Installing Forcepoint DLP Protector on Oracle Linux 8.x

This section outlines the Protector installation procedure on Oracle Linux 8 systems.

The Forcepoint DLP Protector software package can be installed on the following Oracle Linux options:
  • Minimal Linux
  • Workstation Edition
  • Server Edition

Steps

  1. Download the Forcepoint DLP Protector software package for Oracle Linux, from the Downloads page in My Account in Forcepoint Customer Hub.
  2. Log on as root user to run this installer.
  3. Verify that the installation file has executable permissions. If not, run chmod +x <installation file>.
  4. Run the installer file by entering <installation file>.
    The prerequisites are checked for all types of installation.
  5. Disable SELinux in the Server Edition and Minimal Linux.
    1. Enter the command, vi /etc/selinux/config.
    2. Edit the file by replacing SELINUX=enforcing with SELinux=disabled.
    3. Save the file and enter reboot to reboot the machine.
    Note: In the Workstation Edition, SELinux is disabled by default.
  6. Run the installer file again to proceed with the installation.
  7. To disable the firewall connectivity, enter y.
  8. To install the network-scripts, enter y.
    Network scripts gets successfully installed.
  9. To disable the NetworkManager connectivity, enter y.
    The user agreement message displays. You can press space to continue reading the agreement.
  10. To accept the license agreement, enter y.
    The installation prerequisite check will complete and prompt you to add the missing package files.
  11. To install the missing packages for the Server Edition installation, enter the command, yum install java-17-openjdk-headless perl libnsl stunnel rpm-libs.
  12. To install the missing packages for the Workstation Edition installation, enter the command, yum install java-17-openjdk-headless postfix perl libnsl stunnel rpm-libs.
  13. To install the missing packages for the Minimal Linux installation, enter the command, yum install cyrus-sasl java-17-openjdk-headless cyrus-sasl-plain postfix perl stunnel python3 rpm-libs libX11 libnsl python3-idna python3-requests libXft libgsf chrony.
  14. To confirm the installation, enter y.
    The status appears as Complete.
  15. Run the installer file again to proceed with the installation.
    User agreement message displays. You can press space to continue reading the agreement.
  16. To accept the license agreement, enter y.
    Installation begins after file extraction is complete.
  17. Register with a Forcepoint DLP server.

    In this step, a secure channel will be created connecting the protector to a Forcepoint DLP Server. This can be either the management server or a supplemental server.

    1. Enter the IP address or FQDN of the Forcepoint DLP Server.
      Note: This must be the IP address identified when you installed the server machine. It cannot be a secondary IP address.
    2. Enter the user name and password for a Forcepoint DLP administrator that has privileges to manage system modules.
  18. Verify the protector installation.

    In the Data Security module of the Security Manager, verify that the protector status is no longer pending and that the icon displays its active status.

  19. Refresh the browser, and then click Deploy.
    The Protector is successfully connected to the DLP Manager.