Blue Coat Systems. Reference Guide. SSL Proxy. For SGOS 5.5.x and later
|
|
|
- Ginger Gilmore
- 9 years ago
- Views:
Transcription
1 Blue Coat Systems Reference Guide SSL Proxy For SGOS 5.5.x and later
2 Contact Information Americas: Blue Coat Systems Inc. 410 North Mary Ave Sunnyvale, CA Rest of the World: Blue Coat Systems International SARL 3a Route des Arsenaux 1700 Fribourg, Switzerland For concerns or feedback about the documentation: ii
3 SSL Proxy Deployment Guide Copyright Blue Coat Systems, Inc. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified, decompiled, disassembled, published or distributed, in whole or in part, or translated to any electronic medium or other means without the written consent of Blue Coat Systems, Inc. All right, title and interest in and to the Software and documentation are and shall remain the exclusive property of Blue Coat Systems, Inc. and its licensors. ProxyAV, ProxyOne, CacheOS, SGOS, SG, Spyware Interceptor, Scope, ProxyRA Connector, ProxyRA Manager, Remote Access and MACH5 are trademarks of Blue Coat Systems, Inc. and CacheFlow, Blue Coat, Accelerating The Internet, ProxySG, WinProxy, PacketShaper, PacketShaper Xpress, PolicyCenter, PacketWise, AccessNow, Ositis, Powering Internet Management, The Ultimate Internet Sharing Solution, Cerberian, Permeo, Permeo Technologies, Inc., and the Cerberian and Permeo logos are registered trademarks of Blue Coat Systems, Inc. All other trademarks contained in this document and in the Software are the property of their respective owners. BLUE COAT SYSTEMS, INC. AND BLUE COAT SYSTEMS INTERNATIONAL SARL (COLLECTIVELY BLUE COAT ) DISCLAIM ALL WARRANTIES, CONDITIONS OR OTHER TERMS, EXPRESS OR IMPLIED, STATUTORY OR OTHERWISE, ON SOFTWARE AND DOCUMENTATION FURNISHED HEREUNDER INCLUDING WITHOUT LIMITATION THE WARRANTIES OF DESIGN, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL BLUE COAT, ITS SUPPLIERS OR ITS LICENSORS BE LIABLE FOR ANY DAMAGES, WHETHER ARISING IN TORT, CONTRACT OR ANY OTHER LEGAL THEORY EVEN IF BLUE COAT SYSTEMS, INC. HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. America s: Rest of the World: Blue Coat Systems, Inc. Blue Coat Systems International SARL 420 N. Mary Ave. 3a Route des Arsenaux Sunnyvale, CA Fribourg, Switzerland Document Number: Document Revision: SSL Proxy Reference Guide SGOS /2010 (03/2012) iii
4 iv
5 Table of Contents Introduction to the Blue Coat SSL Proxy What the SSL Proxy Does 5 Increasing Control 6 SSL Proxy Overview About SSL 7 Using an SSL Proxy for Privacy, Authentication, and Data Integrity 8 SSL Proxy Versus HTTPS Reverse Proxy 10 Best Practices and Deployment Question: What do I need to know before deploying the SSL Proxy? 11 Question: How do I fix server certificate errors? 12 Question: Can I configure the ProxySG to tunnel SSL traffic when errors occur? 13 Question: How do I selectively intercept SSL traffic? 14 Question: Can the ProxySG Distribute issuer certificates to client desktops? 17 Question: In addition to browser warnings, how do I create a Web page to explicitly warn users of invalid certificates and allow them the choice to ignore the error and continue to the content? 19 Question: How do I protect end-user privacy and prevent accidental exposure of sensitive information when intercepting SSL traffic? 22 Question: How do I set up SSL Proxy in explicit mode? 24 Question: How do I deploy SSL Proxy in transparent mode? 25 Question: How do I deploy the SSL Proxy in a proxy chain? 26 Question: I am using a transparent proxy deployment. How do I allow non- SSL traffic on port 443 to certain servers while still enabling the SSL Proxy for other port 443 traffic? 28 v
6 Table of Contents Question: Windows updates fail when I use the SSL Proxy to intercept all SSL connections. 28 Question: Can I use CA hierarchy for certificate emulation? 29 Question: How does the HTTP Proxy securely process the CONNECT method? 30 Question: How do I authenticate intercepted SSL traffic and add the username to the access log? 32 Question: How can I enable LDAP over SSL with a third-party certification authority? 40 Troubleshooting Tips Cannot Reach an HTTPS Site 41 Upgrading and Using SSL Client Certificates with Internet Explorer 42 Logging 43 Microsoft 43 SKYPE 44 Error Messages 44 vi
7 Introduction to the Blue Coat SSL Proxy HTTPS traffic poses a major security risk to enterprises. Because SSL (Secure Socket Layer) content is encrypted, it cannot be intercepted by normal means. Users can bring in viruses, access forbidden sites, and leak business confidential information over an HTTPS connection, which uses port 443. Because IT organizations have no visibility into SSL sessions, they are blind to any potential security threats sent over HTTPS. In addition to the security threat, encrypted traffic makes it difficult for IT to assess bandwidth usage and apply intelligent content control policies to ensure maximum user productivity. Before to the SSL Proxy, the only solution for managing HTTPS traffic was to deny HTTPS altogether or