This slide deck takes you through the role and architecture of the ProxyClient as an add-on solution that meets the application delivery and security
|
|
- Bernice Underwood
- 7 years ago
- Views:
Transcription
1 This slide deck takes you through the role and architecture of the ProxyClient as an add-on solution that meets the application delivery and security needs in your network. Each slide presents the important points and the notes elaborate on the topics that need more discussion. This slide deck is not a whitepaper. 1
2 2
3 3
4 Blue Coat ProxyClient is a client-based platform that extends IT s sphere of influence beyond the traditional physical boundaries of the enterprise. It is part of Blue Coat s overall enterprise solution for application delivery that interconnects with Blue Coat s ProxySG appliances to provide application acceleration and/or security for all users whether at headquarters, regional and branch offices, on the road, or at home. With the ProxySG appliance running Blue Coat s 5-part Multiprotocol Accelerated Caching Hierarchy (MACH5) edition license, the ProxyClient leverages the MACH5 technology to optimize data, video, cloud and web applications in IPv4, IPv6 or mixed environments. The MACH5 technology combines protocol acceleration, compression, object and byte caching and QoS to help accelerate key applications such as file access, , web, storage replication and backup; it accelerates a wide array of applications including internally and externally-hosted encrypted applications. When used for security (with the Proxy Edition license on the ProxySG appliance), the ProxyClient offers proactive protection from Web threats using Blue Coat WebPulse. WebPulse provides immediate cloud analysis of new or recently compromised Web links using proactive machine analysis, multiple anti-malware engines, and/or Web hunters. Location awareness enables administrators to improve efficiency and make intelligent use of the ProxySG appliances in the network by enabling or disabling ProxyClient acceleration and Web filtering functionality based on a user s location. For example, the administrator can disable both acceleration and Web filtering when a user is in the office and a local ProxySG is available to perform those functions. Conversely, both acceleration and Web filtering are enabled for mobile users when there is no local ProxySG to perform those functions. The ProxyClient application automatically detects its location by matching a combination of IP address, virtual NIC IP address, and DNS server address as configured by the ProxySG administrator. Finally, using the Blue Coat Reporter, you can create centralized reports and drill down into remote client Web activities to meet HR and IT requirements. You can also use these reports to further refine the Web access rules for your network, as 4
5 needed. 4
6 To provide remote Web control (block applications and Web content) and LAN-like response for applications to your remote users, your Application Delivery Network (ADN) requires the framework/components listed above. To understand how the Blue Coat ADN works, refer to the ADN Overview slides in this deck. 5
7 6
8 The ProxyClient software is installed using a Microsoft installer (ProxyClientSetup.msi) on a Windows client and using a MAC installer (ProxyClientSetup.bsx) on a Mac client. The installer installs the ProxyClient application service and the drivers the Web filter driver and the acceleration driver. The Web filter driver does the following: Intercepts HTTP and HTTPS connections Parses out HTTP URLs Forwards URLs to URL rating service The Acceleration driver does the following: Intercepts all the TCP connections Redirects the connections to proxy service based on routing policy The Tray icon Retrieves ProxyClient service status for local web server Displays the key status events 7
9 This is the architecture of the ProxyClient Service. The function of each component is described below: Service manager Starts, stops and monitors the service Client Manager (CM) service Communicates with the ProxyClient Client Manager for software, policy and status updates URL rating service Communicates with the WebPulse (Dynamic Real Time Rating) service Proxy service Proxies TCP connections based on the routing policy CIFS proxy service Protocol optimization Object caching ADN service Manages ADN tunnels and byte cache Local Web server Serves status, statistics and log entries to browser UI and tray icon Serves exception pages to Web filter module Logging service Collects and uploads logs 8
10 Support for MacOS was introduced in ProxyClient 3.4 9
11 When the ProxyClient is removed from a user's system, all installed software, drivers and supported files are removed. The removal process marks the files for removal upon reboot; and the files are automatically removed when the system is restarted. 10
12 11
