Creating Notification Policies: Coaching, Splash, and Compliance

Size: px
Start display at page:

Download "Creating Notification Policies: Coaching, Splash, and Compliance"

Transcription

1 SGOS 5 Series Creating Notification Policies: Coaching, Splash, and Compliance What is a Notification Policy? Many organizations implement content filtering in order to control employee Web access; however, some blocked URLs need to be allowed for certain users. Additionally, organizations may want to inform employees of the Corporate Internet Usage policy before their first access to the Internet, and/or occasionally send announcements to employees. The Blue Coat ProxySG allows you to create notification policies for a user, group, time, and/or URL to handle all these needs. Notification policies consist of an HTML page that is displayed when triggered; these are described in three ways: Coaching pages advise users about corporate policies regarding the access of a particular Web site and then offer the option to proceed. The policy can ensure that all URLs accessed that way are intentionally requested. The policy can also act as a soft deny and provide a link to, or text of, the Corporate Internet Usage policy. Splash pages differ slightly in that they are used for announcements, such as maintenance schedules, or requirements (technical, usage, and so forth) of a Web site, rather than to advise users about a specific URL or URL category. Typically, a link to the originally requested URL is provided for the user, or the page can be set to automatically open the requested URL after a delay. Compliance pages inform the user of corporate Internet access requirements. They are often used to show users, upon first Internet access attempt per day, a Corporate Internet Usage page that requires an affirmative user-click to proceed. After the Corporate Internet Usage page has been viewed once, it may or may not splash future Internet access attempts. How it Works All of these notification policies are implemented by launching the Visual Policy Manager (VPM), configuring a Web Access layer, and then specifying a Destination (the notification trigger), and an Action; optionally, you can also specify a Source, (for a specific user or group) or a Time setting. All of the notification policies described in this document use the Notify User action object. You can change the HTML message for that object; example HTML messages that you can use are included in this document. To launch the VPM, go to Configuration > Policy > Visual Policy Manager and click Launch. To add a Web Access Layer, click Policy in the VPM and select Add Web Access Layer. The HTTP proxy service must be set to intercept traffic. To do this, go to Services > Proxy Services, select the HTTP service, set it to Intercept, and click Apply. For the policies to trigger on HTTPS (SSL) traffic as well, also set the HTTPS proxy service to Intercept. In order to record the user reaction to the notification, access logging must be enabled. To do this, go to the Configuration > General > Access Logging page, select Enable Access Logging, and click Apply.

2 About the Default Proxy Policy On the Management Console Configuration > Policy > Policy Options page you can set the default policy option to Deny or Allow. The two options provide two different approaches; however, as the Notify User action object does not modify the Allow or Deny state, the examples provided will function as expected within existing policy allow/deny settings. For more details on developing effective policies, see the Policy Best Practices tech brief. About the Variables The HTML code examples for the Notify User action in the policies described in this document use a few common variables, defined below. For a full list of variables that may be used in policy messages, see the CPL Guide, Appendix D. Variable $(exception.details) $(exception.contact) $(client.address) $(user) $(url.host) $(categories) Creates A link to the requested URL The name of the originator of the policy The IP Address of the requesting machine The name of the requestor The requested URL The category of the requested URL This document describes the following: Creating Notification Policies How to use a Web access layer policy with the Notify User action to create custom Notification policies and pages. Example Custom Notification Pages Provides the HTML code and the VPM procedure for creating notification policies. Creating Notification Policies This section describes how to create a notification policy to display a coaching, splash, or compliance page for a specific URL, a custom URL category, a URL filtering list category, or all Internet access. How to use the Notify User action object to either allow access to the requested (or an alternate) URL, to invisibly auto-request the URL (to prevent the policy being re-triggered) without requiring any user-interaction, or to auto-redirect to the requested (or an alternate) URL, is described. How to specify the policy for a user, a group, a time of day, or first-time (or any) Internet use is described. There are three parts to defining a notification policy with a Web Access Layer: 1 Defining the notification trigger 2 Optionally, specifying a user, group, and/or time period for the policy 3 Defining the Notify User action setting

3 Defining Notification Triggers The most common conditions used for triggering notification rules are URL based: A custom URL category. When a user attempts to access one of those URLs, they receive the associated coaching page. The page informs the user of the corporate policy for accessing the Web site in question and may include a link allowing access; if the user clicks on the link and proceeds to the Web site, the access is logged. This method is useful for specific instances of coaching, such as allowing or denying access to a list of specific sites. How to define a coaching URL category is described. An installed URL filtering list category (Blue Coat WebFilter, Websense, SmartFilter, etc.). When used this way, a user attempting to access any Web site that falls in the trigger category gets the associated coaching page. Again, the user may or may not be given a link to the trigger Web site. To install a URL filtering list, see the Blue Coat Tech Brief page for specific instructions. A URL condition matching all Internet accesses. This method is useful for bringing up a Corporate Internet Usage compliance page when an employee first attempts to access the Internet through the corporate network. This method is also useful for displaying splash pages, such as maintenance schedules, when any Internet access is attempted. The method described below configures a trigger for any Internet address but exempts internal addresses. Defining a Custom URL Category To define a custom URL category object for use in a coaching policy: 1 Launch the VPM; click Policy > Add Web Access Layer. Name the layer WebAccess_ShopURLs; for example. NOTE: To help maintain scalability, Blue Coat recommends giving relevant names to layers and objects.

