Removing the Ethernet Bridge - TrendEdge Solutions - Trend Micro

pridefulauburnData Management

Dec 16, 2012 (4 years and 11 months ago)

511 views

Securing Your Web World
A Trend Micro TrendEdge Solution
Advanced Technologies and Techniques to Enhance Your Product
Steven Spadaccini
Director, Senior Solutions Strategist
Solution Architecture and Validation Program
Trend Micro, Inc.
Jason Pappalexis
Senior Solutions Architect
Solution Architecture and Validation Program
Trend Micro, Inc.
TREND MICRO INC.
10101 N. De Anza Blvd. Cupertino, CA, 95014 • www.trendmicro.com
• Toll free: +1 800.228.5651 • Fax: +1 408.257.2003 • Phone: +1 408.257.1500
Creating a Transparent Bridge for Trend Micro
InterScan Web Security Suite 3.1 for Linux
March 2008
Creating a Transparent Bridge for Trend Micro InterScan Web Security Suite 3.1 for Linux
A Trend Micro TrendEdge Solution i

Trend Micro, the Trend Micro t-ball logo, Control Manager, and InterScan are trademarks or registered
trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered
trademarks of their owners.
Trend Micro Incorporated reserves the right to make changes to this document and to the product described
herein without notice, and the information contained in this document is provided "as-is". This document is for
informational purposes only, and is not supported by Trend Micro or its partners.
TREND MICRO MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT.
Copyright© 2008 Trend Micro Incorporated. All rights reserved.
Document Part No. TE01WSLX31_080324US
Creating a Transparent Bridge for Trend Micro InterScan Web Security Suite 3.1 for Linux
A Trend Micro TrendEdge Solution ii
Contents
Introduction ...............................................................................................................................................1
Requirements for Creating an Ethernet Bridge for IWSS .........................................................................1
Download Requirements ..........................................................................................................................1
Building the Ethernet Bridge .....................................................................................................................3
Installing InterScan Web Security Suite 3.1 .............................................................................................6
Testing the Configuration .......................................................................................................................12
Removing the Ethernet Bridge ...............................................................................................................13
Resources ..............................................................................................................................................14
Web Sites ........................................................................................................................................14
About the Authors ...................................................................................................................................15
Steven Spadaccini ..........................................................................................................................15
Jason Pappalexis ............................................................................................................................15
About Trend Micro ..................................................................................................................................16
Creating a Transparent Bridge for Trend Micro InterScan Web Security Suite 3.1 for Linux
A Trend Micro TrendEdge Solution 1
Introduction
Trend Micro™ InterScan™ Web Security Suite 3.1 for Linux™ (IWSS) is a gateway solution that protects your
environment from various Web-borne threats. IWSS can protect you in the following ways:

Scans HTTP and FTP traffic for spyware and viruses in Web pages and in Web-based email

Prevents access to known malware propagation sites

Blocks outbound data to known phishing-related Web sites

Offers optional integrated URL filtering and optional, automatic remediation with Trend Micro™ Damage
Cleanup Services

Offers optional validation to screen Web pages for malicious Java™ applets and ActiveX™ controls

Integrates with Trend Micro™ Control Manager™ for centralized management across the entire network
Trend Micro InterScan Web Security Suite 3.1 for Linux has various configuration options for your environment.
By default, the product acts as a proxy and does not offer Ethernet bridge capabilities. This document focuses on
how to create an Ethernet bridge
1
to redirect traffic destined for port 80 (HTTP) and optionally port 21 (FTP) to
IWSS and have the IWSS software scan them for malware.
For additional information on IWSS configuration options, visit Trend Micro on the Web at:
http://www.trendmicro.com/download/product.asp?productid=34
Note:
Trend Micro provides this document—as-is—as a courtesy to interested parties. The accuracy of the
information is solely the author’s responsibility. This document is neither supported by Trend Micro nor its
partners.
Requirements for Creating an Ethernet Bridge for IWSS

Red Hat™ Enterprise Linux™ 4 Server (2.6.9-42 and above)

Three (3) network interfaces (1 for management; 2 for the Ethernet bridge)