13 For servicing the needs of remote users (ProxyClients) in your ADN, you need a ProxyClient Manager, an ADN Manager and an ADN Concentrator. The role that each device plays on your network is listed below: The ProxyClient Manager provides the following services: Software for the client (initial deployment and updates). The Client Manager hosts the software binaries that users can download and automatically informs users when updates are unavailable. The ProxyClient also periodically polls the ProxyClient Manager on port 8084 for configuration and software updates Periodic verification of the Blue Coat Web Filter (BCWF) license and database (required to use BCWF) Monitoring Client configuration management (such as Web filtering policy) The ADN manager publishes routes advertised by the AND Concentrator(s) on the network. The ProxyClient maintains a management session with the ADN manager on port This session is used to receive ADN routing table updates and the ProxyClient uses this information to route traffic to the appropriate ADN Concentrator and retrieve content from the server. The ADN Concentrator must advertise the subnets to which it is connected so that the ADN peers (other ProxySG appliances and ProxyClients) can establish connections with it. When a ProxyClient connects to an ADN Concentrator, it connects to the physical IP of the Concentrator and uses port 3035 (the default) as the destination port. If the same appliance is used for the proxy features and as the ADN Concentrator: you must use a Virtual IP for the proxy service(s) and it must be different from the IP of the physical interface. the Concentrator s IP address is displayed as the source IP in the logs and in policy. Note: Although you can elect to use one appliance to function both as an ADN Manager and as a ProxyClient Manager, the ADN
14 Concentrator is best when configured as a standalone appliance. 12
15 13
16 In conjunction with the ProxySG, the ProxyClient accelerates a wide array of applications, including internally and externally-hosted encrypted applications. The devices combine protocol acceleration, compression, object and byte caching, and QoS to help accelerate key applications such as file access, , web, storage replication and backup. When used for acceleration, the ProxyClient receives the following Acceleration configuration from the Client Manager: Which application port to optimize Which CIFS specific acceleration features to use Location awareness: where the ProxyClient needs to be activated for both acceleration and Web filtering Automatic updates 14
17 When a ProxyClient at the edge communicates with a ProxySG appliance/adn Concentrator at the core, the communication takes place over a connection called an ADN tunnel. This ADN tunnel accelerates and optimizes traffic between the two devices. For example, when a user requests a file, the VPN on the client machine (with ProxyClient installed) connects to the VPN firewall, which then connects to the ProxySG appliance/adn Concentrator at the data center. The connection between the ProxyClient and the ProxySG is an ADN tunnel that uses the IP address of the ProxySG on port This ADN tunnel accelerates and optimizes the request and response between the user and server. 15
18 This slide explains how the first-time connection happens and the AND tunnel is formed to accelerate and optimize data. The ProxyClient always connects explicitly to the ADN Manager/Concentrator. When a client requests data from a file server, the first-time connection occurs as follows: 1. TCP Connect 2. ADN Connect 3. Client request 4. Server response with the data requested by the client 16
19 A proxy service is a logical grouping of traffic flows that share the same characteristics, such as a specific application or protocol such as CIFS or HTTP. To manage a particular type of traffic, ProxySG/ProxyClient must detect and intercept the service for that traffic and perform specified actions to route/ optimize and accelerate the flow. If the proxy services are enabled, the ProxyClient redirects the client request to the appropriate proxy based on the configuration. The ProxyClient refers to the network routing information that the ADN Manager advertised to it and redirects the connection to the appropriate ADN Concentrator to access the file server and service the request. If for example, the client opens a CIFS file share, the ProxyClient enables the CIFS proxy to optimize and accelerate the ensuing traffic. The CIFS proxy accelerates file shares located on remote servers by byte caching, which is locally caching regions of files that are read or written by the client; The CIFS proxy also performs object caching for both read and write file activities. Note: Both SMBv1 and v2 are supported, but protocol optimization and object caching limitations may apply to SMBv2 connections. 17
20 18
21 Most organizations have an acceptable use policy that governs the use of the Internet but they lack the ability to enforce these policies outside of a LAN. Blue Coat ProxyClient extends the enforcement of the enterprise policy and enables a single policy to cover all users, regardless of where they connect to the Internet. The ProxyClient connects the user to the Blue Coat WebFilter (BCWF) ecosystem that continually tracks, evaluates and dynamically rates millions of websites every day. Thus, once the user leaves the sphere of control created by the corporate secure gateway, he/she remains protected from Internet threats such as spyware and phishing and are in compliance with corporate policy on accessing or downloading applications and executable content. Thereby, the ProxyClient ensures productivity and risk management for users outside the LAN. To use Web filtering, the ProxyClient Client Manager must have a valid BCWF license. The Client Manager is a ProxySG appliance that provides the management infrastructure to ProxyClients. It can be any appliance in the ADN network, including an ADN Concentrator, the ADN Manager, or a backup manager. Commonly, the Client Manager appliance is deployed in the intranet behind the enterprise VPN gateway, with a router connection to the Internet. When used for security, the Client Manager must: Have the Proxy Edition license for the content filtering functionality; Blue Coat Web Filter must be enabled and the database downloaded to the device. Be accessible to ProxyClients directly on the Internet (Port 8084) or via VPN to periodically to check for filtering configuration changes; by default the client polls the manager every two hours. To meet HR and IT requirements, you can upload logs from the user s machine to the Blue Coat Reporter, and then create 19