4 2 Right-click the Destination setting and select Set. The Set Destination Object dialog displays. 3 Click New and select Request URL Category. The Add Request URL Category Object dialog displays. Name the object RequestURLCategory_ExCoShopUrls; for example. 4 Click the default Policy category. The Add button becomes active. 5 Click Add. An Object Name dialog displays. Name the object ShopURLs; for example, and click OK. The new category displays under the Policy branch. 6 Select the new category and click Edit URLs. The Edit Locally defined category Object dialog displays.

5 7 Enter URLs for the ShopURLs category, one per line. Once all the URLs for this category have been entered, click OK to dismiss the dialog. This custom URL category object is now available for use in any policy. 8 To set the custom URL category object in your policy, select it and click OK to add this Request URL Category object and dismiss the Add Request URL Category Object dialog. The Set Destination dialog re-displays with the custom Request URL Category object that you defined. 9 To use the object in a policy, select it and click OK. Using an Installed URL Filtering List To use an installed URL filtering list in a coaching policy: 1 Launch the VPM; click Policy > Add Web Access Layer. Name the layer WebAccess_WebFilter; for example. 2 Right-click the Destination setting and select Set. The Set Destination Object dialog displays. 3 Click New and select Request URL Category. The Add Request URL Category Object dialog displays. Name the object RequestURLCategory_BlueCoat; for example. 4 Select the installed URL filtering list that you want to use. A list of URL categories displays.

6 5 Select all of the categories that you want for triggers for this policy and click OK to add this Request URL Category object and dismiss the Add Request URL Category Object dialog. The Set Destination dialog re-displays with the Request URL Category object that you defined. 6 To use the object in a policy, select it and click OK. Note: You can use a custom URL category and an installed URL filtering list together. Defining Internet Access To identify Internet access for use in a splash or compliance policy: 1 Launch the VPM; click Policy > Add Web Access Layer. Name the layer; for example, WebAccess_InternetSplash. 2 Right-click the Destination setting and select Set. The Set Destination Object dialog displays. 3 Click New and select Destination IP Address/Subnet. The Add Destination Address Object dialog displays. 4 Enter a subnet pattern to match all internal (non-internet) addresses. Click Add. Click Close to dismiss the dialog. The Set Destination Object dialog re-displays with the newly-defined object.

7 5 Select the new destination object and click OK to set it and dismiss the dialog. 6 Right-Click the newly defined Destination Address object and select Negate to match not IP addresses in the defined internal subnet. In this way, all IP addresses except internal ones trigger the policy.

8 Specifying a User or Group (Optional) For notifications to a specific user or group: Along with the Notify User action described above, configure a Source setting for the particular user or group. Note: If you click New, many additional options display, including the following (most likely to be of use for a notification policy): User: An individual user in the form of a verifiable username or login name. Group: A verifiable group name. Attribute: An LDAP or Radius realm-specific attribute. Note: Some options for this setting require a configured authentication realm in order for the user/group to be identified. Scheduling Notifications (Optional) For scheduled notifications: Along with the Notify User action described above, configure a Time setting. This is used for regular notifications, such as maintenance schedules.

9 Defining the Notify User Action Three ways to define the Notify User action are described: Notify and require acceptance: When triggered, a notification page with a link to the requested URL displays. The user must click the link to satisfy the notification policy. Notify and auto-request: When triggered, a notification page displays; no click is required, the request is made invisibly to the user so the notification page is no longer triggered on future accesses. Notify and auto-redirect: When triggered, a notification page displays; an auto-request occurs and, after a set time period, the requested or an alternate URL automatically proceeds. Notify and Require Acceptance 1 In the Web Access layer previously defined, right-click the Action setting and select Set. The Set Action Object dialog displays. 2 Click New and select Notify User. The Add Notify User Object dialog displays. 3 Name the object CoachSports; for example. Modify the Body text as needed. (examples are provided below) 4 Select a Notify mode: Notify once for all hosts: The notification page is displayed only once for that user; this is often used for configuring compliance pages. This option uses a Virtual Notify URL. You do not need to change this URL; it simply works with the policy to display your notification page. If you must change the URL from the default value, please read the limitation section provided in the online help.

10 Notify only once for related domains: The notify page reappears each time the user visits a new Web site; this is used for configuring coaching pages. Notify on every host: The notify page reappears each time the user visits a new Web host. Note: Blue Coat recommends that only highly experienced administrators employ this option; on some Internet Web sites this option might cause JavaScript errors that impair the functionality of the site. 5 Select a Notify users again time interval: At next browser session: The notification page does not reappear until the next browser session (when a user reboots, logs out, or closes all Web browser windows). After <time interval>: Notification recurs after the specified elapsed time (minutes or hours). After <specified time>: Notification recurs at a specified time and day. NOTE: The time is referenced from the local workstation. If a compliance page is configured, verify the workstations and ProxySG appliance clocks are synchronized. 6 Click OK to add the object. Click OK to set the object. Click Install Policy to finish. Note: The Notify User action generates CPL that might interfere with other policy or cause undesired behavior. Please consider the following: Notifications will conflict with policy that modifies the Cookie request header. Notifications will conflict with policy that modifies the Set-Cookie and P3P response headers. Notification pages exist in the browser history. Therefore, if you click the provided link and are taken to the requested page, and then click Back, you get the notification page again. If you have a chain of SG appliances, with different notification pages configured on each appliance in the chain, then each notification page must have a different object name. Notify and Auto-Request You may want to further discourage access to the requested URL by removing the requested link from the page. In order to do this and not have the notification policy triggered every time access to the page is attempted, modify the code in the Body option of the Notify User object as follows: Replace the Body tag in the Notify User object HTML (Body text option) with: <body onload="accept();var notify_img=new Image(1,1);notify_img.src='$(exception. details)';"> Use the Notify Mode options (described above) to specify how often the policy is triggered. Now, when the notification page displays on a JavaScript enabled browser, there is no need for the user to click a link. The notification policy is not re-triggered because an auto-request was made behind-the-scenes. Notify and Auto-Redirect You can use the same modification described above (for notifications with auto-request) along with a Meta Refresh tag to auto-redirect the splash page to the requested URL. To do this, insert a Meta Refresh tag before the Body tag in the Body text option of the Notify User object, after making the modification described in Notifications with Auto-Request, above. An example specifying a redirect after 10 seconds would be this:

11 <meta http-equiv="refresh" content="10;url=$(url)">. Use the Notify Mode options (described above) to specify how often the policy is triggered. Now, when the notification page displays, there is no need for a link to the requested URL; the browser will automatically proceed after the set time (10 seconds in the example above). The notification policy will not be re-triggered. Note: To auto-direct to an alternate link rather than the requested link, simply replace the $(exception.details) variable in the Meta Refresh tag with the URL that you want to provide. Custom Notification Page Examples This section offers examples of custom notification pages that you can create by copying the HTML provided directly into the Body option of the Notify User object. Four example custom notification pages are provided: Notify and Require Acceptance Coaching Page Example: A coaching page including the requested link. Notify and Auto-Request Splash Page Example: A maintenance schedule splash page with no link. Notify and Auto-Request/Auto-Redirect Splash Page Example: A maintenance schedule splash page with no link but including an auto-redirect to the requested URL. Notify and Require Acceptance Compliance Page Example: A compliance page with an auto-redirect to the requested URL. Note: In the HTML code examples given in this section, the HTML and Head tags are automatically inserted by the policy. Notify and Require Acceptance Coaching Page Example The following illustration depicts a custom coaching page informing the user that the requested site is generally blocked; however, users that have a legitimate reason for accessing the site may click the here link, being forewarned that their activity is being logged. If the user clicks the provided link, they are given access. The HTML source used to define this page is provided below.

12 <body> <p align=center><text align=center><b><span style='color:red'><h2>attention!</h2></ span></b></p> <p><b>access to this website has been barred under company Internet usage policy or to prevent excessive demand conflicting with core business activities. </b></p> <p><b>note:</b> Internet usage is routinely monitored and logged.</p> <p>your IP address: $(client.address)<br> Your username: $(user) <br> The requested URL host is: $(url.host) <br> Which has been categorized as: $(categories) </p> <p>if you have a legitimate reason to access this site please click <a href="$(exception. details)" onclick="accept();">here </a>,<br> or <a href="mailto:support@example.com?subject="barred Web Page" $(url.host) category: $(categories), IP address: $(client.address), User ID: $(user)">employee Services </a> to request a permanent exception.</p> <p><b>warning:</b> Those who ignore this message and persist in repeated attempts to access barred sites are traced and reported to their manager for disciplinary action.</p> </body> To implement this coaching policy with a Web access layer in the VPM: 1 Use either a Request URL or Request URL Category destination object (see Defining Notification Triggers for details). 2 Use the Notify User action object and do the following: a. Paste into the Body option the HTML code given above, modified appropriately. b. Select the Notify only once for related domains option. c. Leave the Notify users again option at the default. To specify a user or group for the policy, add a Source object. To specify a time of day restriction for the policy, add a Time object. Notify and Auto-Request Splash Page Example The following illustration depicts a custom splash page informing the user of significant interrupting events. No link is provided; the user must re-enter the requested link in order to get access. The auto-request ensures that this page displays only once per policy trigger. Note the modified BODY tag at the top. The HTML source used to define this page is provided below.

13 <body onload="accept();var notify_img=new Image(1,1);notify_img.src='$(exception. details)';"> <p align=center><text align=center><b><span style='color:red'><h2>important Notice!</ h2></span></b></p> <p><b>system maintenance is scheduled for Sunday July 17, 2:00-4:00 am EST.</b></p> <p><b>to report any conflicts with the scheduled maintenance, see $(exception.contact)</ b></p> <p><b>please NOTE:</b> Internet usage is routinely monitored and logged.</p> <p>your IP address: $(client.address)<br> Your username: $(user)<br></p> </body> To implement this splash policy with a Web access layer in the VPM: 1 Use a Destination IP Address/Subnet destination object or other appropriate destination object (see Defining Notification Triggers for details). 2 Use the Notify User action object and do the following: a. Paste into the Body option the HTML code given above, modified appropriately. b. Select the Notify once for all hosts option. c. Set the Notify users again option appropriately. To specify a user or group for the policy, add a Source object. To specify a time of day restriction for the policy, add a Time object. Notify, Auto-Request and Auto-Redirect Splash Page Example Here is a similar splash page that auto-redirects the user to the requested URL after a set time period. No link needs to be provided if the browser supports JavaScript. This page may be used as a splash on any Internet access attempt by following the Defining Internet Access procedure. The auto-request ensures that this page displays only once per time period. Note the Meta Refresh tag within the Head tag as well as the modified Body tag. The HTML source used to define this page is provided below. Note: The HTML and Head tags are automatically inserted by the policy; to use the Meta Refresh tag, place it at the top as shown below and the policy will insert it within the Head tags.