Trend Micro InterScan Web Security Suite 3.1 for Linux

ebtables 2.0.8-rc3

iptables 1.2.11

bridge-utils-1.0.4-4
Download Requirements

IWSS 3.1 for Linux:
http://www.trendmicro.com/ftp/products/iwss/iwss_31_linux_b1027.tgz
1. A network bridge is a way to connect two networks by physically connecting them to at least two Ethernet
ports. All network traffic routes through the bridge because it is in the “middle” of the data transmission. A net-
work bridge is much easier to deploy than other solutions because you can protect your clients and your net-
work transparently without modifying them.
Creating a Transparent Bridge for Trend Micro InterScan Web Security Suite 3.1 for Linux
A Trend Micro TrendEdge Solution 2

iptables (included by Red Hat in its default installation)

bridge-utils RPM (located on Disk 2 of the Red Hat Enterprise Server installation set if not installed in the
package).

ebtables (available from sourceforge.net):
http://ebtables.sourceforge.net/download.html#latest
Creating a Transparent Bridge for Trend Micro InterScan Web Security Suite 3.1 for Linux
A Trend Micro TrendEdge Solution 3
Building the Ethernet Bridge
Once you have installed Red Hat Enterprise Linux Server with iptables, your environment should look similar to
the screen capture in Figure 1 below:
F
IGURE
1
Red Hat Enterprise Linux Server with iptables Installed
Before we install InterScan Web Security Suite 3.1 for Linux, we must first install the bridge software. A snapshot
of this process appears in Figure 2:
F
IGURE
2
Linux Commands Required to Install bridge-utils on Red Hat Enterprise Linux Server
Let us also install the ebtables software. A snapshot of this process appears in Figure 3:
F
IGURE
3
Linux Commands Required to Install ebtables on Red Hat Enterprise Linux Server
Now that we have the bridge software and the ebtables software installed, let us discuss the steps that are
needed to make IWSS an effective malicious code scanner on an Ethernet bridge. In this example, Ethernet port
eth2 is used for system management. Figure 4 provides the steps necessary for creating a bridge between
Ethernet ports eth0 and eth1.
[root@iwss ~]# uname -a
Linux iwss 2.6.9-42.ELsmp #1 SMP Wed Jul 12 23:27:17 EDT 2006 i686 i686 i386
GNU/Linux
[root@iwss ~]# iptables --version
iptables v1.2.11
[root@iwss ~]#
[root@iwss ~]# rpm -Uvh bridge-utils-1.0.4-4.i386.rpm
warning: bridge-utils-1.0.4-4.i386.rpm: V3 DSA signature: NOKEY, key ID db42a60e
Preparing... ########################################### [100%]
1:bridge-utils ########################################### [100%]
[root@iwss ~]#
[root@iwss ~]# rpm -Uvh ebtables-2.0.8-rc3.i386.rpm
Preparing... ########################################### [100%]
1:ebtables ########################################### [100%]
[root@iwss ~]#
Creating a Transparent Bridge for Trend Micro InterScan Web Security Suite 3.1 for Linux
A Trend Micro TrendEdge Solution 4
F
IGURE
4
Linux Commands Required to Create a Transparent Bridge
Note:
IP address 192.168.1.50 and gateway 192.168.1.1 should be modified according to the network topology
used for your environment.
Figure 5 shows the output of the ifconfig command. This is what the example network environment now looks
like: port br0 is present and both eth0 and eth1 should be listed without IP address assignments.
F
IGURE
5
Sample ifconfig Command Output
[root@iwss ~]# echo “1” > /proc/sys/net/ipv4/ip_forward
[root@iwss ~]# ifconfig eth0 up
[root@iwss ~]# ifconfig eth1 up
[root@iwss ~]# brctl addbr br0
[root@iwss ~]# brctl stp br0 off
[root@iwss ~]# brctl addif br0 eth0
[root@iwss ~]# brctl addif br0 eth1
[root@iwss ~]# ifconfig eth0 0 0.0.0.0
[root@iwss ~]# ifconfig eth1 0 0.0.0.0
[root@iwss ~]# ifconfig br0 192.168.1.50 netmask 255.255.255.0 up
[root@iwss ~]# route add default gw 192.168.1.1 dev br0
[root@iwss ~]#
[root@iwss ~]# ifconfig
br0 Link encap:Ethernet HWaddr 00:0C:F1:E6:D1:FF
inet addr:192.168.10.111 Bcast:192.168.10.255 Mask:255.255.255.0
inet6 addr: fe80::20c:f1ff:fee6:d1ff/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:5 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:0 (0.0 b) TX bytes:378 (378.0 b)
Creating a Transparent Bridge for Trend Micro InterScan Web Security Suite 3.1 for Linux
A Trend Micro TrendEdge Solution 5
Now that we have successfully created an Ethernet bridge between eth0 and eth1, we must setup rules so that
we can redirect traffic to the IWSS software. To accomplish this, we need to tell the Ethernet bridge to redirect
locally any traffic destined for port 80.