22 centralized reports and drill downs into the Web activities of the remote user. 19
23 When a user requests Web content, the client machine with ProxyClient installed, sends the request to the WebPulse service. However, to determine the rules that should apply for the requested content (whether to block or allow the content) the ProxyClient depends on the Client manager. For example, if WebPulse categorizes the content as Social Networking, ProxyClient uses the Web access policy rules that it received from the Client Manager to determine whether or not the user is allowed to view the requested content. 20
24 21
25 22
26 WAN optimization is a set of technologies for accelerating, compressing, and securing application traffic across distributed network environments. The Application Delivery Network (ADN) is the core of Blue Coat s WAN optimization solution; it defines the framework that enables application acceleration between various corporate offices and endpoints separated by a WAN. In an ADN, ProxySG appliances are integrated into the network in different roles to provide visibility, acceleration, and control for all TCP (and UDP streaming) traffic sent over the WAN, including Web (HTTP), secure Web (SSL), file sharing (CIFS), Microsoft Outlook/Exchange (MAPI), DNS, live and on-demand streaming (RTSP, MMS, streaming over HTTP) traffic, and TCP-based applications. 23
27 An optimal ADN network will have the following devices: Branch or Edge Peers: The ProxySG appliances or ProxyClients that are placed in the local branch or endpoint to create ADN tunnels that can optimize traffic over the WAN; Typically the ADN Concentrator is placed in the datacenter or core and it terminates ADN connections. When a client makes a request, an ADN tunnel is formed between the local ProxySG appliance that the client is behind and the ProxySG appliance that fronts the server that hosts the requested content or between the ProxyClient and a ProxySG appliance that fronts the server that hosts the requested content. The ProxySG appliance closer to the server that hosts the content, terminates the connection, unoptimizes the data and serves the client s request. The content is then optimized and served back to the client over the ADN tunnel. ADN Manager: A ProxySG appliance that is responsible for publishing the routing table to ProxyClients and to other ProxySG appliances that serve as ADN peers. The ADN routing table specifies the ProxyClients and the ProxySG appliances that are available for routing traffic through the WAN for acceleration and optimization. ProxyClient Manager: A Client Manager is a ProxySG appliance that provides the management infrastructure to ProxyClients. The ProxyClient depends on the Client Manager for route information that enables it to form ADN tunnels and accelerate network traffic. The ProxyClient connects directly to the IP address of the advertised ProxySG appliance that fronts the content servers from which the user wishes to access or retrieve content. 24
28 To understand the role of the ADN Manager and the process that is uses to publish routes to ProxyClients and other ProxySG appliances that serve as ADN peers, see the network diagram above. The next 3 slides take you through the process of how the peer database on each device is populated so that the traffic can be accelerated and/or optimized to deliver the best user experience. In this network diagram, keep the following details in mind: SN 9999 is the ADN Manager SN 2000 fronts the file server and functions as an ADN Concentrator that terminates requests made to the file server SN 1001 is a Branch Peer SN Px 2002 and Px 3003 are remote users that have ProxyClient installed on their laptops Note: An ADN Manager is not required for all ADN deployments; It is required for a ADN with ProxyClients. 25
29 After you complete the configuration to define the appliance with IP as the ADN Manager, the serial number of the appliance (9999) is automatically added to its routing table. On the ADN Concentrator (SN 2000), after you configure the IP address of the ADN Manager, the appliance first adds its own serial number to its routing table and then sends its SN to the ADN Manager. The ADN Manager then adds the SN to its routing table and reciprocates with its SN. This process creates a mutual entry on the routing table for both devices. 26
30 Next when you configure the ADN Manager on the branch peer with SN 1001, it sends its SN number information to the ADN Manager which then appends the SN to its routing table and then it publishes its updated routing information to the devices it manages concentrator and the branch peer. 27
31 The same update process happens with the ProxyClients. The ADN Manager receives information on the SN of the ProxyClients on the network and updates its routing table to reflect the most current list of devices it manages. While the ADN Manager maintains a list of all managed devices, the routing table on the individual appliances only contains information on other appliances (and not ProxyClients), and each ProxyClient has a list of itself and all other appliances managed by the ADN Manager. 28