severely limit its usage. What the SSL Proxy Does HTTPS traffic is the same as HTTP traffic except that it is encapsulated so that the content is hidden. The SSL Proxy can be used to tunnel or intercept HTTPS traffic. The SSL Proxy tunnels all HTTPS traffic by default unless there is an exception, such as a certificate error or a policy denial. In such cases the SSL Proxy intercepts the SSL connection and sends an error page to the user. The SSL Proxy allows interception of HTTPS traffic even when there are no errors. Such interception enables the application of various security policies to HTTPS content. Some HTTPS traffic, such as financial information, should not be intercepted, but instead passed through in a dedicated tunnel. The following table lists the available functions depending on whether the SSL proxy is used to tunnel or intercept HTTPS traffic: Table 1-1. SSL Proxy Function Tunneling Interception Validate server certificates, including revocation checks using Certificate Revocation Lists (CRLs) and Online Certificate Status Protocol (OCSP). Check various SSL parameters such as cipher and version. Log useful information about the HTTPS connection. 5
8 Reference Guide: SSL Proxy Table 1-1. SSL Proxy Function Tunneling Interception Cache HTTPS content. Apply HTTP-based authentication mechanism. Scan for viruses and filter specified URLs. Apply granular policy (such as validating MIME type and filename extension). The Blue Coat SSL proxy allows you to: Determine what HTTPS traffic to intercept through existing policy conditions, such as destination IP address and port number. You can also use the hostname in the server certificate to make the intercept versus tunnel decision. Validate the server certificate to confirm the identity of the server, and check Certificate Revocation Lists (CRLs) to be sure the server certificate has not been revoked. Apply caching, virus scanning and URL filtering policies to intercepted HTTPS traffic. Increasing Control The SSL proxy allows you to increase control by: Distinguishing between SSL and non-ssl traffic on the same port. Distinguishing HTTPS from other protocols over SSL. Categorizing sites by their SSL server certificate hostname. Enhancing security through: Server certificate validation, including revocation checks with the help of CRLs and OCSP. Virus scanning and URL filtering of HTTPS content. The SSL proxy also improves visibility into SSL traffic by creating log files, and enhances performancing by caching data. 6
9 SSL Proxy Overview SSL and tunneling protocols are closely tied together. To understand SSL, you must first understand how tunneling applications work. This chapter discusses: About SSL on page 7 Using an SSL Proxy for Privacy, Authentication, and Data Integrity on page 8 SSL Proxy Versus HTTPS Reverse Proxy on page 10 About SSL At the lowest level, SSL is layered on top of TCP/IP. SSL uses the SSL Handshake Protocol to allow the server and client to authenticate each other and to negotiate the encryption cipher before the application protocol transmits or receives its first byte of data. SSL has emerged as the de facto standard protocol for establishing a secure, encrypted link between a remote application server and the client Web browser on the local user s desktop. SSL is a proven technology with strong appeal to IT organizations because each secure session link is automatically established on demand using standards-based protocols, encryption techniques, and certificate exchange all without the need for any IT administration. The process of setting up the private connection is automatically initiated by the server communicating directly with the browser. The result is a private, encrypted tunnel used to move information between the server and client desktop. When the session is over, the connection is automatically terminated. However, SSL sessions have become a conduit for a variety of enterprise security threats including spyware, viruses, worms, phishing, and other malware. 7
10 Reference Guide: SSL Proxy Using an SSL Proxy for Privacy, Authentication, and Data Integrity The SSL proxy can manage the SSL sessions in such a way as to prevent enterprise security threats while at the same time allowing you to determine the level of control. If the HTTPS traffic contains financial information, you most likely do not want to intercept that traffic. However, many other kinds of traffic can and should be intercepted by the SSL proxy. Determining What HTTPS Traffic to Intercept The default mode of operation for the SSL Proxy is to intercept HTTPS traffic only if there is an exception, such as a certificate error. Otherwise, it tunnels all HTTPS traffic. To intercept HTTPS traffic for reasons other than error reporting, many existing policy conditions, such as destination IP address and port number, can be used. Additionally, the SSL proxy can use the hostname in the server certificate to make the decision to intercept or tunnel the traffic. The server certificate hostname can be used as-is to make