QO;$/A
 /R@QO;$/A
-' $)03P@NM;$/)QO;$/A
-' $)03Q@NM;$/)QO;$/A
-' $)03R@QO;$/A
 )/P@NM;$/)QO;$/A
 )/Q@NM;$/)QO;$/A
 )/R@QO;$/A
 $)Q@QO;$/A
 $)R@QO;$/A
LKN)O@NM;$/)QO;$/A
LLL7M7)N@NM;$/)QO;$/A
LM@QO;$/A
'*0$)03P@NM;$/)QO;$/A
'*0$)03Q@NM;$/)QO;$/A
'*0$)03R@QO;$/A
(5*)$)03M@NM;$/)QO;$/A
0)/0LK:KO@QO;$/A
0)/0LM:KO@QO;$/A
0)/0LO:KO@QO;$/A
"-!%2.'-"('%"-2'%6 ''QO;$/$)031 -.$*).*1
! '-  '- ,(-0+ ", "'%. "' -!  -  '- ,(-0+ )$ 6 ( "',-%% ) .+"-2  '- (' '-4 ., -!
- '-"',-%%+6
(+ %",- ( ,.))(+- ) .+"-2 -.+, 2 ,(-0+ )%-(+&4 , -! (.&'- -"-% " &#%* :,7 2 &""!#%
%&#$   %!#$6 (+ %",- ( ,)"L" "'.1 $+'%, ,.))(+- (+ ! )%-(+&4 , -! (.&'- -"-% " &#%*
:,72&""!#% &)# $6
Upgrading a Deep Security Agent system to Windows 10
! 4*0 0-- )/'4 #1  +  0-$/4 " )/ T:Q $)./''  *) $-*.*!/ $)*2. R7 S7 *- S:L .4./ ( ) 2)/ /* 0+"- /#/ #*./ .4./ ( /*
$-*.*!/$)*2.LK& +/# . +*$)/.$)($)9
(-5
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) System Requirements
15
? +"- /#  +  0-$/4 " )/ /* 1 -.$*) T:Q L  !*- 0+"-$)" /# *+ -/$)" .4./ (: -'$ - 1 -.$*). *! /#  +  0-$/4
" )/- $)*(+/$' 2$/#$)*2.LK:
? !  +  0-$/4 " )/ .4./ ( #.  ) 0+"-  /* $)*2. LK  !*- 0+"-$)" /*  +  0-$/4 " )/ T:Q L7 4*0 2$'' ) 
/*0)$)./''/#  + 0-$/4" )/7- **//# .4./ (7)/# )$)./'' + 0-$/4" )/T:QL*)/# .4./ (:
? # 0+"- /*  +  0-$/4 T:Q L (4 - ,0$- .4./ ( - **/ *) $)*2. S ) S:L .4./ (.: ! 4*0 - +-*(+/  /* - **/
/# .4./ (7+ -!*-(/# - **/ !*- 0+"- /# *+ -/$)".4./ (:
? $)*2.LK$.)*/.0++*-/ 2$/#" )/' ...4./ (.)*($) (* :
? !4*0 $ /*0)$)./''/#  + 0-$/4T:QL" )/!-*($)*2.LK#*./7$/2$''- ,0$- .4./ (- **/:
Deep Security Virtual Appliance
? Minimum &(+26 O@ (*-4- ,0$- ( )/.)1-4 + )$)"*)/# )0( -*!. $)"+-*/ / A:
? Minimum ",$)6 MK
? 0+'/"+('&'-6
'/"+('&'-6
2- 1 )/ -P:P72$/#$P:P
2- 1 )/ -Q:K72$/#$P:P*-Q:K
/!"%'/"+('&'-6 2- 1 )/ -P:P*-Q:K2$/#$P:P*-Q:K
? "-"('%0+-"%"-",6
'/"+('&'-6 2- **'.72- 1 )/ - -1 -++'$) P:P72- )" -Q:L:P*-Q:M
? .))(+- .,-)%-(+&,(+0!"!-!"+-.%))%"'')+(/")+(--"('6
(- %% ) .+"-2 -.+, + ,.))(+- (' %% )%-(+&,6 (+ %",- ( ,.))(+- ) .+"-2 -.+, 2
,(-0+)%-(+&4,-!(.&'--"-% "&#%*:,72&""!#%%&#$ %!#$6
"'(0,6
$)*2.$./@NM;$/A2$/#'/ ./. -1$ +&*-+/#
$)*2.R@NM;$/)QO;$/A2$/#'/ ./. -1$ +&*-+/#
$)*2.N*-#$"# -@NM;$/A2$/#'/ ./. -1$ +&*-+/#
$)*2.MKKNM*-#$"# -@NM;$/)QO;$/A2$/#'/ ./. -1$ +&*-+/#
$)*2.MKKS@NM;$/)QO;$/A2$/#'/ ./. -1$ +&*-+/#
$)*2.MKKSM@QO;$/A2$/#'/ ./. -1$ +&*-+/#
$)*2.S@NM;$/)QO;$/A@1+# - P:P*)'4A2$/#'/ ./. -1$ +&*-+/#
$)*2. S:L @NM;$/ ) QO;$/A @1+# - P:P ; $ 0$' LSTMRTO *- #$"# -A 2$/# '/ ./ . -1$ +& *-
+/#
$)*2.MKLM@QO;$/A@1+# - P:P*)'4A2$/#'/ ./. -1$ +&*-+/#
$)*2.MKLMM@QO;$/A@1+# - P:P;$0$'LSTMRTO*-#$"# -A2$/#'/ ./. -1$ +&*-+/#
"'.16
 /)/ -+-$. P@NM;$/)QO;$/A
 /)/ -+-$. Q@NM;$/)QO;$/A
 /)/ -+-$. R@QO;$/A
 )/P@NM;$/)QO;$/A
 )/Q@NM;$/)QO;$/A
 )/R@QO;$/A
-' $)03P@NM;$/)QO;$/A; /& -) '
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) System Requirements
16
-' $)03Q@NM;$/)QO;$/A; /& -) '
-' $)03P@QO;$/A;)- &'  -) '
-' $)03Q@QO;$/A;)- &'  -) '
-' $)03R@QO;$/A
LKN7O@NM;$/)QO;$/A
LLL7M7N@NM;$/)QO;$/A
LM@QO;$/A
0)/0LK:KO@QO;$/A
0)/0LM:KO@QO;$/A
0)/0LO:KO@QO;$/A
'*0$)03P@NM;$/)QO;$/A
'*0$)03Q@NM;$/)QO;$/A
(.+ 0+ /'-+ &.,-  "-!+ '  '/"+('&'- (+ /!"% '/"+('&'-4 '(- &"1-.+ ( -! -0(6  2(. 0'- -( .,
(-!'/!"%4-!2&.,-"',)+-/'-+,6(.'&(+-!'('/'-+-().+"-2' +6
! ) .+"-2 "+-.% ))%"' .,, FD7"- '-9 - :"'%. "' -! "+-.% ))%"' ,(-0+ )$ ;6 .,
-! ) .+"-2 "+-.% ))%"' .,, -! ,& +(--"(' (.% )%. 7"', , ) .+"-2  '-,4 "&)(+-"' ' .)- -( -!
FD7"-  -  '- ,(-0+ ' % -( '(-"L"-"(' -!- '0 ,(-0+ ", /"%% (+ -! "+-.% ))%"' , (+  -
 '-,6
.,"' :111 :#.&(+&,;42(.&.,-.,"."%E6E6@6AGIGGEF(+%-+6
ESXi Requirements for the Deep Security Virtual Appliance
)$/$*)/*/# $./)-.4./ (- ,0$- ( )/.7/# !*''*2$)".+ $Z$/$*).(0./ ( /9
? 6 QO;$/7)/ ';*-;+- . )/) )' $)
? .))(+-/0"-!,6
6 1+# - $./-$0/ 2$/#@1A
/!"%6 1+# - /)-2$/#@1A*-/#$-+-/412$/#@$.* 30.LKKK1A
0+ (, '(- ,.))(+- +.''"' ',- " ,+/+, "' )+(.-"(' '/"+('&'-,6 (+ &(+ "'(+&-"('4 , -!", 0+
'(0% ,+-"%6
Deep Security Notifier System Requirements
? "'(0,6
$)*2. -1 -MKLMM@QO;$/A2$/#'/ ./. -1$ +&*-+/#
$)*2. -1 -MKLM@QO;$/A2$/#'/ ./. -1$ +&*-+/#
$)*2.S:L@NM;$/)QO;$/A2$/#'/ ./. -1$ +&*-+/#
$)*2.S@NM;$/)QO;$/A2$/#'/ ./. -1$ +&*-+/#
$)*2.R@NM;$/)QO;$/A2$/#'/ ./. -1$ +&*-+/#
$)*2. -1 -MKKSM@QO;$/A2$/#'/ ./. -1$ +&*-+/#
$)*2. -1 -MKKS@NM;$/)QO;$/A2$/#'/ ./. -1$ +&*-+/#
(-5
(-5
(-5
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) System Requirements
17
$)*2.$./@NM;$/)QO;$/A2$/#'/ ./. -1$ +&*-+/#
$)*2. -1 -MKKNM@NM;$/)QO;$/A2$/#'/ ./. -1$ +&*-+/#
$)*2. -1 -MKKNM@NM;$/)QO;$/A2$/#'/ ./. -1$ +&*-+/#
$)*2.@NM;$/)QO;$/A2$/#'/ ./. -1$ +&*-+/#
' , )+(-- 2 "+-.% ))%"'4 -! '-"7%0+ &(.% &.,-  %"', ' '% (' -!  (+ -! ) .+"-2
(-"L"+-(",)%2"'(+&-"('6
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) System Requirements
18
Preparation
What You Will Need (VMware NSX)
Deep Security Software Packages
*2)'*/# !*''*2$)".*!/2- $)./''+&" .!-*(/# - )$-**2)'* )/ -9
? ).+"-2' +
? ).+"-2"+-.%))%"'
? ).+"-2 '-
'2 ) .+"-2 "',-%%-"('4 + +%,, ( 0!-!+ "- ", )+(/""'  '-%,, (+  '-7, )+(--"('4 +*."+, -
%,- (' %27'%  '- -(  "',-%% -( (0'%( ' ",-+".- .+"-2 ' (-0+ )-,6 '2 FD7"-
"'(0,(+"'.1 '-')+(/"%2.'-"('%"-26
? ).+"-2(-"O"+
# *2)'* )/ -$.'*/ /9
#//+9>>*2)'* )/ -:/- )($-*:*(>
( &'.%%2 ('L"+& -!- 2(. )(,,,, % "-"&- /+,"(' ( ! "',-%% )$ 4 ., !,! %.%-(+ -( %.%- -! !,!
/%.(-!(0'%(,(-0+'(&)+"--(-!/%.).%",!('-!+'"+((0'%('-+,"-6
) /#  +  0-$/4 )" - $. $)./'' 7 4*0 2$'' )  /* ()0''4 $(+*-/ /# $-/0' ++'$) !-*( '*' $- /*-4 $)/* /# )" -:
@* +'*4/#  + 0-$/4. -1$ /*4*0-1 )/ -7/# ++'$) (0./ $(+*-/ /* + 0-$/4)" -:A
("&)(+--!).+"-2"+-.%))%"',(-0+6
L: *2)'* /#  +  0-$/4 $-/0' ++'$) .*!/2- +&" !-*( /# - ) $-* *2)'*  )/ -
@#//+9>>*2)'* )/ -:/- )($-*:*(A/*/#  + 0-$/4)" -#*./(#$) :
M: ) /#  +  0-$/4 )" -7 "* /* /# &"'",-+-"(' N )-, N (-0+ N (% +" ) '$& &)(+-777 $) /# /**'- )
$(+*-/ /# .*!/2- +&" /*  +  0-$/4: @#  +  0-$/4 ()" - 2$'' /# ) 0/*(/$''4 *2)'* /# '/ ./ QO;$/  
/" )/.*!/2- +&" 2#$#2$'''/ - 0. /*0+"- /# $-/0'++'$) H.-*/ /$*)*0' .:A
( "&)(+- -! ) .+"-2  '- ,(-0+7 .  $%  % " &#%*  % /" 440 )  $%    ! <&#  *-
  % /"550:
#  +  0-$/4 */$Z$ - $. ) *+/$*)' *(+*) )/ /#/ 4*0 ) $)./'' *) 4*0- +-*/ /  $)*2. .: / $.+'4. '*' )*/$Z$/$*). *!
.4./ (1 )/.$)/# )*/$Z$/$*)- :
License (Activation Codes)
*0 2$'' - ,0$-  +  0-$/4 /$1/$*) * . !*- /# +-*/ /$*) (*0' . ) . +-/ /$1/$*) * !*- 0'/$; ))4 $! 4*0 $)/ ) /*
$(+' ( )/$/:
@2- $ ). .2$'''.* - ,0$- !*-2- *(+*) )/.:A
Administrator/Root Privileges
*0) /*#1 ($)$./-/*->**/+-$1$' " .*)/# *(+0/ -.*)2#$#4*02$''$)./'' + 0-$/4.*!/2- *(+*) )/.:
(-5
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) What You Will Need (VMware NSX)
20
SMTP Server
*02$'') ). -1 -/*. )' -/ ($'.:# 0. .*-/MP4 !0'/!*-*)) /$*)/*/#  -1 -:
Available Ports
'-!).+"-2' +
*0(0./(& .0- /# !*''*2$)"+*-/.*)/# (#$) #*./$)" + 0-$/4)" -- *+ )))*/- . -1 !*-*/# -+0-+*. .9
? (+- GDEC6 # +*-/ !*- I# -/ /I7 0.  4  +  0-$/4 " )/. ) ++'$) . /* *((0)$/ 2$/#  +  0-$/4 )" -
@*)Z$"0-' A:
? (+- GDDK6 .  !*- /#  +  0-$/4 )" - *).*' : '.* 0.  !*- *((0)$/$*) !-*( $: ).0- /#/ +*-/ OLLT $. *+ )
!-*(/# )" -/*/#  + 0-$/4)" -:
? (+-DHED6 $;$- /$*)'-' /. . -1 -+*-/:
? (+-,DGFF'DGFG6 $;$- /$*)'$-*.*!/ -1 -/. +*-/.:
? (+-,FJK5IFI5'FEIJ6 . !*-*)) /$*)2$/#) -1 -)/$1 $- /*-4@*)Z$"0-' A:
? (+-EH6 *((0)$/$*)/* -1 -/*. ) ($'' -/.@*)Z$"0-' A:
? (+-HF6 *-**&0+:
? (+-HDG6 *((0)$/$*)2$/#4.'*". -1 -@*)Z$"0-' A:
? (+- GGF6 *((0)$/$*) 2$/# 2- 1'*07 1 )/ -7 1#$ '> )" -7 (5*) 7 $-*.*!/ 50- 7 ) */# - '*0
*0)/.:
(+ &(+ -"%, (.- !(0 ! ( -!, )(+-, + ., 2 ) .+"-24 , !#%$ $ * " &#%* "' -! +'
,-"('(-!('%"'!%)(+-!&"'",-+-(+=,."6
'-!%28'% '-,5 '-,5'))%"',
*0(0./(& .0- /# !*''*2$)"+*-/.*)/# (#$) #*./$)" '4; )' " )/- *+ )))*/- . -1 !*-*/# -+0-+*. .9
? (+-GDEE6  '4/*" )/>++'$) *((0)$/$*):
? (+-GDDJ6 )" -;/*;" )/*((0)$/$*):
? (+-GDEF6 . !*-$)/ -)'*((0)$/$*):#*0')*/ *+ )/*/# *0/.$ :
? (+-JC5GGF6 *)) /$*)/*- )$-*+/  -1 -)(-/-*/ /$*) -1 -:
? (+-HDG6 $;$- /$*)'*((0)$/$*)2$/#4.'*". -1 -@*)Z$"0-' A:
#  +  0-$/4 )" - 0/*(/$''4 $(+' ( )/. .+ $Z$ $- 2'' 0' . /* *+ ) /# - ,0$-  *((0)$/$*) +*-/. *) (#$) . #*./$)"
 '4; )' " )/.7" )/.)++'$) .:
Network Communication
*((0)$/$*)  /2 )  +  0-$/4 )" - )  '4; )'  " )/.7 " )/.>++'$) . ) #4+ -1$.*-. 0. .  #*./)( . 4
 !0'/: ) *- - !*-  +  0-$/4 " )/>++'$)  +'*4( )/. /* .0 ..!0'7 4*0 (0./ ).0- /#/ # *(+0/ - ) - .*'1 /#
#*./)( *! /#  +  0-$/4 )" - )  '4; )'  " )/: #$. (4 - ,0$- /#/ /#  +  0-$/4 )" - )  '4; )'  " )/
*(+0/ -.#1  )/-4*-) )/-4$)/# " )/>++'$) *(+0/ -H.#*./.Z$' :
(. 0"%%  ,$ (+ -!", !(,-'& , )+- ( -! ) .+"-2 ' + "',-%%-"(' )+(.+6  2(. ( '(- !/ 4 '-+ '
+,,.+"' -!"',-%%-"('6
(-5
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) What You Will Need (VMware NSX)
21
Reliable Time Stamps
'' *(+0/ -. *) 2#$#  +  0-$/4 *!/2- $. -0))$)" .#*0' .4)#-*)$5  2$/# - '$' /$( .*0- : *- 3(+' 7 - "0'-'4
*((0)$/$)"2$/# /2*-&$( -*/**'@A. -1 -:
Performance Recommendations
"&#%* ##!# %&#$ /"950:
Deep Security Manager and Database Hardware
)4  +  0-$/4 )" - *+ -/$*). @.0# . +/ . )  *(( )/$*) ).A - ,0$- #$"#  )  (*-4 - .*0- .: - ) $-*
- *(( )./#/ #)" -)* #1 !*0-*- .).0!Z$$ )/$)#$"#.'  )1$-*)( )/.:
# /. .#*0' $)./''  *) #-2- /#/ $. ,0' /* *-  // - /#) /# .+ $Z$/$*). *! /#  ./  +  0-$/4 )" - )* : *-
/#  ./ + -!*-() /# /. .#*0' #1 S;LQ *!  ) !./  .. /* /# '*' *- ) /2*-& //#  ./*-" : # ) 1 - +*..$'
/. ($)$./-/*-.#*0' *).0'/ *)/#  ./*)Z$"0-/$*)*!/# /. . -1 -)($)/ )) +').#*0' +0/$) !! /:
*-(*- $)!*-(/$*)7. %$! $#%! $ /"340:
Dedicated Servers
#  +  0-$/4 )" - ) /# /. ) $)./''  *) /# .( *(+0/ - $! 4*0- Z$)'  +'*4( )/ $. )*/ 3+ /  /* 3  LKKK
*(+0/ -. @- ' *- 1$-/0'A: ! 4*0 /#$)& 4*0 (4 3  LKKK *(+0/ -.7 /#  +  0-$/4 )" - ) /# /. .#*0' $)./'' 
*)  $/  . -1 -.: / $. '.* $(+*-/)/ /#/ /# /. ) /#  +  0-$/4 )" - *;'*/  *) /# .( ) /2*-& 2$/# L
 *)) /$*) /* ).0- 0)#$) -  *((0)$/$*)  /2 ) /# /2*: # .( ++'$ . /* $/$*)'  +  0-$/4 )" - * .: /2*
($''$. *)'/ )4*- // -$.- *(( ) !*-/# *)) /$*)!-*(/# )" -/*/# /. :
High Availability Environments
! 4*0 0. 2- H. $"# 1$'$'$/4 @A ! /0- .7 (& .0- /#/ /#  )1$-*)( )/ $. ./'$.#   !*- 4*0  "$) $)./''$)"  +  0-$/4:
 +  0-$/4 (0./  +'*4  *) '' $ #4+ -1$.*-. @$)'0$)" /# *) . 0.  !*- - *1 -4 *+ -/$*).A:  +'*4$)"  +  0-$/4 *) ''
#4+ -1$.*-.2$'' ).0- /#/+-*/ /$*)- ($).$) !! /!/ -- *1 -4*+ -/$*):
!' "+-.% ))%"' ", )%(2 "' 0+ '/"+('&'- -!- &$, ., ( -! 0+ ",-+".- ,(.+ !.%+
:;4 "- ", "&)(+-'- -!- -! ))%"' (, '(- - /(-"(' %(' 0"-! -! /"+-.% &!"', , )+- ( -!  )+(,,6
"+-.% ))%"', &.,-  >)"''> -( -!"+ )+-".%+ " ,+/+6 (. &.,- -"/%2 !'  -!  ,--"' , (+ %% -! "+-.%
))%"', -( >'.%> (+ >",%> :+(&&'; ,( -!- -!2 0"%% '(-  /(-"(' 2 -! 6  "+-.% ))%"'
:(+ '2 /"+-.% &!"',; ", ,- -( >",%>4 /'-+ +/+ (, '(- &" +- -!- /"+-.% &!"' (+ )+(/" &" +-"('
+(&&'-"(', (+ "-6 !", ", $'(0' , >)"''"' > -! /"+-.% &!"' -( "-, + ",-+ !(,-6 !", ", -! +(&&' (.+,
( -"(' (+ "+-.% ))%"', "'  '/"+('&'-6 ' %-+'-"/ ", -( )%(2 -! "+-.% ))%"' ('-( %(% ,-(+  ,
())(, -( ,!+ ,-(+ 6 !' -! "+-.% ))%"' ", )%(2 ('-( %(% ,-(+  "- ''(-  /(-"(' 2 6 (+ .+-!+
"'(+&-"('('')"''"' /"+-.%&!"',-(,)"L"",+/+4)%,(',.%-2(.+0+(.&'--"('6
 /"+-.% &!"' ", /(-"(' 2  +(& ' " )+(-- 2  -( ' " -!- ", '(- )+(-- 2 4 -!
/"+-.% &!"' 0"%% (& .')+(--6  -! /"+-.% &!"' ", ,.,*.'-%2 /(-"(' $ -( -! (+" "'% "4 "- 0"%% '(-
.-(&-"%%2  )+(--  "' .'%,, 2(. !/ +- ' /'-7, ,$ -( -"/- ' )+(-- (&).-+, -!- !/ '
/(-"('-('"0"-!'/"%%6
(-5
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) What You Will Need (VMware NSX)
22
Database Considerations
 ! - /* 4*0- /. +-*1$ -H. *0( )//$*) !*- $)./-0/$*). *) /. $)./''/$*) )  +'*4( )/ 0/ & + /# !*''*2$)"
*).$ -/$*).$)($)!*-$)/ "-/$*)2$/# + 0-$/4:
Install before Deep Security
*0 (0./ $)./'' /# /. .*!/2- 7 - / /. $)./) !*-  +  0-$/4 @$! 4*0 - )*/ 0.$)" /#  !0'/ $)./) A7 ) - /
0. -*0)/!*- + 0-$/4 (+ 4*0$)./'' + 0-$/4)" -:
Location
# /. (0./ '*/  *) /# .( ) /2*-& . /#  +  0-$/4 )" - 2$/# *)) /$*) .+  *! L>. *1 - : @
*)) /$*).- )*/- *(( ) :A
Dedicated Server
# /. .#*0' $)./'' *). +-/  $/ (#$) :
Microsoft SQL Server
? )' I (*/ *)) /$*).I:@ #//+9>>(.):($-*.*!/:*(> );0.>'$--4>TKTRLM@1W1.:TKA:.+3A
? # /. *0)/0. 4/#  + 0-$/4)" -(0./#1 ?(0'+ -$"#/.:
? !0.$)"0'/$; ))47/# /. *0)/0. 4/#  + 0-$/4)" -(0./#1 +-(+ -$"#/.:
?  ' //# I.$(+' I- *1 -4(* '+-*+ -/4!*-4*0-/. :@ #//+9>>/ #) /:($-*.*!/:*(> );0.>'$--4>(.LSTMRM:.+3A
Oracle Database
? /-//# I-' $./ ) -I. -1$ )(& .0- $/ +/.*)) /$*).:
? # /. *0)/ 0.  4 /#  +  0-$/4 )" - (0./ "-)/  /#  )  -*' . ) 
7 7  )  .4./ (+-$1$' " .:
? ! 0.$)" 0'/$; ))47 /# /. *0)/ 0.  4 /#  +  0-$/4 )" - (0./ "-)/  /#  7  7
7  )  .4./ (+-$1$' " .:
Transport Protocol
# - *(( ) /-).+*-/+-*/**'$. :
! 0.$)" & "), /* *)) / /*   -1 -7 +-*+ -'4 0/# )/$/  $-*.*!/ $)*2. *((0)$/$*) #)) ' (0./ 1$''
 /2 ) + 0-$/4)" -#*./)/#  -1 -#*./:#$.(4'- 4 3$./$!9
? #  -1 -$.*)/# .( #*./. + 0-$/4)" -:
? */##*./.- ( ( -.*!/# .( *($):
? /-0./- '/$*).#$+ 3$./. /2 )/# /2*#*./.:
!)*.0#*((0)$/$*)#)) '$.1$'' 7 + 0-$/4)" -2$'')*/ ' /**((0)$/ /*/#  -1 -*1 -)( +$+ .:
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Database Considerations
23
Connection Settings Used During Deep Security Manager Installation.
0-$)" /#  +  0-$/4 )" - $)./''/$*)7 4*0 2$'' .&  !*- /. *)) /$*)  /$'.: )/ - /# /. #*./)( 0) -
I*./)( I)/# +- ;- / /. !*- + 0-$/40) -I/. ( I:
# $)./''/$*) .0++*-/. */#  ) $)*2. 0/# )/$/$*): # ) 0.$)" $)*2. 0/# )/$/$*)7 '$& *) /# I1) I 0//*) /*
$.+'4$/$*)'*+/$*).:
Avoid special Characters for the database user name (Oracle)
%-!(. ! +% %%(0, ,)"% !+-+, "' -, (#- '&, " -!2 + ,.++(.' 2 *.(-,4 ) .+"-2 (, '(-
,.))(+- ,)"% !+-+, "' -, (#- '&,6 !", )  (' +%=, 0 ,"- ,+", -! %%(0 !+-+, "' '('7
*.(-'&,5 !--)599(,6(+%6(&99BHCEI<@A9,+/+6AAA9BHBHF9,*%<%&'-,@@H6!-&?@@BBC
Keep the database Name Short (SQL Server)
! 0.$)" 0'/$; ))47 & +$)" /# ($) /. )( .#*-/ 2$'' (& $/ .$ - /* -  /# /. )( . *! 4*0- ))/.: @$ : ! /# ($)
/. $. II7 /# Z$-./ ))/H. /. )( 2$'' IGLI7 /# . *) ))/H. /. )( 2$'' IGMI7 ) .*
*):A
 2(. + .,"' 27+7, %"', 0"-! -!  +$-)% /+,"(' ( ) .+"-2 ' +4 .%-"7''2 ", '(-
,.))(+-6
Oracle RAC (Real Application Clusters) Support
 + 0-$/4.0++*-/.9
? $)03)/ -+-$.  -1 -LLN2$/#-' LM ' . L@1LM:L:K:M:KA
?  /$)03)/ -+-$.  -1 -Q:Q2$/#-' LM ' . L@1LM:L:K:M:KA
! .%- "'.1 +/+ ) .+"-2 (%"2 ", (&)-"% 0"-! -! +%  '/"+('&'-4 0"-! -! 1)-"(' ( "+0%%
,--"' ,6 (. ' ",% "+0%% (+ .,-(&"3 -! "+0%% ,--"' , (+"' -( -! "',-+.-"(', "' -! >"+0%% --"' , 0"-!