Figure 6 outlines the rules you must establish for ebtables and iptables:
F
IGURE
6
Mandatory Traffic Redirection Rules for ebtables and iptables
The first command uses ebtables to tell the bridge to redirect all port 80 traffic to the local machine. The second
command uses iptables to redirect this port 80 traffic to the listening port of the IWSS software. By default,
IWSS is configured to listen on port 8080. This is a configurable port inside the IWSS GUI. Consult the Trend
Micro InterScan Web Security Suite 3.1 for Linux Administrator’s Guide for additional information:
http://www.trendmicro.com/ftp/documentation/guides/
iwss_31_linux_b1027_AdminGd.pdf
Note:
To maintain the configuration during system startup, we recommend that the commands from Figures 4 and
6 be placed in a system bootup script (standard examples are /etc/rc.d, /etc/init.d or
/etc/bashrc if the bash shell is used), so that the server retains the bridge configuration when restarted.
eth0 Link encap:Ethernet HWaddr 00:0C:F1:E6:D1:FF
inet6 addr: fe80::20c:f1ff:fee6:d1ff/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:203029 errors:0 dropped:0 overruns:0 frame:0
TX packets:117696 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:100
RX bytes:178217565 (169.9 MiB) TX bytes:37624489 (35.8 MiB)
Base address:0xdcc0 Memory:fe9e0000-fea00000
eth1 Link encap:Ethernet HWaddr 00:14:6C:CB:4D:00
inet6 addr: fe80::214:6cff:fecb:4d00/64 Scope:Link
UP BROADCAST MULTICAST MTU:1500 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:0 (0.0 b) TX bytes:0 (0.0 b)
Interrupt:217 Base address:0xf00
[root@iwss ~]# ebtables -t broute -A BROUTING -p ipv4 --ip-protocol 6
--ip-destination-port 80 -j redirect --redirect-target ACCEPT
[root@iwss ~]# iptables -t nat -A PREROUTING -i br0 -p tcp --dport 80 -j REDIRECT
--to-port 8080
Creating a Transparent Bridge for Trend Micro InterScan Web Security Suite 3.1 for Linux
A Trend Micro TrendEdge Solution 6
Installing InterScan Web Security Suite 3.1
We are almost there. Now we need to install the InterScan Web Security Suite 3.1 for Linux on the system.
Figure 7 below outlines the IWSS installation procedure.
Note:
Your configuration may not appear exactly the same.
F
IGURE
7
IWSS 3.1 for Linux Installation Script
[root@iwss ~]# ./install_iwss.sh
Script started, file is /tmp/install.log
######################################################
## Trend Micro InterScan Web Security Suite 3.1 ##
## Installation ##
######################################################
NOTICE: Trend Micro licenses its products in accordance with certain terms and
conditions. By breaking the seal on the CD jacket in the Software package or
installing a serial number, registration key or activation code, You already
accepted a Trend Micro license agreement. A courtesy copy of a representative
Trend Micro License Agreement is included for reference below. The language and
terms of the actual Trend Micro license agreement that you accepted may vary. By
clicking "I Accept" below or using the Software, You confirm Your agreement to the
terms and conditions of the original Trend Micro license agreement you accepted.
[Enter] = continue viewing [Y|y] = accept license [N|n] = decline license
Y
Your system kernel parameter: shmmax (33554432) is less than recommended
(1073741824). Installation needs to change this setting before proceeding. Please
confirm to proceed (default yes) [y/n]:
###################################
## Source and Install Location ##
###################################
Enter the InterScan Web Security Suite 3.1 install location (default
/opt/trend/iwss):
Enter the binary package file (default binary-20080107.tar.gz):
Enter the data package file (default data-20080107.tar.gz):
Installing InterScan Web Security Suite 3.1 from binary-20080107.tar.gz and
data-20080107.tar.gz...
Unpacking InterScan Web Security Suite 3.1 package...this may take a few minutes.
Creating a Transparent Bridge for Trend Micro InterScan Web Security Suite 3.1 for Linux
A Trend Micro TrendEdge Solution 7
##############################
## Database Install ##
##############################
By default, InterScan Web Security Suite 3.1 installs a copy of PostgreSQL
database on this machine.
You can choose to use an existing remote/local PostgreSQL database.
Use an existing database? (the version 7.4.16 above only)(default no) [y/n]:
Initializing PostgreSQL database...
waiting for postmaster to start....done
postmaster successfully started
##################################
## Database Username & Password ##
##################################