intercept decisions for individual sites, or it can be categorized using any of the various URL databases supported by Blue Coat. Categorization of server certificate hostnames can help place the intercept decision for various sites into a single policy rule. Recommendations for intercepting traffic include: Intercept Intranet traffic. Intercept suspicious Internet sites, particularly those that are categorized as none in the server certificate. Intercept sites that provide secure Web-based , such as Gmail over HTTPS. Managing Decrypted Traffic After the HTTPS connection is intercepted, you can do: Anti-virus scanning over ICAP. URL filtering (on-box and off-box). Blue Coat recommends on-box URL/ Content filtering if you use transparent proxy. When the URL is sent off-box for filtering, only the hostname or IP address of the URL (not the full path) is sent for security reasons. Filtering based on the server certificate hostname. Caching. 8
11 SSL Proxy Overview HTTPS applications that require browsers to present client certificates to secure Web servers do not work if you are intercepting traffic. Do not create policy rules to intercept such applications. If you intercept HTTPS traffic, be aware that local privacy laws might require you to notify the user about interception or obtain consent. You can use the HTML Notify User object to notify users after interception. You can use consent certificates to obtain consent prior to interception. The HTML Notify User feature is easier; however, the ProxySG must decrypt the first request from the user before it can issue an HTML notification page. Digital Certificates and Certificate Authorities Server certificates are used to authenticate the identity of a server. A certificate is an electronic confirmation that the owner of a public key is who he or she really claims to be, and thus holds the private key corresponding to the public key in the certificate. The certificate contains other information, such as its expiration date. The association between a public key and a particular server occurs by generating a certificate signing request using the server s public key. A Certificate Authority (CA) verifies the identity of the server and generates a signed certificate. The resulting certificate can then be offered by the server to clients who can recognize the CA s signature and trust that the server is who it claims to be. Such use of certificates issued by CAs have become the primary infrastructure for authentication of communications over the Internet. ProxySG appliances ship with many popular CA certificates already installed. You can review these certificates using the Management Console or the CLI. You can also add certificates for your own internal certificate authorities. ProxySG appliances trust all root CA certificates trusted by Internet Explorer and Firefox. The list is updated periodically to be in sync with the latest versions of IE and Firefox. CA certificates installed on the ProxySG are used to verify the certificates presented by HTTPS servers and the client certificates presented by browsers (when browsers are configured to do so). ProxySG appliances also check Certificate Revocation Lists (CRLs, which are provided and maintained by CAs) for certificates that have been revoked. 9
12 Reference Guide: SSL Proxy SSL Proxy Versus HTTPS Reverse Proxy Depending on your needs, you can use the ProxySG as either an SSL proxy or an HTTPS reverse proxy. SSL proxy functionality enables the ProxySG to act as forward proxy for HTTPS requests. This deployment guide discusses the HTTPS forward proxy. To configure the ProxySG as an HTTPS reverse proxy, refer to the Blue Coat SGOS 5.5.x Administration Guide documentation suite. An SSL proxy is a client-side proxy typically used for applying security and performance features such as authentication, URL filtering, and caching. An HTTPS reverse proxy is a server-side proxy typically used to offload SSL processing from server to the proxy. Reverse proxies are deployed in proximity to the server. The communication between the HTTPS reverse proxy and server might or might not use SSL. The ProxySG can be used as an HTTPS reverse proxy with the help of the existing HTTPS Reverse Proxy service. Performance is usually the only objective. 10
