Frequently asked support and security questions for Service Gateway.
Click a link to jump to the topic.
The Service Gateway virtual appliance uses a customized Linux kernel which removes unnecessary tools, software, and commands to secure the environment.
When Trend Micro receives a CVE or ZDI vulnerability report, our security team performs a CVSS evaluation of the current Service Gateway build. If the vulnerability impacts Service Gateway, a critical patch is released or the vulnerability is resolved in the next build release depending on the severity. New builds are normally released every two weeks.
The Service Gateway virtual appliance only allows the default admin user to sign in to the Command Line Interface Shell (CLISH) console. The admin user is required to change the password when signing in for the first time. The password can be changed manually with the command configure password.
The password must meet the following requirements:
Must be 8 to 32 characters
At least one uppercase letter (A-Z)
At least one lowercase letter (a-z)
At least one number (0-9)
At least one special character: ~!`@#$%^&*()/_+=[]{}-\|<>',.?:;"
Follow security best practices to create a strong password:
Avoid using words found in the dictionary
Intentionally misspell words
Use phrases or combine words
Use both uppercase and lowercase letters
Service Gateway provides HTTP and HTTPS ports for integration with other on-premises products. For more information, see Ports Used by the Service Gateway Virtual Appliance
Service Gateway supports installation on a range of different network virtualization platforms. For virtual machine deployments with a hypervisor, Service Gateway supports VMware ESXi and Microsoft Hyper-V.
Service Gateway supports cloud deployments with Amazon Web Services and Microsoft Azure.