32 29
33 30
34 The ProxyClient requires an explicit ADN deployment. That is there must be an ADN Manager that publishes routes advertised by the ADN Concentrator(s) on the network; the ADN Concentrator must advertise the subnets to which it is connected so that the ADN Branch peers can establish connections with it. In the example above, after you configure the ADN Concentrator to advertise the subnets that its serves, the sequence of events is as follows: 1: The Concentrator advertises the routing information on the server subnets that it services to the ADN Manager. 2. The ADN Manager publishes the server subnet information along with the IP address of the Concentrator to which the devices must connect to access the file servers serviced by the Concentrator. 3. When a user requests content from file server , the ProxyClient (installed on the client machine) establishes an ADN connection to the ADN Concentrator with IP
35 32
Blue Coat Systems ProxySG Appliance
Blue Coat Systems ProxySG Appliance Configuration and Management Suite Volume 5: Advanced Networking Version SGOS 5.3.x Volume 5: Advanced Networking Contact Information Blue Coat Systems Inc. 420 North
More informationCourse Syllabus. Fundamentals of Windows Server 2008 Network and Applications Infrastructure. Key Data. Audience. Prerequisites. At Course Completion
Key Data Product #: 3380 Course #: 6420A Number of Days: 5 Format: Certification Exams: Instructor-Led None This course syllabus should be used to determine whether the course is appropriate for the students,
More informationDownloading and Configuring WebFilter
Downloading and Configuring WebFilter What is URL Filtering? URL filtering is a type of transaction content filtering that limits a user s Web site access through a policy that is associated with a specific
More informationBlue Coat Security First Steps Solution for Deploying an Explicit Proxy
Blue Coat Security First Steps Solution for Deploying an Explicit Proxy SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW,
More informationDEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services
DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services Table of Contents Table of Contents Using the BIG-IP Edge Gateway for layered security and
More informationMasters Project Proxy SG
Masters Project Proxy SG Group Members Chris Candilora Cortland Clater Eric Garner Justin Jones Blue Coat Products Proxy SG Series Blue Coat Proxy SG appliances offer a comprehensive foundation for the
More informationWAN OPTIMIZATION FOR MICROSOFT SHAREPOINT BPOS
WHITEPAPER EXECUTIVE SUMMARY Microsoft SharePoint is a web-based collaboration and information-sharing platform designed as a centralized replacement for multiple web applications. SharePoint leverages
More informationChapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN
More informationBlue Coat Systems. Client Manager Redundancy for ProxyClient Deployments
Blue Coat Systems Client Manager Redundancy for ProxyClient Deployments Copyright 1999-2013 Blue Coat Systems, Inc. All rights reserved worldwide. No part of this document may be reproduced by any means
More informationVPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu
VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
More informationReverse Proxy with SSL - ProxySG Technical Brief
SGOS 5 Series Reverse Proxy with SSL - ProxySG Technical Brief What is Reverse Proxy with SSL? The Blue Coat ProxySG includes the functionality for a robust and flexible reverse proxy solution. In addition
More informationHow To Configure SSL VPN in Cyberoam
How To Configure SSL VPN in Cyberoam Applicable Version: 10.00 onwards Overview SSL (Secure Socket Layer) VPN provides simple-to-use, secure access for remote users to the corporate network from anywhere,
More informationBlue Coat Security First Steps Transparent Proxy Deployments
Transparent Proxy Deployments SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE,
More informationBlue Coat Security First Steps Solution for Controlling Web Applications
Blue Coat Security First Steps Solution for Controlling Web Applications SGOS 6.5 Third Party Copyright Notices 2015 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW,
More informationUsing IPsec VPN to provide communication between offices
Using IPsec VPN to provide communication between offices This example provides secure, transparent communication between two FortiGates located at different offices using route-based IPsec VPN. In this
More informationFirewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
More informationSSL Inspection Step-by-Step Guide. June 6, 2016
SSL Inspection Step-by-Step Guide June 6, 2016 Key Drivers for Inspecting Outbound SSL Traffic Eliminate blind spots of SSL encrypted communication to/from the enterprise Maintaining information s communication
More informationBlue Coat Security First Steps Solution for Streaming Media
Blue Coat Security First Steps Solution for Streaming Media SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
More informationProxySG TechBrief Implementing a Reverse Proxy
ProxySG TechBrief Implementing a Reverse Proxy What is a reverse proxy? The Blue Coat ProxySG provides the basis for a robust and flexible Web communications solution. In addition to Web policy management,
More informationMcAfee Web Gateway Administration Intel Security Education Services Administration Course Training
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction
More informationQuick Start for Network Agent. 5-Step Quick Start. What is Network Agent?