+%>,-"('(-!).+"-2' +%)(+&"'",-+-(+=,."6
High Availability
#  +  0-$/4 /. $. *(+/$' 2$/# /. !$'*1 - +-*/ /$*) .* '*)" . )* '/ -/$*). - ( /* /# /. .# (: *-
3(+' 7.*( /. - +'$/$*)/ #)*'*"$ .*'0()./*/# /. /' .0-$)"- +'$/$*)2#$#)- .0'/$)-$/$'!$'0- .:
*-/#$.- .*)7/. ($--*-$)"$.- *(( ) *1 -/. - +'$/$*):
(-5
(-5
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Database Considerations
24
Installation
Installing the Deep Security Manager
Before You Begin
Database
 !*- 4*0 $)./''  +  0-$/4 )" -7 4*0 (0./ $)./'' /. .*!/2- 7 - / /. ) 0. - *0)/ !*-  +  0-$/4 )" - /*
0. :*-$)!*-(/$*)*)$)./''$)"/. 7. %$! $#%! $ /"340:
Co-Located Relay-enabled Agent
 +  0-$/4  +'*4( )/ - ,0$- . / ' ./ *)  '4 @  +  0-$/4 " )/ 2$/#  '4 !0)/$*)'$/4 )' A:  '4. $./-$0/ *!/2-
)  0-$/4 +/ . /* " )/.>++'$) . 2#$# & + 4*0- +-*/ /$*) 0+ /* / : - ) $-* - *(( ). $)./''$)"  '4; )'  " )/
*)/# .( *(+0/ -./#  + 0-$/4)" -/*+-*/ //# #*./*(+0/ -)/*!0)/$*).'*' '4:
0-$)" /# $)./''/$*) *! /#  +  0-$/4 )" -7 /# $)./'' - 2$'' '**& $) $/. '*' $- /*-4 !*- ) " )/ $)./'' +&" @/# !0'' 5$+
+&" 7 )*/ %0./ /# *- " )/ $)./'' -A: ! $/ * .)H/ Z$) ) $)./'' +&" '*''47 $/ 2$'' // (+/ /* *)) / /* /# - ) $-* *2)'*
 )/ - *1 - /# )/ -) / ) '*/ ) " )/ $)./'' +&" /# - : ! $/ '*/ . ) $)./'' +&" $) $/# - *! /#*. '*/$*).7 $/ 2$'' "$1 4*0
/# *+/$*) /* $)./'' *;'*/   '4; )'  " )/ 0-$)" /# $)./''/$*) *! /#  +  0-$/4 )" -: @! " )/ $)./'' +&" . - !*0)
$) */# '*/$*).7 /# '/ ./ *! /# /2* 1 -.$*). 2$'' . ' / :A # " )/ ) 0.  /* +-*/ / /#  +  0-$/4 ()" - #*./ (#$) 7
#*2 1 - $/ 2$'' $)$/$''4 $)./''  2$/# *)'4 /#  '4 (*0' )' : * )' +-*/ /$*) 4*0 2$'' #1 /* ++'4 ) ++-*+-$/  0-$/4
*'$4:
! )* " )/ $)./'' +&" $. 1$'' 7 /# $)./''/$*) *! /#  +  0-$/4 )" - 2$'' +-*  2$/#*0/ $/ @0/ 4*0 2$'' #1 /* $)./''  '4;
)' " )//'/ -/$( A:
)'"' (' 2(.+ '/"+('&'-4 "-"('% %27'%  '-, '  "',-%% - %-+ -"&6 :(+ "',-+.-"(', (' "',-%%"'
%27'% '-4,  $% %"&#%* % /"440 ' ! <&# * /"5506;
Proxy Server Information
! /#  +  0-$/4 2$'' )  /* 0. +-*34 . -1 - /* *)) / /* - ) $-* +/  -1 -. *1 - /# )/ -) /7 #1 4*0- +-*34 . -1 - - ..7
+*-/7)'*"$)-  )/$'.- 4:
Multi-Node Manager
 +  0-$/4 )" - ) -0) . (0'/$+' )* . *+ -/$)" $) +-'' ' 0.$)" .$)"' /. : 0))$)" /# )" - . (0'/$+' )* .
+-*1$ .$)- . - '$$'$/47- 0))/1$'$'$/471$-/0''40)'$($/ .'$'$/47) // -+ -!*-() :
# )* $. +' *! '' /.&. ) )* )* $. (*- $(+*-/)/ /#) )4 *! /# */# -.: . -. ) .$") $) /* )4 )* /* --4 *0/ /# $- /.&.:
# !$'0- *!)4)* ))*/' /*)4/.&.)*/ $)"--$ *0/:# !$'0- *!)4)* ))*/' /*/# '*..*!)4/:
# )* (0./ -0))$)" /# .( 0$' )0( - *! /# )" - .*!/2- : # ) + -!*-($)" ) 0+"- *! /# )" - .*!/2- 7 /# Z$-./
)" - /* 0+"-  2$'' /& *1 - ''  +  0-$/4 )" - 0/$ . ) .#0/ *2) '' /# */# -  +  0-$/4 )" - )* .: # 4 2$''
++ - . I*!Z'$) I $) /# -0(+$ ) 0"-! -"/"-2 +)! $) /# 2,-& -"/"-2 . /$*) *! /# 2,-& '(+&-"(' +" 2$/# ) $)$/$*)
/#/ ) 0+"- $. - ,0$- : . /# 0+"- . - --$  *0/ *) /# */# - )* .7 /# 4 2$'' 0/*(/$''4 -*0"#/ & *)'$) )  "$)
.#-$)"$)/# /.&.:
(  ) .+"-2 ' + '( -( 2(.+ "',-%%-"('7 -0) /# )" - $)./'' +&" *) ) 2 *(+0/ -: # ) +-*(+/ 7 /4+ /#
'*/$*) *! ) '*"$) -  )/$'. !*- /# /.  $)" 0. : ) /# $)./'' - *)) /. /* /# /. 7 4*0 ) +-*  2$/# $)" /# )*
/*/# .4./ (:
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Installing the Deep Security Manager
26
(.&.,-.,"' "-!++/+(++%-,-(+.'&.%-")%'(,6
- '( )("'- ,!(.% &(+ -!' (' "',-' ( -! "',-%%+  +.''"' - -! ,& -"&6 ("' ,( ' % -( .')+"-% +,.%-,
"'%."' (++.)-"('(-!-,6
Download the the Installer Package
*2)'* /# '/ ./ 1 -.$*) *! /#  +  0-$/4 )" - @) *+/$*)''4 /#  +  0-$/4 " )/A .*!/2- !-*( /# - ) $-* *2)'*
 )/ -/9
#//+9>>*2)'* )/ -:/- )($-*:*(>
Install the Deep Security Manager for Windows
L: *+4 /#  +  0-$/4 )" - $)./'' - +&" /* /# /-" / (#$) : /-/ /#  +  0-$/4 )" - $)./'' - 4 *0' ;
'$&$)"/# $)./''+&" :
M: "',  +&'-6 ! 4*0 "- /* /# / -(. *! /# '$ ). "- ( )/7 . ' / )- -! -+&, ( -! +' "+( %"',
 +&'-:
N: ',-%%-"('-!6  ' //# !*' -2# -  + 0-$/4)" -2$'' $)./'' )'$& 1-:
(-5
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Installing the Deep Security Manager
27
O: -,6  ' //# /. 4*0$)./'' +- 1$*0.'4:
! 4*0- /. $.   -1 -7 '$& /' /* .+ $!4 & ',-'7 (&"'7 *- /# 0. *! .%- (%%-"(': *''/$*)
 / -($) . #*2 ./-$)". - .*-/  ) *(+- : #  !0'/ $. I0). ' / I7 2#$# ( ). /#/  +  0-$/4 2$'' 0.
/$)LG ) -'GG !*- *''/$*) *) / 3/;/4+ *'0().: ! 4*0 . ' / , .%- (%%-"('7  +  0-$/4 2$'' 0. /# *''/$*)
( /#*.+ $Z$ 44*0- -1 -/. :*-$/$*)'$)!*-(/$*)*)*''/$*)7- ! -/*4*0- -1 -*0( )//$*):
P: +(.- -"/-"('6 )/ - 4*0- /$1/$*) * @.A: )/ - /# * !*- '' -*/ /$*) *0' . *- /# * . !*- /# $)$1$0'
(*0' . !*- 2#$# 4*0 #1 +0-#.  '$ ). : *0 ) +-*  2$/#*0/ )/ -$)" )4 * .7 0/ )*) *! /# -*/ /$*) *0' .
2$'' 1$'' !*- 0. : @*0 ) )/ - 4*0- Z$-./ *- $/$*)' * . !/ - $)./''/$*) *! /#  +  0-$/4 )" - 4 "*$)" /*
&"'",-+-"('N"',,:A
Q: +,, ' (+-,6 )/ - /# #*./)( 7 7 *-  - .. *! /#$. *(+0/ -: # )" - - .. (0./ $/# - - .*'1'
#*./)( 7 !0''4 ,0'$Z$  *($) )( 7 *- )  - ..: !  $. )*/ 1$'' $) 4*0- )1$-*)( )/7 *- $! .*( *(+0/ -. -
0)' /* 0. 7 Z$3   - .. .#*0' 0.  $)./  *! #*./)( : +/$*)''47 #)" /#  !0'/ *((0)$/$*) +*-/.9
# I)" - *-/I $. /# +*-/ *) 2#$# /# )" -H. -*2. -;.   $.  ..$' /#-*0"# : # I -/ / *-/I $. /#
+*-/*)2#$#/# )" -'$./ ).!*-*((0)$/$*)!-*(/# " )/.>++'$) .:
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Installing the Deep Security Manager
28
R: &"'",-+-(+ (.'-6 )/ - 0. -)( ) +..2*- !*- /# ./ - ($)$./-/*- *0)/:  ' /$)" /# )!*- ./-*)"
+..2*-. @- *(( ) A - ,0$- . /#$. ) !0/0- ($)$./-/*- +..2*-. /* $)'0 0++ - ) '*2 -;. ' // -.7 )*);
'+#)0( -$#-/ -.7))0( -.7)/*- ,0$- ($)$(0()0( -*!#-/ -.:
!.,+'&'),,0(++/+2"&)(+-'-6(.0"%%'-!&-(%( "'-().+"-2' +6
 2(. !/ &"' +" !-, (' -! ' + !(,- &!"'4 2(. ' +,- ' (.'- ),,0(+ .,"' -! dsm_c -
action unlockout -username USERNAME -newpassword NEWPASSWORD [-disablemfa] (&&'6
S: ('O" .+ .+"-2 )-,6  ' /$)" /# +- !.% ,$ -( + .%+%2 !$ (+ .+"-2 )-, *+/$*) 2$'' - /
# 0'  .& /* 0/*(/$''4 - /-$ 1 /# '/ ./  0-$/4 +/ . !-*( - ) $-* ) $./-$0/ /# ( /* 4*0- " )/. )
++'$) .: @*0 ) *)Z$"0- +/ . '/ - 0.$)" /#  +  0-$/4 )" -:A ! /#  +  0-$/4 )" - 2$'' )  /* /* 0.
+-*34 /* /* *)) / /* /# - ) $-* +/ . -1 -. *1 - /# )/ -) /7 . ' / , +(12 +/+ 0!' (''-"' -( +'
"+(-(!$(+.+"-2)-, ) )/ -4*0-+-*34$)!*-(/$*):
T: ('O" .+(-0+)-,6 # *+/$*).!*-.*!/2- 0+/ .- /# .( ./#*. !*-. 0-$/40+/ .$)/# +- 1$*0../ +:
LK: (8(- %28'%  '-6 ! ) " )/ $)./'' +&" $. 1$'' $/# - $) /# '*' !*' - *- !-*( /# - ) $-*
*2)'*  )/ -7 4*0 2$'' "$1 ) /# *+/$*) /* $)./'' *;'*/   '4; )'  " )/: )4  +  0-$/4 $)./''/$*) - ,0$- .
/ ' ./ *) '4 /* *2)'* ) $./-$0/  0-$/4 ) *!/2- +/ .: ! 4*0 *)H/ $)./''  '4; )'  " )/ )*27 4*0
2$'') /**.*/'/ -/$( :
',-%%"' (7%(-%27'% '-",,-+(' %2+(&&'6
(-5
(-5
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Installing the Deep Security Manager
29
LL: &+- +(--"(' -0(+$6  ' / 2# /# - 4*0 2)/ /* )' - ) $-* (-/ & @- *(( ) A: @*0 ) )' *-
*)Z$"0- (-/  & '/ - 0.$)" /#  +  0-$/4 )" -A: +/$*)''4 )/ - 4*0- $)0./-4 4 . ' /$)" !-*( /# -*+;*2)
'$./:
LM: ',-%%-"(''(+&-"('6 -$!4/# $)!*-(/$*)4*0 )/ - )'$& ',-%% /**)/$)0 :
LN:  ' / .'! -! ) .+"-2 ' + (',(% /* *+ ) 2  -*2. - /* /#  +  0-$/4 )" -  2# ) . /0+ $.
*(+' / :'$& "'",! /*'*. /#  /0+2$5-:
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Installing the Deep Security Manager
30
#  +  0-$/4 )" - . -1$ 2$'' ./-/ 2# ) . /0+ $. *(+' / : # $)./'' - +' . .#*-/0/ /*  +  0-$/4 )" - $) /# +-*"-(
( )0:*0.#*0'/& )*/ *!/#$.$!4*02)//* ../# )" -!-*(- (*/ '*/$*):
Installing the Deep Security Manager for Linux
# . ,0 ) *! ./ +. !*- $)./''$)"  +  0-$/4 )" - *) $)03  2$/# $)*2 4./ ( - /# .( . /#*.  .-$  !*- $)*2.
@*1 A:*-$)!*-(/$*)*)+ -!*-($)".$' )/$)03$)./''/$*)7.  % $%!"&#%* # /"840:
 2(. + "',-%%"' ) .+"-2 ' + (' "'.1 0"-! ")-%, '%4 2(. 0"%% ' -( ('L" .+ -! ")-%, -( %%(0 -+L"
(')(+-,DAAI'DAB@6
Starting Deep Security Manager
#  +  0-$/4 )" - . -1$ ./-/. 0/*(/$''4 !/ - $)./''/$*): # . -1$ ) ./-/ 7 - ./-/  ) ./*++  !-*( /# $-*.*!/
 -1$ .)" ( )/*).*' :# . -1$ )( $.I- )$-* + 0-$/4)" -I:
* -0) /# ;.  ()" ( )/ *).*' 7 "* /* /# +' "+( +-*"-( "-*0+ $) /# /-/ ( )0 @ $)*2.A *- ; )0 @ $)*2.A
)'$& ).+"-2' +:
*-0)/#  ;. ()" ( )/*).*' !-*(- (*/ *(+0/ -4*02$''#1 /*(& )*/ *!/# 9
!--),699<!(,-'&=6<)(+-=9
2# - <!(,-'&= $. /# #*./)( *! /# . -1 - *) 2#$# 4*0 #1 $)./''   +  0-$/4 )" - ) <)(+-= $. /# I)" - *-/I 4*0
.+ $Z$ $)./ +S*!/# $)./''/$*)@OLLT4 !0'/A:
. -.  ..$)" /# ;.  ()" ( )/ *).*' 2$'' - ,0$-  /* .$") $) 2$/# /# $- . - *0)/ -  )/$'.: @# -  )/$'. - / 
0-$)"/# $)./''/$*)) 0. /*'*"$))- / */# -. -*0)/.:A
! ) .+"-2 ' + +-, A@72+ ,%7," ' +-"L"- (+ -! (''-"(', 0"-!  '-,9))%"',4 %2,4 ' ,+,=
0 +(0,+,6 (0/+4 (+  ,.+"-24 -!", +-"L"- '  +)% 0"-! +-"L"- +(& -+.,- +-"L"- .-!(+"-2
:;6 :.! +-"L"-, + &"'-"' -+ ) .+"-2 ' + .) +6; (+ "'(+&-"(' (' .,"' +-"L"- +(& 4
, #%  &% %%! #%<% /"9606
Manually Importing Additional Deep Security Software
 +  0-$/4 " )/. ) /# $- .0++*-/$)" .*!/2- +&" . ) $(+*-/  !-*( 2$/#$) /#  +  0-$/4 )" - *) /# &"'",-+-"('
N )-, N (-0+ N (0'%( '-+ +" : /# - .*!/2- +&" . (0./ $(+*-/  ()0''4 !-*( /# - ) $-* *2)'*  )/ -
2 .$/ @#//+9>>*2)'* )/ -:/- )($-*:*(>A:
(&'.%%2"&)(+-"-"('%).+"-2,(-0+-(-!).+"-2' +6
L: *2)'*/# .*!/2- !-*(/# - )$-**2)'* )/ -2 .$/ /*'*'$- /*-4:
(-5
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Installing the Deep Security Manager
31
M: ) /#  +  0-$/4 )" -7 "* /* &"'",-+-"(' N )-, N (-0+ N (% ) '$& &)(+-777 $) /# /**'- /* $.+'4 /#
&)(+-(-0+ 2$5-:
N: . /# +(0,:::*+/$*)/*)1$"/ /*). ' /4*0-*2)'* .*!/2- :
O: '$& 1- )/# ) "'",! /* 3$//# 2$5-:
# .*!/2- $.)*2$(+*-/ $)/*/#  + 0-$/4)" -:
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Installing the Deep Security Manager
32
Manually Installing the Deep Security Agent
#$.. /$*) .-$ .#*2/*$)./'')/$1/  + 0-$/4" )/.)#*2/* )'  '4!0)/$*)'$/4@$!- ,0$- A:
Importing Agent Software
 +  0-$/4 " )/ $. $)$/$''4 $)./''  2$/# *- !0)/$*)'$/4 *)'4: / $. *)'4 2# ) -*/ /$*) *0' $. )'  *) ) " )/ /#/ /#
+'0";$). - ,0$-  !*- /#/ (*0' - *2)'*  ) $)./'' : (+ -!", +,('4  '- ,(-0+ )$ , &.,-  "&)(+- "'-( ) .+"-2
' + (+ 2(. "',-%% -!  '- (' (&).-+6 @ . *) - .*) !*- $(+*-/$)" /# " )/ /*  +  0-$/4 )" - $. !*- /# *)1 )$ )
*! $)"' /* .$'4 3/-//# " )/$)./'' -!-*($/0.$)"/#  + 0-$/4)" -H.:A
("&)(+- '-,(-0+)$ ,-().+"-26
L: )  +  0-$/4 )" -7 "* /* &"'",-+-"(' N )-, N (-0+ N (0'%( '-+: # (0'%( '-+ +" $.+'4.
/# '/ ./1 -.$*).''" )/.*!/2- 1$'' !-*(- )$-*:
M:  ' / 4*0- " )/ .*!/2- +&" !-*( /# '$./ ) '$& &)(+- $) /# ( )0 -:  +  0-$/4 2$''  "$) /* *2)'* /#
.*!/2- !-*(/# - )$-**2)'* )/ -/*/#  + 0-$/4)" -:
N: # )/# .*!/2- #.Z$)$.# *2)'*$)"7"- )# &(-&2$''++ -$)/# &)(+- *'0()!*-/#/" )/:
(1)(+--! '-"',-%%+6
L: ) + 0-$/4)" -7"*/* &"'",-+-"('N)-,N(-0+N(%:
M:  ' /4*0-" )/!-*(/# '$./). ' / 1)(+-N1)(+-',-%%+777 !-*(/# ( )0-:
 2(. !/ (%+ /+,"(', ( -!  '- (+ -! ,& )%-(+&4 -! %-,- /+,"(' ( -! ,(-0+ 0"%% !/ +' !$
&+$"'-! $%$% (%.&'6
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Manually Installing the Deep Security Agent
33
N: 1 /# " )/$)./'' -/*'*'!*' -:
'%2 ., -! 1)(+-  '-  $%# :-! 6&," (+ -! 6+)& L"%; (' "-, (0' -( "',-%% -! ) .+"-2  '-6  2(. 1-+- -!
.%%  '- 3") )$  ' -!' +.' -!  '- "',-%%+ +(& -! ,& (%+ -!- !(%, -! (-!+ 3"))  '- (&)(''-,4 %% -!
.+"-2 (.%, 0"%%  "',-%% :.- '(- -.+' (';6  2(. ., -!  '- "',-%%+4 "'"/".% (.%, 0"%%  (0'%( +(&
).+"-2' +'"',-%%('',7',",4&"'"&"3"' -!"&)-('-!%(%(&).-+6
#  +  0-$/4 " )/ I5$+I Z$' . - ( 1$'' *) /# - ) $-* *2)'*  )/ - !*- 0. -. 2#* )  /* ()0''4 $(+*-/ /# " )/.
$)/* /# $-  +  0-$/4 )1$-*)( )/  0. /# $-  +  0-$/4 )" - $. $-;"++  ) ))*/ *)) / $- /'4 /* /# *2)'*  )/ -
2  .$/ : . -. 2#*.  +  0-$/4 )" - $. ' /* *)) / /* /# *2)'*  )/ - - ./-*)"'4 )*0-"  /* $(+*-/ /# $- " )/ .*!/2-
+&" . 0.$)" /#  +  0-$/4 )" - *).*' : // (+/$)" /* $)./'' ) " )/ 2# ) /# *-- .+*)$)" .*!/2- +&" #. )*/  )
$(+*-/ /* + 0-$/4)" -)' /*. -$*0.$..0 .:
Installing the Windows Agent
L: *+4 /# " )/ $)./'' - Z$' /* /# /-" / (#$) ) *0' ;'$& /# $)./''/$*) Z$' /* -0) /# $)./'' - +&" : / /# '*(
.- )7'$& 1- /* "$)/# $)./''/$*):
' "'(0, +/+ B@AB B +/+ (+4 2(. &.,- %.'! -! "',-%%+ .,"' -!", (&&'5 msiexec /i Agent-
Core-Windows-9.6.x-xxxx.x86_64.msi
!'"',-%%"' -! '-('"'(0,B@AB+/+(+4-!(-"L"+0"%%'(-"'%.6
M: '8,+ "',  +&'-6 ! 4*0 "- /* /# / -(. *! /# '$ ). "- ( )/7 . ' / )- -! -+&, ( -! %"',
 +&'- )'$& 1-:
(-5
(-5
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Manually Installing the Deep Security Agent
34
N: ,-"'-"('(%+6  ' //# '*/$*)2# - 4*02*0''$&  + 0-$/4" )//* $)./'' )'$& 1-:
O: 2-("',-%%+'"+().+"-2 '-6 '$& ',-%% /*+-* 2$/#/# $)./''/$*):
P: (&)%-6 2# )/# $)./''/$*)#.*(+' / .0 ..!0''47'$& "'",!:
#  + 0-$/4" )/$.)*2$)./'' )-0))$)"*)/#$.*(+0/ -7)2$''./-/ 1 -4/$( /# (#$) **/.:
.+"' ' "',-%%4 '-0(+$ "'-+, 0"%%  ,.,)' (+ 0 ,(', (+ "' +,-(+6  2(. + .,"' 4 '0
+*.,-0"%% '+-4)(-'-"%%2+,.%-"' "''0+,,(+-!+,-(+(''-"('6
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Manually Installing the Deep Security Agent
35
Installing the Red Hat, SUSE, Oracle Linux, or Cloud Linux Agent
(.&.,-%( (',>+((->-("',-%%-! '-6%-+'-"/%242(.'.,>,.(>6
L: *+4/# $)./''/$*)Z$' /*/# /-" /(#$) :
M: . I-+(;$I/*$)./''/# .G" )/+&" 9
# rpm -i <package name>
Preparing... ########################################## [100%]
1:ds_agent ########################################## [100%]
Loading ds_filter_im module version ELx.x [ OK ]
Starting ds_agent: [ OK ]
@. I-+(;I/*0+"- !-*(+- 1$*0.$)./'':#$.++-*#2$''+- . -1 4*0-+-*Z$' . //$)".A
N: #  + 0-$/4" )/2$''./-/0/*(/$''40+*)$)./''/$*):
Installing the Ubuntu or Debian Agent
*''*2 /# $)./-0/$*). 0) - I(+*-/$)" " )/ *!/2- I @*1 A /* $(+*-/ /# ++-*+-$/ 0)/0 *-  $) " )/ .*!/2- +&" !-*(
/# *2)'* )/ -/* + 0-$/4)" -)/# ) 3+*-//# $)./'' -@: Z$' A:
*$)./''*)0)/0*- $)7*+4/# $)./'' -Z$' @: A/*/# /-" /(#$) )0. /# !*''*2$)"*(()9
sudo dpkg -i <installer file>
Starting, stopping and resetting the Agent on Linux:
Command-line options:
*./-//# " )/9
/etc/init.d/ds_agent start
*./*+/# " )/9
/etc/init.d/ds_agent stop
*- . //# " )/9
/etc/init.d/ds_agent reset
*- ./-//# " )/9
/etc/init.d/ds_agent restart
Installing the Solaris Agent
Requirements:
*-*'-$.+->T9
? '$$*)1L:LL*- // -
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Manually Installing the Deep Security Agent
36
? +Z$'G*'-$.G3:+&"
? " )/;*'-$.GP:T;T:K:K;3333:.+-:+&":"5
*-*'-$.SQ>LK9
? " )/;*'-$.GP:LKGR;T:K:K;3333:3SQGQO:+&":"5
? " )/;*'-$.GP:LKGP;T:K:K;3333:3SQGQO:+&":"5
*-*'-$.SQ>LL9
? " )/;*'-$.GP:LL;T:K:K;3333:$NSQ:+P+:"5
*-*'-$.>LL9
? " )/;*'-$.GP:LL;T:K:K;3333:.+-:+P+:"5
To install the Solaris 11 Agent:
L: *+4/# $)./''/$*)Z$' /*/# /-" /(#$)
M: )./''/# " )/9
gunzip Agent-Solaris_5.x_sparc-9.x.x-xxxx.sparc.p5p.gz
pkg install -g Agent*p5p ds-agent
svcadm enable ds_agent
To install the Solaris 10 Agent:
L: *+4/# $)./''/$*)Z$' /*/# /-" /(#$)
M: )./''/# " )/9
gunzip Agent-Solaris_5.10_U7-9.x.x-xxxx.x86_64.pkg.gz
pkgadd -d Agent-Solaris_5.10_U7-9.x.x-xxxx.x86_64.pkg all
To install the Solaris Sparc 9 Agent:
L: ,0$- ''*!/# - ,0$- +&" .@. *1 A
M: *+4/# $)./''/$*)Z$' /*/# /-" /(#$)
N: )./'''$$*)1;L:S;.*'3;.+-:"59
gunzip libiconv-1.8-solx-sparc.gz
pkgadd -d libiconv-1.8-solx-sparc all
O: )./'''$";N:O:Q;.*'3;.+-:"59
gunzip libgcc-3.4.6-solx-sparc.gz
pkgadd -d libgcc-3.4.6-solx-sparc all
P: )./''+Z$'9
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Manually Installing the Deep Security Agent
37
pkgadd -d pfil_Solaris_x.pkg all
Q: 0.#/# +Z$'./- ((*0' $)/*/# ) /2*-&$)/ -! 9
ifconfig <interface> modinsert pfil@2
)L"% ,!(.% ( +" !- -+ ") "' -! '-0(+$ "'-+ ,-+&6 ( -+&"' 0!+ ") ",4 )+(+&5 "('L" J"'-+K
&(%",-'',.+-!--!'.&+.,('-!&("',+-",('!" !+-!'-!'.&+(")"'-!&(%",-6
)L"% &.,-   -( -! '-0(+$ ,-$ (+ ! ( -! "'-+, -!  '- 0"%%  )+(--"' -(.! 9-9")6(' 9-9
"'"-69)L"%,-+-:(+&(+"'(+&-"('4,>(-,('',-%%"' ('(%+",:H'I)+;(,->4%(06;
R: )./''/# " )/9
gunzip Agent-Solaris_5.x_sparc-9.x.x-xxxx.sparc.pkg.gz
pkgadd -d Agent-Solaris_5.x_sparc-9.x.x-xxxx.sparc.pkg all
To start, stop and reset the Agent on Solaris 10 and 11
? svcadm enable ds_agent ;./-/./# " )/
? svcadm disable ds_agent ;./*+./# " )/
? /opt/ds_agent/dsa_control -r ;- . /./# " )/
? svcadm restart ds_agent ;- ./-/./# " )/
? svcs –a | grep ds_agent ;$.+'4." )/.//0.