14 <meta http-equiv="refresh" content="15;url='$(exception.details)'> <body onload="accept();var notify_img=new Image(1,1);notify_img.src='$(exception. details)';"> <p align=center><text align=center><b><span style='color:red'><h2>important Notice!</ h2></span></b></p> <p><b>system maintenance is scheduled for Sunday July 17, 2:00-4:00 am EST.</b></p> <p><b>to report any conflicts with the scheduled maintenance, see $(exception.contact)</ b></p> <p><b>please NOTE:</b> Internet usage is routinely monitored and logged.</p> <p>your IP address: $(client.address)<br> Your username: $(user)</p> <p>you will be connected in 15 seconds.</p> </body> To implement this splash policy with a Web access layer in the VPM: 1 Use a negated Destination IP Address/Subnet destination object to match the entire Internet; see Defining Internet Access for details. 2 Use the Notify User action object and do the following: a. Paste into the Body option the HTML code given above, modified appropriately. b. Select the Notify once for all hosts option. c. Set the Notify users again option appropriately. To specify a user or group for the policy, add a Source object. To specify a time of day restriction for the policy, add a Time object. Notify and Require Acceptance Compliance Page Example The following illustration depicts a custom compliance page. The link provided connects the user to the requested URL, but requires them to agree to the Corporate Internet Use policy to do so. The HTML source used to define this page is provided below.

15 <body> <p align=center><text align=center><b><span style='color:red'><h2>attention!</h2></ span></b></p> <p><b>you are about to access the Internet from the Example Company Network.</b></p> <p>your IP address: $(client.address)<br> Your username: $(user)<br></p> <p>you must agree to the Example Company Corporate Internet Use policy before accessing the Internet. <br> We have a common-sense Internet use policy. <br> Obscene, foul, or pornographic sites are not to be visited while at work.<br> Personal shopping, browsing, or communications are discouraged.<br> Any abuse of this professional, common sense policy may result in disciplinary action, up to and including termination.<br> Please read the entire policy in the Company Handbook.</p> <p>if you agree to the Corporate Internet Use policy, please click <a href="$(exception.details)" onclick="accept();">i agree</a>, to be connected.<br> <p>for any comments <a href="mailto:support@example.com?subject=corporate Internet Use Policy">Employee Services</a></p> <p><b>please NOTE:</b> Internet usage is routinely monitored and logged.<br> Content filtering and virus scanning are applied. </p> </body> To implement this compliance policy with a Web access layer in the VPM: 1 Use a negated Destination IP Address/Subnet destination object to match the entire Internet; see Defining Internet Access for details. 2 Use the Notify User action object and do the following: a. Paste into the Body option the HTML code given above, modified appropriately. b. Select the Notify once for all hosts option (for the page to display only once per user). c. Leave the Notify users again option at the default. To specify a user or group for the policy, add a Source object. To specify a time of day restriction for the policy, add a Time object. Conclusion The Blue Coat ProxySG provides a security administrator with the ability to notify their user community about access to various Web sites, system maintenance schedules, and Corporate Internet Use policies. Policies can be designed to display only once; for example, upon first Internet access attempt; or at a set interval. Policies can be triggered for only a particular user, user group, or during specific times of day. Blue Coat Systems, Inc. Corporate Headquarters Sunnyvale, CA USA // EMEA Headquarters Hampshire, UK // APAC Headquarters Hong Kong // Copyright 2009 Blue Coat Systems, Inc. All rights reserved worldwide. No part of this document may be reproduced by any means nor translated to any electronic medium without the written consent of Blue Coat Systems, Inc. Specifications are subject to change without notice. Information contained in this document is believed to be accurate and reliable, however, Blue Coat Systems, Inc. assumes no responsibility for its use. Blue Coat, ProxySG, PacketShaper, ProxyClient and BlueSource are registered trademarks of Blue Coat Systems, Inc. in the U.S. and worldwide. All other trademarks mentioned in this document are the property of their respective owners. v.tb-create_notification_policies-v3-0409

Implementing Exception Pages

Implementing Exception Pages Technical Brief: Implementing Exception Pages Implementing Exception Pages SGOS 5 Series Developed using SGOS 5.3.1.4 What are Exception Pages? Exception pages are Web pages (messages sent to users under

More information

Reverse Proxy with SSL - ProxySG Technical Brief

Reverse Proxy with SSL - ProxySG Technical Brief SGOS 5 Series Reverse Proxy with SSL - ProxySG Technical Brief What is Reverse Proxy with SSL? The Blue Coat ProxySG includes the functionality for a robust and flexible reverse proxy solution. In addition

More information

Downloading and Configuring WebFilter

Downloading and Configuring WebFilter Downloading and Configuring WebFilter What is URL Filtering? URL filtering is a type of transaction content filtering that limits a user s Web site access through a policy that is associated with a specific

More information

ProxySG ICAP Integration

ProxySG ICAP Integration ProxySG ICAP Integration Blue Coat s proxies can utilize the Internet Content Adaptation Protocol (ICAP) to hand off HTTP requests and/or responses to an external server for configured processing and transformation.

More information

LDAP Authentication and Authorization

LDAP Authentication and Authorization LDAP Authentication and Authorization What is LDAP Authentication? Today, the network can include elements such as LANs, WANs, an intranet, and the Internet. Many enterprises have turned to centralized

More information

ProxySG TechBrief Enabling Transparent Authentication

ProxySG TechBrief Enabling Transparent Authentication ProxySG TechBrief Enabling Transparent Authentication What is Transparent Authentication? Authentication is a key factor when defining a web access policy. When the Blue Coat ProxyxSG is configured for

More information

Blue Coat Security First Steps Solution for Integrating Authentication

Blue Coat Security First Steps Solution for Integrating Authentication Solution for Integrating Authentication using IWA Direct SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,

More information

ProxySG TechBrief Downloading & Configuring Web Filter

ProxySG TechBrief Downloading & Configuring Web Filter ProxySG TechBrief Downloading & Configuring Web Filter What is Content Filtering? URL filtering is the process of limiting a user s Web site access through a policy that is associated with a specific URL