What is Network Agent? Websense Network Agent software monitors all internet traffic on the machines that you assign to it. Network Agent filters HTTP traffic and more than 70 other popular internet protocols,
More informationDEPLOYMENT GUIDE. Deploying F5 for High Availability and Scalability of Microsoft Dynamics 4.0
DEPLOYMENT GUIDE Deploying F5 for High Availability and Scalability of Microsoft Dynamics 4.0 Introducing the F5 and Microsoft Dynamics CRM configuration Microsoft Dynamics CRM is a full customer relationship
More informationWAN Optimization for Microsoft SharePoint BPOS >
White Paper WAN Optimization for Microsoft SharePoint BPOS > Best Practices Table of Contents Executive Summary 2 Introduction 3 SharePoint BPOS performance: Managing challenges 4 SharePoint 2007: Internal
More informationDigi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering
Introduction Digi Connect Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering The Digi Connect supports five features which provide security and IP traffic forwarding when using incoming
More informationContact Information. Document Number: 231-02909 Document Revision: SSL Proxy Deployment Guide SGOS 5.1.4
Contact Information Blue Coat Systems Inc. 420 North Mary Ave Sunnyvale, CA 94085-4121 http://www.bluecoat.com/support/contact.html bcs.info@bluecoat.com http://www.bluecoat.com For concerns or feedback
More informationBlue Coat Systems SG Appliance
Blue Coat Systems SG Appliance Configuration and Management Guide Volume 6: Advanced Networking Version SGOS 5.1.x Volume 6: Advanced Networking Contact Information Blue Coat Systems Inc. 420 North Mary
More informationFundamentals of Windows Server 2008 Network and Applications Infrastructure
Fundamentals of Windows Server 2008 Network and Applications Infrastructure MOC6420 About this Course This five-day instructor-led course introduces students to network and applications infrastructure
More informationA TECHNICAL REVIEW OF CACHING TECHNOLOGIES
WHITEPAPER Over the past 10 years, the use of applications to enable business processes has evolved drastically. What was once a nice-to-have is now a mainstream staple that exists at the core of business,
More information21.4 Network Address Translation (NAT) 21.4.1 NAT concept
21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially
More informationSSL VPN Technology White Paper
SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and
More informationHow To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface
How To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface How To Configure load sharing and redirect mail server traffic over preferred Gateway
More informationIntego Enterprise Software Deployment Guide
Intego Enterprise Software Deployment Guide www.intego.com Intego Enterprise Software Deployment Guide! Page 1 Table of Contents Introduction!... 3 Managing Macs in the Enterprise!... 4 Using Remote Management
More informationHow To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 (
UAG715 Support Note Revision 1.00 August, 2012 Written by CSO Scenario 1 - Trunk Interface (Dual WAN) Application Scenario The Internet has become an integral part of our lives; therefore, a smooth Internet
More informationSymantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper
Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper Details: Introduction When computers in a private network connect to the Internet, they physically
More informationSonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
More informationContent Filtering Client Policy & Reporting Administrator s Guide
Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION
More informationCisco Expressway Basic Configuration
Cisco Expressway Basic Configuration Deployment Guide Cisco Expressway X8.1 D15060.03 August 2014 Contents Introduction 4 Example network deployment 5 Network elements 6 Internal network elements 6 DMZ
More informationStep-by-Step Configuration
Step-by-Step Configuration Kerio Technologies C 2001-2003 Kerio Technologies. All Rights Reserved. Printing Date: December 17, 2003 This guide provides detailed description on configuration of the local
More informationHow do I set up a branch office VPN tunnel with the Management Server?
Fireware How To VPN How do I set up a branch office VPN tunnel with the Management Server? Introduction Using the WatchGuard Management Server, you can make fully authenticated and encrypted IPSec tunnels
More informationDEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v9.x with Microsoft IIS 7.0 and 7.5
DEPLOYMENT GUIDE Version 1.2 Deploying the BIG-IP System v9.x with Microsoft IIS 7.0 and 7.5 Deploying F5 with Microsoft IIS 7.0 and 7.5 F5's BIG-IP system can increase the existing benefits of deploying
More informationCourse Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
More informationThreat Containment for Facebook
Threat Containment for Facebook Based on statistics for more than 62M users in 2009, the Blue Coat WebPulse cloud service ranked social networking as the number one most requested web category, surpassing
More informationChapter 10 Troubleshooting
Chapter 10 Troubleshooting This chapter provides troubleshooting tips and information for your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. After each problem description, instructions are provided
More informationBOOSTING INTERNET ACCESS LINK PERFORMANCE WITH BLUE COAT WAN OPTIMIZATION TECHNOLOGIES
PERFORMANCE WITH BLUE COAT WHITEPAPER EXECUTIVE SUMMARY Gateways to Internet traffic are facing unprecedented loads and growth rates in all types of industries and organizations due to the growth of mobile
More informationSteps for Basic Configuration
1. This guide describes how to use the Unified Threat Management appliance (UTM) Basic Setup Wizard to configure the UTM for connection to your network. It also describes how to register the UTM with NETGEAR.