The default username for the PostgreSQL database is "sa"...
Create a password for this database account:
Enter the password again:
CREATE USER
ALTER USER
ALTER USER
CREATE DATABASE
Starting to create DB objects and insert initial entries...
CREATE TABLE
CREATE TABLE
CREATE TABLE
CREATE TABLE
CREATE TABLE
CREATE TABLE
CREATE TABLE
CREATE INDEX
CREATE TABLE
CREATE TABLE
CREATE INDEX
CREATE INDEX
CREATE TABLE
Creating a Transparent Bridge for Trend Micro InterScan Web Security Suite 3.1 for Linux
A Trend Micro TrendEdge Solution 8
CREATE INDEX
CREATE INDEX
CREATE TABLE
CREATE INDEX
CREATE TABLE
CREATE TABLE
CREATE INDEX
CREATE TABLE
CREATE TABLE
CREATE TABLE
CREATE TABLE
CREATE TABLE
CREATE TABLE
CREATE TABLE
CREATE INDEX
CREATE INDEX
CREATE INDEX
CREATE INDEX
CREATE INDEX
CREATE INDEX
INSERT 17252 1
INSERT 17253 1
INSERT 17254 1
INSERT 17255 1
INSERT 17256 1
INSERT 17257 1
INSERT 17258 1
INSERT 17259 1
INSERT 17260 1
INSERT 17261 1
INSERT 17262 1
INSERT 17263 1
INSERT 17264 1
INSERT 17265 1
INSERT 17266 1
INSERT 17267 1
Creating a Transparent Bridge for Trend Micro InterScan Web Security Suite 3.1 for Linux
A Trend Micro TrendEdge Solution 9
INSERT 17268 1
INSERT 17269 1
INSERT 17270 1
INSERT 17271 1
INSERT 17272 1
INSERT 17273 1
INSERT 17274 1
CREATE TABLE
CREATE INDEX
CREATE FUNCTION
CREATE FUNCTION
CREATE FUNCTION
CREATE FUNCTION
CREATE FUNCTION
CREATE FUNCTION
CREATE FUNCTION
CREATE FUNCTION
CREATE FUNCTION
CREATE FUNCTION
CREATE FUNCTION
CREATE FUNCTION
CREATE FUNCTION
CREATE FUNCTION
CREATE FUNCTION
CREATE FUNCTION
addinitvalues
---------------
0
(1 row)
Loading contrib module...
CREATE FUNCTION
CREATE FUNCTION
Modifying intscan.ini...
Modifying odbc.ini...
Modifying pg_hba.conf to use password mode...
postmaster successfully signaled
Creating a Transparent Bridge for Trend Micro InterScan Web Security Suite 3.1 for Linux
A Trend Micro TrendEdge Solution 10
PostgreSQL setup complete.
Setting up InterScan Web Security Suite 3.1 Control Manager Agent...
##############################
## Configuration ##
##############################
Do you want to register to Control Manager? (default no) [y/n]
/opt/trend/iwss/bin/ISAGENT_MCP/config_mcpagent.sh
Skipped Control Manager registration. You can try to register to Control Manager
through 'Remote registration page' or 'tool' later.
waiting for postmaster to shut down......done
postmaster successfully shut down
Starting /usr/iwss/S99ISmaild...
Starting the InterScan Web Security Suite mail daemon...
Starting /usr/iwss/S99ISdatabase...
waiting for postmaster to start...done
postmaster successfully started
Starting /usr/iwss/S99ISproxy...
Starting the InterScan HTTP daemon...
Please wait while the InterScan Web Security Suite daemon is being
checked.........ok
Starting /usr/iwss/S99ISftp...
Starting /usr/iwss/S99IScanHttpd...
Using CATALINA_BASE: /usr/iwss/AdminUI/tomcat
Using CATALINA_HOME: /usr/iwss/AdminUI/tomcat
Using CATALINA_TMPDIR: /usr/iwss/AdminUI/tomcat/temp
Using JRE_HOME: /usr/iwss/AdminUI/jre
Starting /usr/iwss/S99ISlogtodb...
Starting DataBase logging daemon ...
Starting /usr/iwss/S99ISMetricMgmtd...
Starting metrics management daemon...
Starting /usr/iwss/S99ISsvcmonitor...
Starting SVCMonitor daemon ...
Starting /usr/iwss/S99ISagent...
Starting InterScan Web Security Suite 3.1 Control Manager MCP Agent...
The InterScan Web Security Suite 3.1 MCP Agent is running now.
Creating a Transparent Bridge for Trend Micro InterScan Web Security Suite 3.1 for Linux
A Trend Micro TrendEdge Solution 11
You have now completed the setup portion of this document.
#############################################################
## Trend Micro InterScan Web Security Suite 3.1 ##
## Installation complete ##
#############################################################
## ##
## You can now access the InterScan Web Security Suite 3.1 ##
## web console by pointing your browser to: ##
## ##
## http://localhost:1812 ##
## ##
## The following is the default administrator login for ##
## InterScan Web Security Suite 3.1: ##
## ##
## username: admin ##
## password: adminIWSS85 ##
## ##
## To protect your installation, you should ##
## change the password as soon as you log in. ##
## ##
#############################################################
Script done, file is /tmp/install.log
Installation log install.log has been moved to /etc/iscan/log.
Enter to exit installation.
Creating a Transparent Bridge for Trend Micro InterScan Web Security Suite 3.1 for Linux
A Trend Micro TrendEdge Solution 12
Testing the Configuration