13 Best Practices and Deployment This chapter contains answers to frequently-asked SSL Proxy deployment questions. Question: What do I need to know before deploying the SSL Proxy? Answer: The default mode of operation for the SSL proxy is intercept on exception, tunnel otherwise. Common examples of exceptions for which the SSL Proxy intercepts traffic in this default mode are certificate errors and policy based denials. To intercept HTTPS traffic for purposes other than error reporting (such as antivirus scanning or caching), you must create additional policy. The SSL proxy can detect the following certificate errors for both intercepted and tunneled traffic: The certificate has expired (or is valid at a future date). The certificate issuer is untrusted; that is, the ProxySG does not recognize or trust the issuer of the certificate. The certificate has been revoked. The ProxySG does a revocation check using Certificate Revocation Lists (CRLs) to determine if the issuer of the certificate has revoked the certificate. Recommendation: Audit all internal HTTPS servers to verify that they use valid certificates before upgrading the ProxySG to SGOS 5.x. This ensures that internal HTTPS sites accessed through the ProxySG do not break after enabling the SSL Proxy. Answer: After the SSL proxy starts intercepting traffic, it also verifies that the common-name (CN) in the certificate matches with the request URL, and denies data exchange between client and server when a mismatch is detected. Answer: In the case of server certificate errors, the SSL proxy intercepts the connection in default mode and sends an exception page to the browser showing the cause of the error. In addition, from the SSL access logs, you can monitor the following fields to learn which servers present certificates with errors and what the ProxySG is doing: 11
14 Reference Guide: SSL Proxy x-rs-certificate-observed-errors: Shows all the actual error(s) detected with the certificate except hostname-mismatch error. Detected errors include untrusted-issuer, expired, and revoked. x-rs-certificate-validate-status: Shows the certificate validation status after following policy rules. If policy ignores a specific certificate validation error, this field shows the status as CERT_VALID, although the certificate presented by a server has the error. Recommendation: Leave the SSL proxy in its default mode where it intercepts the connection in case of errors and reports an exception to the browser. If no errors are found, traffic is tunneled. This allows you to better understand the SSL traffic in your network and helps you write suitable interception policy. Question: How do I fix server certificate errors? Answer: The SSL Proxy can detect the following certificate errors: untrusted-issuer expired revoked hostname mismatch (intercepted connections only) The most secure way to fix any of these errors is to get a new certificate that does not have the detected error. Many times, however, the sites presenting a bad certificate are not in administrative control. In this case, the SSL Proxy provides a way to ignore certificate errors for certain sites through policy. Recommendation: If internal HTTPS servers use certificates issued by an internal Certificate Authority (CA), the SSL Proxy flags such certificates with the untrusted-issuer error. To prevent such errors, import the internal CA certificate to the ProxySG as a trusted certificate. Do not ignore untrusted-issuer errors through policy because an untrusted-issuer error means that nothing from the certificate can be trusted. Do not disable certificate validation globally. Assess ignorable certificate errors on a case-by-case basis, as discussed below. Procedure: To ignore certificate errors for specific sites For detailed information on the Visual Policy Manager, refer to the SGOS 5.5.x Visual Policy Manager Reference. 1. Launch the Visual Policy Manager: a. Select Configuration > Policy > Visual Policy Manager. b. Click the Launch button. 2. Select Policy > Add SSL Access Layer from the menu bar. A policy row is added by default when you create a layer. 3. Right-click the Destination field; select Set to open the Set Destination Object dialog. 12
15 Best Practices and Deployment 4. Click New, then: a. Add a condition for Destination Host/Port or Server URL. b. Add the IP address and the port or the server URL. c. Click Close. d. Click OK. 5. Right click the Action field; select Set. 6. Click New and select Set Server Certificate Validation. 7. Select the certificate errors to ignore (for example, Ignore expiration), and then click OK. 8. Click OK to close the Set Action Object dialog. 9. Click Install Policy. Question: Can I configure the ProxySG to tunnel SSL traffic when errors occur? Answer: Yes. The ProxySG has an option named Tunnel on Protocol Error. applies when non-ssl traffic arrives at the SSL port (443 by default). A common scenario that causes this is having peer-to-peer applications (viz, Skype, BitTorrent, Gnutella, older AOL-IM and emule) configured to enable port 443 for peer-to-peer traffic without SSL set as the transport protocol. A ProxySG transparently intercepting all 443 traffic cannot process these connections, rendering the application unusable (and the user receives an exception page). 13