More informationWhite Paper. Enterprise IPTV and Video Streaming with the Blue Coat ProxySG >
White Paper Enterprise IPTV and Video Streaming with the Blue Coat ProxySG > Table of Contents INTRODUCTION................................................... 2 SOLUTION ARCHITECTURE.........................................
More informationPresented by Philippe Bogaerts Senior Field Systems Engineer p.bogaerts@f5.com. Securing application delivery in the cloud
Presented by Philippe Bogaerts Senior Field Systems Engineer p.bogaerts@f5.com Securing application delivery in the cloud 2 The Leader in Application Delivery Networking Users Data Center At Home In the
More informationWAN Optimization, Web Cache, Explicit Proxy, and WCCP. FortiOS Handbook v3 for FortiOS 4.0 MR3
WAN Optimization, Web Cache, Explicit Proxy, and WCCP FortiOS Handbook v3 for FortiOS 4.0 MR3 FortiOS Handbook WAN Optimization, Web Cache, Explicit Proxy, and WCCP v3 13 January 2012 01-433-96996-20120113
More informationETM System SIP Trunk Support Technical Discussion
ETM System SIP Trunk Support Technical Discussion Release 6.0 A product brief from SecureLogix Corporation Rev C SIP Trunk Support in the ETM System v6.0 Introduction Today s voice networks are rife with
More informationStep-by-Step Configuration
Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Printing Date: August 15, 2007 This guide provides detailed description on configuration of the local network which
More informationBASIC ANALYSIS OF TCP/IP NETWORKS
BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks
More informationThis presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1.
This presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1. WD31_VirtualApplicationSharedServices.ppt Page 1 of 29 This presentation covers the shared
More informationDEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5
DEPLOYMENT GUIDE Version 1.2 Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Microsoft IIS Prerequisites and configuration
More informationTechnical White Paper
Instant APN Technical White Paper Introduction AccessMyLan Instant APN is a hosted service that provides access to a company network via an Access Point Name (APN) on the AT&T mobile network. Any device
More informationDEPLOYMENT GUIDE DEPLOYING THE BIG-IP SYSTEM WITH MICROSOFT INTERNET INFORMATION SERVICES (IIS) 7.0
DEPLOYMENT GUIDE DEPLOYING THE BIG-IP SYSTEM WITH MICROSOFT INTERNET INFORMATION SERVICES (IIS) 7.0 Deploying F5 with Microsoft IIS 7.0 F5's BIG-IP system can increase the existing benefits of deploying
More informationDeploying F5 to Replace Microsoft TMG or ISA Server
Deploying F5 to Replace Microsoft TMG or ISA Server Welcome to the F5 deployment guide for configuring the BIG-IP system as a forward and reverse proxy, enabling you to remove or relocate gateway security
More informationHow To Choose A Network Firewall
Critical Considerations in Choosing a Network Firewall Version 5.4.3 July 2014 Why today s Firewalls are broken Visibility No visibility into user behavior No control over applications Manageability No
More informationDeploying Steelhead Appliances with Symantec Endpoint Protection 11.0
WHITE PAPER Deploying Steelhead Appliances with Symantec Endpoint Protection 11.0 Solutions Guide Riverbed Technical Marketing DEPLOYING RIVERBED STEELHEAD APPLIANCES WITH SYMANTEC ENDPOINT PROTECTION
More informationInstalling and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationWorkflow Guide. Establish Site-to-Site VPN Connection using Digital Certificates. For Customers with Sophos Firewall Document Date: November 2015
Workflow Guide Establish Site-to-Site VPN Connection using Digital Certificates For Customers with Sophos Firewall Document Date: November 2015 November 2015 Page 1 of 14 Establish Site-to-Site VPN Connection
More informationDEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH MICROSOFT WINDOWS SERVER 2008 TERMINAL SERVICES
DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH MICROSOFT WINDOWS SERVER 2008 TERMINAL SERVICES Deploying the BIG-IP LTM system and Microsoft Windows Server 2008 Terminal Services Welcome to the
More informationCisco AnyConnect Secure Mobility Solution Guide
Cisco AnyConnect Secure Mobility Solution Guide This document contains the following information: Cisco AnyConnect Secure Mobility Overview, page 1 Understanding How AnyConnect Secure Mobility Works, page
More informationIntegrating F5 Application Delivery Solutions with VMware View 4.5
APPLICATION READY SOLUTION GUIDE What s inside: 2 Improving user experience 2 Enhancing security and access control 3 Application Performance and Availability 4 F5 and global configuration diagram 5 More
More informationWebsense Web Security Gateway: Integrating the Content Gateway component with Third Party Data Loss Prevention Applications
Websense Web Security Gateway: Integrating the Content Gateway component with Third Party Data Loss Prevention Applications November, 2010 2010 Websense, Inc. All rights reserved. Websense is a registered
More informationRelease Notes. Pre-Installation Recommendations... 1 Platform Compatibility... 1 Known Issues... 2 Resolved Issues... 2 Troubleshooting...