To start, stop and reset the Agent on Solaris 9:
? /etc/init.d/ds_agent start ;./-/./# " )/
? /etc/init.d/ds_agent stop ;./*+./# " )/
? /opt/ds_agent/dsa_control -r ;- . /./# " )/
? /etc/init.d/ds_agent restart ;- ./-/./# " )/
(--!--!L"%-+"' -"/"-2%( L"%,+"'9/+9%( 9,< '-
Notes on Installing PFIL on a Solaris (8 and 9 Sparc) Host
# *'-$. " )/ 0. . /#   Z$'/ - *(+*) )/  1 '*+  4 -- )  :  +  0-$/4 0-- )/'4 .0++*-/. 1 -.$*) M:L:LL: #1 0$'/
/#$..*0- * )+-*1$ +&" *)/# - )$-**2)'* )/ -7#//+9>>*2)'* )/ -:/- )($-*:*(:
0-/# -$)!*-(/$*)) !*0)/9#//+9>>**(.:)0: 0:0>E1'*):@*-*+4*!/# .*0- * 7*)//4*0-.0++*-/+-*1$ -:A
Notes on pfil
@# !*''*2$)"..0( .4*0-$)/ -! $.#( A
!4*0*I$!*)Z$"(*'$./I74*02$''. '$./*!(*0' .+0.# *)/*/# $)/ -! '$& /#$.@!*-#( KA9
(-5
(-5
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Manually Installing the Deep Security Agent
38
0 arp
1 ip
2 hme
*0) /*$). -/+Z$' /2 )$+)#( 9
ifconfig hme0 modinsert pfil@2
# &$)"/# '$./74*0.#*0'. 9
0 arp
1 ip
2 pfil
3 hme
**)Z$"0- /# +Z$'/- (.(*0' /* 0/*(/$''4+0.# 2# )/#  1$ $.*+ ) 9
autopush -f /etc/opt/pfil/iu.ap
//#$.+*$)/7
strconf < /dev/hme
.#*0'- /0-)9
pfil
hme
'.*7 modinfo .#*0'.#*29
# modinfo | grep pfil
110 102d392c 6383 24 1 pfil (pfil Streams module 2.1.11)
110 102d392c 6383 216 1 pfil (pfil Streams driver 2.1.11)
Installing the HP-UX Agent
L: *"$).**/
M: *+4/# $)./''/$*)Z$' /*/# /-" /(#$)
N: *+4/# +&" /*/ (+*--4!*' -@I>/(+IA
O: )5$+/# +&" 0.$)""0)5$+9
/tmp> gunzip Agent-HPUX_xx.xx-x.x.x-xxxx.ia64.depot.gz
P: )./''/# " )/9@*/ /#//# +&" $.- ! - ) 0.$)"/# !0''+/#: '/$1 +/#.2$'')*/  +/ :A
/tmp> swinstall –s /tmp/Agent-HPUX_xx.xx-x.x.x-xxxx.ia64.depot ds_agent
*./-/)./*+/# " )/*);7 )/ -*) *!/# !*''*2$)"9
? /sbin/init.d/ds_agent start
? /sbin/init.d/ds_agent stop
Installing the AIX Agent
L: *"$).**/
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Manually Installing the Deep Security Agent
39
M: *+4/# $)./''/$*)Z$' /*/# /-" /(#$)
N: *+4/# +&" /*/ (+*--4!*' -@I>/(+IA
O: )5$+/# +&" 0.$)""0)5$+9
/tmp> gunzip Agent-AIX_x.x-x.x.x-xxxx.powerpc.bff.gz
P: )./''/# " )/9
/tmp> installp –a –d /tmp/Agent-AIX_x.x-x.x.x-xxxx.powerpc.bff ds_agent
*./-//# " )/*)9
# startsrc -s ds_agent
*./*+/# " )/*)9
# stopsrc -s ds_agent
*'*/# -$1 -*)9
# /opt/ds_agent/ds_fctrl load
*0)'*/# -$1 -*)9
# /opt/ds_agent/ds_fctrl unload
Using Deployment Scripts to Install Agents
$)" *(+0/ - /* 4*0- '$./ *! +-*/ /  - .*0- . $)  +  0-$/4 ) $(+' ( )/$)" +-*/ /$*) $. (0'/$;./ + +-* ..: *./ *! /# . ./ +.
) + -!*-(  '*''4 !-*( /# *(() '$) *) /# *(+0/ - ) ) /# - !*- .-$+/ : #  +  0-$/4 )" -H.  +'*4( )/
-$+/" ) -/*-)  .. !-*(/# )" -H.0++*-/( )0:
!'"',-%%"' -! '-('"'(0,B@AB+/+(+4-!(-"L"+0"%%'(-"'%.6
( '+-)%(2&'-,+")-6
L: /-/ /#  +'*4( )/ -$+/ " ) -/*- 4 '$&$)" )%(2&'- +")-,777 !-*( /#  +  0-$/4 )" -H. 0+*-/ ( )0 @/ /#
/*+-$"#/*!/#  + 0-$/4)" -2$)*2A:
M:  ' //# +'/!*-(/*2#$#4*0-  +'*4$)"/# .*!/2- :
%-(+&, %",- "' -! +()7(0' &'. 0"%% (++,)(' -( -! ,(-0+ -!- 2(. !/ "&)(+- "'-( -! ) .+"-2
' +6
N:  ' / -"/-  '- .-(&-"%%2 -+ "',-%%-"(': @+/$*)'7 0/ " )/. (0./ /$1/  4 /#  +  0-$/4 )" -
 !*- +-*/ /$*)*'$4) $(+' ( )/ :A
O:  ' //# *'$44*02$.#/*$(+' ( )/*)/# *(+0/ -@*+/$*)'A
P:  ' //# *(+0/ --*0+@*+/$*)'A
Q:  ' //#  '4-*0+
. 4*0 (& /# *1 . ' /$*).7 /#  +'*4( )/ -$+/  ) -/*- 2$'' " ) -/ .-$+/ 2#$# 4*0 ) $(+*-/ $)/* 4*0-  +'*4( )/ /**' *!
#*$ :
! )%(2&'- +")- '+-(+ ' %,(  ,-+- +(& -! &'. + (' -!  $%#%! ; "%$ ; !%(# ; !
) 6
(-5
(-5
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Manually Installing the Deep Security Agent
40
! )%(2&'- ,+")-, '+- 2 ) .+"-2 ' + (+ "'(0,  '-, &.,-  +.' "' "'(0, (0+!%% /+,"(' B6@
(+%-+6(.&.,-+.'(0+!%%,'&"'",-+-(+'2(.&2!/-(+.'-!(%%(0"' (&&'-(%-(+.',+")-,5
Set-ExcecutionPolicy RemoteSigned
' 0"'(0, &!"',4 -! )%(2&'- ,+")- 0"%% ., -! ,& )+(12 ,--"' , , -! %(% ()+-"' ,2,-&6  -! %(% ()+-"'
,2,-& ", ('L" .+ -( ., )+(12 ' -! ) .+"-2 ' + ", ,,"% ('%2 -!+(. ! "+- (''-"('4 -! )%(2&'-
,+")-0"%%"%6
Iptables on Linux
 +  0-$/4 T:P *- '/ - * . )*/ $.' $)03 $+/' . 0-$)" $)./''/$*): ! /# $- 2'' *- )./-0.$*) - 1 )/$*) (*0' . - )' 7
$+/' . $. $.' : ! /# " )/ $. $.' 7 $+/' . $. )'  ) /# . //$)". - - 1 -/ : *- $)./-0/$*). *) #*2 /* +- 1 )/ /#  +
 0-$/4" )/!-*(#)"$)"$+/' .7. /# ).+"-2,-+-".":
Activating the Agent
# " )/(0./ /$1/ !-*(/#  + 0-$/4)" - !*- $/) *)Z$"0- /*/. '4*-/*+-*/ //# #*./*(+0/ -:
(-"/--!'0%2"',-%% '-6
L: )/#  + 0-$/4)" -7"*/*/# *(+0/ -.+" )'$& 0N0(&).-+777 /*$.+'4/# 0(&).-+"3+:
M: )/ - /# #*./)( *-  - .. *! /# *(+0/ -: ! 4*0 2)/ /* 0. /# " )/ /* +-*1$ +-*/ /$*) !*- /# #*./ *(+0/ - . 2 ''
.!0)/$*). '47. ' / + 0-$/4*'$4!-*(/# (%"2 ( )0:/# -2$. ' 1 (%"2 . //*I*) I:
(-5
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Manually Installing the Deep Security Agent
41
N: # 2$5-2$''*)Z$-(/#/$/2$''/$1/ /# " )/*)/# *(+0/ -)++'4 0-$/4*'$4@$!*) 2.. ' / A:
O: )/# Z$)'.- )7 ;. ' /I+ )*(+0/ - /$'.*)H'*. HI)'$& %(,:
P: # " )/ $. )*2 /$1/ : ) /#  +  0-$/4 )" -7 "* /* /# (&).-+, .- ) ) # & /# *(+0/ -H. .//0.: / .#*0'
$.+'4I)" @)'$) AI:
Enabling Relay Functionality
)4 /$1/  QO;$/ $)*2. *- $)03 " )/ ) *)Z$"0-  /* / .  '47 *2)'*$)" ) $./-$0/$)"  0-$/4 ) *!/2- +/ .:
''%('' '-4%2.'-"('%"-2''(-",%6
('%%2.'-"('%"-26
L: ) /#  +  0-$/4 )" -7 "* /* /# (&).-+, +" 7 *0' ;'$& /# *(+0/ - 2$/# /# ) 2'4;/$1/ " )/ /* $.+'4 $/.
-"%, $/*-2$)*2:
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Manually Installing the Deep Security Agent
42
M: ) /# *(+0/ - $/*-7 "* /* /# /+/"0 N -"(', N (-0+ -  ) '$& '% %2: '$& %(, /* '*. /# $/*-
2$)*2:
N: ) /#  +  0-$/4 )" - *) /# *(+0/ -. +" 7 /# *(+0/ -H. $*) 2$'' #)" !-*( *-$)-4 *(+0/ - @ A /* *(+0/ -
2$/#  '4; )'  " )/ @ A: '$& /# +/"0 $*) /* $.+'4 /# - 1$ 2 ) 2# - 4*0 ) . /# )0( - *! +/
*(+*) )/./#  '4*0' $.- 4/*$./-$0/ :
Considerations for Windows 2012 Server Core
# - - ! 2/#$)".4*0.#*0'& +$)($)2# )-0))$)" + 0-$/4" )/2$/#$)*2.MKLM -1 -*- 9
?  +  0-$/4 * . )*/ .0++*-/ .2$/#$)" /# $)*2. MKLM . -1 - (*  /2 )  -1 - *- ) 0'' @A (* . !/ - /#
 + 0-$/4" )/$.$)./'' :
? ! 4*0 - 0.$)"  -1 - *- (* $) 4+ -; )1$-*)( )/7 4*0 2$'' )  /* 0. 4+ -; )" - /* - (*/ '4 ()" /#  -1 -
*- *(+0/ - !-*( )*/# - *(+0/ -: # ) /#  -1 - *- *(+0/ - #. /#  +  0-$/4 " )/ $)./''  ) $- 2'' )' 7
/# $- 2'' 2$'' '*& /# - (*/ ()" ( )/ *)) /$*): * ()" /#  -1 - *- *(+0/ - - (*/ '47 /0-) *!! /# $- 2''
(*0' :
? 4+ -; +-*1$ . ($"-/$*) !0)/$*) 0.  /* (*1 "0 ./  !-*( *) 4+ -; . -1 - /* )*/# -: #  +  0-$/4 $- 2''
(*0' 2$'' '*& /# *)) /$*)  /2 ) 4+ -; . -1 -.7 .* 4*0 2$'' )  /* /0-) *!! /# $- 2'' (*0' /* 0. /# ($"-/$*)
!0)/$*):
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Manually Installing the Deep Security Agent
43
Installing and Configuring a Relay-enabled Agent
 '4 $.  +  0-$/4 " )/ 2$/#  '4 !0)/$*)'$/4 )' :  '4. *2)'* ) $./-$0/  0-$/4 ) *!/2- +/ . /* 4*0-  +
 0-$/4" )/. )++'$) .:*0(0./#1 /' ./*)  '4; )' " )//*& +4*0-+-*/ /$*)0+/*/ :
Install and Activate a Deep Security Agent
! 4*0 * )*/ '- 4 #1 ) " )/ $)./''  *) *(+0/ -7 * .* 4 !*''*2$)" /# $)./-0/$*). $)  $%  % " &#%*  % /"
440:*0.&$+# /*/# . /$*)*)I)0')./''/$*)I:
) /# " )/$.$)./'' 74*0) /*/$1/ $/:
(-"/--! '-5
L: )/#  + 0-$/4)" -7"*/*/# *(+0/ -.+" :
M: )/# ( )0-7'$& 0N0(&).-+777 /*$.+'4/# 0(&).-+ $5-:
N: *- (,-'&7 )/ -/# #*./)( *-- ..*!/# *(+0/ -*)2#$#4*0%0./$)./'' /# " )/:
O: *- (%"27. ' /)++-*+-$/ +*'$4:
P: *- (0'%(.+"-2)-,+(&7' 1 /#  !0'/. //$)"@ !0'/ '4-*0+A:
Q: '$& "'",!: + 0-$/4)" -2$''$(+*-//# *(+0/ -/*$/.*(+0/ -.+" )/$1/ /# " )/:
Enable Relay Functionality on a Deep Security Agent
('%%2.'-"('%"-2(''"',-%%).+"-2 '-6
L: # $)" ) 2 *(+0/ - ) /$1/$*) +-* .. .#*0' #1 Z$)$.#  4 *+ )$)" /# *(+0/ -H. "-(+ 2$)*2: ! $/ #.)H/7
!*''*2./ +/2*@ '*2A/**+ )/# 2$)*2:
M: ) /#  +  0-$/4 )" -7 "* /* /# (&).-+, .- )7 Z$) /# " )/ *) 2#$# 4*0 2)/ /* )' '4 !0)/$*)'$/4 )
*0' ;'$&$//**+ )$/. (&).-+"-(+ 2$)*2:
N: )/# (&).-+"-(+ 2$)*27"*/* /+/"0N-"(',N(-0+ )'$& '%%2:
 2(. ( '(- , -!   * .--('4 ( -(  $%#%! ; "%$ ; !%(# ; ! -( !$ 0!-!+ -!
(++,)('"' )$ !,'"&)(+-6%,(',.+-!--!(&).-++.''"' FD7"-/+,"('(-! '-6
 + 0-$/4)" -2$''$)./''/# +'0";$).- ,0$- 4/#  '4*0' 7)/# " )/2$'' "$)/*!0)/$*). '4:
 2(. + +.''"' "'(0, "+0%% (+ ")-%,4 2(. %,( ' -(  "+0%% .% -!- %%(0, 9 -+L" (' )(+- DABB ('
-!%27'% '-,6
%27'  '-, + (+ '"3 "'-( * #!&"$6 0 %27'%  '-, + .-(&-"%%2 ,," ' -( -! &%
* #!&"6 ! .%- %2 +(.) ", ('L" .+ -( +-+"/ .+"-2 ' (-0+ )-, +(& -! +"&+2 .+"-2 )-
(.+ L"' "' -! ) .+"-2 ' + (' -!  $%#%! ; *$% %% $ ; "%$ -6 :! +"&+2 )-
(.+2.%-",+'"+(=,)-+/+,4.--!",('L" .+%6;
(-5
(-5
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Installing and Configuring a Relay-enabled Agent
44
Deploying Agentless Protection in an NSX Environment
Requirements
Deep Security Requirements
!(%%(0"' +'"+().+"-2,(-0+&.,-"',-%%(+"&)(+-6
? !).+"-2' +K7ID&.,-"',-%%:@  $% %"&#%* # /"370:A
!).+"-2' +,!(.%"%%2"',-%%('"-""'-!,&-'-+6
? ) .+"-2  '- 0"-! %2 .'-"('%"-2 '% &.,-  "',-%% ' -"/-5 ' %% )-, &.,- !/
(&)%- (0'%("' 7 @*- $)./-0/$*). *) $)./''$)" ) *)Z$"0-$)" ) " )/ 2$/#  '47 .  $%  % " &#%*
 % /"440 )  $%  ! <&# *-  % /"550:A
? ! ) .+"-2 "+-.% ))%"' ,(-0+ )$  &.,-  "&)(+- "'-( ) .+"-2 ' +7 ) /# $-/0'
++'$) $. -0))$)" $) /# / )/ -7 $/ 2$'' )  /* *)) / /* '4; )'  " )/ /* #1  .. /* /# '/ ./  0-$/4 )
*!/2- +/ .:
("&)(+--!).+"-2"+-.%))%"',(-0+6
L: *2)'* /#  +  0-$/4 $-/0' ++'$) .*!/2- +&" !-*( /# - ) $-* *2)'*  )/ -
@#//+9>>*2)'* )/ -:/- )($-*:*(A/*/#  + 0-$/4)" -#*./(#$) :
M: ) /#  +  0-$/4 )" -7 "* /* /# &"'",-+-"(' N )-, N (-0+ N (% +" ) '$& &)(+-777 $) /# /**'- )
$(+*-/ /# .*!/2- +&" /*  +  0-$/4: @#  +  0-$/4 ()" - 2$'' /# ) 0/*(/$''4 *2)'* /# '/ ./ QO;$/  
/" )/.*!/2- +&" 2#$#2$'''/ - 0. /*0+"- /# $-/0'++'$) H.-*/ /$*)*0' .:A
',-%%"' -!).+"-2 '-
) )  )1$-*)( )/7 /#  +  0-$/4 $-/0' ++'$) +-*1$ . )/$;'2- 7 )/ "-$/4 *)$/*-$)"7 +0//$*)  -1$ 7 $- 2''7
))/-0.$*)- 1 )/$*)!*-4*0-1$-/0'(#$) .72$/#*0/- ,0$-$)")" )/:#$.$./# - *(( )  +'*4( )/( /#*:
! 4*0  $ /* '.* $)./''  +  0-$/4 " )/ *) 4*0- 1$-/0' (#$) .7 /#  +  0-$/4 $-/0' ++'$) 2$'' *)'4 +-*1$ )/$;
'2- ) )/ "-$/4 *)$/*-$)": #  +  0-$/4 " )/ 2$'' +-*1$  +0//$*)  -1$ 7 $- 2''7 )/-0.$*) - 1 )/$*)7 ) '.* *"
).+ /$*):#$.$.&)*2.I*($) * I:
VMware Requirements
(.&.,-+.''"' -!(%%(0"' 0+,(-0+6
? 0+/)!+H7H(+I7C
0+/'-+H7H(+I7C
0+"H7H(+I7C
0+/)!+%"'- @- ,0$- .'.#; )' 2 -*2. -A
? 0+' +I7D7H(+I7E
(.+-'-+&.,-&--!(%%(0"' ('O" .+-"('+*."+&'-,6
? ! -'-+ &.,-  .,"' /)!+ ",-+".- 0"-! :/;7 @*- ,0$& "0$ /* $)./''$)" 1+# - $./-$0/  2$/#7
.  $% '"#$%#&%(% /"9:0:A
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Deploying Agentless Protection in an NSX Environment
45
? ",+/+,&.,-(''--(-!",-+".-0"-!7
? (.+ " ,+/+, &.,-  +(.) "'-( %.,-+,5 /' " 2(. ('%2 !/ ,"' % " "' ,"' % %.,-+7 @# $ . -1 -.
(0./ *)) / /*/# 1 (+ /# 4- (*1 $)/*'0./ -.:A
? (.+ %.,-+ &.,-  )+)+ 2 "',-%%"' -! +"/+, -!- 0"%% %%(0 '-0(+$ -+O" "',)-"(' (' %% " ,+/+,7 @*-
,0$&"0$ /*#*./+- +-/$*)7. #"# $#'#$ /":10:A
? .,- '-+(,)-"(' ,+/" &.,-  "',-%% (' -! %.,-+ -!- 2(. 0'- -( )+(--7 @*- ,0$& "0$ /* $)./''$)" 0 ./
)/-*.+ /$*). -1$ 7.  $% &$% %#!$"%! $#' /":20:A
? "+-.% &!"', &.,- %(' -( '  .+"-2 +(.)7 @*- ,0$& "0$ /* - /$)"   0-$/4 -*0+.7 . #%  
&#%*#!&"$ /":40:A
? "+-.%&!"',&.,-!/-!%-,-0+((%,"',-%%5"'%."' -!0+.,-'-+(,)-"('+"/+7
*).0'/4*0-2- *0( )//$*)!*-(*-  /$' $)!*-(/$*)*)*)Z$"0-$)"4*0- )1$-*)( )//*( //# *1 - ,0$- ( )/.:
Add the vCenter to Deep Security Manager
* ()" /# . 0-$/4 *! /# 1$-/0' (#$) . $) 4*0- / )/ - 2$/#  +  0-$/47 4*0 (0./ Z$-./  /# 1 )/ - /* /#  +  0-$/4
)" -:
(-!/'-+-().+"-2' +6
L: )/#  + 0-$/4)" -7"*/*/# (&).-+, +" )'$& 0777N0+/'-+777:
M: )/# 0+/'-+"3+7 )/ -/# !*''*2$)"9
+/+6 /# - ..*-#*./)( )+*-//**)) //*/# 1 )/ -
&6 )( ) .-$+/$*)*!/# / )/ -@!*-$.+'4+0-+*. .*)'4A
+'-"%,6 0. -)( )+..2*-/* ../# 1 )/ -
N:  +//#  -/$Z$/ $!- ,0$- :
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Deploying Agentless Protection in an NSX Environment
46
O: )/ -/# )" - -1 -- ..7)/# - ,0$- -  )/$'.:
 -! /'-+ 0, )+/"(.,%2  -( '(-!+ ) .+"-2 ' +4 -! 0"3+ ",)%2, &,,  +&"'"' 2(.