More information

ProxySG TechBrief Implementing a Reverse Proxy

ProxySG TechBrief Implementing a Reverse Proxy ProxySG TechBrief Implementing a Reverse Proxy What is a reverse proxy? The Blue Coat ProxySG provides the basis for a robust and flexible Web communications solution. In addition to Web policy management,

More information

Blue Coat Security First Steps Solution for Controlling Web Applications

Blue Coat Security First Steps Solution for Controlling Web Applications Blue Coat Security First Steps Solution for Controlling Web Applications SGOS 6.5 Third Party Copyright Notices 2015 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW,

More information

Blue Coat Security First Steps Solution for Controlling HTTPS

Blue Coat Security First Steps Solution for Controlling HTTPS Solution for Controlling HTTPS SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE,

More information

HTTPS HTTP. ProxySG Web Server. Client. ProxySG TechBrief Reverse Proxy with SSL. 1 Technical Brief

HTTPS HTTP. ProxySG Web Server. Client. ProxySG TechBrief Reverse Proxy with SSL. 1 Technical Brief ProxySG TechBrief Reverse Proxy with SSL What is Reverse Proxy with SSL? The Blue Coat ProxySG includes the basis for a robust and flexible reverse proxy solution. In addition to web policy management,

More information

Blue Coat Security First Steps Solution for Integrating Authentication Using LDAP

Blue Coat Security First Steps Solution for Integrating Authentication Using LDAP Solution for Integrating Authentication Using LDAP SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,

More information

ISA Server Plugins Setup Guide

ISA Server Plugins Setup Guide ISA Server Plugins Setup Guide Secure Web (Webwasher) Version 1.3 Copyright 2008 Secure Computing Corporation. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Contact Information. Document Number: 231-02909 Document Revision: SSL Proxy Deployment Guide SGOS 5.1.4

Contact Information. Document Number: 231-02909 Document Revision: SSL Proxy Deployment Guide SGOS 5.1.4 Contact Information Blue Coat Systems Inc. 420 North Mary Ave Sunnyvale, CA 94085-4121 http://www.bluecoat.com/support/contact.html bcs.info@bluecoat.com http://www.bluecoat.com For concerns or feedback

More information

ProxySG TechBrief LDAP Authentication with the ProxySG

ProxySG TechBrief LDAP Authentication with the ProxySG ProxySG TechBrief LDAP Authentication with the ProxySG What is LDAP Authentication? Today, the network can include elements such as LANs, WANs, an intranet, and the Internet. Many enterprises have turned

More information

WatchGuard QMS End User Guide

WatchGuard QMS End User Guide WatchGuard QMS End User Guide WatchGuard QMS Overview The WatchGuard QMS device enables spam messages from the WatchGuard XCS to be directed to a local quarantine area that provides spam storage for each

More information

Blue Coat Security First Steps Transparent Proxy Deployments

Blue Coat Security First Steps Transparent Proxy Deployments Transparent Proxy Deployments SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE,

More information

SuperLumin Nemesis. Administration Guide. February 2011

SuperLumin Nemesis. Administration Guide. February 2011 SuperLumin Nemesis Administration Guide February 2011 SuperLumin Nemesis Legal Notices Information contained in this document is believed to be accurate and reliable. However, SuperLumin assumes no responsibility

More information

Blue Coat Systems. Reference Guide. SSL Proxy. For SGOS 5.3.1

Blue Coat Systems. Reference Guide. SSL Proxy. For SGOS 5.3.1 Blue Coat Systems Reference Guide SSL Proxy For SGOS 5.3.1 Contact Information Blue Coat Systems Inc. 420 North Mary Ave Sunnyvale, CA 94085-4121 http://www.bluecoat.com/support/contactsupport http://www.bluecoat.com

More information

Blue Coat Systems. Reference Guide. SSL Proxy. For SGOS 5.5.x and later

Blue Coat Systems. Reference Guide. SSL Proxy. For SGOS 5.5.x and later Blue Coat Systems Reference Guide SSL Proxy For SGOS 5.5.x and later Contact Information Americas: Blue Coat Systems Inc. 410 North Mary Ave Sunnyvale, CA 94085-4121 Rest of the World: Blue Coat Systems

More information

Using Device Discovery

Using Device Discovery 2 CHAPTER You can use Active Discovery to scan your network for new monitors (Active Monitors and Performance Monitors) and devices on a regular basis. Newly discovered items are added to the Active Discovery

More information

User Identification and Authentication

User Identification and Authentication User Identification and Authentication Vital Security 9.2 Copyright Copyright 1996-2008. Finjan Software Inc.and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included

More information

Blue Coat Security First Steps Solution for Deploying an Explicit Proxy

Blue Coat Security First Steps Solution for Deploying an Explicit Proxy Blue Coat Security First Steps Solution for Deploying an Explicit Proxy SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW,

More information

Sophos Mobile Control Installation guide. Product version: 3

Sophos Mobile Control Installation guide. Product version: 3 Sophos Mobile Control Installation guide Product version: 3 Document date: January 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...16 4 External

More information

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client Astaro Security Gateway V8 Remote Access via L2TP over IPSec Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If

More information

Best Practices for Controlling Skype within the Enterprise. Whitepaper

Best Practices for Controlling Skype within the Enterprise. Whitepaper Best Practices for Controlling Skype within the Enterprise Whitepaper INTRODUCTION Skype (rhymes with ripe ) is a proprietary peer-to-peer (P2P) voice over Internet protocol (VoIP) network, founded by

More information

Deploying Layered Email Security. What is Layered Email Security?