Global VPN Client SonicWALL Global VPN Client 4.7.3 Release Notes Contents Pre-Installation Recommendations... 1 Platform Compatibility... 1 Known Issues... 2 Resolved Issues... 2 Troubleshooting... 4
More informationWhat is the Barracuda SSL VPN Server Agent?
The standard communication model for outgoing calls is for the appliance to simply make a direct connection to the destination host. This paradigm does not suit all business needs. The Barracuda SSL VPN
More informationSolarWinds Log & Event Manager
Corona Technical Services SolarWinds Log & Event Manager Training Project/Implementation Outline James Kluza 14 Table of Contents Overview... 3 Example Project Schedule... 3 Pre-engagement Checklist...
More informationReadyNAS Remote White Paper. NETGEAR May 2010
ReadyNAS Remote White Paper NETGEAR May 2010 Table of Contents Overview... 3 Architecture... 3 Security... 4 Remote Firewall... 5 Performance... 5 Overview ReadyNAS Remote is a software application that
More informationSet Up a VM-Series Firewall on the Citrix SDX Server
Set Up a VM-Series Firewall on the Citrix SDX Server Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa
More informationTESTING & INTEGRATION GROUP SOLUTION GUIDE
TESTING & INTEGRATION GROUP SOLUTION GUIDE AppDirecor optimizing the delivery of VMware View 4.5 Contents INTRODUCTION... 2 RADWARE APPDIRECTOR... 2 VMWARE VIEW... 2 RADWARE APPDIRECTOR AND VMWARE VIEW
More informationDEPLOYMENT GUIDE. Deploying the BIG-IP LTM v9.x with Microsoft Windows Server 2008 Terminal Services
DEPLOYMENT GUIDE Deploying the BIG-IP LTM v9.x with Microsoft Windows Server 2008 Terminal Services Deploying the BIG-IP LTM system and Microsoft Windows Server 2008 Terminal Services Welcome to the BIG-IP
More informationNetwork setup and troubleshooting
ACTi Knowledge Base Category: Troubleshooting Note Sub-category: Network Model: All Firmware: All Software: NVR Author: Jane.Chen Published: 2009/12/21 Reviewed: 2010/10/11 Network setup and troubleshooting
More informationDMZ Network Visibility with Wireshark June 15, 2010
DMZ Network Visibility with Wireshark June 15, 2010 Ashok Desai Senior Network Specialist Intel Information Technology SHARKFEST 10 Stanford University June 14-17, 2010 Outline Presentation Objective DMZ
More informationKerio Control. Step-by-Step Guide. Kerio Technologies
Kerio Control Step-by-Step Guide Kerio Technologies 2011 Kerio Technologies s.r.o. All rights reserved. This guide provides detailed description on configuration of the local network which uses the Kerio
More informationSonicOS Enhanced 3.8.0.6 Release Notes TZ 180 Series and TZ 190 Series SonicWALL, Inc. Firmware Release: August 28, 2007
SonicOS Enhanced 3.8.0.6 TZ 180 Series and TZ 190 Series SonicWALL, Inc. Firmware Release: August 28, 2007 CONTENTS PLATFORM COMPATIBILITY SONICWALL RECOMMENDATIONS KNOWN ISSUES RESOLVED KNOWN ISSUES UPGRADING
More informationDeploying Virtual Cyberoam Appliance in the Amazon Cloud Version 10
Deploying Virtual Cyberoam Appliance in the Amazon Cloud Version 10 Document version 1.0 10.6.2.378-13/03/2015 Important Notice Cyberoam Technologies Pvt. Ltd. has supplied this Information believing it
More informationDEPLOYMENT GUIDE DEPLOYING F5 WITH MICROSOFT WINDOWS SERVER 2008
DEPLOYMENT GUIDE DEPLOYING F5 WITH MICROSOFT WINDOWS SERVER 2008 Table of Contents Table of Contents Deploying F5 with Microsoft Windows Server 2008 Prerequisites and configuration notes...1-1 Deploying
More informationHTTPS HTTP. ProxySG Web Server. Client. ProxySG TechBrief Reverse Proxy with SSL. 1 Technical Brief
ProxySG TechBrief Reverse Proxy with SSL What is Reverse Proxy with SSL? The Blue Coat ProxySG includes the basis for a robust and flexible reverse proxy solution. In addition to web policy management,
More informationFortiOS Handbook WAN Optimization, Web Cache, Explicit Proxy, and WCCP for FortiOS 5.0
FortiOS Handbook WAN Optimization, Web Cache, Explicit Proxy, and WCCP for FortiOS 5.0 FortiOS Handbook WAN Optimization, Web Cache, Explicit Proxy, and WCCP for FortiOS 5.0 June 10, 2014 01-500-96996-20140610
More informationNEXT GENERATION SECURE WEB GATEWAY: THE CORNERSTONE OF YOUR SECURITY ARCHITECTURE
: THE CORNERSTONE OF YOUR SECURITY ARCHITECTURE A CLOSER LOOK REVEALS WHY PROXY-BASED ARCHITECTURE IS UNIQUELY EFFECTIVE IN DEFENDING AGAINST WEB-BASED THREATS. The web is central to the way we work, live,