Now that we have successfully installed all the necessary software and rules for creating a transparent scanner
for Web traffic, let us see if we can analyze some of the traffic to verify that the bridge is working.
We are going to use tcpdump to determine whether our ebtables and iptables rules are redirecting traffic to
IWSS. My client system (IP address 192.168.1.201) is making an HTTP request through the bridge (IP address
192.168.1.50) to a public Web site. If we setup our rules correctly, any port 80 traffic should be redirected to
port 8080, the listening port for IWSS. The tcpdump capture will convert port 8080 traffic to Webcache, the
standard format used in reviewing data in scanning and Web caching software. Figure 8 shows the tcpdump
capture of the bridge:
F
IGURE
8
tcpdump Capture of IWSS Transparent Bridge
[root@iwss ~]# tcpdump -i br0 port 8080
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on br0, link-type EN10MB (Ethernet), capture size 96 bytes
20:41:23.575998 IP 192.168.1.201.1152 > 192.168.1.50.webcache: S
4173551942:4173551942(0) win 65535 <mss 1460,nop,nop,sackOK>
20:41:23.634229 IP 192.168.1.50.webcache > 192.168.1.201.1152: S
3327081530:3327081530(0) ack 4173551943 win 5840 <mss 1460,nop,nop,sackOK>
20:41:23.576135 IP 192.168.1.201.1152 > 192.168.1.50.webcache: . ack 1 win 65535
20:41:23.579713 IP 192.168.1.201.1152 > 192.168.1.50.webcache: P 1:521(520) ack 1
win 65535
20:41:23.579780 IP 192.168.1.50.webcache > 192.168.1.201.1152: . ack 521 win 6432
20:41:23.776592 IP 192.168.1.50.webcache > 192.168.1.201.1152: . 1:1461(1460) ack
521 win 6432
20:41:23.776864 IP 192.168.1.50.webcache > 192.168.1.201.1152: . 1461:2921(1460)
ack 521 win 6432
20:41:23.777158 IP 192.168.1.201.1152 > 192.168.1.50.webcache: . ack 2921 win
65535
20:41:23.777207 IP 192.168.1.50.webcache > 192.168.1.201.1152: . 2921:4381(1460)
ack 521 win 6432
20:41:23.777221 IP 192.168.1.50.webcache > 192.168.1.201.1152: P 4381:5721(1340)
ack 521 win 6432
20:41:23.777598 IP 192.168.1.201.1152 > 192.168.1.50.webcache: . ack 5721 win
65535
20:41:23.786703 IP 192.168.1.201.1152 > 192.168.1.50.webcache: P 521:1151(630)
ack 5721 win 65535
20:41:23.786827 IP 192.168.1.50.webcache > 192.168.1.201.1152: . ack 1151 win
7560
Creating a Transparent Bridge for Trend Micro InterScan Web Security Suite 3.1 for Linux
A Trend Micro TrendEdge Solution 13
Success! We have successfully created a partially transparent Ethernet bridge. This means that the requesting
client can access IWSS and see the IP address of the upstream device, but that the upstream device cannot
access IWSS and see the IP or MAC address of the requesting client. The upstream device sees only the IP and
MAC addresses of the IWSS host machine.
The result of implementing this partially transparent ridge is that IWSS can now scan and protect your
environment from Web threats without the clients being exposed to potential attacks issued through the upstream
device.
For further configuration and reporting options using the InterScan Web Security Suite Web-based management
console, consult the Trend Micro InterScan Web Security Suite 3.1 for Linux Administrator’s Guide:
http://www.trendmicro.com/ftp/documentation/guides/
iwss_31_linux_b1027_AdminGd.pdf
Removing the Ethernet Bridge
If it is desired to return to forward proxy mode, simply remove the configuration steps (as described in the Building
an Ethernet Bridge section above) from the server startup scripts and restart the server. Without the ebtables,
iptables, ifconfig and route commands, the server will behave in the way it is configured in the IWSS 3.1
administrative console.
20:41:23.880092 IP 192.168.1.50.webcache > 192.168.1.201.1152: P 5721:5865(144)
ack 1151 win 7560
20:41:23.883826 IP 192.168.1.201.1152 > 192.168.1.50.webcache: P 1151:1774(623)
ack 5865 win 65391
20:41:23.883914 IP 192.168.1.50.webcache > 192.168.1.201.1152: . ack 1774 win
8820
20:41:24.068951 IP 192.168.1.50.webcache > 192.168.1.201.1152: P 5865:6009(144)
ack 1774 win 8820
20:41:24.249031 IP 192.168.1.201.1152 > 192.168.1.50.webcache: . ack 6009 win
65247
20:41:29.068414 IP 192.168.1.50.webcache > 192.168.1.201.1152: F 6009:6009(0) ack
1774 win 8820
20:41:29.068587 IP 192.168.1.201.1152 > 192.168.1.50.webcache: . ack 6010 win
65247
20:41:29.068647 IP 192.168.1.201.1152 > 192.168.1.50.webcache: F 1774:1774(0) ack
6010 win 65247
20:41:29.068666 IP 192.168.1.50.webcache > 192.168.1.201.1152: . ack 1775 win
8820
[root@iwss ~]#
Creating a Transparent Bridge for Trend Micro InterScan Web Security Suite 3.1 for Linux
A Trend Micro TrendEdge Solution 14
Resources
Web Sites