16 Reference Guide: SSL Proxy With an explicit proxy deployment, SSL errors during the initial handshake causes the same issue. The following example illustrates this: ProxySG is configured to have an explicit HTTP service on port The HTTP service is configured with detect protocol enabled, which hands off SSL traffic to the SSL proxy from an HTTP CONNECT request. The same applies to an explicit SOCKS proxy deployment with protocol detection enabled or an explicit TCP listener. Procedure: To enable Tunnel on Protocol Error 1. In the Management Console, select the Configuration > Proxy Settings > General > General tab. 2. In the Tunnel on Protocol Error area, select TCP tunnel requests when a protocol error is detected. 3. Click Apply. Additional Policy As a companion piece to this feature, the Visual Policy Manager (VPM) provides the Client Certificate Requested object in the SSL Intercept Layer > Service column (the equivalent CPL is client.certificate.requested {yes no}). Use this policy to minimize traffic disruption when the SSL proxy intercepts secure traffic and encounters cases where intercepting further is not an option. For example, the SSL proxy does not have enough information to continue intercepting emule because to allow the SSL traffic, the OCS requires client certificate authentication. This policy works seamlessly when the SSL proxy is configured to tunnel the secure traffic. Question: How do I selectively intercept SSL traffic? Answer: To selectively intercept SSL traffic using the most preferred method, configure a URL filter database. The following procedures apply to inline deployments only. For additional information on configuring the SSL proxy, refer to SSL Proxy chapter located in the SGOS 5.5.x Administration Guide. Using the Blue Coat Web Filter as an example, the following steps show how to create a rule that intercepts selected categories. 1. Launch the Visual Policy Manager from Configuration > Policy > Visual Policy Manager. 2. Add an SSL Intercept Layer by selecting Policy > Add SSL Intercept Layer from the menu bar. A policy row is added by default when you create a layer. 3. Right click the Destination field; select Set, then New. 4. Select the Server Certificate Category and expand the Blue Coat category. 14
17 Best Practices and Deployment 5. Select the categories to intercept. 6. Expand the System category; select none to intercept Web sites whose categorization is unknown. This allows you to treat unrated sites as suspicious and apply security policies to the data transferred to and from such sites. 7. Click OK. 8. Click OK. 9. Right click the Action field; select Set, then New. 10. Select Enable HTTPS Interception 15
18 Reference Guide: SSL Proxy For additional details on the SSL Forward Proxy object, refer to the SGOS 5.5.x Administration Guide. 11. To allow SSL content to be examined, select: a. Issuer Keyring: Accept the default keyring or select this option and from the drop-down list select a previously generated keyring. This is the keyring used for signing emulated certificates. b. Hostname: The hostname you enter here is the hostname in the emulated certificate. c. Splash Text: The limit is 200 characters. The splash text is added to the emulated certificate as a certificate extension. The splash text is added to the emulated certificate as a certificate extension. For example: Not all browsers display the splash text and splash URL correctly. Visit To add substitution variables to the splash text, click Edit and select from the list. d. Splash URL: The splash text is added to the emulated certificate as a certificate extension. 12. Click OK. 13. Click OK. The SSL splash can be caused by such occurrences as when a browser receives a server certificate signed by an unknown CA, or a host mismatch. 14. Apply the policy by clicking Install Policy in the upper-right-hand corner. 16
19 Best Practices and Deployment Question: Can the ProxySG Distribute issuer certificates to client desktops? Answer: When the SSL Proxy intercepts an SSL connection, it presents an emulated server certificate to the client browser. The client browser issues a security pop-up to the end-user because the browser does not trust the issuer used by the ProxySG. This pop-up does not occur if the issuer certificate used by SSL Proxy is imported as a trusted root in the client browser s certificate store. The ProxySG makes all configured certificates available for download via its management console. You can ask end users to download the issuer certificate through Internet Explorer or Firefox and install it as a trusted CA in their browser of choice. This eliminates the certificate popup for emulated certificates. To download the certificate through Internet Explorer, see "To download a certificate through Internet Explorer". To download a certificate through Firefox, see To download a certificate through Firefox on page 18. Procedure: To download a certificate through Internet Explorer Tip: the console URL corresponding to the issuer certificate to end users so that the end-user can install the issuer certificate as a trusted CA. 1. Select Statistics > Advanced. 2. From the SSL section, click Download a ProxySG Certificate as a CA Certificate; the list of certificates on the system display. 3. Click a certificate (it need not be associated with a keyring); the File Download Security Warning dialog displays asking what you want to do with the file. 4. Click Save. When the Save As dialog displays, click Save; the file downloads. ~or~ 5. Click Open to view the Certificate properties; the Certificate dialog displays. 17