More informationALTIRIS Deployment Solution 6.8 PXE Overview
ALTIRIS Deployment Solution 6.8 PXE Overview Notice Altiris AAA Document 2006 Altiris, Inc. All rights reserved. Document Date: October 3, 2006 Altiris, Inc. is a pioneer of IT lifecycle management software
More informationBlue Coat Security First Steps Solution for Recording and Reporting Employee Web Activity
Solution for Recording and Reporting Employee Web Activity SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
More informationDUBEX CUSTOMER MEETING
DUBEX CUSTOMER MEETING JOHN YUN Director, Product Marketing Feb 4, 2014 1 AGENDA WebPulse Blue Coat Cloud Service Overview Mobile Device Security 2 WEBPULSE 3 GLOBAL THREAT PROTECTION NEGATIVE DAY DEFENSE
More informationVirtual Appliance Setup Guide
The Barracuda SSL VPN Vx Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda SSL VPN hardware appliance. It is designed for easy deployment
More informationSAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview
More informationDeploying Firewalls Throughout Your Organization
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
More informationIssue 1 April 2, 2009 Using the VT2442 Web User Interface
Using the VT2442 Web User Interface View the Terms of Service by visiting the Vonage website at www.vonage.com/tos. 1 Table of Contents Introduction to the Web UI... 3 Home Page... 4 Setup... 7 WAN Configuration...
More informationIntroduction to Endpoint Security
Chapter Introduction to Endpoint Security 1 This chapter provides an overview of Endpoint Security features and concepts. Planning security policies is covered based on enterprise requirements and user
More informationSonicWALL Global Management System Configuration Guide Standard Edition
SonicWALL Global Management System Configuration Guide Standard Edition Version 2.3 Copyright Information 2002 SonicWALL, Inc. All rights reserved. Under copyright laws, this manual or the software described
More informationIntroduction to the Mobile Access Gateway
Introduction to the Mobile Access Gateway This document provides an overview of the AirWatch Mobile Access Gateway (MAG) architecture and security and explains how to enable MAG functionality in the AirWatch
More informationFIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
More informationSecuring and Monitoring BYOD Networks using NetFlow
Securing and Monitoring BYOD Networks using NetFlow How NetFlow can help with Security Analysis, Application Detection and Traffic Monitoring Don Thomas Jacob Technical Marketing Engineer ManageEngine
More information7.1. Remote Access Connection
7.1. Remote Access Connection When a client uses a dial up connection, it connects to the remote access server across the telephone system. Windows client and server operating systems use the Point to
More informationA host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
More informationBlue Coat Security First Steps. Solution for HTTP Object Caching
Solution for HTTP Object Caching Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE, CROSSBEAM,
More informationvcloud Air - Virtual Private Cloud OnDemand Networking Guide
vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
More informationDEPLOYMENT OF I M INTOUCH (IIT) IN TYPICAL NETWORK ENVIRONMENTS. Single Computer running I m InTouch with a DSL or Cable Modem Internet Connection
DEPLOYMENT OF I M INTOUCH (IIT) IN TYPICAL NETWORK ENVIRONMENTS Introduction I m InTouch is a personal remote access application that allows a user to access the data on his or her PC from a remote location,
More informationWeb Application Classification Feature
Web Application Classification Feature PacketShaper 11.5 Third Party Copyright Notices 2015 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
More informationFortiOS Handbook - WAN Optimization, Web Cache, Explicit Proxy, and WCCP VERSION 5.2.4
FortiOS Handbook - WAN Optimization, Web Cache, Explicit Proxy, and WCCP VERSION 5.2.4 FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO GUIDE http://video.fortinet.com FORTINET BLOG https://blog.fortinet.com
More informationHow To Configure L2TP VPN Connection for MAC OS X client
How To Configure L2TP VPN Connection for MAC OS X client How To Configure L2TP VPN Connection for MAC OS X client Applicable Version: 10.00 onwards Overview Layer 2 Tunnelling Protocol (L2TP) can be used
More information