-( +&(/ %% ) .+"-2 "+-.% ))%"', +(& 2(.+ " ,+/+, ' -( %- '2 (%  .+"-2 (%"",6 
2(. !/ )+(+& -!(, -"(',4 ,%- > !/ +&(/ %% ) .+"-2 ,+/", '  .+"-2 (%"", -!-
++'-!)+/"(.,)%(2&'-60'--((/+0+"--!)+/"(.,)%(2&'-,--"' ,6>'-!'%"$ )%6
P:  +//#  -/$Z$/ $!- ,0$- :
Q: #  0+ /'-+ "3+ 2$'' $.+'4 .0 ..!0' - .0'/ ( .." 2# ) /# 1 )/ - #.  ) $(+*-/ : '$& "'",! )
/# ) %(, /*'*. /# 2$5-:
! . ' / 7 /# *+/$*) .#*2) $) /# $(" *1 - / . /2* 1 )/;.  .&.: ) /$1/ . . 2# ) +-*/ /$*) $.   ) /# */# -
 /$1/ . . 2# ) +-*/ /$*) $. - (*1 : *- (*- $)!*-(/$*)7 . I1 )/;.  .&. - /  # ) $)" 1 )/ - /*  +  0-$/4
)" -I$) &%!%!*  %  '#!  %$ /"710:
# )  +  0-$/4 )" - . /# 1 )/ - /* $/. $)1 )/*-47 $/ '.* - "$./ -. /#  +  0-$/4 . -1$ 2$/#$)  )" -: #$. + -($/.
/#  +'*4( )/*!/#  + 0-$/4. -1$ /*/# $. -1 -.:
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Deploying Agentless Protection in an NSX Environment
47
Synchronize Deep Security Policies with NSX
# - - /2*24./*+-*/ /4*0-.2$/# + 0-$/49
? . 1 )/;.  /.&. /* /$1/ )  /$1/ . $)  +  0-$/4 ) ++'4 *- - (*1  !0'/ +*'$4: *- (*- $)!*-(/$*)7
. I1 )/;.  .&. - /  # ) $)" 1 )/ - /*  +  0-$/4 )" -I $) &%!% !*   % 
 '#!  %$ /"710:
? 4)#-*)$5 4*0- + 0-$/4+*'$$ .2$/#:#$.( /#*$. .-$  '*2:
#  /#/ 4*0 2)/ /* +-*/ / (0./  '*)" /* )   0-$/4 -*0+7 2#$# #. )   0-$/4 *'$4 ..$")  /* $/: # ) 4*0 . / 0+
)   0-$/4 *'$47 *) *! /# *+/$*). /#/ 4*0 . ' / $. /#   -1$ -*Z$' : $/#  +  0-$/4 T:Q *- -'$ -7 /# - 2. *)'4 *) 
 -1$ -*Z$' !*- 0. 2$/#  +  0-$/4: . *!  +  0-$/4 T:Q L7 4*0 ) #**. /* .4)#-*)$5 '' *! 4*0-  +  0-$/4 +*'$$ . 2$/#
: #$. - / . (/#$)"   -1$ -*Z$' @2#$# 2 '' I++   -1$ -*Z$' I $)  +  0-$/4A !*- # *! 4*0-  +  0-$/4
+*'$$ .:
('%)(%"2,2'!+('"3-"('6
%%(-!)(%"","').+"-2' +&.,-!/.'"*.'&(+-!2+,2'!+('"30"-!6
L: )/#  + 0-$/4)" -7"*/*/# (&).-+, +" )-$"#/;'$&/# 1 )/ -2# - 4*02)//* )' .4)#-*)$5/$*):
M: '$& +()+-",:
N: )/# ('O" .+-"(' /7. ' / 2'!+('"3).+"-2(%"",0"-!+/"+(O"%,:'$& :
1-,-),6
L: - / )   0-$/4 *'$47 .  .-$  $) /# I- / )   0-$/4 *'$4I . /$*) '/ - $) /#$. #+/ -:  ' / ++ 
 -1$ -*Z$' . /#  -1$ -*Z$' !*- /# .,- '-+(,)-"(' +/" ) /# )*0) ) 0/*0) -0(+$ '-+(,)-"('
+/",:
 2(. ,%- -! >.%- :;> ,+/" )+(L"%4 -! , "' +(.), -!- ., -!", )(%"2 0"%%  !'% 2 -! >
.+"-2+(.)!' >/'-7,-,$,6
M: ..$") /#   0-$/4 *'$4 /* /#   0-$/4 -*0+. *)/$)$)" /# . /#/ 4*0 2)/ /* +-*/ /7 .  .-$  $) /# I++'4
/#   0-$/4 *'$4 /* /#   0-$/4 -*0+I . /$*) '/ - $) /#$. #+/ -: )4 . $) /#   0-$/4 -*0+ 2$'' /$1/ 
)..$") /# *-- .+*)$)" + 0-$/4+*'$40/*(/$''472$/#*0//# 0. *! 1 )/;. /.&.:
!' "' (++&(/"' -!)(%"2,," '-(
# )$.+-*/ / 4++  -1$ -*Z$' 7/# +*'$4..$")( )/))*/ #)" !-*(2$/#$) + 0-$/4)" -9
(-5
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Deploying Agentless Protection in an NSX Environment
48
*#)" /# +-*Z$' 0. /*+-*/ /74*0(0./#)" /#  0-$/4*'$4*- 0-$/4-*0+!-*(4*0-1+# -  '$ )/:
!4*00)..$")) 0-$/4*'$4!-*("-*0+7)4.$)/#/"-*0+2$''  /$1/ $) + 0-$/4)" -:
!' "' -!'&()(%"2
!4*0- )( +*'$4$) + 0-$/4)" -7/#  -1$ -*Z$' ( 2$'''.* #)" :
%-"' )(%"2
! 4*0  ' / +*'$4 $)  +  0-$/4 )" - ) /# *-- .+*)$)"   -1$ -*Z$' $. )*/ $) 0. 7 $/ 2$''  ' / : ! /# *-- .+*)$)"
  -1$ -*Z$' $. $) 0. 7 /#   -1$ -*Z$' 2$'' )* '*)" - .4)#-*)$5  2$/#  +  0-$/4 )" - ) $/. )( 2$'' #)" 
/*$)$/ /#/$/$.)*'*)" -1'$:!/#  -1$ -*Z$'  *( .0)0. '/ -7$/2$''  ' / :
0+/%"3
! 4*0 - *)Z$"0-$)" '0 +-$)/ 2$/# 2- 1 '$5 7 4*0 ) ..$") $/# -   0-$/4 -*0+ *- )   0-$/4 *'$4 /* /# '0 +-$)/:
#  0-$/4-*0+*- 0-$/4*'$4)*/#0. ++  -1$ -*Z$' .:
Install the Deep Security service
(+ "',-%%"' -! ) .+"-2 ,+/"4 2(. &.,- L"+,- "&)(+- ) .+"-2 "+-.% ))%"' "'-( -! ) .+"-2
' +6 (. &.,- %,( ',.+ -!- -! .,- '-+(,)-"(' ,+/" ", "',-%% "' /)!+6 :(+ *."$ ." -( "',-%%"' .,-
'-+(,)-"(',+/"4,  $% &$% %#!$"%! $#' /":206;
* +-*1$ " )/' .. +-*/ /$*) /* /# 1$-/0' (#$) . *) 4*0- $ . -1 -.7 4*0 (0./ $)./'' /#  +  0-$/4 . -1$ @/#  +  0-$/4
$-/0'++'$) A*)/# '0./ -/#/4*0-$. -1 -. '*)"/*:
("',-%%-!).+"-2,+/"6
L: ) /# 1+# -   '$ )/7 "* /* (& N -0(+$"' ' .+"-2 N ',-%%-"(' N +/" )%(2&'-, ) '$& /# "- )
+'0..$")@ A/*$.+'4/# )%(2-0(+$4.+"-2+/", 2$)*29
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Deploying Agentless Protection in an NSX Environment
49
M: %-,+/",4,!.%9. ' //# +'"+().+"-2 . -1$ 9
'$& 1-:
N: %-%.,-+,9. ' //# '0./ [email protected]/#/$)'0 ./# $. -1 -.*)2#$#/* +'*4/#  + 0-$/4. -1$ 9
'$& 1-:
O: %- ,-(+  ' ' &'- -0(+$9 *- # '0./ -7 . ' / /./*- *) 2#$# /* ./*- /#  +  0-$/4 $-/0'
++'$) 7 /# ) /2*-& @/# $./-$0/  +*-/ "-*0+ 0.  4 /# 1 *) /# / )/ -A ) /#  ..$")( )/ ( /#* !*- /#  +
 0-$/4. -1$ /*0. :
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Deploying Agentless Protection in an NSX Environment
50
 2(. + ,," '"' ,--"  )((%, "' -! > ,," '&'-> (%.&' -( -! ) .+"-2 ,+/" (+ .,- '-+(,)-"('
,+/"4 &$ ,.+ 2(.+ .%- -02 '  ", +!%9+,(%/% ' -! )+L"1 %' -! ", (++-6  2(. (
'(-4 -! ) .+"-2 ' .,- '-+(,)-"(' ,+/" , 0"%% '(- - -"/- ' -!2 0"%% '(-  % -( -%$ -(
 &' + (+ ) .+"-2 ' + ., -!"+ , + '(- (' -! ,& '-0(+$ , -! ) .+"-2 ' +
(+-!' +6
P: '$& 1-:
Q: 2-((&)%-9'$& "'",! /**(+' / /#  +'*4( )/*!/#  + 0-$/4. -1$ 9
R: # )  +'*4( )/ $. *(+' / 7 4*0H'' . /# - ) $-*  +  0-$/4 . -1$ $) /# '$./ *! -0(+$ 4 .+"-2 +/"
)%(2&'-,9
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Deploying Agentless Protection in an NSX Environment
51
#  + 0-$/4. -1$ $.)*2 +'*4 /*/# '0./ -:
Create an NSX Security Policy
 3/7 4*0 )  /* - /  .+"-2 (%"2 2$/#  +  0-$/4 )'  . */# ) ')("'- +/" ) . -0(+$ '-+(,)-"('
,+/":
(+-.+"-2(%"2(+).+"-26
L: ) 4*0- 1+# - '$ )/7 "* /* (& N -0(+$"' ' .+"-2 N +/" (&)(,+ ) '$& *) /# .+"-2 (%"", /7
)'$&/# 0.+"-2(%"2 $*)@ A:
M: &',+")-"('9"$1 )( /*/# ) 2+*'$49
'$& 1-:
N: .,- '-+(,)-"(' +/",9 '$& /# "- ) +'0. .$") @ A /*  ) ')("'- +/": -*1$ )( !*- /# )+*$)/  -1$
). ' //# !*''*2$)". //$)".9
-"('6 ++'4
+/"&6 - )$-* + 0-$/4
+/" +(O"%6 ! 4*0 - 0.$)" 1 )/;.  /.&. /* #)' /# - /$*) ) +-*/ /$*) *! .7 . ' / I !0'/ @AI:
! 4*0 #1 .4)#-*)$5  4*0-  +  0-$/4 +*'$$ . 2$/#   -1$ -*Z$' .7 . ' / /#  -1$ -*Z$' /#/ (/# .
/#  + 0-$/4+*'$4/#/4*02)//*++'4:
--6 )' 
'(+6 .
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Deploying Agentless Protection in an NSX Environment
52
'$& 7/# )'$& 1-:
O: "+0%%.%,9*)*/(& )4#)" .:'$& 1-:
P: -0(+$ '-+(,)-"(' +/",9 *0 2$'' $)" -0(  /2*-& )/-*.+ /$*)  -1$ . /* /#   0-$/4 *'$49 Z$-./ *) !*-
(.-(.' /-!Z$7). *)*) !*- "'(.' /-!Z$:
L: *- /# Z$-./7 (.-(.'7 . -1$ 7 $) /# -0(+$ '-+(,)-"(' +/", *+/$*).7 '$& /# "- ) +'0. .$") /* - /
) 2 . -1$ : ) /#  -0(+$ '-+(,)-"(' +/" 2$)*27 +-*1$ )( !*- /# . -1$ @+- ! -'4 *) /#/
$)'0 ./# 2*-I0/*0)IA). ' //# !*''*2$)". //$)".9
-"('6  $- //*. -1$
+/"&6 - )$-* + 0-$/4
+(O"%6  ' //# .(  -1$ -*Z$' .4*0$$)./ +N:
(.+6 *'$4H. 0-$/4-*0+.
,-"'-"('6 )4
+/"6 )4
--6 )' 
( 6 *)*/'*"
M: *- /# . *)7 "'(.'7 . -1$ 7 $) /# -0(+$ '-+(,)-"(' +/", *+/$*).7 '$& /# "- ) +'0. .$") /* - /
) 2 . -1$ : ) /#  -0(+$ '-+(,)-"(' +/" 2$)*27 +-*1$ )( !*- /# . -1$ @+- ! -'4 *) /#/
$)'0 ./# 2*-I)*0)IA). ' //# !*''*2$)". //$)".9
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Deploying Agentless Protection in an NSX Environment
53
-"('6  $- //*. -1$
+/"&6 - )$-* + 0-$/4
+(O"%6  ' //# .(  -1$ -*Z$' .4*0$$)./ +N:
(.+6 )4
,-"'-"('6 *'$4H. 0-$/4-*0+.
+/"6 )4
--6 )' 
( 6 *)*/'*"
N: '$&  $) /#  -0(+$ ',)-"(' +/" 2$)*27 ) /# ) '$& "'",! /* *(+' / ) '*. /# 0
.+"-2(%"2 2$)*2:
*0#1 )*2- / 4*0- 0-$/4*'$4!*- + 0-$/4:
Apply the NSX Security Policy to the NSX Security Group
*0(0./)*2++'4/#  0-$/4*'$4/*/#  0-$/4-*0+*)/$)$)"/# .4*02)//*+-*/ /:
! /"+-.% &!"', 2(. 0'- -( )+(-- 0"-! ) .+"-2 &.,- %(' -(  .+"-2 +(.)6 :(+ *."$ ." -( +-"'
.+"-2+(.),4, #% &#%*#!&"$ /":406;
())%2-!.+"-2(%"2-(-!.+"-2+(.)9
L: /4 *) /# .+"-2 (%"", / *! /# (& N -0(+$"' 4 .+"-2 N +/" (&)(,+ +" $) 4*0- 1+# - '$ )/:
$/#/# ) 2 0-$/4*'$4. ' / 7'$&/# ))%2.+"-2(%"2 $*)@ A:
M: ) /# ))%2 (%"2 -( .+"-2 +(.), 2$)*27 . ' / /#  0-$/4 -*0+ /#/ *)/$). /# . 4*0 2)/ /* +-*/ / ) '$& :
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Deploying Agentless Protection in an NSX Environment
54
#  0-$/4*'$4$.)*2++'$ /*/# .$)/#  0-$/4-*0+:
Adding Additional ESXi Servers to Your NSX Cluster After Deep Security
Integration
$)") 2$. -1 -/*'0./ -/#/$.+-*/ / 4 + 0-$/4(0./ *) $)/# !*''*2$)". ,0 ) 9
L: *.//*/# / )/ - .-'(-"+-%2-(-!%.,-+:
M: *)) //# *.//*/# $./-$0/ 2$/#:
N: *1 /# *./$)/*/# '0./ -:
) /# *./$.(*1 $)/*/# '0./ -7/#  + 0-$/4. -1$ 2$''  +'*4 0/*(/$''4:
Apply Deep Security Protection to Your VMs
*0 ) )*2 - /0-) /* /#  +  0-$/4 )" - *).*' 2# - 4*0 ) /$1/ /# . $) /# $(+*-/  1 )/ - ) ++'4  +  0-$/4
*'$$ . /* /# (: *- $)!*-(/$*) *) 0.$)"  +  0-$/4 /* +-*/ / 4*0- .7 . /# . -H. 0$ . /$*) *! /#  +  0-$/4 )" -H.
*)'$) # '+7$)+-/$0'-7/# "' (&).-+, ) )%(2"' +(--"(' . /$*).:
 2(. ,%- -! !$(1 - -! ' ( -! > -! /'-+ -( ) .+"-2 ' +> )+(.+4 ' /'-7, ,$ 0"%%
-"/- -! , "' -! .+"-2 +(.)6 (+ &(+ "'(+&-"('4 , >/'-7, ,$, +- !' "' /'-+ -( )
.+"-2' +>"' &%!%!*  %  '#!  %$ /"7106
!", ,-) ", '(- ',,+2 " 2(. + .,"' ))  +/" +(L"%,4 , ,+" "' >2'!+('"3 ) .+"-2 (%"", 0"-!
>6
VMware NSX Security Tags
 +  0-$/4 ) ++'4  .+"-2  , /* +-*/ /  . 0+*)  / /$)" ('2- /#- /:   0-$/4 ". ) 0.  2$/#   -1$
*(+*. - /* 0/*(/  -/$) /.&. .0# .7 !*- 3(+' 7 ,0-)/$)$)" $)! /  .: *).0'/ 4*0- 2-  *0( )//$*) !*- (*-
$)!*-(/$*)*) 0-$/4".)4)($ 0-$/4-*0+..$")( )/:
 .+"-2  , + )+- ( -! 0+ /)!+  '/"+('&'- ' + '(- -(  ('., 0"-! ) .+"-2 /'-  ,6
(+&(+"'(+&-"('(').+"-2/'- "' 4, ' %  "'-!,+=,.",-"('(-!('%"'!%)6
# '-"8%0+ ) '-+.,"('+/'-"('2,-& +-*/ /$*)(*0' .) *)Z$"0- /*++'4 0-$/4".:
(-5
(-5
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Deploying Agentless Protection in an NSX Environment
55
Anti-Malware NSX Security tags
**)Z$"0- /# ++'$/$*)*! 0-$/4".7"*/* (&).-+9(%"2"-(+N'-"8%0+N/'N.+"-2 "' :
*0 ) #**. /* *)'4 ++'4 /#   0-$/4 " $! /# - ( $/$*) /$*) // (+/  4 /# )/$;'2- )"$) !$'.: @# - ( $/$*)
/$*) $.  / -($)  4 /# '2- ) *)Z$"0-/$*) /#/ $. $) !! /: * . 2#$# '2- ) *)Z$"0-/$*) $. $) !! /7 "* /* /#
(&).-+9(%"2"-(+N'-"8%0+N'+% /)# &/# %8"&'7 '.%'7) !.%' - .:A
*0 ) '.* #**. /* #1 /#  0-$/4 " - (*1 $! .0. ,0 )/ '2- ) * . )*/  / / )4 ('2- : *0 .#*0' *)'4 0. /#$.
. //$)"$!'''2- ).2$'' *!/# .( &$):
Intrusion Prevention NSX Security Tags
* *)Z$"0- /# ++'$/$*) *!   0-$/4 ".7 "* /* (&).-+9(%"2 "-(+ N '-+.,"(' +/'-"(' N /' N  .+"-2
 "' :
)/-0.$*)- 1 )/$*)1 )/.#1 . 1 -$/4' 1 '/#/$. / -($) 4/# . 1 -$/4' 1 '*!/# )/-0.$*)- 1 )/$*)0' /#/0. $/:
!,/+"-2%/%(''-+.,"('+/'-"('.%",('L" .+%('-! &#!"#%$; # -6
)/-0.$*)- 1 )/$*)0' . 1 -$/4' 1 '.(+/*/"..!*''*2.9
.%/+"-2 .+"-2
-$/$' G:/#- /W#$"#
$"# G:/#- /W#$"#
 $0( G:/#- /W( $0(
*2 G:/#- /W'*2
*0 ) *)Z$"0- /# . ).$/$1$/4 *! /# /""$)" ( #)$.( 4 .+ $!4$)" /# ($)$(0( )/-0.$*) - 1 )/$*) . 1 -$/4 ' 1 ' /#/ 2$'' 0. )
. 0-$/4/"/* ++'$ /*:
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Deploying Agentless Protection in an NSX Environment
56
# *+/$*).!*-/# "'"&.&+.%,/+"-2-(-+" +))%"-"('('.+"-2 . //$)"- 9
? .%-:( "' ;6 */"$.++'$ :
? +"-"%6 )/"$.++'$ /*/# $!))/-0.$*)- 1 )/$*)0' 2$/#. 1 -$/4' 1 '*! +"-"% $./-$"" - :
? " !6 )/"$.++'$ /*/# $!))/-0.$*)- 1 )/$*)0' 2$/#. 1 -$/4' 1 '*! " ! *- +"-"% $./-$"" - :
? ".&6 )  /" $. ++'$  /* /#  $! ) )/-0.$*) - 1 )/$*) 0' 2$/# . 1 -$/4 ' 1 ' *! ".&7 " !7 *- +"-"% $.
/-$"" - :
? (06 )  /" $. ++'$  /* /#  $! ) )/-0.$*) - 1 )/$*) 0' 2$/# . 1 -$/4 ' 1 ' *! (07 ".&7 " !7 *- +"-"% $.
/-$"" - :
 +-/ . //$)".- +-*1$ !*-0' ./#/- *+ -/$)"$)- 1 )/(* )!*-0' ./#/*+ -/$)"$) / /;*)'4(* :
!-!+ '  .% ", ()+-"' "' +/'- (+ --7('%2 &( ", -+&"' '(- ('%2 2 -! '-+.,"(' +/'-"(' &(.%
,--"' :!"&%#.!* %!# ;  %#&$! #' %! ;  # -;4 .- %,( 2 -! ('L" .+-"(' ( -! "'"/".% .%
"-,%:&#!"#%$; #%;%$;6
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Deploying Agentless Protection in an NSX Environment
57
Installing the Deep Security Notifier
#  +  0-$/4 */$Z$ - $. 0/$'$/4 !*- +#4.$' *- 1$-/0' $)*2. (#$) . 2#$# +-*1$ . '*' )*/$Z$/$*) 2# ) ('2- $.  / /  *-
('$$*0. . - '*& : #  +  0-$/4 */$Z$ - $. 0/*(/$''4 $)./''  . +-/ *! /#  +  0-$/4 " )/ *) $)*2. (#$) .: #
./);'*) $)./''/$*)  .-$  # - $. $)/ )  !*- 0. *) " )/' .. $)*2. .  $)" +-*/ /  4 /#  +  0-$/4 $-/0' ++'$) :
Copy the Installation Package
*+4/# $)./''/$*)Z$' /*/# /-" /(#$) :
Installing the Deep Security Notifier for Windows
&&+-!-2(.&.,-!/&"'",-+-(+)+"/"% ,-("',-%%'+.'-!).+"-2(-"L"+('"'(0,&!"',6
L: *0' ;'$&/# $)./''/$*)Z$' /*-0)/# $)./'' -+&" :'$& 1- /* "$)/# $)./''/$*):
M:  /# '$ ). "- ( )/)'$& 1-:
N: '$& ',-%% /*+-* 2$/#/# $)./''/$*):
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Installing the Deep Security Notifier
58
O: '$& "'",! /**(+' / /# $)./''/$*):
#  +  0-$/4 */$Z$ - $. )*2 $)./''  ) -0))$)" *) /#$. *(+0/ -7 ) /# */$Z$ - $*) ++ -. $) /# $)*2. 4./ ( -4: #
*/$Z$ - 2$'' 0/*(/$''4 +-*1$ +*+;0+ )*/$Z$/$*). 2# ) ('2- $.  / /  *-  #.  ) '*& : @*0 ) ()0''4 $.'
)*/$Z$/$*).4*0' ;'$&$)"/# /-4$*)/**+ )/# */$Z$ -.//0.)*)Z$"0-/$*)2$)*2A:
' , )+(-- 2 "+-.% ))%"'4 -! '-"7%0+ &(.% &.,-  %"', ' '% (' -!  (+ -! ) .+"-2
(-"L"+-(",)%2"'(+&-"('6
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Installing the Deep Security Notifier
59
Automated Policy Management in NSX Environments
 2(. !/ '% ,2'!+('"3-"(' ( ) .+"-2 )(%"", -( 4 2(. 0"%% '(- ' -( ., -!  &#%* #!&"  
6 (+ "'(+&-"(' (' )(%"2 ,2'!+('"3-"('4 , >2'!+('"3 ) .+"-2 (%"", 0"-! > "' "!*   %$$
#!%%!    '#!  % /"5606
# . 0-$/4 *)Z$"0-/$*) *!  $) )  )1$-*)( )/ ) 0/*(/$''4 (*$Z$  .  #)" . /* /# H.   0-$/4 -*0+:
# 0/*(/$*)*!. 0-$/4*)Z$"0-/$*)$.*) 0.$)"/# .+"-2+(.)!'  1 )/;. .&:
. - ..*$/  2$/#   0-$/4 -*0+.7   0-$/4 -*0+. - ..*$/  2$/#   0-$/4 *'$$ .7 )   0-$/4 *'$$ . -
..*$/ 2$/# -1$ -*Z$' .:
"NSX Security Group Change" Event-Based Task
 +  0-$/4 #. /'-8, ,$, @.A /#/ ) *)Z$"0-  /* + -!*-( /$*). 2# ) .+ $Z$ 1 )/. 2$/# .+ $Z$ *)$/$*). -
 / / : #  .+"-2 +(.) !'   3$./. /* ' / 4*0 (*$!4 /# +-*/ /$*) . //$)". *!  $! #)" . /* /#   0-$/4 -*0+
/#/ '*)"./*-  / / :
!  &#%* #!&"    ('%2 --, !' , -(  .+"-2 +(.), -!- + ,,("- 0"-! -! &% /0
 +/" +(L"%6 "&"%+%24  &2  ,,("- 0"-! &'2 +(.),9(%"",4 .- ) .+"-2 0"%% ('%2 &('"-(+ ' +)(+-
!' ,-!-"'/(%/+(.),9(%"",,,("-0"-!-! &%/0 +/"+(L"%6
1 )/;. .&.- '*/ $)/#  + 0-$/4)" -*)/# ($)$./-/$*)/9
# .+"-2+(.)!'  $./-$"" - 2# ))4*!/# !*''*2$)" 1 )/.*0-9
? $. /*)-*0+/#/$.@$)$- /'4A..*$/ 2$/#/# .%-:;  -1$ -*Z$' :
? $.- (*1 !-*()-*0+/#/$...*$/ 2$/#/# .%-:;  -1$ -*Z$' :
? )*'$4..*$/ 2$/#/# .%-:;  -1$ -*Z$' $.++'$ /*)-*0+:
(-5
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Automated Policy Management in NSX Environments
60
? )*'$4..*$/ 2$/#/# .%-:;  -1$ -*Z$' $.- (*1 !-*()-*0+:
? )*'$4$...*$/ 2$/#/# .%-:;  -1$ -*Z$' :
? )*'$4$.- (*1 !-*(/# .%-:;  -1$ -*Z$' :
? )-*0+/#/$...*$/ 2$/#) .%-:;  -1$ -*Z$' #)" .)( :
)1 )/$./-$"" - !*- #$)$1$0'!! / 4#)" :
Conditions Under Which to Perform Tasks
# !*''*2$)" *)$/$*). - ++'$' /* /#  .+"-2 +(.) !'  1 )/;.  .& ) ) / ./  "$)./  !*- + -!*-($)" )
/$*)9
? (&).-+&9# #*./)( *!/# :
? "&9# *./)( *!/# $/# $."0 ./*):
? (%+&9# )( *!/# H.!*' -$)/# $!*' -./-0/0- :
? .+"-2+(.)&9# )( *!/#  0-$/4-*0+/#/#.0) -"*) #)" :
? %-(+&9/# *+ -/$)".4./ (*!/# :
? /'-+'&8# )( *!/# 1 )/ -/# $.+-/*!:
? ))%"' +(--"(' /"%%6  +  0-$/4 $-/0' ++'$) $. 1$'' /* +-*/ / . *) /# $ *) 2#$# /#  $.
#*./ :# (4*-(4)*/ $)I/$1/ I.// :
? ))%"' +(--"(' -"/-9  +  0-$/4 $-/0' ++'$) $. 1$'' /* +-*/ / . *) /# $ *) 2#$# /#  $.