http://www.trendmicro.com/us

http://freshmeat.net

http://www.sourceforge.net

http://www.redhat.com

http://www.trendmicro.com/ftp/documentation/guides/
iwss_31_linux_b1027_AdminGd.pdf
Creating a Transparent Bridge for Trend Micro InterScan Web Security Suite 3.1 for Linux
A Trend Micro TrendEdge Solution 15
About the Authors
Steven Spadaccini
Steven Spadaccini has been with Trend Micro for over 5 years and is currently the Director and Senior Solutions
Strategist for the Solution Architecture and Validation Program. Prior to this role, Steven worked as a Senior
Security Engineer at Trend Micro and has over 12 years experience in network security. Before working for Trend
Micro, Steven worked for Sun Microsystems Enterprise Server Products.
Jason Pappalexis
Jason Pappalexis has been with Trend Micro for over 4 years in a Senior Technical Marketing Engineering role
and is currently a Senior Solutions Architect. Prior to working at Trend Micro, he has worked as system
administrator and field engineering roles for public and government clients. He holds a Bachelor’s and Master’s
degree in Mechanical Engineering.
Creating a Transparent Bridge for Trend Micro InterScan Web Security Suite 3.1 for Linux
A Trend Micro TrendEdge Solution 16
About Trend Micro
Trend Micro Incorporated is a pioneer in secure content and threat management. Founded in 1988, Trend Micro
provides individuals and organizations of all sizes with award-winning security software, hardware, and services.
With headquarters in Tokyo and operations in more than 30 countries, Trend Micro solutions are sold through
corporate and value-added resellers and service providers worldwide. For additional information and evaluation
copies of Trend Micro products and services, visit our Web site at www.trendmicro.com.