Deploying Layered Email Security. What is Layered Email Security? Deploying Layered Email Security This paper is intended for users of Websense Email Security who want to add Websense Hosted Email Security to deploy a layered email security solution. In this paper: Review

More information

Blue Coat ProxySG Authentication Guide. SGOS 6.5.x

Blue Coat ProxySG Authentication Guide. SGOS 6.5.x Blue Coat ProxySG Authentication Guide SGOS 6.5.x 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE, CROSSBEAM, K9,

More information

vcloud Director User's Guide

vcloud Director User's Guide vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

Content Filtering Client Policy & Reporting Administrator s Guide

Content Filtering Client Policy & Reporting Administrator s Guide Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION

More information

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see

More information

CA Technologies SiteMinder

CA Technologies SiteMinder CA Technologies SiteMinder Agent for Microsoft SharePoint r12.0 Second Edition This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to

More information

MadCap Software. Upgrading Guide. Pulse

MadCap Software. Upgrading Guide. Pulse MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished

More information

Executive Summary. What is Authentication, Authorization, and Accounting? Why should I perform Authentication, Authorization, and Accounting?

Executive Summary. What is Authentication, Authorization, and Accounting? Why should I perform Authentication, Authorization, and Accounting? Executive Summary As the leader in Wide Area Application Delivery, Blue Coat products accelerate and secure applications within your WAN and across the Internet. Blue Coat provides a robust and flexible

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep the sole right to

More information

Threat Containment for Facebook

Threat Containment for Facebook Threat Containment for Facebook Based on statistics for more than 62M users in 2009, the Blue Coat WebPulse cloud service ranked social networking as the number one most requested web category, surpassing

More information

SonicWALL Email Security Quick Start Guide. Version 4.6

SonicWALL Email Security Quick Start Guide. Version 4.6 SonicWALL Email Security Quick Start Guide Version 4.6 Quick Start Guide - Introduction This document guides you through the most basic steps to set up and administer SonicWALL Email Security. For more

More information

Cloud Director User's Guide

Cloud Director User's Guide Cloud Director 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this

More information

SSL Proxy Deployment Guide

SSL Proxy Deployment Guide SSL Proxy Deployment Guide SGOS 6.5 and later Version: 02-07.14.15 - 2 - Copyrights 2015 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS,

More information

Deploying NetScaler Gateway in ICA Proxy Mode

Deploying NetScaler Gateway in ICA Proxy Mode Deploying NetScaler Gateway in ICA Proxy Mode Deployment Guide This deployment guide defines the configuration required for using the NetScaler Gateway in ICA Proxy Mode. Table of Contents Introduction

More information

M86 Web Filter USER GUIDE for M86 Mobile Security Client. Software Version: 5.0.00 Document Version: 02.01.12

M86 Web Filter USER GUIDE for M86 Mobile Security Client. Software Version: 5.0.00 Document Version: 02.01.12 M86 Web Filter USER GUIDE for M86 Mobile Security Client Software Version: 5.0.00 Document Version: 02.01.12 M86 WEB FILTER USER GUIDE FOR M86 MOBILE SECURITY CLIENT 2012 M86 Security All rights reserved.

More information

Blue Coat Security First Steps Solution for Recording and Reporting Employee Web Activity

Blue Coat Security First Steps Solution for Recording and Reporting Employee Web Activity Solution for Recording and Reporting Employee Web Activity SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,

More information

Sophos Mobile Control as a Service Startup guide. Product version: 3.5

Sophos Mobile Control as a Service Startup guide. Product version: 3.5 Sophos Mobile Control as a Service Startup guide Product version: 3.5 Document date: August 2013 Contents 1 About this guide...3 2 What are the key steps?...4 3 First login...5 4 Change your administrator

More information

Novell Filr 1.0.x Mobile App Quick Start

Novell Filr 1.0.x Mobile App Quick Start Novell Filr 1.0.x Mobile App Quick Start February 2014 Novell Quick Start Novell Filr allows you to easily access all your files and folders from your desktop, browser, or a mobile device. In addition,

More information

Google Apps Deployment Guide

Google Apps Deployment Guide CENTRIFY DEPLOYMENT GUIDE Google Apps Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of your corporate

More information

SmartLink for Lotus Notes User Guide

SmartLink for Lotus Notes User Guide SmartLink for Lotus Notes User Guide Copyright 1998-2006 E-Z Data, Inc. All Rights Reserved No part of this documentation may be copied, reproduced, or translated in any form without the prior written

More information

Virtual Data Centre. User Guide

Virtual Data Centre. User Guide Virtual Data Centre User Guide 2 P age Table of Contents Getting Started with vcloud Director... 8 1. Understanding vcloud Director... 8 2. Log In to the Web Console... 9 3. Using vcloud Director... 10

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

Virtual Web Appliance Setup Guide

Virtual Web Appliance Setup Guide Virtual Web Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance This guide describes the procedures for installing a Virtual Web Appliance. If you are installing

More information

Snare for Firefox Snare Agent for the Firefox Browser

Snare for Firefox Snare Agent for the Firefox Browser Snare Agent for the Firefox Browser InterSect Alliance International Pty Ltd Page 1 of 11 Intersect Alliance International Pty Ltd. All rights reserved worldwide. Intersect Alliance Pty Ltd shall not be

More information

IWA AUTHENTICATION FUNDAMENTALS AND DEPLOYMENT GUIDELINES

IWA AUTHENTICATION FUNDAMENTALS AND DEPLOYMENT GUIDELINES IWA AUTHENTICATION FUNDAMENTALS AND DEPLOYMENT GUIDELINES TECHNICAL BRIEF INTRODUCTION The purpose of this document is to explain how Integrated Windows Authentication (IWA) works with the ProxySG appliance,