#*./ )/# $.I/$1/ I:
? ,-,+,,9# 0-- )/*-'./&)*2)- ..*!/# *(+0/ -:
(+ "'(+&-"(' (' -!, ('"-"(', ' /'-7, ,$, "' '+%4 , -! ('%"' !%) (+ -!  $%#%! ; ' %-$
$$ ) 6
# .+"-2+(.)& *)$/$*)$. 3+'$$/'4!*-#)" ./*/# .+"-2+(.)!'  1 )/;. .&:
/  +/. %1 - "0'- 3+- ..$*) (/# /* /#   0-$/4 -*0+ /#   '*)". /* 2#*. +-*+ -/$ . #1 #)" : 2* .+ $' . . -
*).$ - 9
? (/#!*-( ( -.#$+$))4-*0+:)/#$.. /# - *(( ) - "0'- 3+- ..$*)$.I:VI:
? (/#!*-( ( -.#$+$))*-*0+.:)/#$.. /# - *(( ) - "0'- 3+- ..$*)$.IDJI:
/# -- "0'- 3+- ..$*).)$)'0 .+ $Z$-*0+)( *-+-/$')( @/*(/#(*- /#)*) -*0+A. .$- :
! %",- ( )(-'-"% +(.), "' -!", ('"-"(' ++, ('%2 -( +(.), ,,("- 0"-! (%"", ,,("- 0"-! -! &% /0 
+/"+(L"%6
Actions Available
# !*''*2$)"/$*).) + -!*-( *)2# ) + 0-$/4 / /.#)" /*/#  0-$/4-*0+/#  '*)"./*9
? -"/- (&).-+9 /$1/  +  0-$/4 +-*/ /$*) 4 /#  +  0-$/4 $-/0' ++'$) : . /#$. 2# )  $. (*1  $)/*
 + 0-$/4;+-*/ /  0-$/4-*0+:
? -"/- (&).-+6  /$1/  +  0-$/4 +-*/ /$*) 4 /#  +  0-$/4 $-/0' ++'$) : . /#$. 2# ) (*1$)"  *0/
*!  +  0-$/4;+-*/ /    0-$/4 -*0+: ) ' -/ 2$'' -$.  $! /#$. /$*) $. )*/ + -!*-(  2# )  $. (*1 *0/
 0-$/4-*0++-*/ / 4 + 0-$/4 0. /# ))*'*)" - +-*/ / :
? ,," '(%"29..$") + 0-$/4*'$4/*:
(-5
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Automated Policy Management in NSX Environments
61
? ,," '%2+(.)9..$") '4-*0+/*:
Event-Based Tasks Created When Adding a vCenter to Deep Security Manager
2*1 )/. .&.) - / 2# )$)")1 )/ -/*:# './+" *!/# /'-+ 2$5-$.+'4.# &*39
! . ' / 7 /#$. *+/$*) - / . /2* 1 )/;.  .&.: ) /* /$1/ . 2# ) +-*/ /$*) $.   ) /# */# - /*  /$1/ . 2# )
+-*/ /$*)$.- (*1 :
# Z$-./1 )/;. .&$.*)Z$"0- .!*''*2.9
? &6 /$1/ X1 )/ -( Y72# - X1 )/ -( Y$./# 1'0 . )$)/# ( Z$ '*)/# 1 )/ -+-*+ -/$ .:
? /'-6  0-$/4-*0+#)" 
? ,$'%6 -0
? -"('6 /$1/ *(+0/ -!/ - '4*!Z$1 ($)0/ .
? ('"-"(',6
/'-+&6 X1 )/ -( Y0./(/# 0. /# $.1 )/ -;.+ $Z$:
))%"'+(--"('/"%%6 -0 :0./#1 )/$1/  +'*4 *)/# .( $:
))%"'+(--"('-"/-6 '. :#$.*)'4++'$ ./*0)/$1/ .:
.+"-2+(.)6 I:VI:0./ ( ( -*!*) *-(*-  + 0-$/4-*0+.:
*0 ) (*$!4 /# /$*). ..*$/  2$/# /#$. 1 )/;.  .&7 !*- 3(+' 4 ++'4$)"  +  0-$/4 +-*/ /$*) *'$4 *- ..$")$)"
$!! - )/  '4 -*0+: # /$*). @) */# - +-*+ -/$ .A *! )4 3$./$)" 1 )/;.  .&. ) $/  *) /# &"'",-+-"(' N /'-8
,,$, +" $)/#  + 0-$/4)" -:
# . *)1 )/;. .&$.*)Z$"0- .!*''*2.9
? &6  /$1/ X1 )/ -( Y72# - X1 )/ -( Y$./# 1'0 . )$)/# ( Z$ '*)/# 1 )/ -+-*+ -/$ .:
? /'-6  0-$/4-*0+#)" 
? ,$'%6 '.
? -"('6  /$1/ *(+0/ -
? ('"-"(',6
/'-+&6 X1 )/ -( Y:0./(/# 0. /# 1 )/;. .&$.1 )/ -;.+ $Z$:
))%"'+(--"('-"/-6 -0 :#$.*)'4++'$ ./*/$1/ .:
.+"-2+(.)6 IDJI:0./)*/ ( ( -*!)4 + 0-$/4-*0+:
!", /'-7, ,$ ", ",% 2 .%-6 (. ' '% "- ' .,-(&"3 "- , ,"+ -+ -!
/'-+"',-%%-"('",(&)%-6
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Automated Policy Management in NSX Environments
62
&.%-")%/'-7,,$,+-+" +2-!,&('"-"('4-!,$,+1.-"'%)!-"%(++2,$'&6
Removal of a vCenter from Deep Security Manager
# ) 1 -1 )/ -$.- (*1 !-*( + 0-$/4)" -$.' .''1 )/;. .&./#/( //# !*''*2$)"-$/ -$9
L: # /'-+& *)$/$*)(/# ./# )( *!/# 1 )/ - $)"- (*1 :
!",&.,-'1-&-!6/'-7,,$,0!"!&-!&.%-")%/'-+'&,0"%%'(-",%6
M: # 1 )/;. .& /'-2) $.I 0-$/4-*0+#)" I:1 )/;. .&.2$/#*/# - 1 )//4+ .- )*/$.' :
(-5
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Automated Policy Management in NSX Environments
63
Upgrading
Upgrading to Deep Security 9.6 SP1 in an NSX Environment
# ./ +.!*-0+"-$)"!-*( + 0-$/4T:P7T:PL7*-T:Q/* + 0-$/4T:QL$)) )1$-*)( )/- 9
L: +"- /* + 0-$/4)" -T:QL:
M: (+*-/1 -.$*)T:QL*!/#  + 0-$/4$-/0'++'$) ) + 0-$/4" )/:
N: +"- 4*0- + 0-$/4 '4; )' " )/:
O: +"- 4*0- + 0-$/4$-/0'++'$) :
*-$)./-0/$*).*)0+"-$)"4*0-1#$ ' )1$-*)( )//*Q:L:P*-Q:M7+' . *).0'/4*0-2- *0( )//$*):
Upgrade to Deep Security Manager 9.6 SP1
) .+"-2 I6F "'%. "&)+(/&'-, -( ,%"%"-2 ' L""'26 ., ( -!, !' ,4 -! .) + +(& )+7I6F
/+,"(' -( I6F A ' )(-'-"%%2 -$ *."- %(' -"& :.) -( ,/+% !(.+, )'"' (' -! ,"3 ( 2(.+ -,;6 , .,.%4
$.) 2(.+ -, (+ .) +"' ' (',"+ )+(+&"' -! .) + .+"' (7!(.+,6 ( $ .) 2(.+ I6E A )
.+"-2 -4 , >-, $.) ' (/+2> "' -! 2(.+ ) .+"-2 I6E A ('%"' !%) (+ &"'",-+-(+=, ."6 (.+
).+"-2 '-,'))%"',0"%%('-"'.-()+(/")+(--"('.+"' -!.) +)+(,,6
(.) +-().+"-2' +K7ID6
L: *2)'* /#  +  0-$/4 )" - T:Q L $)./'' +&" !-*( /# - ) $-* *2)'*  )/ - 2  .$/
@#//+9>>*2)'* )/ -:/- )($-*:*(>A/*'*'$- /*-4:
M: 0) /# $)./'' - +&" .  .-$  $)  $%  " &#%*  # /" 3707 0/ #**. ) + $)./  *! !' 
2# )"$1 )/# *+/$*):
# ) /#  +  0-$/4 )" - $)./'' -  / /. ) *' - 1 -.$*) *!  +  0-$/4 )" - *) 4*0- .4./ (7 $/ 2$'' "$1 4*0 /#
*+/$*) /* I0+"- /# 3$./$)" $)./''/$*)I7 *- /* I#)" /# 3$./$)" $)./''/$*)I: +"-$)" /# $)./''/$*) 2$'' 0+"- /#
 +  0-$/4 )" - /* /# '/ ./ 1 -.$*) 0/ 2$'' )*/ *1 -2-$/ 4*0- +*'$$ .7  0' .7 $- 2'' 0' .7 ++'$/$*) 4+ .7 /:
*- #)" )4 *! /# . 0-$/4 . //$)". /#/ 2 - ++'$  /* /# *(+0/ -. *) 4*0- ) /2*-&: #)"$)" /# 3$./$)" $)./''/$*) 2$''
-. ''/..*$/ 2$/#/# +- 1$*0.$)./''/$*))/# )$)./''/# ) 2-0' .7+*'$$ .7 /:
( '(- %- '2 /'-+, +(& -! ) .+"-2 ' + " 2(. 0",! -( ('-"'. )+(/""' -! ,& )+(--"(' , 2(. " 0"-!
/+,"('I6E6
Import 9.6 SP1 versions of your Deep Security software
((0'%(K7ID/+,"(',(2(.+).+"-2,(-0+6
L: )  +  0-$/4 )" -7 "* /* &"'",-+-"(' N )-, N (-0+ N (0'%( '-+: # (0'%( '-+ +" $.+'4.
/# '/ ./1 -.$*).''.*!/2- 1$'' !-*(- )$-*:
M: *$(+*-//#  + 0-$/4$-/0'++'$) .*!/2- 7. ' //# '/ ./1 -.$*))'$& &)(+-:
! %-,- /+,"(' ( -! "+-.% ))%"' ,(-0+ 0"%%  I6E6 ' 2(. "&)(+- -! I6E "+-.% ))%"'4 )
.+"-2 ' + 0"%% .-(&-"%%2 "&)(+- -! %-,- I6F A  - F  '- )$  0!"! "- 0"%% ., -( .) +
-!"+-.%))%"'=,+(--"('(.%)%. 7"',-(/+,"('I6FA6
N: * $(+*-/ /#  +  0-$/4 " )/ .*!/2- 7 . ' / /# '/ ./ 1 -.$*) ) '$& &)(+-: *0 ) 0. /#$. .*!/2- /* 0+"-  +
 0-$/4" )/*- '4; )' " )/:
(-5
(-5
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Upgrading to Deep Security 9.6 SP1 in an NSX Environment
65
I6@).+"-2%2,0"%%.) +-().+"-2I6FA%27'% '-,6
O: # )/# .*!/2- #.Z$)$.# *2)'*$)"7"- )# &(-&2$''++ -$)/# &)(+- *'0()!*-/#/+&" :
Upgrade to a version 9.6 SP1 Relay-enabled Agent
Upgrade your 9.5 SP1 Relay-enabled Agent
) .+"-2  '-, ' %2, &.,-  ( -! ,& /+,"(' (+ %,, -!' -! ) .+"-2 ' + "' ., -( &'  "-6 !
).+"-2' +&.,-%02,.) +(+-!).+"-2 '-,'%2,6
!' )%''"' -! .) + ( 2(.+  '-, ' %2, -( /+,"(' I6F A4 ',.+ -!- 2(.+ I6F A  '-, + ,," ' -( %2
+(.), -!- ('-"' ('%2 I6F A %2,6 (. ,!(.% .) + %% %2, "' +(.) -( I6F A :(+ +- '0 I6F A +(.);
(+('L" .+"' '2I6FA '-,-(+"/.)-,+(&-! +(.)6
(.) +2(.+K7H(+K7HD%28'% '-9
L: )/#  + 0-$/4)" -7"*/*/# (&).-+, +" :
M: $)/# *(+0/ -*)2#$#4*02)//*0+"- /#  '4; )' " )/:
N: $"#/;'$&/#  + 0-$/4 '4)'$& -"(',N) + '-(-0+7
O: *''*2/# *).- )+-*(+/.:
(. ' &'.%%2 .) + -! %2, %(%%2 (' (&).-+6 ( ( -!",4 (%%(0 -! "',-+.-"(', "'  $%  % " &#%*
 % /"4406
Upgrade your 9.0 Deep Security Relay
 +  0-$/4 T:K "'(0,  '4. ) 0+"-  /* T:Q L  '4; )'  " )/. 0.$)" /#  +  0-$/4 )" - *).*' *- 4 ()0'
'*' 0+"- :  +  0-$/4 T:K "'.1  '4. ))*/ 0+"- : # 4 (0./ 0)$)./''  ) - +'  2$/# !- .# $)./'' *! T:Q L $)03
" )/:@ I+"-  '4*)$)03I7 '*27!*-$)./-0/$*).:A
(.) +).+"-2K7C%2('"'(0,6
L: )/#  + 0-$/4)" -7"*/*/# (&).-+, +" :
M: $"#/;'$&/#  + 0-$/4 '4)'$& -"(',N) +:
N: *''*2/# *).- )+-*(+/.:# T:K + 0-$/4 '42$'' 0+"- /*T:PL '4; )' " )/:
(.) +).+"-2K7C%2('"'.16
L: +"-  + 0-$/4)" -/*1 -.$*)T:QL:
M: (+*-/ Agent-platform-9.6.build.zip $)/* + 0-$/4)" -:
N:  /$1/ /#  '4/#/4*02)//*0+"- )/# )0)$)./''$/:
O: )./'' Agent-Core-platform-9.6.build.rpm *)/# " )/*(+0/ -:
P: /$1/ /# " )/:
Q: !/ -- ; )'$)"/# *(+0/ -7 )' /#  '4:
(('/+-K7C%2-(K7ID '-('"'.16
L: +"-  + 0-$/4)" -/*1 -.$*)T:QL:
(-5
(-5
(-5
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Upgrading to Deep Security 9.6 SP1 in an NSX Environment
66
M: (+*-/ Agent-platform-9.6.build.zip $)/* + 0-$/4)" -:
N:  /$1/ /#  '4/#/4*02)//*0+"- :
O:  ' / /#  '4!-*( + 0-$/4)" -:
P: )$)./''/#  '4:
Q: )./'' Agent-Core-platform-9.6.build.rpm *)/# " )/*(+0/ -:
R: ) + 0-$/4)" -7/# *(+0/ -@(&).-+, Y 0 Y 0(&).-+A:
Upgrade your Deep Security Virtual Appliance
*0- + 0-$/4$-/0'++'$) 0. ./# QO;$/ /)/ -+-$. $)03Q" )/.- .*0- !*-0+"- .:
(.) +2(.+"+-.%))%"'6
L: ) /#  +  0-$/4 )" -7 "* /* &"'",-+-"(' N )-, N (-0+ N (0'%( '-+ ) '*/ /# '/ ./ 0$' *! /#
QO;$/ /)/ -+-$. $)03Q" )/:
M:  ' //# " )/)'$& &)(+- *)/# /**'-:
N: ) /# " )/#. )$(+*-/ /* + 0-$/4)" -7"*/*/# (&).-+, +" )'*/ /# $-/0'++'$) :
O: $"#/;'$& /# $-/0' ++'$) 7 . ' / -"(', N ) + ))%"' (-0+7 ) !*''*2 /# *).- ) $)./-0/$*). 0)/$' /#
0+"- $.*(+' / :
Upgrade your NSX environment
! 4*0 2)/ /* 0+"- 4*0-  )1$-*)( )/ / /# .( /$( . 4*0-  +  0-$/4 0+"- 7 !*''*2 /# . ./ +.:  ! - /* 4*0- 2-
*0( )//$*)!*- /$'.*0/#*2/*+ -!*-(/# 0+"- ./ +.:
L:  -!*-(''*!/#  + 0-$/40+"- ./ +.:
M: +"- )" -/*Q:L:P*-Q:M:
N: +"- )+*$)/-$1 -.!*-/# *./:
O: +"- 1 )/ -!-*(P:3/*Q:K:
P: +"- /# $*.//*Q:K:
Q:  ' / )- ;$)./''/# 0 ./)/-*.+ /$*) -1$ :
R:  ' / )- ;$)./''/# - )$-* + 0-$/4 -1$ :
S: +/$*)''47- **//# $*./:#$../ +$.- *(( ) /*1*$+*/ )/$' --*-.!/ -/# .- /0-)/* $)"*)'$) :
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Upgrading to Deep Security 9.6 SP1 in an NSX Environment
67
Upgrading from a pre-9.6 vShield to a 9.6 SP1 NSX Environment
# ./ +.!*-0+"-$)"!-*( + 0-$/4T:K*-T:PL$)1#$ ' )1$-*)( )//* + 0-$/4T:QL$)) )1$-*)( )/- 9
L: +"- /* + 0-$/4)" -T:QL:
M: (+*-/1 -.$*)T:QL*!/#  + 0-$/4$-/0'++'$) ) + 0-$/4" )/:
N: )./''*-0+"- /' ./*)  + 0-$/4T:QL '4; )' " )/:
O:  (*1  + 0-$/4!-*(/# 1#$ '1 )/ -:
P: +"- /# 1 )/ - )1$-*)( )//*Q:L:P*-Q:M:
Q:  ; +'*4  +  0-$/4 T:Q L $) /# ) 2'4 0+"-   )1$-*)( )/: "!*   %$$ #!%%! 
 '#!  % /"560:
*-$)./-0/$*).*)0+"-$)"4*0-1#$ ' )1$-*)( )//*Q:L:P*-Q:M7+' . *).0'/4*0-2- *0( )//$*):
! .) + )+(,, (, '(- %- (+ (/+0+"- '2 - .- $"' .) 2(.+ ,2,-& (+ ' .) + ", %02, (( "6
!  &" *!&# :,6 " &#%* %+ , >-, $.) ' (/+2> "' -! 2(.+ ) .+"-2 I6E ('%"' !%) (+
&"'",-+-(+=,."6
Upgrade to Deep Security Manager 9.6 SP1
) .+"-2 I6F "'%. "&)+(/&'-, -( ,%"%"-2 ' L""'26 ., ( -!, !' ,4 -! .) + +(& )+7I6F /+,"(',
-( I6F A ' )(-'-"%%2 -$ *."- %(' -"& :.) -( ,/+% !(.+, )'"' (' -! ,"3 ( 2(.+ -,;6 , .,.%4 $.)
2(.+ -, (+ .) +"' ' (',"+ )+(+&"' -! .) + .+"' (7!(.+,6 ( $ .) 2(.+ I6E A ) .+"-2
-4 , >-, $.) ' (/+2> "' -! 2(.+ ) .+"-2 I6E A ('%"' !%) (+ &"'",-+-(+=, ."6 (.+ )
.+"-2 '-,'))%"',0"%%('-"'.-()+(/")+(--"('.+"' -!.) +)+(,,6
(.) +-().+"-2' +K7ID6
L: *2)'* /#  +  0-$/4 )" - T:Q L $)./'' +&" !-*( /# - ) $-* *2)'*  )/ - 2  .$/
@#//+9>>*2)'* )/ -:/- )($-*:*(>A/*'*'$- /*-4:
M: 0) /# $)./'' - +&" .  .-$  $)  $%  " &#%*  # /" 3707 0/ #**. ) + $)./  *! !' 
2# )"$1 )/# *+/$*):
# ) /#  +  0-$/4 )" - $)./'' -  / /. ) *' - 1 -.$*) *!  +  0-$/4 )" - *) 4*0- .4./ (7 $/ 2$'' "$1 4*0 /#
*+/$*) /* I0+"- /# 3$./$)" $)./''/$*)I7 *- /* I#)" /# 3$./$)" $)./''/$*)I: +"-$)" /# $)./''/$*) 2$'' 0+"- /#
 +  0-$/4 )" - /* /# '/ ./ 1 -.$*) 0/ 2$'' )*/ *1 -2-$/ 4*0- +*'$$ .7  0' .7 $- 2'' 0' .7 ++'$/$*) 4+ .7 /:
*- #)" )4 *! /# . 0-$/4 . //$)". /#/ 2 - ++'$  /* /# *(+0/ -. *) 4*0- ) /2*-&: #)"$)" /# 3$./$)" $)./''/$*) 2$''
-. ''/..*$/ 2$/#/# +- 1$*0.$)./''/$*))/# )$)./''/# ) 2-0' .7+*'$$ .7 /:
( '(- %- '2 /'-+, +(& -! ) .+"-2 ' + " 2(. 0",! -( ('-"'. )+(/""' -! ,& )+(--"(' , 2(. " 0"-!
/+,"('I6E6
Import 9.6 SP1 versions of your Deep Security software
((0'%(K7ID/+,"(',(2(.+).+"-2,(-0+6
L: )  +  0-$/4 )" -7 "* /* &"'",-+-"(' N )-, N (-0+ N (0'%( '-+: # (0'%( '-+ +" $.+'4.
/# '/ ./1 -.$*).''.*!/2- 1$'' !-*(- )$-*:
M: *$(+*-//#  + 0-$/4$-/0'++'$) .*!/2- 7. ' //# '/ ./1 -.$*))'$& &)(+-:
(-5
(-5
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Upgrading from a pre-9.6 vShield to a 9.6 SP1 NSX Environment
68
! %-,- /+,"(' ( -! "+-.% ))%"' ,(-0+ 0"%%  I6E6 ' 2(. "&)(+- -! I6E "+-.% ))%"'4 )
.+"-2 ' + 0"%% .-(&-"%%2 "&)(+- -! %-,- I6F A  - F  '- )$  0!"! "- 0"%% ., -( .) +
-!"+-.%))%"'=,+(--"('(.%)%. 7"',-(/+,"('I6FA6
N: * $(+*-/ /#  +  0-$/4 " )/ .*!/2- 7 . ' / /# '/ ./ 1 -.$*) ) '$& &)(+-: *0 ) 0. /#$. .*!/2- /* 0+"-  +
 0-$/4" )/*- '4; )' " )/:
I6@).+"-2%2,0"%%.) +-().+"-2I6FA%27'% '-,6
O: # )/# .*!/2- #.Z$)$.# *2)'*$)"7"- )# &(-&2$''++ -$)/# &)(+- *'0()!*-/#/+&" :
Upgrade to a version 9.6 SP1 Relay-enabled Agent
Upgrade your 9.5 or 9.5 SP1 Relay-enabled Agent
) .+"-2  '-, ' %2, &.,-  ( -! ,& /+,"(' (+ %,, -!' -! ) .+"-2 ' + "' ., -( &'  "-6 !
).+"-2' +&.,-%02,.) +(+-!).+"-2 '-,'%2,6
!' )%''"' -! .) + ( 2(.+  '-, ' %2, +(& I6@ (+ I6E A -( /+,"(' I6F A4 ',.+ -!- 2(.+ I6F A  '-, +
,," ' -( %2 +(.), -!- ('-"' ('%2 I6F A %2,6 (. ,!(.% .) + %% %2, "' +(.) -( I6F A :(+ +- '0
I6FA+(.);(+('L" .+"' '2I6FA '-,-(+"/.)-,+(&-! +(.)6
(.) +2(.+K7H(+K7HD%28'% '-9
L: )/#  + 0-$/4)" -7"*/*/# (&).-+, +" :
M: $)/# *(+0/ -*)2#$#4*02)//*0+"- /#  '4; )' " )/:
N: $"#/;'$&/#  + 0-$/4 '4)'$& -"(',N) + '-(-0+7
O: *''*2/# *).- )+-*(+/.:
(. ' &'.%%2 .) + -! %2, %(%%2 (' (&).-+6 ( ( -!",4 (%%(0 -! "',-+.-"(', "'  $%  % " &#%*
 % /"4406
Upgrade your 9.0 Deep Security Relay
 +  0-$/4 T:K "'(0,  '4. ) 0+"-  /* T:Q L  '4; )'  " )/. 0.$)" /#  +  0-$/4 )" - *).*' *- 4 ()0'
'*' 0+"- :  +  0-$/4 T:K "'.1  '4. ))*/ 0+"- : # 4 (0./ 0)$)./''  ) - +'  2$/# !- .# $)./'' *! T:Q L $)03
" )/:@ I+"-  '4*)$)03I7 '*27!*-$)./-0/$*).:A
(.) +).+"-2K7C%2('"'(0,6
L: )/#  + 0-$/4)" -7"*/*/# (&).-+, +" :
M: $"#/;'$&/#  + 0-$/4 '4)'$& -"(',N) +:
N: *''*2/# *).- )+-*(+/.:# T:K + 0-$/4 '42$'' 0+"- /*T:PL '4; )' " )/:
(.) +).+"-2K7C%2('"'.16
L: +"-  + 0-$/4)" -/*1 -.$*)T:QL:
M: (+*-/ Agent-platform-9.6.build.zip $)/* + 0-$/4)" -:
N:  /$1/ /#  '4/#/4*02)//*0+"- )/# )0)$)./''$/:
O: )./'' Agent-Core-platform-9.6.build.rpm *)/# " )/*(+0/ -:
(-5
(-5
(-5
(-5
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Upgrading from a pre-9.6 vShield to a 9.6 SP1 NSX Environment
69
P: /$1/ /# " )/:
Q: !/ -- ; )'$)"/# *(+0/ -7 )' /#  '4:
(('/+-K7C%2-(K7ID '-('"'.16
L: +"-  + 0-$/4)" -/*1 -.$*)T:QL:
M: (+*-/ Agent-platform-9.6.build.zip $)/* + 0-$/4)" -:
N:  /$1/ /#  '4/#/4*02)//*0+"- :
O:  ' / /#  '4!-*( + 0-$/4)" -:
P: )$)./''/#  '4:
Q: )./'' Agent-Core-platform-9.6.build.rpm *)/# " )/*(+0/ -:
R: ) + 0-$/4)" -7/# *(+0/ -@(&).-+, Y 0 Y 0(&).-+A:
Remove Deep Security 9.5 from the vShield vCenter
L: -"/- -! .,- ,9 ) /#  +  0-$/4 )" -7 "* /* /# *(+0/ -. +" ) . ' / /# +-*/ /  "0 ./ 1$-/0' (#$) .
@*)'4 /# .7 )*/ /# $-/0' ++'$) @.AA $) /# 1 )/ - 4*0 - "*$)" /* 0+"- /*  Q:L:P *- Q:M: $"#/;'$& /# . ' / 
.). ' / -"(',N-"/-:
M: -"/- -! "+-.% ))%"':,;9 /$'' *) /# (&).-+, +" 7 . ' / /# $-/0' ++'$) . $) /# 1 )/ - 4*0- - "*$)" /*
0+"- 7-$"#/;'$&). ' / -"(',N-"/-:
N: %- -! ) .+"-2 "+-.% ))%"' +(& -! /'-+ '/"+('&'-6 ' -! 0+ /)!+  %"'-7 "* /* /* (&
N/'-+N(,-,'%.,-+, )Z$)) ' / /#  /$1/  + 0-$/4$-/0'++'$) .:
O: '"',-%%/!"%')("'-6
L: '-!0+/)!+%"'-4 "*/*/* (&N/'-+N(,-,'%.,-+,
M:  ' //# $#*./!-*(/# $)1 )/*-4/- :
N: '$&/# /!"% /
O: '$& '"',-%% !*-/# 1#$ ')+*$)/. -1$
P: &(/ -! "%-+ +"/+6 ' -! ) .+"-2 ' +4 . ' / # $ #*./ $) /# 1 )/ - 4*0 - "*$)" /* 0+"- 7 -$"#/;'$&
). ' / -"(',N&(/"%-++"/+:
( '(- %- -! /'-+ +(& ) .+"-2 ' + " 2(. "'-' -( )+(-- -! ,& /'-+ 0"-! ) .+"-2 -+ -!
.) +-().+"-2I6FA'F6A6E(+F6B6
Upgrade your vShield Manager to the new NSX Manager
' . *).0'/4*0-2- *0( )//$*)!*-1 )/ -0+"- $)./-0/$*).:
Remove the old vShield Manager from Deep Security and add the new NSX
Manager
L: ) /#  +  0-$/4 )" -7 "* /* /# (&).-+, .- ) ) -$"#/;'$& /# 1 )/ - ) . ' / +()+-", /* $.+'4 $/.