20 Reference Guide: SSL Proxy 6. Click the Install Certificate button to launch the Certificate Import Wizard. 7. Verifty that the Automatically select the certificate store based on the type of certificate option is enabled before completing the wizard; the wizard announces when the certificate is imported. 8. (Optional) To view the installed certificate, go to Internet Explorer, Select Tools > Internet Options > Contents > Certificates, and open either the Intermediate Certification Authorities tab or the Trusted Root Certification Authorities tab, depending on the certificate you downloaded. Procedure: To download a certificate through Firefox Tip: the console URL corresponding to the issuer certificate to end users so that the end-user can install the issuer certificate as a trusted CA. 1. Go to Statistics > Advanced. 2. Select SSL. 3. Click Download a ProxySG Certificate as a CA Certificate; the list of certificates on the system display. 4. Click a certificate (it need not be associated with a keyring); the Download Certificate dialog displays. 18
21 Best Practices and Deployment 5. Enable the options as needed. View the certificate before trusting it for any purpose. 6. Click OK; close the Advanced Statistics dialog. Question: In addition to browser warnings, how do I create a Web page to explicitly warn users of invalid certificates and allow them the choice to ignore the error and continue to the content? Description: Some servers may have invalid certificates, which trigger warnings from browsers for instances such as self-signed certificates (untrusted issuer), expired certificates, and hostname mismatches with the certificate. Users connected to these sites through the ProxySG with the SSL proxy enabled can receive an additional error page explaining the reason why users could not access the page. Solution: Present a warning message to users that allows them to connect to the HTTPS site by clicking on a link. This requires two components: policy and modified exception pages. You must Ensure SSL traffic is in intercept mode: In the VPM, create an SSL Intercept Layer; intercept only the URLs you want to apply to the Certificate Not Valid policy. Modify the built-in exceptions: ssl_domain_invalid ssl_server_cert_expired ssl_server_cert_untrusted_issuer See Certificate Not Valid Exception on page 20. Install the Certificate Not Valid Policy. 19
22 Reference Guide: SSL Proxy See Certificate Not Valid Policy on page 21. Certificate Not Valid Exception This exception needs to be placed in your local policy. (exception.ssl_domain_invalid (contact) (details "Your request contacted a host which presented a certificate with a Common Name that did not match the domain requested.") (format <<--eof-- Your request contacted a host which presented a certificate with a Common Name that did not match the domain requested. <br> <br> <form method="get" action="$(url)"> <input type="submit" style="width:400;height:24;" value="click here if you have a legitimate reason to access this site"></form> <br> --eof-- ) (help "This is typically caused by a Web Site presenting an incorrect or invalid certificate, but could be because of a configuration error.") (summary "SSL Certificate Hostname Mismatch") (http (code "409") (contact) (details) (format) (help) (summary) ) ) (exception.ssl_server_cert_expired (contact) (details "Your request contacted a host which presented an expired or Invalid certificate") (format <<--eof-- Your request contacted a host which presented an expired or Invalid certificate. <br> <br> <form method="get" action="$(url)"> <input type="submit" style="width:400;height:24;" value="click here if you have a legitimate reason to access this site"></form> <br> --eof-- ) (help "This is typically caused by a Web Site presenting an incorrect or invalid certificate, but could be because of a configuration error. ") (summary "Expired SSL Server Certificate") 20
23 Best Practices and Deployment (http (code "503") (contact) (details) (format) (help) (summary) ) ) (exception.ssl_server_cert_untrusted_issuer (contact) (details "Your request contacted a host which presented a certificate signed by an untrusted issuer.") (format <<--eof-- Your request contacted a host which presented a certificate signed by an untrusted issuer. <br> <br> <form method="get" action="$(url)"> <input type="submit" style="width:400;height:24;" value="click here if you have a legitimate reason to access this site"></form> <br> --eof-- ) (help "This is typically caused by a Web Site presenting an incorrect or invalid certificate, but could be because of a configuration error.") (summary "Untrusted SSL Server Certificate") (http (code "503") (contact) (details) (format) (help) (summary) ) ) Certificate Not Valid Policy <exception> condition=sslexception action.mycookie(yes) <proxy> condition=sslallow request.header.cookie="sslallow"\ action.rewtohttps(yes) request.header.cookie="sslallow" action.red(yes) <ssl> condition=sslallow server.certificate.validate.ignore(all) define action mycookie set(exception.response.header.set-cookie, "sslallow$(url.cookie_domain)") end define action rewtohttps rewrite(url,"(.*)\?xyzallow","$(1)") end 21
