3.2. Procedure – Installing PNS on a Ubuntu server

Purpose: 

If you want to install PNS on an existing Ubuntu server, complete the following steps.

Prerequisites: 

  • An already installed Ubuntu 22.04 LTS server. Install only services and applications that you absolutely need. For details on installing Ubuntu Server, see Procedure 3.1, Installing Ubuntu Server.

  • Ensure that you have a working BalaSys Support System registration and that have downloaded the required PNS license files.

Steps: 

  1. Login to the host as root from a local console or using SSH.

  2. Update your system and upgrade the PNS-related packages. This is important, because there might be newer packages available. To update your system, enter the following commands:

    sudo apt update
    sudo apt dist-upgrade

    Note that during this step, some packages may be downgraded. This is normal.

  3. Create the following mount point for the PNS install medium:

    sudo mkdir -p /media/cdrom
  4. Mount the PNS install medium to the previous mount point.

    sudo mount /dev/cdrom /media/cdrom -o ro
  5. Add PNS installer package repositories to APT’s list of available sources.

    sudo /media/cdrom/add-pns-installer-apt-repository
  6. Install the PNS components that you want to use on the host. Issue the following command: sudo apt install <PNS-components-to-install>, where replace the <PNS-components-to-install> part of the command with the package names of the PNS components that you want to use on the host. The following packages are available:

    • PNS Application-level Gateway: The package required for a firewall host. (Package name: pns-product-alg)

    • Management Server: MS — depending on its product license — can be installed on the PNS firewall host or on a separate machine. (Package name: pns-product-ms)

    • Authentication Server: AS enables the authentication of network traffic on the user level at the firewall using password, CryptoCard, S/key, or X.509 methods. Integrating with existing Microsoft Active Directory, LDAP, PAM, and Radius databases is also supported. The module can be installed either together with the PNS and MS modules or separately at a later date. (Package name: pns-product-as)

    • PNS URL Filtering: The package is required for the URL filtering functionality on a firewall host. (Package name: pns-product-urlfilter)

    • Content Filtering: CF is a framework and a uniform interface to manage various built-in and third party content filtering modules (that is, virus and spam filtering engines). The content filtering modules to be installed (in addition to the CF framework) can be selected from the following list. (Package name: pns-product-cf)

      Warning

      The CF framework and the content filtering modules must be installed on the same host.

      • ESET’s NOD32 antivirus engine: This module contains the libraries and virus signature databases needed for using the ESET’s NOD32 antivirus engine. (Package name: pns-product-eset)

      • ClamAV Antivirus Scanner: This module contains the libraries and virus signature databases needed for using the ClamAV antivirus engine. (Package name: pns-product-clamav)

      • SpamAssassin spam filter: This module contains the libraries and databases needed for using the SpamAssassin spam filtering engine. (Package name: pns-product-spamassassin)

      • ModSecurity: This module contains the libraries needed for using ModSecurity Web Application Firewall (WAF) engine. (Package name: pns-product-waf)

    For further information on the different modules, see the Chapter 14, Virus and content filtering using CF in Proxedo Network Security Suite 2 Administrator Guide.

    Below are some guidelines about which modules should be installed on the different types of machines.

    • When installing a single firewall (or a node of a cluster) that will be managed from a separate MS host, select only the PNS Application-level Gateway (ALG) component.

    • The third-party modules that can be used by CF must be licensed separately from PNS. Select them only if you have a valid license for them, and only when you are installing the host that will run CF.

    • When installing a MS host that will manage one or more PNS firewalls, but the machine itself will not be used as a firewall, select the Management Server (MS) component.

    • If you will use a single host as the firewall and MS, select the Management Server and the PNS Application-level Gateway components. Also select Content Filtering and its required modules, and the Authentication Server component if you have purchased licenses for them.

    • Authentication Server (AS) is an optional, central authentication service that can be installed on a PNS machine. If you have license for AS select it together with the PNS Application-level Gateway component. This service must be licensed separately.

    Note

    The Management Console and the Authentication Agent applications are client–side components that cannot be installed on PNS hosts. Their installation is discussed in Chapter 5, Installing the Management Console (MC) and Chapter 6, Installing the Authentication Agent (AA), respectively.

    After choosing the modules to install, select Continue.

    Note

    When you continue the installation, some steps may not appear for you, depending on the components you have selected to install.

  7. Remove PNS installer package repositories fron APT’s list of available sources.

    sudo /media/cdrom/remove-pns-installer-apt-repository
  8. Umount the PNS install medium from the file system.

    sudo umount /dev/cdrom
  9. Configure network interface bootstrap by MS.

  10. Reboot the system:

    sudo reboot
  11. Repeat this procedure to install other hosts if needed for your environment.

  12. If you have installed a Management Server (MS), install the Management Console (MC) application on the deskop of your PNS administrators. For details, see Chapter 5, Installing the Management Console (MC).