More information

www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013

www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,

More information

SSL VPN. Virtual Appliance Installation Guide. Virtual Private Networks

SSL VPN. Virtual Appliance Installation Guide. Virtual Private Networks SSL VPN Virtual Appliance Installation Guide Virtual Private Networks C ONTENTS Introduction... 2 Installing the Virtual Appliance... 2 Configuring Appliance Operating System Settings... 3 Setting up the

More information

Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01

Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01 Secure Web Service - Hybrid Policy Server Setup Release 9.2.5 Manual Version 1.01 M86 SECURITY WEB SERVICE HYBRID QUICK START USER GUIDE 2010 M86 Security All rights reserved. 828 W. Taft Ave., Orange,

More information

Deploying the SSL Proxy

Deploying the SSL Proxy Blue Coat Systems Deployment Guide Deploying the SSL Proxy For SGOS 5.1.4 Contact Information Blue Coat Systems Inc. 420 North Mary Ave Sunnyvale, CA 94085-4121 http://www.bluecoat.com/support/contact.html

More information

CA Unified Infrastructure Management Server

CA Unified Infrastructure Management Server CA Unified Infrastructure Management Server CA UIM Server Configuration Guide 8.0 Document Revision History Version Date Changes 8.0 September 2014 Rebranded for UIM 8.0. 7.6 June 2014 No revisions for

More information

To begin, visit this URL: http://www.ibm.com/software/rational/products/rdp

To begin, visit this URL: http://www.ibm.com/software/rational/products/rdp Rational Developer for Power (RDp) Trial Download and Installation Instructions Notes You should complete the following instructions using Internet Explorer or Firefox with Java enabled. You should disable

More information

Virtual Managment Appliance Setup Guide

Virtual Managment Appliance Setup Guide Virtual Managment Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance As an alternative to the hardware-based version of the Sophos Web Appliance, you can deploy

More information

BlackShield ID Agent for Remote Web Workplace

BlackShield ID Agent for Remote Web Workplace Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,

More information

Novell Identity Manager

Novell Identity Manager AUTHORIZED DOCUMENTATION Manual Task Service Driver Implementation Guide Novell Identity Manager 4.0.1 April 15, 2011 www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with

More information

Sophos Mobile Control Installation guide. Product version: 3.5

Sophos Mobile Control Installation guide. Product version: 3.5 Sophos Mobile Control Installation guide Product version: 3.5 Document date: July 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...10 4 External

More information

Windows Server Update Services 3.0 SP2 Step By Step Guide

Windows Server Update Services 3.0 SP2 Step By Step Guide Windows Server Update Services 3.0 SP2 Step By Step Guide Microsoft Corporation Author: Anita Taylor Editor: Theresa Haynie Abstract This guide provides detailed instructions for installing Windows Server

More information

LogLogic Blue Coat ProxySG Syslog Log Configuration Guide

LogLogic Blue Coat ProxySG Syslog Log Configuration Guide LogLogic Blue Coat ProxySG Syslog Log Configuration Guide Document Release: September 2011 Part Number: LL600070-00ELS100000 This manual supports LogLogic Blue Coat ProxySG Release 1.0 and later, and LogLogic

More information

Integrated Cloud Environment Box User s Guide

Integrated Cloud Environment Box User s Guide Integrated Cloud Environment Box User s Guide 2012-2015 Ricoh Americas Corporation It is the reader's responsibility when discussing the information contained this document to maintain a level of confidentiality

More information

Setting Up Scan to SMB on TaskALFA series MFP s.

Setting Up Scan to SMB on TaskALFA series MFP s. Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

1 You will need the following items to get started:

1 You will need the following items to get started: QUICKSTART GUIDE 1 Getting Started You will need the following items to get started: A desktop or laptop computer Two ethernet cables (one ethernet cable is shipped with the _ Blocker, and you must provide

More information

STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS

STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS Notes: STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS 1. The installation of the STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation

More information

DEPLOYMENT GUIDE Version 1.0. Deploying F5 with the Oracle Fusion Middleware SOA Suite 11gR1

DEPLOYMENT GUIDE Version 1.0. Deploying F5 with the Oracle Fusion Middleware SOA Suite 11gR1 DEPLOYMENT GUIDE Version 1.0 Deploying F5 with the Oracle Fusion Middleware SOA Suite 11gR1 Introducing the F5 and Oracle Fusion Middleware SOA Suite configuration Welcome to the F5 and Oracle Fusion Middleware

More information

How to Configure a Secure Connection to Microsoft SQL Server

How to Configure a Secure Connection to Microsoft SQL Server How to Configure a Secure Connection to Microsoft SQL Server 1993-2015 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying,

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies C 2001-2003 Kerio Technologies. All Rights Reserved. Printing Date: December 17, 2003 This guide provides detailed description on configuration of the local

More information

Siteminder Integration Guide

Siteminder Integration Guide Integrating Siteminder with SA SA - Siteminder Integration Guide Abstract The Junos Pulse Secure Access (SA) platform supports the Netegrity Siteminder authentication and authorization server along with

More information

CA Performance Center

CA Performance Center CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

LogLogic Cisco IPS Log Configuration Guide

LogLogic Cisco IPS Log Configuration Guide LogLogic Cisco IPS Log Configuration Guide Document Release: March 2011 Part Number: LL600072-00ELS090000 This manual supports LogLogic Cisco IPS Release 1.0 and later, and LogLogic Software Release 4.9.1

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Setting Up SSL on IIS6 for MEGA Advisor