24 Reference Guide: SSL Proxy define action red redirect(307,"(.*)","$(1)?xyzallow") end define condition sslallow url.substring="xyzallow" end define condition sslexception exception.id=ssl_server_cert_untrusted_issuer exception.id=ssl_server_cert_expired exception.id=ssl_domain_invalid end Notes: For an invalid certificate, the xyzallow value is appended to the URL after user clicks on Accept. This is expected behavior. SGOS introduced a new policy gesture, request_redirect. Only use the request_redirect gesture for objects returned from the ProxySG itself, such as the accelerated_pac_base.pac. Do not apply to redirects for objects from an OCS (Origin Content Server). Continue to use redirect( ) for redirects to an OCS. Question: How do I protect end-user privacy and prevent accidental exposure of sensitive information when intercepting SSL traffic? Answer: For intercepted SSL traffic, potentially sensitive information is available in cleartext in the following locations: If ICAP scanning is enabled for intercepted HTTPS traffic, such data is sent without encryption to the ICAP server. You can log request and response headers containing sensitive information to the access log and event log. If you use an off-box URL filtering solution, part of the URL may be sent in cleartext to the URL database service point. Note that such a service point can be located on the Internet. Intercepted HTTPS content that is cacheable is also available on the disk in the clear. Recommendation: Take the following measures to prevent accidental exposure of sensitive information: Enable secure ICAP scanning between the ICAP server and the ProxySG. If you use plain ICAP scanning for intercepted HTTPS content, ensure that the network link between the ProxySG and the ICAP server cannot be snooped. 22
25 Best Practices and Deployment Use care in determining which sites to intercept. Avoid intercepting wellknown banking and financial sites. On-box URL databases and server certificate categories can be used in determining which sites to intercept. Use on-box URL databases, such as Blue Coat Web Filter or a third-party content filtering vendor, to avoid transmitting URLs in clear text. Further, if you use WebPulse services for dynamic categorization of Web requests, enable the Use secure connections checkbox to ensure that all communication with the WebPulse service occurs in secure mode. For information on Client Consent Certificates, refer to the Managing X.509 Certificates chapter in the SGOS 5.5.x Administration Guide. For information on HTML Notification, refer to the Managing SSL Proxy chapter in the SGOS 5.5.x Administration Guide. Implement HTML notification for intercepted sites to inform end-users that their HTTPS traffic will be monitored and that they can opt-out if they do not want their traffic to be intercepted. HTML notification is also helpful if a site is accidentally intercepted. Do not log URL or header information for intercepted HTTPS traffic. (By default, the SSL log does not log this information.) The ProxySG allows you to set up notification two ways, HTML notification and client consent certificates. Setting up HTML Notification Procedure: Set up HTML notification only for HTTPS sites: 1. Launch the Visual Policy Manager from Configuration > Policy > Visual Policy Manager. 2. Add a new rule to the Web Access layer. a. Right click the Action field; select Set. b. Click New, then select the Notify User object. c. Customize the Notify User object as needed. d. Click OK. e. Click OK. f. Right click the Service field; select Set. g. Click New, then select the Client Protocol object. 23
26 Reference Guide: SSL Proxy h. Select HTTPS from the drop-down list in the top field; make sure ALL HTTPS is selected from the drop-down list in the lower field. i. Click OK. 3. Click OK. 4. Apply the policy by clicking Install Policy in the upper-right-hand corner. Question: How do I set up SSL Proxy in explicit mode? Answer:The SSL Proxy can be used in explicit mode in collaboration with the HTTP Proxy or SOCKS Proxy. You must create an HTTP Proxy service or SOCKS Proxy service and use it as the explicit proxy from desktop browsers. When requests for HTTPS content are sent to either a SOCKS proxy or an HTTP proxy, the proxies can detect the use of the SSL protocol on such connections and enable SSL Proxy functionality. Note that SSL protocol detection should be enabled for the proxy service in use (HTTP or SOCKS). To create an explicit SSL proxy, complete the following steps: Configure the browser on the desktop to use a proxy or point to a PAC file that points to the proxy. Coordinate with other devices, such as a firewall, to prevent users from accessing the internet without a proxy. Confirm that an HTTP proxy or SOCKS proxy service is present on the desired port and that protocol detection is enabled for that service. Create or import an issuer keyring or use the defaults. Configure SSL proxy rules through VPM. 24
