Installation guide

1-iii
Contents
Preface
Audience ............................................................................................................... x
How to Use this Guide ......................................................................................x
IWSVA Documentation ..................................................................................xii
Document Conventions .................................................................................xiii
About Trend Micro .........................................................................................xiii
Chapter 1: Preinstallation Planning
Server Requirements ....................................................................................... 1-2
Operating System ....................................................................................... 1-2
Hardware Requirements ........................................................................... 1-2
Component Installation ............................................................................ 1-3
Web Browser .............................................................................................. 1-4
Other Requirements .................................................................................. 1-5
Information Needed to Install IWSVA ....................................................... 1-6
Fresh Installation ....................................................................................... 1-6
Migration ..................................................................................................... 1-6
Type of Proxy Configuration ................................................................... 1-7
Control Manager Server Information ..................................................... 1-7
Database Type and Location .................................................................... 1-7
SNMP Notifications .................................................................................. 1-7
Web Console Password ............................................................................ 1-7
Command Line Access ............................................................................. 1-8
Proxy for Internet Updates ...................................................................... 1-8
Activation Codes ........................................................................................ 1-8
Planning Network Traffic Protection .......................................................... 1-9
Transparent Bridge Mode ......................................................................... 1-9