+()+-", 2$)*2:
M: ) /# 1#$ ' )" - /7 $) /# 1#$ ' )" - - 7 '$& &(/ ' +: #$. 2$'' - (*1 /# 1#$ ' )" - -  )/$'.
@)- /$/' /# /!"%' + //* /!"%9' +:A
N: )/# /!"%9' + /7 )/ -/# -  )/$'.*!/# ) 2'40+"- )" -:
O: '$&  /*'*. /# -*+ -/$ .2$)*2:
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Upgrading from a pre-9.6 vShield to a 9.6 SP1 NSX Environment
70
Upgrade Your Deep Security Agents
) .+"-2  '-, &.,-  ( -! ,& /+,"(' (+ %,, -!' -! ) .+"-2 ' + "' ., -( &'  -!&6 ! )
.+"-2' +&.,-%02,.) +(+-!).+"-2 '-,6
!' )%''"' -! .) + ( 2(.+  '-, ' %2, -( /+,"(' I6F A4 ',.+ -!- 2(.+ I6F A  '-, + ,," ' -( %2
+(.), -!- ('-"' ('%2 I6F A %2,6 (. ,!(.% .) + %% %2, "' +(.) -( I6F A :(+ +- '0 I6F A +(.);
(+('L" .+"' '2I6FA '-,-(+"/.)-,+(&-! +(.)6
(.) +).+"-2 '-,.,"' -!).+"-2' +6
L: )/#  + 0-$/4)" -7"*/*/# (&).-+, .- ):
M: $)/# *(+0/ -*)2#$#4*02)//*0+"- /# " )/:
N: $"#/;'$&/# *(+0/ -). ' / -"(',N) + '-,(-0+:
O: # ) 2" )/.*!/2- 2$'' . )//*/# *(+0/ -)/# " )/2$'' 0+"- :
(. ' %,( &'.%%2 .) +  '-, %(%%2 (' (&).-+6 ( ( -!",4 (%%(0 -! "',-+.-"(', "'  $%  % " &#%*
 % /"4406
(-5
(-5
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Upgrading from a pre-9.6 vShield to a 9.6 SP1 NSX Environment
71
Appendices
Silent Install of Deep Security Manager
(+.',"%'-"',-%%(-!).+"-2' +6
L: )$)*2.*(()+-*(+/*-$)03*(()'$) 7"*/*/# .( $- /*-4./# $)./''+&" :
M: !4*0- $)./''$)"*)$)037"-)/ 3 0/$*)+ -($..$*)/*/# $)./''+&" :
N: 0)/# ++-*+-$/ *(()!*-4*0-+'/!*-(9
'"'(0,6
Manager-Windows-<Version>.x64.exe [-q] [-console] [-Dinstall4j.language=<ISO code>] [-varfile
<PropertiesFile>]
'"'.16
Manager-Linux-<Version>.x64.sh [-q] [-console] [-Dinstall4j.language=<ISO code>] [-varfile
<PropertiesFile>]
 /# I-( / -.I. /$*)7 '*27!*- /$'.*) #*!/# *(()+-( / -.:
Parameters
8* !*- .$)./''O%/* 3 0/ $)0)// ) @.$' )/A(* :
8(',(% !*- .( .." ./*++ -$)/# *).*' @./*0/A:
8"',-%%G#7%' . LM (N ' /. 4*0 *1 --$ /#  !0'/ $)./''/$*) ')"0" @)"'$.#A $! */# - ')"0" . - 1$'' : + $!4
')"0" 0.$)"./)-')"0" $ )/$Z$ -.9
? +) . 9 #
? $(+'$Z$ #$) . 9 3!?
8/+O"% M+()+-","%N 7 2# - M+()+-","%N $. /# !0'' +/# /* ./)- 1 +-*+ -/$ . Z$' 2$/# )/-$ . !*- /# 1-$*0. . //$)". 4*0
) ++'4 0-$)"  +  0-$/4 )" - $)./'': # +-*+ -/4 $. $ )/$Z$  4 $/. ,0$1' )/  .- ) ) . //$)" $) /# $)*2.  +
 0-$/4)" -$)./''/$*):*- 3(+' 7/#  + 0-$/4)" -- ..*)/# I- ..)*-/.I.- )$..+ $Z$ .9
AddressAndPortsScreen.ManagerAddress=
*./*!/# +-*+ -/$ .$)/#$.Z$' #1  +/'  !0'/.)(4 *($// :
*-*(+' /  .-$+/$*)*!1$'' . //$)".7. "&#%* #%% $#!"#%$ /"860:
Sample Properties File
#$.$.) 3(+' *!/# *)/ )/*!/4+$'+-*+ -/$ .Z$' 9
AddressAndPortsScreen.ManagerAddress=10.201.111.91
AddressAndPortsScreen.NewNode=True
UpgradeVerificationScreen.Overwrite=False
LicenseScreen.License.-1=XY-ABCD-ABCDE-ABCDE-ABCDE-ABCDE-ABCDE
DatabaseScreen.DatabaseType=Oracle
DatabaseScreen.Hostname=10.201.xxx.xxx
DatabaseScreen.Transport=TCP
DatabaseScreen.DatabaseName=XE
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Silent Install of Deep Security Manager
73
DatabaseScreen.Username=DSM
DatabaseScreen.Password=xxxxxxx
AddressAndPortsScreen.ManagerPort=4119
AddressAndPortsScreen.HeartbeatPort=4120
CredentialsScreen.Administrator.Username=masteradmin
CredentialsScreen.Administrator.Password=xxxxxxxx
CredentialsScreen.UseStrongPasswords=False
SecurityUpdateScreen.UpdateComponents=True
SoftwareUpdateScreen.Proxy=False
SoftwareUpdateScreen.ProxyType=""
SoftwareUpdateScreen.ProxyAddress=""
SoftwareUpdateScreen.ProxyPort=""
SoftwareUpdateScreen.ProxyAuthentication="False"
SoftwareUpdateScreen.ProxyUsername=""
SoftwareUpdateScreen.ProxyPassword=""
SoftwareUpdateScreen.UpdateSoftware=True
RelayScreen.Install=True
SmartProtectionNetworkScreen.EnableFeedback=False
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Silent Install of Deep Security Manager
74
Deep Security Manager Settings Properties File
#$. . /$*) *)/$). $)!*-(/$*) *0/ /# *)/ )/. *! /# +-*+ -/$ . Z$' /#/ ) 0.  $) *(();'$) $)./''/$*) @.$' )/ $)./''A *! /#
 + 0-$/4)" -:@  % $%!"&#%* # /"840:A
Settings Properties File
# !*-(/*! # )/-4$)/# . //$)".+-*+ -/$ .Z$' $.9
<Screen Name>.<Property Name>=<Property Value>
# . //$)".+-*+ -/$ .Z$' #.- ,0$- )*+/$*)'1'0 .:
(+()-"('%'-+",4,.))%2"' '"'/%"/%.0"%%+,.%-"'-!.%-/%."' .,6
Required Settings
LicenseScreen
+()+-2 (,,"%%., .%-%.
$ ). - ):$ ). :;LWX1'0 Y X!*-''(*0' .Y ')&

+()+-2 (,,"%%., .%-%.
$ ). - ):$ ). :KWX1'0 Y X!*-)/$;'2- Y ')&
$ ). - ):$ ). :LWX1'0 Y X!*-$- 2''>Y ')&
$ ). - ):$ ). :MWX1'0 Y X!*-)/ "-$/4*)$/*-$)"Y ')&
$ ). - ):$ ). :NWX1'0 Y X!*-*").+ /$*)Y ')&
CredentialsScreen
+()+-2 (,,"%%., .%-%.
-  )/$'.- ):($)$./-/*-:. -)( WX1'0 Y X0. -)( !*-(./ -($)$./-/*-Y ')&
-  )/$'.- ):($)$./-/*-:..2*-WX1'0 Y X+..2*-!*-/# (./ -($)$./-/*-Y ')&
Optional Settings
LanguageScreen
+()+-2 (,,"%%., .%-%. (-,
.4.:')"0" WX1'0 Y
)G
%
5#G
)G I )GIW)"'$.#7I%IW+) . 7I5#GIW$(+'$Z$ #$) .
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Deep Security Manager Settings Properties File
75
UpgradeVerificationScreen
!",,+'9,--"' ",'(-++'.'%,,'1",-"' "',-%%-"('",--6
+()+-2 (,,"%%., .%-%.
+"-  -$Z$/$*)- ):1 -2-$/ WX1'0 Y
-0
'.
'.
--"' -!",/%.-(+.0"%%(/+0+"-'21",-"' -"'-!-,6-0"%%(-!",0"-!(.-'2.+-!+)+(&)-,6
DatabaseScreen
#$..- ) Z$) ./# /. /4+ )*+/$*)''4/# +-( / -.)  /* .. -/$)/. /4+ .:
! "'-+-"/ "',-%% )+(/", ' >/'> "%( -( L"' -! "',-' '& ' (&"' ( "+(,(-  ,+/+4 .-
.,-!.'--'"',-%%(,'(-,.))(+-"%( ,-!,+ .&'-,+"'%."'-!-,+',--"' ,%(06
+()+-2
(,,"%
%.,
.%-
%.
(-,
/. - ):/. 4+ WX1'0 Y
(  
$-*.*!/

 -1 -
-'
(   *)
/. - ):*./)( WX1'0 Y
# )(
*-
- ..*!
/#
/.
. -1 -
0-- )/
#*./)(
0-- )/
#*./)(
*)
/. - ):/. ( WX1'0 Y )4./-$)" .( */- ,0$- !*-(  
/. - ):-).+*-/WX1'0 Y
( 
$+ .

( 
$+ .
 ,0$- !*- -1 -*)'4
/. - ):. -)( WX1'0 Y )4./-$)" ')&
. -)( 0. 4/# )" -/*0/# )/$/ /*/# /. . -1 -:0./(/#
) 3$./$)"/. *0)/:*/ /#//#  + 0-$/4)" -/.
+ -($..$*).2$''*-- .+*)/*/#$.0. -H.+ -($..$*).:*- 3(+' 7$!4*0#**. 
/. *0)/2$/#- ;*)'4+-$1$' " .7/#  + 0-$/4)" -2$'')*/
' /*2-$/ /*/# /. :*/- ,0$- !*-(  :)/*-4!*-$-*.*!/
 -1 -)-' :
/. - ):..2*-WX1'0 Y )4./-$)" ')&
..2*-0. 4/# )" -/*0/# )/$/ /*/# /. . -1 -:*/- ,0$- 
!*-(  :)/*-4!*-$-*.*!/ -1 -)-' :
/. - ): -1 -:)./) WX1'0 Y )4./-$)" ')&
. *)'42$/#$-*.*!/ -1 -72#$#.0++*-/.(0'/$+' $)./) .*).$)"'
. -1 -*-+-* ..*-:)'4*) $)./) ) /#  !0'/$)./) ))4*/# -.-
)( $)./) .:!/#  + 0-$/4)" -/. $)./) $.)*//#  !0'/7
)/ -/# )( *!/# $)./) # - :# 1'0 (0./(/#) 3$./$)"$)./) *-
' !/')&/*$)$/ /#  !0'/$)./) :
/. - ): -1 -:*($)WX1'0 Y )4./-$)" ')&
. *)'42$/#$-*.*!/ -1 -:#$.$./# $)*2.*($)0. 2# )
0/# )/$/$)"/*/#  -1 -:# /. - ):. -)( )
/. - ):..2*- .-$ *1 - *)'41'$2$/#$)/# ++-*+-$/
*($):
/. - ): -1 -:.  !0'/*''/$*)WX1'0 Y
-0
'.
'.
. *)'42$/#$-*.*!/ -1 -:*''/$*) / -($) .#*2./-$)".- .*-/ 
)*(+- :!/# 1'0 $.I'. I7 + 0-$/42$''0. /$)LG ) -'GG
!*-*''/$*)*)/ 3/;/4+ *'0().:!/# 1'0 $.I-0 I7 + 0-$/42$''0. /#
(-5
(-5
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Deep Security Manager Settings Properties File
76
+()+-2
(,,"%
%.,
.%-
%.
(-,
*''/$*)( /#*.+ $Z$ 44*0- -1 -/. :*-$/$*)'$)!*-(/$*)
*)*''/$*)7- ! -/*4*0- -1 -*0( )//$*):
AddressAndPortsScreen
#$. .- )  Z$) . /# #*./)( 7 7 *-  - .. *! /#$. *(+0/ - )  Z$) . +*-/. !*- /# )" -: ) /# $)/ -/$1 $)./'' - /#$. .- )
'.*.0++*-/./# $/$*)*!) 2)" -/*) 3$./$)"/. 70//#$.*+/$*)$.)*/.0++*-/ $)/# 0)// ) $)./'':
+()+-2
(,,"%
%.,
.%-
%.
(-,
- ..)*-/.- ):)" -- ..WX1'0 Y
X#*./)( 7
*-
- ..*!
/# )" -
#*./Y
X0-- )/
#*./
)( Y
*)
- ..)*-/.- ):)" -*-/WX1'0 Y
X1'$+*-/
)0( -Y
OLLT *)
- ..)*-/.- ): -/ /*-/WX1'0 Y
X1'$+*-/
)0( -Y
OLMK *)
- ..)*-/.- ): 2* WX1'0 Y
-0
'.
'.
-0 $)$/ ./#//# 0-- )/$)./''$.) 2)* :!/# $)./'' -Z$). 3$./$)"/$)
/# /. 7$/2$''/#$.$)./''/$*).) 2)* :@0'/$;)* . /0+$.'24.
.$' )/$)./''A:*/ 9# I 2* I$)./''/$*)$)!*-(/$*)*0//#  3$./$)"/.
/* +-*1$ 1$/# /. - )+-*+ -/$ .:
CredentialsScreen
+()+-2 (,,"%%., .%-%. (-,
-  )/$'.- ):. /-*)"..2*-.WX1'0 Y
-0
'.
'. -0 $)$/ ./# .#*0' . /0+/* )!*- ./-*)"+..2*-.
SecurityUpdateScreen
+()+-2
(,,"%
%.,
.%-
%.
(-,
 0-$/4+/ - ):+/ *(+*) )/.WX1'0 Y
-0
'.
-0
-0 2$''$)./-0//#  + 0-$/4)" -/*- / # 0' .&/*
0/*(/$''4# &!*- 0-$/4+/ .:# # 0' .&2$''-0)2# )
$)./''/$*)$.*(+' / :
 0-$/4+/ - ):-*34WX1'0 Y
-0
'.
'.
-0 $)$/ ./#//#  + 0-$/4)" -0. .+-*34/**)) //*/#
)/ -) //**2)'* 0-$/4+/ .!-*(- )$-*:
 0-$/4+/ - ):-*344+ WX1'0 Y

O
P
')& # +-*/**'0. 4/# +-*34:
 0-$/4+/ - ):-*34- ..WX1'0 Y
1'$1O*-1Q
- ..*-
#*./)(
')& # *-#*./)( *!/# +-*34:
 0-$/4+/ - ):-*34*-/WX1'0 Y $)/ " - ')& # +*-/)0( -*!/# +-*34:
 0-$/4+/ - ):-*340)/# )/$/$*)WX1'0 Y
-0
'.
'. -0 $)$/ ./#//# +-*34- ,0$- .0/# )/$/$*)-  )/$'.:
 0-$/4+/ - ):-*34. -)( WX1'0 Y )4./-$)" ')& # 0/# )/$/$*)0. -)( :
 0-$/4+/ - ):-*34..2*-WX1'0 Y )4./-$)" ')& # 0/# )/$/$*)+..2*-:
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Deep Security Manager Settings Properties File
77
SoftwareUpdateScreen
+()+-2
(,,"%
%.,
.%-
%.
(-,
*!/2- +/ - ):+/ *!/2- WX1'0 Y
-0
'.
-0
-0 2$''$)./-0//#  + 0-$/4)" -/*- / # 0' .&/*
0/*(/$''4# &!*-*!/2- +/ .:# # 0' .&2$''-0)2# )
$)./''/$*)$.*(+' / :
*!/2- +/ - ):-*34WX1'0 Y
-0
'.
'.
-0 $)$/ ./#//#  + 0-$/4)" -0. .+-*34/**)) //*/#
)/ -) //**2)'**!/2- +/ .!-*(- )$-*:
*!/2- +/ - ):-*344+ WX1'0 Y

O
P
')& # +-*/**'0. 4/# +-*34:
*!/2- +/ - ):-*34- ..WX1'0 Y
1'$1O*-
1Q- ..*-
#*./)(
')& # *-#*./)( *!/# +-*34:
*!/2- +/ - ):-*34*-/WX1'0 Y $)/ " - ')& # +*-/)0( -*!/# +-*34:
*!/2- +/ - ):-*340)/# )/$/$*)WX1'0 Y
-0
'.
'. -0 $)$/ ./#//# +-*34- ,0$- .0/# )/$/$*)-  )/$'.:
*!/2- +/ - ):-*34. -)( WX1'0 Y )4./-$)" ')& # 0/# )/$/$*)0. -)( :
*!/2- +/ - ):-*34..2*-WX1'0 Y )4./-$)" ')& # 0/# )/$/$*)+..2*-:
SmartProtectionNetworkScreen
#$..- ) Z$) .2# /# -4*02)//* )' - )$-*(-/ &)*+/$*)''44*0-$)0./-4:
+()+-2 (,,"%%., .%-%. (-,
(-/-*/ /$*) /2*-&- ):)'  &WX1'0 Y
-0
'.
'. -0  )' .- )$-*(-/ &:
(-/-*/ /$*) /2*-&- ):)0./-44+ WX1'0 Y
*/.+ $Z$ 
)&$)"
*((0)$/$*).)( $
0/$*)
) -"4
./;(*1$)"*).0( -"**.@A
$))$'
**) 1 -"
*1 -)( )/
 '/#-
).0-)
)0!/0-$)"
/ -$'.
 $
$')".
 ' .//
 /$'
#)*'*"4
' *((0)$/$*).
-).+*-//$*)
/$'$/$ .
/# -
')& ')&*-- .+*)./**/.+ $Z$ 
Sample Properties Files
# !*''*2$)"$.) 3(+ *!/# *)/ )/*!/4+$'+-*+ -/$ .Z$' 9
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Deep Security Manager Settings Properties File
78
AddressAndPortsScreen.ManagerAddress=10.201.111.91
AddressAndPortsScreen.NewNode=True
UpgradeVerificationScreen.Overwrite=False
LicenseScreen.License.-1=XY-ABCD-ABCDE-ABCDE-ABCDE-ABCDE-ABCDE
DatabaseScreen.DatabaseType=Oracle
DatabaseScreen.Hostname=10.201.xxx.xxx
DatabaseScreen.Transport=TCP
DatabaseScreen.DatabaseName=XE
DatabaseScreen.Username=DSM
DatabaseScreen.Password=xxxxxxx
AddressAndPortsScreen.ManagerPort=4119
AddressAndPortsScreen.HeartbeatPort=4120
CredentialsScreen.Administrator.Username=masteradmin
CredentialsScreen.Administrator.Password=xxxxxxxx
CredentialsScreen.UseStrongPasswords=False
SecurityUpdateScreen.UpdateComponents=True
SoftwareUpdateScreen.UpdateSoftware=True
RelayScreen.Install=True
SmartProtectionNetworkScreen.EnableFeedback=False
Installation Output
# !*''*2$)" $. .(+' *0/+0/ !-*( .0 ..!0' $)./''7 !*''*2  4 ) 3(+' *0/+0/ !-*( !$'  $)./'' @$)1'$ '$ ). A: # B--*-C /"
$)/# /- $)$/ .!$'0- :
Successful Install
/*++$)"- )$-* + 0-$/4)" - -1$ :::
# &$)"!*-+- 1$*0.1 -.$*).*!- )$-* + 0-$/4)" -:::
+"-  -$Z$/$*)- ). //$)". +/ :::
# $)./''/$*)$- /*-4#. ). //*9F-*"-($' .F- )$-*F + 0-$/4)" -:
/. - ). //$)". +/ :::
$ ). - ). //$)". +/ :::
- ..)*-/.- ). //$)". +/ :::
-  )/$'.- ). //$)". +/ :::
 0-$/4+/ - ). //$)". +/ :::
*!/2- +/ - ). //$)". +/ :::
(-/-*/ /$*) /2*-&- ). //$)". +/ :::
''. //$)". +/ 7- 4/* 3 0/ :::
3/-/$)"Z$' .:::
 //$)"+:::
*)) /$)"/*/# /. :::
- /$)"/# /. # (:::
- /$)"./ -($)*0)/:::
 *-$)" //$)".:::
- /$)" (+*--4$- /*-4:::
)./''$)" +*-/.:::
)./''$)"*0' .)'0";$).:::
- /$)" '+4./ (:::
'$/$)")++'4$)"/$1/$*)* .:::
*)Z$"0- *'$5'  //$)".:::
 //$)" !0'/..2*-*'$4:::
- /$)"# 0' .&.:::
- /$)".. /(+*-/) )/-$ .:::
- /$)"0$/*-*' :::
+/$($5$)":::
(+*-/$)"*!/2- &" .:::
*)Z$"0-$)" '4*-)./'':::
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Deep Security Manager Settings Properties File
79
(+*-/$)" -!*-() -*Z$' .:::
 *-$)")./''/$*):::
' -$)" ..$*).:::
- /$)"-*+ -/$ .$' :::
- /$)"#*-/0/:::
*)Z$"0-$)":::
*)Z$"0-$)" -1$ :::
*)Z$"0-$)"1 0-$/4:::
*)Z$"0-$)"1*""$)":::
' )$)"+:::
/-/$)" + 0-$/4)" -:::
$)$.#$)"$)./''/$*):::
Failed Install
#$. 3(+' .#*2./# *0/+0/" ) -/ 2# )/# +-*+ -/$ .Z$' *)/$) )$)1'$'$ ). ./-$)"9
/*++$)"- )$-* + 0-$/4)" - -1$ :::
 / /$)"+- 1$*0.1 -.$*).*!- )$-* + 0-$/4)" -:::
+"-  -$Z$/$*)- ). //$)". +/ :::
/. - ). //$)". +/ :::
/. +/$*).- ). //$)". +/ :::
BC# '$ ). * 4*0#1  )/ - $.$)1'$:
BC$ ). - ). //$)".- % / :::
*''$)"&#)" .:::
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Deep Security Manager Settings Properties File
80
Deep Security Manager Memory Usage
Configuring the Installer's Maximum Memory Usage
# $)./'' - $. *)Z$"0-  /* 0. L *! *)/$"0*0. ( (*-4 4  !0'/: ! /# $)./'' - !$'. /* -0) 4*0 ) /-4 *)Z$"0-$)" /# $)./'' - /* 0.
' ..( (*-4:
(('O" .+-!&(.'-(/"%%-(-!"',-%%+6
L: */*/# $- /*-42# - /# $)./'' -$.'*/ :
M: - / ) 2 / 3/ Z$' ''  I)" -;$)*2.;T:Q:3333:3QO:1(*+/$*).I *- I)" -;$)03;T:Q:3333:3QO:1(*+/$*).I7  + )$)"
*)4*0-$)./''/$*)+'/!*-(@2# - I3333I$./# 0$')0( -*!/# $)./'' -A:
N: $//# Z$' 4$)"/# '$) 9I;(3SKK(I@$)/#$. 3(+' 7SKK*!( (*-42$'' ( 1$'' /*/# $)./'' -:A
O: 1 /# Z$' )'0)#/# $)./'' -:
Configuring the Deep Security Manager's Maximum Memory Usage
#  + 0-$/4)" - !0'/. //$)"!*-# +( (*-40." $.O:/$.+*..$' /*#)" /#$.. //$)":
(('O" .+-!&(.'-(/"%%-(-!).+"-2' +6
L: */*/#  + 0-$/4)" -$)./''$- /*-4@/# .( $- /*-4. + 0-$/4)" - 3 0/' A:
M: - / ) 2Z$' : + )$)"*)/# +'/!*-(7"$1 $//# !*''*2$)")( 9
"'(0,6 I + 0-$/4)" -:1(*+/$*).I:
"'.16 I.(G.:1(*+/$*).I:
N: $/ /# Z$' 4 $)" /# '$) 9 I -Xmx10g I @$) /#$. 3(+' 7 ILK"I 2$'' (& LK ( (*-4 1$'' /* /#  +  0-$/4
)" -:A
O: 1 /# Z$' )- ./-//#  + 0-$/4)" -:
P: *0 ) 1 -$!4 /# ) 2 . //$)" 4 "*$)" /* &"'",-+-"(' N 2,-& '(+&-"(' ) $) /# 4./ (  /$'. - 7 3+) ' +
(N&(+2:# 3$(0( (*-41'0 .#*0')*2$)$/ /# ) 2*)Z$"0-/$*). //$)":
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Deep Security Manager Memory Usage
81
Deep Security Virtual Appliance Memory Usage
For information on minimum recommended Deep Security Virtual Appliance memory allocation based on the number of VMs being
protected, see the Deep Security 9.6 SP1 Best Practice Guide:
http://docs.trendmicro.com/all/ent/ds/v9.6_sp1/en-us/Deep_Security_96_SP1_Best_Practice_Guide.pdf