Setting Up SSL on IIS6 for MEGA Advisor Setting Up SSL on IIS6 for MEGA Advisor Revised: July 5, 2012 Created: February 1, 2008 Author: Melinda BODROGI CONTENTS Contents... 2 Principle... 3 Requirements... 4 Install the certification authority

More information

Avalanche Site Edition

Avalanche Site Edition Avalanche Site Edition Version 4.8 avse ug 48 20090325 Revised 03/20/2009 ii Copyright 2008 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite 335 Midvale,

More information

Proxy Forwarding Access Method

Proxy Forwarding Access Method Proxy Forwarding Access Method Version 6.8.5/Doc Revision: 02/26/16 Blue Coat Web Security Service/Page 2 Proxy Fowarding Access Method/Page 3 Copyrights 2016 Blue Coat Systems, Inc.All rights reserved.

More information

Reverse Proxy Deployment Guide

Reverse Proxy Deployment Guide Reverse Proxy Deployment Guide PDF of the Online WebGuide SGOS 6.5.x and Later Third Party Copyright Notices 2015 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW,

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

MultiSite Manager. Setup Guide

MultiSite Manager. Setup Guide MultiSite Manager Setup Guide Contents 1. Introduction... 2 How MultiSite Manager works... 2 How MultiSite Manager is implemented... 2 2. MultiSite Manager requirements... 3 Operating System requirements...

More information

Setting up VMware ESXi for 2X VirtualDesktopServer Manual

Setting up VMware ESXi for 2X VirtualDesktopServer Manual Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

RoomWizard Synchronization Software Manual Installation Instructions

RoomWizard Synchronization Software Manual Installation Instructions 2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System

More information

Sage 200 Web Time & Expenses Guide

Sage 200 Web Time & Expenses Guide Sage 200 Web Time & Expenses Guide Sage (UK) Limited Copyright Statement Sage (UK) Limited, 2006. All rights reserved If this documentation includes advice or information relating to any matter other than

More information

HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE

HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means

More information

Integrated Cloud Environment Scan to Oracle Cloud User s Guide

Integrated Cloud Environment Scan to Oracle Cloud User s Guide Integrated Cloud Environment Scan to Oracle Cloud User s Guide 2012-2015 Ricoh Americas Corporation It is the reader's responsibility when discussing the information contained this document to maintain

More information

Software Version 1.0 ConnectKey TM Share to Cloud April 2013. Xerox ConnectKey Share to Cloud User / Administrator s Guide

Software Version 1.0 ConnectKey TM Share to Cloud April 2013. Xerox ConnectKey Share to Cloud User / Administrator s Guide Software Version 1.0 ConnectKey TM Share to Cloud April 2013 Xerox ConnectKey Share to Cloud User / Administrator s Guide 2013 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, and Xerox

More information

DIGIPASS Authentication for Check Point Security Gateways

DIGIPASS Authentication for Check Point Security Gateways DIGIPASS Authentication for Check Point Security Gateways With IDENTIKEY Server 2009 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 38 Disclaimer Disclaimer of Warranties and

More information

Proxy Forwarding Access Method

Proxy Forwarding Access Method Proxy Forwarding Access Method Version 6.8.3/Doc Revision: 12/17/15 Blue Coat Web Security Service Proxy Fowarding Access Method Copyrights 2015 Blue Coat Systems, Inc.All rights reserved. BLUE COAT, PROXYSG,

More information

CA Spectrum and CA Embedded Entitlements Manager

CA Spectrum and CA Embedded Entitlements Manager CA Spectrum and CA Embedded Entitlements Manager Integration Guide CA Spectrum Release 9.4 - CA Embedded Entitlements Manager This Documentation, which includes embedded help systems and electronically

More information

www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012

www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

Blue Coat Systems. Client Manager Redundancy for ProxyClient Deployments

Blue Coat Systems. Client Manager Redundancy for ProxyClient Deployments Blue Coat Systems Client Manager Redundancy for ProxyClient Deployments Copyright 1999-2013 Blue Coat Systems, Inc. All rights reserved worldwide. No part of this document may be reproduced by any means

More information

Set Up a VM-Series Firewall on the Citrix SDX Server

Set Up a VM-Series Firewall on the Citrix SDX Server Set Up a VM-Series Firewall on the Citrix SDX Server Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa

More information

App Orchestration 2.5

App Orchestration 2.5 Configuring NetScaler 10.5 Load Balancing with StoreFront 2.5.2 and NetScaler Gateway for Prepared by: James Richards Last Updated: August 20, 2014 Contents Introduction... 3 Configure the NetScaler load

More information

Blue Coat Security First Steps. Solution for HTTP Object Caching

Blue Coat Security First Steps. Solution for HTTP Object Caching Solution for HTTP Object Caching Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE, CROSSBEAM,

More information

Secure Web Appliance. SSL Intercept

Secure Web Appliance. SSL Intercept Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...

More information

Manufacturing Representative SSL VDM Login User s Guide

Manufacturing Representative SSL VDM Login User s Guide June 12 2008 Ver. 1.5 KEMET Corporation Manufacturing Representative SSL VDM Login User s Guide This document is a guide to assist a Manufacturing Representative (MFG REP) to connect and login to the SSL

More information

Aventail Connect Client with Smart Tunneling

Aventail Connect Client with Smart Tunneling Aventail Connect Client with Smart Tunneling User s Guide Windows v8.7.0 1996-2006 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile,

More information

Agent Configuration Guide

Agent Configuration Guide SafeNet Authentication Service Agent Configuration Guide SAS Agent for Microsoft Internet Information Services (IIS) Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright

More information