Deploy the Deep Security Virtual Appliance with NSX Advanced or Enterprise

Applies to on-premise Deep Security software installations only

If you want agentless protection for your VMs when you deploy deep security, as part of the required steps, you must download the Deep Security Virtual Appliance onto Deep Security Manager, and then install the appliance as a service on each of your ESXi servers.

In NSX Manager 6.3.0 or later, there is an important networking change. Guest VMs protected on the same ESXi server can lose network connectivity when you deploy a Deep Security Virtual Appliance with network introspection, and later the appliance is shut down, or deleted and re-deployed during upgrade. Configure failOpenbefore you deploy new appliances.

Import the appliance into Deep Security Manager

  1. On your management computer, go to the Trend Micro Download Center (http://downloadcenter.trendmicro.com).
  2. Download the Deep Security Virtual Appliance 9.5 image to your computer.

    (Later, you will upgrade the software inside the image to Deep Security Virtual Appliance 10.0.)

  3. On Deep Security Manager, go to Administration > Updates > Software > Local.
  4. Click Import and upload the image to Deep Security Manager.

    Deep Security Manager will then automatically download the latest 64-bit Deep Security Agent software for Red Hat, which it will later use to upgrade the virtual appliance's protection modules.

  5. Optionally, for guest VMs that run Microsoft Windows, you can also download the Deep Security Notifier. The notifier is a component that displays messages for Deep Security system events in the system tray.

Deploy the appliance and NSX services via vSphere

  1. In the vSphere Web Client, go to Home > Networking and Security > Installation > Service Deployments.
  2. Click the green plus sign ().
  3. On the new window that appears, select the Trend Micro Deep Security service and then click Next.
  4. Select the ESXi cluster(s) where you want to deploy the "Trend Micro Deep Security" service and then click Next.
  5. For each cluster, select:

    • a datastore where you want to store the Deep Security Virtual Appliance
    • a distributed virtual port group (dvSwitch) where the appliance will be attached to the vNetwork
    • how you want to assign an IP address to the appliance, such as DHCP or manually.

    Click Next.

    In IP assignment, if you select static IP pools for the Deep Security service or Guest Introspection service, verify that your default gateway and DNS is reachable, and that the prefix length is correct. The Deep Security Virtual Appliance and Guest Introspection service VMs' IP addresses aren't on the same subnet as Deep Security Manager and NSX Manager, so if the gateway is incorrect, the appliances won't be able to activate, and they won't be able to communicate with their managers.
  6. Click Finish.

    When deployment is complete, the Trend Micro Deep Security service will appear in the list of network and security service deployments on the cluster.