#  !0'/ *)Z$"0-/$*) *! /#  $. /* 0. O *! : ! 4*0 3+ / /* )  (*- /#) /#  !0'/ O7 4*0 2$'' )  /* (*$!4 /# H.
*)Z$"0-/$*)4*0-. '!:# - - /2**+/$*).9
? *$!4 /# *)Z$"0-/$*) *! /# $-/0' ++'$) +-$*- /*  $)" $(+*-/  /*  +  0-$/4 )" - ) /# ) /* /# 1 )/ -7
/# - 4. //$)"/#  !0'/*)Z$"0-/$*)!*-''.0. ,0 )/ + 0-$/4$-/0'++'$) . -1$  +'*4( )/.$)/#/1 )/ -:
? *$!4 /# ( (*-4 ''*/$*) *! /# $-/0' ++'$) *) . . 4 . .$. !/ - $/ #.  ) $(+*-/  /* /# 1 )/ - )
 +'*4 .. -1$ *)$:
Configuring the DSVA's Memory Allocation (pre-deployment)
* #)" /#  +  0-$/4 $-/0' ++'$) H.  !0'/ ( (*-4 ''*/$*)7 4*0 (0./ $/ /# ''*/$*) . //$)". $) /# ++'$) H.  Z$'
 !*- $/" /.$(+*-/ /*/# 1 )/ -:
(('O" .+-!&&(+2%%(-"('().+"-2"+-.%))%"')+"(+-()%(2&'--(-!/'-+9
L: )5$+/# $-/0'++'$) 5$+Z$' 4*0*2)'* !-*(/# - )$-**2)'* )/ -:
M: + ) ,/7(/ $)/ 3/ $/*-:
N: $/ /# !*''*2$)" . /$*) /* (*$!4 /#  !0'/ ( (*-4 ''*/$*) *! OKTQ  /* .0$/ 4*0- )1$-*)( )/ @IOKTQI *0-. $) /#-
'*/$*).A9
<Item>
<rasd:AllocationUnits>byte * 2^20</rasd:AllocationUnits>
<rasd:Description>Memory Size</rasd:Description>
<rasd:ElementName xmlns:rasd="http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/
CIM_ResourceAllocationSettingData">4096 MB of memory</rasd:ElementName>
<rasd:InstanceID xmlns:rasd="http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/
CIM_ResourceAllocationSettingData">2</rasd:InstanceID>
<rasd:Reservation>4096</rasd:Reservation>
<rasd:ResourceType>4</rasd:ResourceType>
<rasd:VirtualQuantity>4096</rasd:VirtualQuantity>
</Item>
O: 1 /# *1!Z$' )- /0-)$//*/# 5$++&" :
P: (+*-/ /# $-/0' ++'$) 5$+ +&" /* /#  +  0-$/4 )" - !-*( /# &"'",-+-"(' N )-, (-0+ N (%
+" :
Configuring the DSVA's Memory Allocation (post-deployment)
!' "' -! ) .+"-2 "+-.% ))%"'=, &&(+2 %%(-"(' ,--"' , +*."+, )(0+"' ( -!  /"+-.% &!"'6
"+-.%&!"','(+&%%2)+(--2-!"+-.%))%"'0"%%.')+(--.'-"%"-",)(0+$('6
(('O" .+-!&&(+2%%(-"('('%+2)%(2).+"-2"+-.%))%"'6
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Deep Security Virtual Appliance Memory Usage
82
L: )4*0-2- 1+# -  '$ )/7-$"#/;'$&*)/# ). ' / (0+N!.-(0'.,-:
M: $"#/;'$&*)/# "$)). ' / "---"' ,777 # $-/0'#$) +()+-", .- )$.+'4.:
N: )/# +0+ /7. ' / &(+2 )#)" /# ( (*-4''*/$*)/*/#  .$- 1'0 :
O: '$& :
P: $"#/;'$&/# "$)). ' / (0+N(0+':
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Deep Security Virtual Appliance Memory Usage
83
Deep Security Manager Performance Features
Performance Profiles
 +  0-$/4 )" - 0. . ) *+/$($5  *)0-- )/ %* .# 0' - /#/ *).$ -. /# $(+/. *! # %* *) 7 /. ) " )/>
++'$) .: 4  !0'/7 ) 2 $)./''/$*). 0. /# I""- ..$1 I + -!*-() +-*Z$' 2#$# $. *+/$($5  !*-  $/  )" -: ! /#  +
 0-$/4 )" - $. $)./''  *) .4./ ( 2$/# */# - - .*0- ;$)/ ).$1 .*!/2- $/ (4 +- ! -' /* 0. /# I/)-I + -!*-()
+-*Z$' : # + -!*-() +-*Z$' ) #)"  4 )1$"/$)" /* &"'",-+-"(' N ' + (,: -*( /#$. .- ) . ' / )" - )*
)*+ )/# +()+-", 2$)*2:-*(# - /#  -!*-() -*Z$' ) #)" 1$/# -*+;*2)( )0:
#  -!*-() -*Z$' '.* *)/-*'. /# )0( - *! " )/>++'$) ;$)$/$/  *)) /$*). /#/ /# )" - 2$''  +/: #  !0'/ *! #
*!/# + -!*-() +-*Z$' . !! /$1 '4') ./# (*0)/*! +/ 7 '4 )- % / # -/ /.:
Low Disk Space Alerts
Low Disk Space on the Database Host
! /#  +  0-$/4 )" - -  $1 . I$.& !0''I --*- ( .." !-*( /# /. 7 $/ 2$'' ./-/ /* 2-$/ 1 )/. /* $/. *2) #- -$1 ) 2$''
. )) ($'( .." /*''. -.$)!*-($)"/# (*!/# .$/0/$*):#$. #1$*-$.)*/*)Z$"0-' :
! 4*0 - -0))$)" (0'/$+' )" - )* .7 /# 1 )/. 2$'' 2-$// ) /* 2#$# 1 - )* $. #)'$)" /# 1 )/: @*- (*- $)!*-(/$*) *)
-0))$)"(0'/$+' )* .7. 0'/$;* )" -$)/#  ! - ) . /$*)*!/# *)'$) # '+*-/# ($)$./-/*-H.0$ :A
) /# $.&.+ $..0 *)/# /. #. )- .*'1 7/# )" -2$''2-$/ /# '*''4./*- //*/# /. :
Low Disk Space on the Manager Host
! /# 1$'' $.& .+ *) /# )" - !''.  '*2 LKU7 /# )" - " ) -/ . *2 $.& + ' -/: #$. ' -/ $. +-/ *! /# )*-(' ' -/
.4./ ( ) $. *)Z$"0-' '$& )4 */# -: @*- (*- $)!*-(/$*) *) ' -/.7 . %+- ('O" .+-"(' $) /# ('O" .+-"(' ' ' &'-
. /$*)*!/# *)'$) # '+*-/# ($)$./-/*-H.0$ :A
!4*0- -0))$)"(0'/$+' )" -)* .7/# )* 2$'' $ )/$Z$ $)/# ' -/:
# ) /# )" -H. 1$'' $.& .+ !''.  '*2 P7 /# )" - 2$'' . ) ) ($' ( .." /* '' . -. ) /# )" - 2$'' .#0/ *2):
# )" -))*/ - ./-/ 0)/$'/# 1$'' $.&.+ $."- / -/#)P:
*0(0./- ./-//# )" -()0''4:
! 4*0 - -0))$)" (0'/$+' )* .7 *)'4 /# )* /#/ #. -0) *0/ *! $.& .+ 2$'' .#0/ *2): # */# - )" - )* . 2$'' *)/$)0
*+ -/$)":
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Deep Security Manager Performance Features
84
Creating an SSL Authentication Certificate
#  +  0-$/4 )" - - / . LK;4 - . '!;.$")   -/$Z$/ !*- /# *)) /$*). 2$/# " )/.>++'$) .7  '4.7 ) . -.H 2 
-*2. -.: *2 1 -7 !*-   . 0-$/47 /#$.  -/$Z$/ ) - +'  2$/#  -/$Z$/ !-*( /-0./   -/$Z$/ 0/#*-$/4 @A: @0#
 -/$Z$/ .- ($)/$) !/ - + 0-$/4)" -0+"- :A
) " ) -/ 7 /#   -/$Z$/ (0./ $(+*-/  $)/* /# :& 4./*- $) /# -**/ *! /#  +  0-$/4 )" - $)./''/$*) $- /*-4 ) #1
)'$.*!I/*(/I:#  + 0-$/4)" -2$''/# )0. /#/ -/$Z$/ :
Windows
(+-2(.+.-!'-"-"('+-"O"-"'"'(0,'/"+('&'-6
L: * /* /#  +  0-$/4 )" - $)./''/$*) $- /*-4 @!*- /# +0-+*. *! /# . $)./-0/$*).7 2 2$'' ..0( $/H. I6>+( +&
"%,>+'"+(>).+"-2' +IA)- / ) 2!*' -''  $.)$2,-(+:
M: *+4 7$2,-(+ ) ('O" .+-"('7)+()+-", /*/# ) 2'4- / !*' - $.)$2,-(+:
N: -*(*(()+-*(+/7"*/*/# !*''*2$)"'*/$*)9 6>+( +&"%,>+'"+(>).+"-2' +>#+>"'7
O: 0)/# !*''*2$)"*(()72#$#2$''- / . '!;.$")  -/$Z$/ 9
C:\Program Files\Trend Micro\Deep Security Manager\jre\bin>keytool -genkey -alias tomcat -
keyalg RSA -dname cn=dsmserver
5 -  ", -! (&&(' '& ( -! +-"L"- 2(.+  0"%% ," '6 (& , +*."+ ,)"L" '& -( ," ' -!
+-"L"-" '"' *.,-:;6%,(',.%-2(.+&"'-(,"2(.!/-!-)+-".%++*."+&'-6
P: # )+-*(+/ 7 )/ -+..2*-:
Q: # - $. ) 2 & 4./*- Z$' - /  0) - /# 0. - #*( $- /*-4: ! 4*0 - '*""  $) . I($)$./-/*-I7 *0 2$'' . /#
7$2,-(+ Z$' 0) - 6>(.&'-,'--"' ,>&"'",-+-(+7
R: $ 2/# ) 2'4" ) -/  -/$Z$/ 0.$)"/# !*''*2$)"*(()9
C:\Program Files\Trend Micro\Deep Security Manager\jre\bin>keytool -list -v
S: 0)/# !*''*2$)"*(()/*- / !*-4*0-/*.$")9
C:\Program Files\Trend Micro\Deep Security Manager\jre\bin>keytool -certreq -keyalg RSA -
alias tomcat -file certrequest.csr
T:  ) /# +-+*.,-7,+ /* 4*0-  /* .$"): ) - /0-) 4*0 2$'' " / /2* Z$' .: ) $. I -/$Z$/ - +'4I @!*- 3(+' 7
+-+,)(',7-1-A)/# . *)$./#  -/$Z$/ $/. '!@!*- 3(+' 7 +-7+- *- +-'07+A:
LK: *+4/# Z$' ./* 6>+( +&"%,>+'"+(>).+"-2' +>#+>"'>:
LL: 0)/# !*''*2$)"*(()/*$(+*-//#  -/$)/-0./ & 4./*- 9
C:\Program Files\Trend Micro\Deep Security Manager\jre\bin>keytool -import -alias root -
trustcacerts -file cacert.crt -keystore "C:\Program Files\Trend Micro\Deep Security Manager\
jre\lib\security\cacerts"
LM: 0)/# !*''*2$)"*(()/*$(+*-//#  -/$Z$/ $)4*0-& 4./*- 9
C:\Program Files\Trend Micro\Deep Security Manager\jre\bin>keytool -import -alias root -
trustcacerts -file cacert.crt
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Creating an SSL Authentication Certificate
85
@.44 ./*2-)$)"( .." A
LN: 0)/# !*''*2$)"*(()/*$(+*-//#  -/$Z$/ - +'4/*4*0-& 4./*- 9
C:\Program Files\Trend Micro\Deep Security Manager\jre\bin>keytool -import -alias tomcat -
file certreply.txt
LO: 0)/# !*''*2$)"*(()/*1$ 2/#  -/$Z$/ #$)$)4*0& 4./*- 9
C:\Program Files\Trend Micro\Deep Security Manager\jre\bin>keytool -list -v
LP: *+4 /# :& 4./*- Z$' !-*( 4*0- 0. - #*( $- /*-4 6>(.&'-, ' --"' ,>&"'",-+-(+ /* 6>+( +& "%,> +'
"+(>).+"-2' +>
LQ: + ) /# *)Z$"0-/$*):+-*+ -/$ . Z$' $) !*' - 6>+( +& "%,>+' "+(>) .+"-2 ' +: / 2$'' '**& .*( /#$)"
'$& 9
keystoreFile=C\:\\\\Program Files\\\\Trend Micro\\\\Deep Security Manager\\\\.keystore
port=4119
keystorePass=$1$85ef650a5c40bb0f914993ac1ad855f48216fd0664ed2544bbec6de80160b2f
installed=true
serviceName= Trend Micro Deep Security Manager
LR:  +' /# +..2*-$)/# !*''*2$)"./-$)"9
keystorePass=xxxx
2# - I1111A $./# +..2*-4*0.0++'$ $)./ +Z$1
LS: 1 )'*. /# Z$' :
LT:  ./-//#  + 0-$/4)" -. -1$ :
MK: *)) //*/#  + 0-$/4)" -2$/#4*0--*2. -)4*02$'')*/$ /#//# ) 2 -/$Z$/ $..$") 44*0-:
Linux
(+-2(.+.-!'-"-"('+-"O"-"'"'.1'/"+('&'-6
L: * /* /#  +  0-$/4 )" - $)./''/$*) $- /*-4 @!*- /# +0-+*. *! /# . $)./-0/$*).7 2 2$'' ..0( $/H. I()->,&IA )
- / ) 2!*' -''  $.)$2,-(+:
M: *+4 7$2,-(+ ) ('O" .+-"('7)+()+-", /*/# ) 2'4- / !*' - $.)$2,-(+:
N: -*(*(()+-*(+/7"*/*/# !*''*2$)"'*/$*)9 ()->,&>#+>"' :
O: 0)/# !*''*2$)"*(()72#$#2$''- / . '!;.$")  -/$Z$/ 9
opt/dsm/jre/bin# keytool -genkey -alias tomcat -keyalg RSA -dname cn=dsmserver
5 -  ", -! (&&(' '& ( -! +-"L"- 2(.+  0"%% ," '6 (& , +*."+ ,)"L" '& -( ," ' -!
+-"L"-" '"' *.,-:;6%,(',.%-2(.+&"'-(,"2(.!/-!-)+-".%++*."+&'-6
P: # )+-*(+/ 7 )/ -+..2*-:
Q: # - $. ) 2 7$2,-(+ Z$' - /  0) - /# 0. - #*( $- /*-4: ! 4*0 - '*""  $) . I($)$./-/*-I7 *0 2$'' . /#
7$2,-(+ Z$' 0) - 79+((-9
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Creating an SSL Authentication Certificate
86
!/# Z$' $.#$ )70. /# !*''*2$)"*(()9 O"'8-2)8"'&A7$2,-(+A8%,
R: $ 2/# ) 2'4" ) -/  -/$Z$/ 0.$)"/# !*''*2$)"*(()9
opt/dsm/jre/bin# keytool -list -v
S: 0)/# !*''*2$)"*(()/*- / !*-4*0-/*.$")9
opt/dsm/jre/bin# keytool -certreq -keyalg RSA -alias tomcat -file certrequest.csr
!4*0. I2-((%.'+( '"3()-"('@8$2% @I70. H8," % H$)./ :
T:  ) /# +-+*.,-7,+ /* 4*0-  /* .$"): ) - /0-) 4*0 2$'' " / /2* Z$' .: ) $. I -/$Z$/ - +'4I ) /# . *) $. /# 
 -/$Z$/ $/. '!:
LK: 0)/# !*''*2$)"*(()/*$(+*-//#  -/$)/*/# 1/-0./ & 4./*- 9
9()-9,&9#+9"'9$2-((%8"&)(+-8%",+((-8-+.,-+-,8O"%+-7+-8$2,-(+A9()-9,&9#+9%"9,.+"-29+-,
LL: 0)/# !*''*2$)"*(()/*$(+*-//#  -/$Z$/ $)4*0-& 4./*- 9
9()-9,&9#+9"'9$2-((%8"&)(+-8%",+((-8-+.,-+-,8O"%+-7+-
@.44 ./*2-)$)"( .." A
LM: 0)/# !*''*2$)"*(()/*$(+*-//#  -/$Z$/ - +'4/*4*0-& 4./*- 9
9()-9,&9#+9"'9$2-((%8"&)(+-8%",-(&-8O"%+-+)%27-1-
LN: 0)/# !*''*2$)"*(()/*1$ 2/#  -/$Z$/ #$)$)4*0& 4./*- 9
opt/dsm/jre/bin# keytool -list -v
LO: *+4/# :& 4./*- Z$' !-*(4*0-#*( $- /*-4 /* 9()-9,&9
)B97$2,-(+9()-9,&97$2,-(+
LP: + )/# ()-9,&9('O" .+-"('7)+()+-", Z$' :/2$'''**&.*( /#$)"'$& 9
keystoreFile= opt/dsm/.keystore
port=443
keystorePass=xxxx
installed=true
serviceName= Trend Micro Deep Security Manager
LQ:  +' /# +..2*-$)/# !*''*2$)"./-$)"9
keystorePass=xxxx
2# - I1111A $./# +..2*-4*0.0++'$ $)./ +Z$1
LR: 1 )'*. /# Z$' :
LS:  ./-//#  + 0-$/4)" -. -1$ :
LT: *)) //*/#  + 0-$/4)" -2$/#4*0--*2. -)4*02$'')*/$ /#//# ) 2 -/$Z$/ $..$") 44*0-:
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Creating an SSL Authentication Certificate
87
Minimum VMware Privileges for DSVA Deployment (NSX)
Account for NSX: admin
Account for vCenter: Administrator of vCenter or a member of vCenter Administrators
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Minimum VMware Privileges for DSVA Deployment (NSX)
88
Installing a vSphere Distributed Switch
*0.  + 0-$/4$)2- 1$-/0') /2*-& )1$-*)( )/74*0-1 )/ - -1 -(0./ 0.$)"1+# - $./-$0/ 2$/#@1A:
("',-%%/('2(.+-'-+6
L: + )4*0-1+# -  '$ )/))1$"/ /*4*0-/ )/ -$)4*0-) /2*-&$)"$)1 )/*-4:
M: $"#/;'$&*)/# / )/ -). ' / 0/)!+",-+".-0"-! /*$.+'4/# 0",-+".-0"-! 2$5-:
N: %-+,"('6  ' / ",-+".-0"-!+,"('6H7H *-'/ -:
O: '+%+()+-",6 $1 /# $./-$0/ .2$/#)( ). ' //# )0( -*!0+'$)&+*-/.:'$& 1-:
P: (,-,'!2,"%)-+,6  ' / '(0 ). ' /*) *-(*- +#4.$'+/ -.:'$& 1-:
Q: 2-((&)%-6  ' / .-(&-"%%2+-.%-)(+- +(.)7*)Z$-(4*0-. //$)".7)'$& "'",!:
*0-1+# - $./-$0/ 2$/#$.)*2$)./'' :
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Installing a vSphere Distributed Switch
89
Preparing ESXi servers
 !*- /#  +  0-$/4 $-/0' ++'$) . -1$ )  +'*4 /* 4*0- / )/ -7 4*0- $ . -1 -. (0./ Z$-./ +- +-  4 $)./''$)"
/# -$1 -.)  ..-4!*-) /2*-&/-!Z$$).+ /$*):#$.*+ -/$*)$.+ -!*-( *)/# '0./ -:
()+)+2(.+%.,-+6
L: )4*0-1+# -  '$ )/7"*/* (&N-0(+$"' 4.+"-2N',-%%-"(' )'$&*)/# (,-+)+-"(' /9
M: */ /#  '0./ - 4*0 - "*$)" /* +-*/ / 2$/#  +  0-$/4 $) /# %.,-+, 4 (,-, '$./ ) '$& ',-%% $) /# ',-%%-"('
--., *'0():# $)./''/$*)2$''*(+' / )/# -$1 -1 -.$*)2$'' $.+'4 $)/# ',-%%-"('--., *'0()9
*./+- +-/$*)$.)*2*(+' / :*-(*- *(+' / $)./-0/$*).*)#*./+- +-/$*)+' . *).0'/4*0-2- *0( )//$*):
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Preparing ESXi servers
90
Installing the Guest Introspection Service
*+-*/ /4*0-.2$/# + 0-$/474*0(0./$)./''/# 0 ./)/-*.+ /$*). -1$ *)/# '0./ -/#/*)/$).4*0-$. -1 -.:
*$)./''/# 0 ./)/-*.+ /$*). -1$ 9
L: ) 4*0- 1+# - '$ )/7 "* /* /# +/" )%(2&'-, / *) /# (& N -0(+$"' 4 .+"-2 N ',-%%-"(' +" )
'$&*)/# "- )+'0..$")@ A/*$.+'4/# )%(2-0(+$4.+"-2+/", 2$)*2:
M: %-,+/",4,!.%6  ' / .,-'-+(,)-"('9
N: %-%.,-+,6  ' //# '0./ -/#/*)/$)./# $. -1 -.)./#/4*02)//*+-*/ /9
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Installing the Guest Introspection Service
91
O: %- ,-(+  ' ' &'- -0(+$6  ' / /# /./*- 7 /# $./-$0/  +*-/ "-*0+ 0.  4 4*0-  '0./ -7 ) 
..$")( )/( /#*9
P: 2-((&)%-9 1$ 24*0-. //$)".)'$& "'",!9
/ (4 /& .*( /$( !*- /# 0 ./ )/-*.+ /$*)  -1$ /* $)./'': # ) $/ $. Z$)$.# 7 /# ',-%%-"(' --., 2$'' $.+'4 . I0  I: *0
(4) /*- !- .#/# 1+# -  '$ )/@ A/*0+/ /# .//0.:
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Installing the Guest Introspection Service
92
Creating NSX Security Groups
*0-- .*0- .(0./ *-")$5 $)/* 0-$/4-*0+ !*- 1+# -  0-$/4*'$4) ..$") /*/# (:
(+-'0.+"-2+(.)6
L: ) 4*0- 1+# - '$ )/7 "* /* /# .+"-2 +(.), / *) /# (& N -0(+$"' 4 .+"-2 N +/" (&)(,+ +" )
'$&*)/# 0.+"-2+(.) $*)@ A9
M: )/# &',+")-"(' *+/$*).7"$1 )( /*4*0- 0-$/4-*0+:
N: O"' 2'&" &+,!")6 ! 4*0 2$.# /* - ./-$/ ( ( -.#$+ $) /#$. "-*0+ .  *)  -/$) Z$'/ -$)" -$/ -$7 )/ - /#*.
-$/ -$# - :
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Creating NSX Security Groups
93
O: # - - ()4 24. /* $)'0 *- 3'0 *% /. $)   0-$/4 -*0+7 0/ !*- /#$. 3(+' 7 2 2$'' .$(+'4 $)'0 /# 
'0./ - /#/ *)/$). /# #*./. ) . /#/ 2 2)/ /* +-*/ /: ) /# %- (#-, -( "'%. *+/$*).7 . ' / %.,-+ !-*( /#
#-2) ( )07)(*1 /# '0./ -/#/*)/$)./# ./*+-*/ //*/# %-#-, *'0():
P: '$& "'",! /*- / /# ) 2 0-$/4-*0+)- /0-)/*/# .+"-2+(.), //*. /# ) 2'4'$./  0-$/4-*0+9
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Creating NSX Security Groups
94
Enable Multi-Tenancy
('%.%-"8''26
L: ) /#  +  0-$/4 )" -7 "* /* &"'",-+-"(' N 2,-& --"' , N /' ) '$& '% .%-"8''- ( $) /#
.%-"8''-)-"(', - /*$.+'4/# .%-"8''-('O" .+-"(' 2$5-:
M: )/ -/# /$1/$*)* )'$& 1-:
N: #**. '$ ). (* /*$(+' ( )/9
'!+"-"',"' +(&+"&+2''-6 $1 .'' ))/./# .( '$ ). ../# -$(-4 ))/:
+''-"',"' 6 )/#$.(* 7 ))/./# (. '1 . )/ -'$ ). 2# )/# 4.$")$)!*-/# Z$-.//$( :
O: '$& 1- /*Z$)$.# )'$)"0'/$; ))4$)4*0- + 0-$/4)" -:
Managing Tenants
) 0'/$; ))/(* $. )' 7 ))/.) ()" !-*(/# ''-, +" /#/)*2++ -.$)/# &"'",-+-"(' . /$*):
Creating Tenants
(+-'0''-6
L: */*/# &"'",-+-"('N''-, +" )'$& 0 /*$.+'4/# 0''- 2$5-:
M: )/ - ))/*0)/( :# *0)/)( ) )4)(  3 +/I-$(-4I2#$#$.- . -1 !*-/# -$(-4 ))/:
N: )/ - ) ($' - ..: # ($' - .. $. - ,0$-  $) *- - /* #1 *)// +*$)/ + - ))/: / $. '.* 0.  !*- /2* *! /# /#-
$!! - )/0. -*0)/" ) -/$*)( /#*.$)/# ) 3/./ +:
O:  ' //# *' :# *'  / -($) ./# ')"0" *!/#  + 0-$/4)" -0. -$)/ -! !*-/#/ ))/:
P:  ' /$( *) :'' ))/;- '/ 1 )/.2$'' .#*2)/*/#  ))/. -.$)/# /$( 5*) *!/#  ))/*0)/:
Q: ! 4*0-  +  0-$/4 $)./''/$*) $. 0.$)" (*- /#) *) /. 7 4*0 2$'' #1 /# *+/$*) /* ' /  +  0-$/4 0/*(/$''4 . ' /
/. . -1 -*)2#$#/*./*- /# ) 2 ))/*0)/@I0/*(/$;;*- ! - ) IA*-4*0).+ $!4+-/$0'-. -1 -:
-, ,+/+, -!- + '( %(' + )-"' '0 ''-, 0"%% '(-  "'%. "' -! +()7(0' %",-6 ! ()-"(', 0"%%
'(-))+"2(.('%2!/,"' %-,6
# )4*0#1 ( 4*0-. ' /$*)7'$& 1- /**)/$)0 :
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Enable Multi-Tenancy
95
R: )/ -. -)( !*-/# Z$-./. -*!/# ) 2 ))/*0)/:
S:  ' /*) *!/# /#- +..2*-*+/$*).9
(&"%6 #  ))4H.Z$-./. -H.0. -)( )+..2*--  Z$) # - ))* ($'.- . )/:
&"% ('O"+&-"(' "'$6 *0 . / /# ))4H. Z$-./ . -H. +..2*-: *2 1 - /# *0)/ $. )*/ /$1 0)/$' /# . -
'$&.*)Z$-(/$*)'$)&# 2$''-  $1 4 ($':
&"% '+- ,,0(+6 #$. ''*2. /# ))/ - /*- /* " ) -/ ))/ 2$/#*0/ .+ $!4$)" /# +..2*-: #$.
$.(*./++'$' 2# )()0''4- /$)"*0)/.!*-0. -.2# - /# - /*-* .)*/)  ..
%% -!+ ()-"(', + /"%% /" -!  6 ! ('L"+&-"(' ()-"(' )+(/", ,."-% &-!( (+ /%()"'
).%" + ",-+-"('6  ", +(&&' -( ',.+ -!- -! ''- +-(+ ", !.&' '(- ' .-(&- >(->6
!&"%('L"+&-"('',.+,-!--!&"%)+(/"%(' ,-(-!.,+(+-!2',,-!(.'-6
T: '$& 1- /* Z$)$.# 2$/# /# 2$5- ) - / /# ))/: @/ (4 /& !-*( NK . *). /* !*0- ($)0/ . /* - / /# ) 2 ))/
/. )+*+0'/ $/2$/#/).(+' *'$$ .:A
Examples of messages sent to Tenants
Email Confirmation Link: Account Confirmation Request
Welcome to Deep Security! To begin using your account, click the following confirmation URL. You can
then access the console using your chosen password.
Account Name: AnyCo
Username: admin
Click the following URL to activate your account:
https://managername:4119/SignIn.screen?confirmation=1A16EC7A-D84F-
D451-05F6-706095B6F646&tenantAccount=AnyCo&username=admin
Email Generated Password: Account and Username Notification
Welcome to Deep Security! A new account has been created for you. Your password will be generated and
provided in a separate email.
Account Name: AnyCo
Username: admin
You can access the Deep Security management console using the following URL:
https://managername:4119/SignIn.screen?tenantAccount=AnyCo&username=admin
Email Generated Password: Password Notification
This is the automatically generated password for your Deep Security account. Your Account Name,
Username, and a link to access the Deep Security management console will follow in a separate email.
Password: z3IgRUQ0jaFi
Managing Tenants
# ''-, +" @&"'",-+-"('N''-,A$.+'4./# '$./*!'' ))/.: ))/) $))4*!/# !*''*2$)" --,9
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Enable Multi-Tenancy
96
? +-6 )/# +-*"- ..*! $)"- / 0/)*/4 //$1
? ('O"+&-"(' *."+6 - / 7 0/ /# /$1/$*) '$)& $) /# *)Z$-(/$*) ($' . )/ /* /# ))/ . - #. )*/ 4 /  ) '$& :
@*0)()0''4*1 --$ /#$..// :A
? -"/6 0''4*)'$) )()" 
? .,)'6 *'*)" - +/$)".$")$).:
? '"' %-"('6 ))/. )  ' / 7 #*2 1 - /# +-* .. $. )*/ $(( $/ : # ))/ ) $) /# + )$)"  ' /$*) .//
!*-0+/*. 1 )4. !*- /# /. $.- (*1 :
? -, ) + "%.+6 *- ))/. /#/ !$'  /# 0+"- +/#: # /. +"- 0//*) ) 0.  /* - .*'1 /#$.
.$/0/$*)
Tenant Properties
*0' ;'$&*) ))//*1$ 2/#  ))/H. +()+-", 2$)*2:
General
# *' 7 $( 5*) ) // *! /# ))/ ) '/ - : 2- /#/ #)"$)" /# /$( 5*) ) '*' * . )*/ !! / 3$./$)" ))/
. -.:/2$''*)'4!! /) 2. -.$)/#/ ))4)1 )/.)*/# -+-/.*!/# /#/- )*/. -;.+ $Z$:
# /. ( $)$/ . /# )( *! /# /. 0.  4 /#$. ))4: # . -1 - /# /. $. -0))$)" *) )  ..  1$ /#
#4+ -'$)&:
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Enable Multi-Tenancy
97
Modules
# (.%, / +-*1$ . *+/$*). !*- +-*/ /$*) (*0' 1$.$$'$/4: 4  !0'/ '' 0)'$ ).  (*0' . - #$ ): *0 ) #)" /#$. 4
 . ' /$)" %02,"'%"',(.%,:'/ -)/$1 '47. ' / (*0' .) .#*2)*)+ -; ))/.$.:
! 4*0 . ' / '!+"- "', +(& +"&+2 ''-7 '' ! /0- . /#/ 4*0 . /# -$(-4 ))/ - '$ ).  !*- 2$'' 1$.$' /* '' ))/.:
# . ' / 1$.$$'$/4) 0. /*/0) 2#$#(*0' .- 1$.$' !*-2#$# ))/.:
!0.$)"/# I - ))/I'$ ).$)"4 !0'/*)'4/# '$ ). (*0' .!*- # ))/2$'' 1$.$' :
! 4*0 - 1'0/$)"  +  0-$/4 $) / ./ )1$-*)( )/ ) 2)/ /* . 2#/ !0'' 0'/$; ))4 $)./''/$*) '**&. '$& 7 4*0 ) )' 0'/$;
))4 (** :
# ) $)  (* * 7 /# )" - +*+0'/ . $/. /. 2$/# .$(0'/  ))/.7 *(+0/ -.7 1 )/.7 ' -/.7 ) */# - /: )$/$''47 . 1 )
4. 2*-/# *! / $. " ) -/  0/ ) 2 / $. " ) -/  *) ) *)"*$)" .$. /* & + /# )" -H. .#*-7  +*-/. ) 1 )/. +" .
+*+0'/ 2$/#/:
&((", !% "'-'-(.,"')+(.-"(''/"+('&'-8
Statistics
# .//$./$. / .#*2. $)!*-(/$*) !*- /# 0-- )/ ))/ $)'0$)" /. .$5 7 %*. +-* .. 7 '*"$).7 . 0-$/4 1 )/. ) .4./ ( 1 )/.:
# .(''"-+#..#*2/# './MO#*0-.*!/$1$/4:
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Enable Multi-Tenancy
98
Agent Activation
# " )/ /$1/$*) / $.+'4. *(();'$) $)./-0/$*): /#/ ) -0) !-*( /# " )/ $)./'' $- /*-4 *! /#$. ))/H. *(+0/ -.
2#$# 2$'' /$1/ /# " )/ *) /# *(+0/ - .* /#/ /# ))/ ) ..$") *'$$ . ) + -!*-( */# - *)Z$"0-/$*) +-* 0- . !-*( /#  +
 0-$/4)" -:
Primary Contact
Relay-enabled Agents
#  +  0-$/4 )" - (0./ #1  .. /* / ' ./ *)  '4; )'  " )/7 ) /#$. $)'0 . /# ))/. $) 0'/$; ))4  +
 0-$/4 $)./''/$*): 4  !0'/7 /#  '4; )'  " )/. $) /# +-$(-4 ))/H. I !0'/  '4 -*0+I - 1$'' /* /# */# - ))/.: #
. //$)" $. !*0) $) /# +-$(-4 ))/H.  +  0-$/4 )" - $) /# &"'",-+-"(' N 2,-& --"' , N ''-, N .%-"8''- )-"(',
- :!/#$.*+/$*)$.$.' 7 ))/.2$''#1 /*$)./'')()" /# $-*2) '4; )' " )/:
The Tenant Account User's View of Deep Security
The Tenant "User experience"
# )0'/$;/ ))4$. )' 7/# .$");$)+" #.)$/$*)' (.'-& / 3/Z$ '9
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Enable Multi-Tenancy
99
))/. - - ,0$-  /* )/ - /# $- *0)/ )( $) $/$*) /* /# $- 0. -)( ) +..2*-: # *0)/ )( ''*2. ))/. /* #1
*1 -'++$)"0. -)( .:@*- 3(+' 7$!(0'/$+'  ))/..4)#-*)$5 2$/#/# .( /$1 $- /*-4. -1 -A:
!'2(.:,-!+"&+2''-;%( "'4%/-!(.'-'&%'$(+.,>+"&+2>6
# ) ))/. '*" $)7 /# 4 #1 1 -4 .$($'- )1$-*)( )/ /* !- .# $)./'' *!  +  0-$/4 )" -: *( ! /0- . $) /#  - )*/ 1$''
/* ))/. -.:# !*''*2$)"- .- #$ )!*- ))/.9
? )" -* .$" /
? 0'/$; ))/$" /.
? ($)$./-/$*)Y4./ ()!*-(/$*)
? ($)$./-/$*)Y$ ). .@!)# -$/*+/$*). ' / A
? ($)$./-/$*)Y)" -* .
? ($)$./-/$*)Y ))/.
? ($)$./-/$*)Y4./ ( //$)".9
))/
 0-$/4Y$")) .."
+/ .Y //$)"!*-''*2$)" ))/./*0.  '4; )' " )/.!-*(/# -$(-4 ))/
1) Y*') -.
1) Y'0""'
? *( *!/# # '+*)/ )/)*/++'$' /* ))/.
? *( - +*-/.)*/++'$' /* ))/.
? /# -! /0- .. *)/# 0'/$; ))/. //$)".4*0#**. *)/# &"'",-+-"('N2,-&--"' ,N''-, /
? *( ' -/4+ .2$'''.* #$ )!-*( ))/.9
 -/ / -1 -$' 
*2$.&+
)" -!Z'$)
)" -$( 0/!4)
 2 - -.$*)*! + 0-$/4)" -1$''
0( -*!*(+0/ -.3 ./. $($/
)2# )$)# -$/ '$ ).$)"$. )' )4*!/# '$ ). ;- '/ ' -/.
/ $. '.* $(+*-/)/ /* )*/ /#/ ))/. ))*/ . )4 *! /# 0'/$; ))/ ! /0- . *! /# +-$(-4 ))/ *- )4 / !-*( )4 */# - ))/:
)$/$*)7 -/$).- - ./-$/ .$) /# 4- *)'40.' 2$/#-$(-4 ))/-$"#/.@.0#.- /$)"*/# - ))/.A:
*- (*- $)!*-(/$*) *) 2#/ $. ) $. )*/ 1$'' /* ))/ . -.7 . /# *)'$) # '+ !*- /# &"'",-+-"(' N 2,-& --"' , N ''-,
+" $)/#  + 0-$/4)" -:
'' ))/. #1 /# $'$/4 /* 0. *' ;.   .. *)/-*' 2$/# (0'/$+' 0. - *0)/. /* !0-/# - .0;$1$  ..: $/$*)''4 /# 4 ) 0.
/$1 $- /*-4 $)/ "-/$*) !*- 0. -. /*  ' "/ /# 0/# )/$/$*) /* /# *($): # ))/ *0)/ ( $. ./$'' - ,0$-  !*- )4 ))/
0/# )/$/$*).:
Agent-Initiated Activation
" )/;$)$/$/ /$1/$*)$. )' 4 !0'/!*-'' ))/.:
'%"$  '-7"'"-"- -"/-"(' (+ -! +"&+2 ''-4 ),,0(+ ' ''-  + +*."+ -( "'/($ -! -"/-"(' (+
''-,+,6
(-5
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Enable Multi-Tenancy
100
))/. ) . /# -"0( )/. - ,0$-  !*- " )/;$)$/$/  /$1/$*) 4 "*$)" /* &"'",-+-"(' N )-, N (-0+ N (% (-0+7
. ' /$)")" )/$)./''+&" 7). ' /$)" '+-)%(2&'-+")-, !-*(/# /**'-9
#$. 2$'' $.+'4 /#  +'*4( )/ .-$+/ " ) -/*-: ! ))/. . ' / /# $- +'/!*-( !-*( /# %-(+& ( )0 ) /# . ' / /$1/ " )/
0/*(/$''47/# " ) -/  +'*4( )/.-$+/2$''$)'0 /# ,?('-+(% 2$/#/# - ,0$- +-( / -.:
.) 3(+' 7/# .-$+/!*-" )/;)$/$/ /$1/$*)*)$)*2.(#$) ($"#/'**&.!*''*2.9
dsa_control -a dsm://manageraddress:4120/ "tenantID:7155A-D130-29F4-5FE1-8AFD102"
"tenantPassword:98785384-3966-B9-1418-3E7D0D5"
Tenant Diagnostics
))/. - )*/ ' /*  .. ()" - $")*./$ +&" . 0 /* /# . ).$/$1$/4 *! /# / *)/$)  2$/#$) /# +&" .: ))/. ) ./$''
" ) -/ " )/$")*./$.4*+ )$)"/# *(+0/ -$/*-)#**.$)"  '-" '(,-", *)/# -"(', /*!/# /+/"0 +" :
Usage Monitoring
 +  0-$/4 )" - - *-. / *0/ ))/ 0." : #$. $)!*-(/$*) $. $.+'4  $) /# ''- +(--"(' -"/"-2 2$" / *) /#
.#*-7 /# ))/ +()+-", 2$)*2H. --",-", /7 ) /# #-" & - +*-/: #$. $)!*-(/$*) ) '.*  ..  /#-*0"# /#
//0. *)$/*-$)"   2#$# ) )'  *- $.'  4 "*$)" /* &"'",-+-"(' N 2,-& --"' , N /' N --., ('"-(+"'
:
#$. #-" & @*- 1$ 2&A $)!*-(/$*) ) 0./*($5  /*  / -($) 2#/ //-$0/ . - $)'0  $) /# - *-: #$. *)Z$"0-/$*) $.
 .$")  /* *((*/ 1-$*0. #-"$)" (* '. /#/ (4 - ,0$-  $) . -1$ +-*1$ - )1$-*)( )/.: *- )/ -+-$. . /#$. (4 0. !0'
/* / -($) /# 0." 4 #0.$) ..0)$/:
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Enable Multi-Tenancy
101
Multi-Tenant Dashboard/Reporting
# )0'/$; ))4$. )' 7-$(-4 ))/. -.#1  ../*$/$*)'.#*-2$" /.!*-(*)$/*-$)" ))//$1$/49
*(  3(+' .*! ))/;- '/ 2$" /.9
# .( $)!*-(/$*) $. 1$'' *) /# &"'",-+-"(' N ''-, +" @.*( $) *+/$*)' *'0().A ) *) /# --",-", / *! ))/H.
+()+-", 2$)*2:
#$. $)!*-(/$*) +-*1$ . /# $'$/4 /* (*)$/*- /# 0." *! /# *1 -'' .4./ ( ) '**& !*- $)$/*-. *! )*-(' /$1$/4: *- $)./) $!
.$)"'  ))/ 3+ -$ ) ..+$& $) .+"-2/'--"/"-2 /# 4(4 0) -//&:
*- $)!*-(/$*) $. 1$'' $) /# ''- )(+- @$) /# /'-, 4 )(+-, . /$*)A: #$. - +*-/  /$'. +-*/ /$*) #*0-.7 /# 0-- )/
/. .$5 .7)/# )0( -*!*(+0/ -.@/$1/ ))*);/$1/ A!*- # ))/:
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Enable Multi-Tenancy
102
Multi-Tenancy (Advanced)
APIs
 + 0-$/4)" -$)'0 .)0( -*!.!*-9
L: )'$)"0'/$; ))4
M: )"$)" ))/.
N:  ..$)"*)$/*-$)"/
O:  ..$)"#-" &@-*/ /$*)/$1$/4A/
P: )"$)" *)-4/.  -1 -.
)$/$*)/# ' "4$)'0 .) 2 .-!'-"- ( /#*/#/ +/./#  ))/*0)/( ./#$-+-( / -:
*-$/$*)'$)!*-(/$*)*)/# .+' . . /# *0( )//$*):
Upgrade
+"- $. 0)#)"  !-*( +- 1$*0. 1 -.$*).: # $)./'' - $. 3 0/  )  / /. ) 3$./$)" $)./''/$*): / 2$'' *!! - ) 0+"- *+/$*): !
0+"- $.. ' / /# $)./'' -Z$-./$)!*-(.*/# -)* ./*.#0/*2))/# ) "$)./# +-* ..*!0+"-$)":
# +-$(-4 ))/ $. 0+"-  Z$-./7 !*''*2  4 /# ))/. $) +-'' ' @Z$1 / /$( A: ) /# $)./'' - Z$)$.# .7 /# .( $)./'' - +&"
.#*0'  3 0/ *)/# - ./*!/# )" -)* .:
) /# 1 )/ *! +-*' ( 0-$)" /# 0+"- *! ))/7 /# ))/H. // @*) /# &"'",-+-"(' N ''-, +" A 2$'' ++ - . -,
) + *."+ :(O%"';: # ))/. $)/ -! ) 0.  /* !*- /# 0+"- +-* ..: ! !*-$)" /# 0+"- * . )*/ 2*-& +' .
*)//.0++*-/:
Supporting Tenants
)  -/$) . . $/ (4 - ,0$-  -$(-4 ))/ /* "$)  .. /* ))/H. 0. - $)/ -! : # ))/. '$./ ) ))/ +-*+ -/$ . +" .
+-*1$ )*+/$*)/*I0/# )/$/ .I"$1 ) ))/7"-)/$)"/# ($(( $/ - ;*)'4 ..:
. -. - '*""  $) . .+ $' *0)/ *) /# ))/ 0.$)" /# +- Z$3 I.0++*-/GI: *- 3(+' $! -$(-4 ))/ 0. - %* '*". *) . ))/
) *0)/ $. - /  ''  I.0++*-/G%* I 2$/# /# I0''  ..I -*' : # 0. - $.  ' /  2# ) /# .0++*-/ 0. - /$( . *0/ *- .$"). *0/ *! /#
*0)/:
#  ))/). /#$.0. -*0)/- / 7.$")$)7.$")*0/) ' / '*)"2$/#)4*/# -/$*).$)/# 4./ ( 1 )/.:
. -.$)/# +-$(-4 ))/'.*#1 $/$*)'$")*./$/**'.1$'' /*/# (9
L: # &"'",-+-"(' N 2,-& '(+&-"(' +" *)/$). $/$*)' $)!*-(/$*) *0/ ))/ ( (*-4 0." ) /# .// *!
/#- .:#$.(4 0. $- /'4*-# '+!0'/*- )$-*.0++*-/:
M: # server0.log *) /# $.& *! /# )" - )* . *)/$). $/$*)' $)!*-(/$*) *) /# )( *! /# ))/ @) /# 0. - $!
++'$' A/#/0. /# '*":#$.) # '+!0'$) / -($)$)"/# .*0- *!$..0 .:
) .*( . . ))/. 2$'' - ,0$- 0./*( %0./( )/. )*/ 1$'' $) /# : #$. 0.0''4 *( . / /# - ,0 ./ *! - ) $-* .0++*-/: #
*(()'$) 0/$'$/4/*'/ -/# . . //$)". +/./# -"0( )/9
-Tenantname "account name"
/*$- //# . //$)"#)" *-*/# -*(()'$) /$*)/.+ $Z$ ))/:!*($// /# /$*)$.*)/# +-$(-4 ))/:
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Multi-Tenancy (Advanced)
103
Load Balancers
4  !0'/7 (0'/$;)* )" - +-*1$ . /# - .. *! '' )" - )* . /* '' " )/. ) 1$-/0' ++'$) .: # " )/. ) 1$-/0'
++'$) . 0. /# '$./ *! - .. . /* -)*('4 . ' / )* /* *)// ) *)/$)0 /* /-4 /# - ./ *! /# '$./ 0)/$' )* )* . ) - # 
@*- - '' 0.4A: ! $/ )H/ - # )4 )* . $/ 2$/. 0)/$' /# ) 3/ # -/ / ) /-$ . "$): #$. 2*-&. 1 -4 2 '' $) )1$-*)( )/. 2# - /#
)0( -*!)" -)* .$.Z$3 )1*$.#1$)"/**)Z$"0- '*') -$)!-*)/*!/# )" -)* .!*-1$'$'$/4).'$'$/4:
) 0'/$; ))/ )1$-*)( )/. $/ (4  .$-' /*  ) - (*1 )" - )* . *)  () @+ -#+. 0.$)" 0/*;.'$)" ! /0- . *! '*0
)1$-*)( )/.A: ) /#$. . $)" ) - (*1$)" )" -. 2*0' 0. ) 0+/ *! 1 -4 " )/ ) 1$-/0' ++'$) $) /# )1$-*)( )/: *
1*$/#$.0+/ /# '*') -. //$)") 0. :
* ') -. ) *)Z$"0-  /* 0. $!! - )/ +*-/. !*- /# $!! - )/ /4+ . *! /-!Z$7 *- $! /# '* ') - .0++*-/. +*-/ - ;$- /$*) $/ )
 0. /* 3+*. ''*!/# - ,0$- +-*/**'.*1 -+*-/OON0.$)"/#- '*') -.9
) '' . ., /# '* ') -s .#*0' *)Z$"0-  . http/https '* ') -s @)*/   -($)/$)"A. #$. ensures a "$1 )
*((0)$/$*) 3#)" 2$'' *0- $- /'4  /2 ) " )/>$-/0' ++'$) ) /# )" - !-*( ./-/ /* Z$)$.#: # ) 3/ *)) /$*)
(4 ') /*$!! - )/)* :
! ''- -, !, ' (/+! ( +(.' A@@ ( ",$ ,) :. -( -! "'"-"% +.%,4 )(%"", ' /'-, -!- )().%-
-!,2,-&;6
''- +-"(' -$, -0' C@ ,(', ' (.+ &"'.-, . -( -! +-"(' ( -! ,!& ' -! )().%-"(' ( -! "'"-"%
-6 !", ',.+, ! '0 ''- !, -! &(,- .) -( - ('L" .+-"(' ' +&(/, -! .+' ( &' "' -,
-&)%-,:,)"%%2-0'&.%-")%-,,+/+,;6
(-5
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Multi-Tenancy (Advanced)
104
Installing a Database for Deep Security (Multi-Tenancy
Requirements)
Configuring Database User Accounts
 -1 -)-' /. 0. $!! - )// -(.!*-/. *) +/. .-$  '*2:
+/+ +%-,
+(,,0!+&.%-")%''-,1.- /.  -1 - /.
'''-@,,-(- /. ' .+ >. -
# !*''*2$)". /$*)0. ./#  -1 -/ -(.!*-*/# -1 -)-' /. :
SQL Server
!' .,"' .%-"7''24 $)"' -! &"' -, '& ,!(+- 0"%% &$ "- ,"+ -( + -! -, '&, ( 2(.+ ''-,6
:"6  -! &"' -, ", >>4 -! L"+,- ''-=, -, '& 0"%%  ><A>4 -! ,(' ''-=, -, '&
0"%%><B>4',(('6;
$) 0'/$; ))4- ,0$- ./# $'$/4!*-/# .*!/2- /*- / /. .7/# +-(+ -*' $.- ,0$- *) -1 -:*- 3(+' 9
*-/# 0. --*' *!/# +-$(-4 ))/$/$.$(+*-/)//*..$")*2) -/*/# ($)/. 9
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Installing a Database for Deep Security (Multi-Tenancy Requirements)
105
! .$- 7-$"#/.(4 !0-/# -- Z$) /*$)'0 *)'4/# $'$/4/*(*$!4/# .# () ../# /:
$/# /# +-(+ -*' /# /. . - /  4 /# *0)/ 2$'' 0/*(/$''4 *2)  4 /# .( 0. -: *- 3(+' # - - /#
+-*+ -/$ .!*-/# 0. -!/ -/# Z$-./ ))/#. )- / 9
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Installing a Database for Deep Security (Multi-Tenancy Requirements)
106
*- / /# Z$-./*0)/*). *)-4/. . -1 -7*)'4/# +-(+ . -1 --*' $.- ,0$- :*0. -(++$)"#./*  Z$) :
Oracle Database
0'/$; ))4 $) -' /. $. .$($'- /*   -1 - 0/ 2$/# ! 2 $(+*-/)/ $!! - ) .: # -   -1 - #. .$)"' 0. - *0)/
+ - /. . -1 -7 -' /. 0. . *) 0. - *0)/ + - ))/: # 0. - /#/  +  0-$/4 2. $)./''  2$/# (+. /* /# +-$(-4
))/:#/0. -) "-)/ + -($..$*)/*''*/ $/$*)'0. -.)/' .+ .:
%-!(. ! +% %%(0, ,)"% !+-+, "' -, (#- '&, " -!2 + ,.++(.' 2 *.(-,4 ) .+"-2 (, '(-
,.))(+- ,)"% !+-+, "' -, (#- '&,6 !", )  (' +%=, 0 ,"- ,+", -! %%(0 !+-+, "' '('7
*.(-'&,5 !--)599(,6(+%6(&99BHCEI<@A9,+/+6AAA9BHBHF9,*%<%&'-,@@H6!-&?@@BBC
) .+"-2 +"/, ''- -, '&, +(& -! &"' :+"&+2 ''-; +% -,6 (+ 1&)%4 " -! &"' -,
", >>4 -! L"+,- ''-=, -, '& 0"%%  ><A>4 -! ,(' ''-=, -, '& 0"%%  ><B>4 '
,(('6:)"' -!&"'-,'&,!(+-0"%%&$"-,"+-(+-!-,'&,(2(.+''-,6;
!0'/$; ))4$. )' 7/# !*''*2$)"-' /. + -($..$*).(0./ ..$") 9
))/.- - / .0. -.2$/#'*)"-)*(+..2*-.)"$1 )/# !*''*2$)"-$"#/.9
(-5
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Installing a Database for Deep Security (Multi-Tenancy Requirements)
107
*- . *)-4 -' /. . -1 -.7 /# Z$-./ 0. - *0)/ @ **/./-+ 0. - *0)/A (0./ - / : #$. 0. - 2$'' #1 ) .. )/$''4
(+/4/' .+ :# *)Z$"0-/$*)$.$ )/$'/*/# +-$(-40. -*0)/:
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Installing a Database for Deep Security (Multi-Tenancy Requirements)
108
Uninstalling Deep Security from your NSX Environment
Delete the Deep Security Service Deployment
( %- -! ) .+"-2 ,+/" )%(2&'-5 $) /# 1+# - '$ )/7 "* /* (& N -0(+$"' ' .+"-2 N ',-%%-"(' N
+/")%(2&'-, ) ' / /# +'"+().+"-2 . -1$ :
Delete All "Deep Security" Security Policies
( %- %% A) .+"-2A .+"-2 (%"",5 "* /* (& N -0(+$"' ' .+"-2 N +/" (&)(,+ N .+"-2 (%"", )
 ' / /# ).+"-2  0-$/4*'$$ .:
Remove the vCenter from the Deep Security Manager
( +&(/ -! /'-+ +(& -! ) .+"-2 ' +5 $) /#  +  0-$/4 )" -7 "* /# (&).-+, +" 7 -$"#/;'$& /# 1 )/ - $)
/# )1$"/$*)/- ). ' / &(/0+/'-+777:
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Uninstalling Deep Security from your NSX Environment
109
#$.2$''$.+'4/# &(/0+/'-+ (*'2$)*2:
 ' /!-*(/# !*''*2$)"*+/$*).)'$& 9
? &(/ 0+ /'-+ ' %% ,.(+"'- (&).-+,9 +(.), +(& 6  (*1 . /# 1 )/ - ) '' - *-. *! /# .
$)'0$)"/#  + 0-$/4*'$$ .)0' ...$") /*/# (:
? &(/ 0+ /'-+ .- +-"' (&).-+ - ' +(.) !"++!26  (*1 . /# 1 )/ - 0/ - /$). $/. #$ --#$'
./-0/0- )/# - *-.*!/# .$)'0$)"/#  + 0-$/4*'$$ .)0' ...$") /*/# (:
? &(/ 0+ /'-+5 +-"' (&).-+ -5 .- O%--' !"++!26  (*1 . /# 1 )/ - 0/ - /$). /# - *-. *! /# .
$)'0$)" /#  +  0-$/4 *'$$ . ) 0' . ..$")  /* /# (: # #$ --#$' ./-0/0- *! /# 1 )/ - $. Z'// )  /* .$)"'
"-*0+:
# 1 )/ -$.)*2- (*1 !-*(/#  + 0-$/4)" -:
 -! ) .+"-2 ' + !, %(,- (''-"/"-2 0"-! -!  ' +4 2(. &2 - ' ++(+ ,--"' >'% -( +&(/ )
.+"-2 +(& 0+6> ( +&(/ -! /'-+ +(& -! ) .+"-2 ' +4 +" !-7%"$ -! /'-+ ' ,%- #!"#%$ -(
",)%2 "-, #!"#%$ 0"'(06 ' -!   # - "' -!   # +4 %"$ !'  #6 !", 0"%% +&(/ -!
/'-++(&-!).+"-2' +6
(-5
Deep Security 9.6 SP1 Installation Guide (VMware NSX) Uninstalling Deep Security from your NSX Environment
110