27 Best Practices and Deployment Internet Disabled Proxy Settings Using Proxy Settings to Access the Internet Question: How do I deploy SSL Proxy in transparent mode? Answer: In a transparent proxy configuration, neither the client (browser) nor the desktop knows that the traffic is being processed by a machine other than the origin content server (OCS). The browser believes it is talking to the OCS, so the request is formatted for the OCS; the proxy determines for itself the destination server based on information in the request, such as the destination IP address in the packet, or the Host: header in the request. A transparent proxy requires one of the following: A hardware bridge A WCCP switch An L4 switch 25
28 Reference Guide: SSL Proxy If you want to use an L4 switch, WCCP, or an explicit proxy instead of bridging, disable the bridging Pass-Thru card. Bridging functionality allows ProxySG appliances to be deployed in environments where L4 switches, explicit proxies, and WCCP-capable routers are not feasible options. A branch office that would take advantage of a bridging configuration is likely to be small (from 20 to 50 users); for example, it might have only one router and one firewall in the network, as shown below. To create a transparent SSL proxy, configure the hardware to use a transparent proxy: Create an SSL service on port 443. Create or import an issuer keyring or use the defaults. Configure SSL proxy through VPM or CPL. Question: How do I deploy the SSL Proxy in a proxy chain? Answer: A typical SSL proxy chain is shown below. 26
29 Best Practices and Deployment : The ProxySG at the branch office (the downstream device) uses the ProxySG at the data center (the upstream device) as its forwarding host, allowing SSL Proxy functionality to be enabled on both appliances. Tips on Setting Up SSL Proxy Chaining Functionality For information on using forwarding hosts, refer to the Forwarding chapter in the SGOS 5.5.x Administration Guide. The upstream ProxySG is configured as the forwarding host of type HTTP proxy for the downstream ProxySG. Both proxies have identical SSL related policy; that is, each should make identical decisions in terms of which SSL connections are intercepted and which SSL connections are tunneled. The issuer certificate used by the upstream ProxySG to sign emulated certificates should be imported as a CA certificate on the downstream ProxySG. This ensures that the downstream device can successfully verify emulated certificates presented by the upstream device. Note that this applies to intercepted SSL connections only. For tunneled SSL connections the downstream ProxySG sees the original server certificate. Now, when an SSL connection is intercepted at the upstream appliance, the ProxySG emulates the server certificate and presents the emulated server certificate to the downstream ProxySG. 27
30 Reference Guide: SSL Proxy Question: I am using a transparent proxy deployment. How do I allow non-ssl traffic on port 443 to certain servers while still enabling the SSL Proxy for other port 443 traffic? Answer: Some legitimate applications, such as the SOCKS-based VPN clients from Aventail and Permeo, use port 443 to communicate to the VPN gateway. However, the protocol they use is not SSL. An SSL service created on port 443 that transparently terminates such TCP connections breaks these applications. That is because the SSL service enforces the use of the SSL protocol. Administrators can allow such SOCKS-based VPN tunnels to a few trusted partner sites. Procedure: To enable non-ssl protocols on port 443 for certain applications For information on creating TCP-tunnel services, refer to the Services chapter in the SGOS 5.5.x Administration Guide. 1. Create a transparent TCP-tunnel service on port 443. Do not create an SSL service on port Specify the list of servers that can use port 443 for non-ssl protocols in policy: define condition Trusted_non_ssl_servers url.address= url.address= end condition Trusted_non_ssl_servers 3. Write a <proxy> layer that forces all other traffic on port 443 to use the SSL protocol: <proxy> proxy.port=443 condition =! Trusted_non_ssl_servers force_protocol(ssl) These rules ensures that port 443 connections to the list of trusted servers are tunneled without intervention while all other port 443 connections use the SSL protocol. Question: Windows updates fail when I use the SSL Proxy to intercept all SSL connections. Answer:SSL connections for Windows updates should always be tunneled. For example: <ssl-intercept> server.certificate.hostname=update.microsoft.com \ ssl.forward_proxy(no) ssl.forward_proxy(https) The same policy can be created in VPM using the SSL Intercept Layer, the Server Certificate Object, and the SSL Forward Proxy object. Note that you only need to do this if the policy intercepts everything. If you do selective interception, as recommended, this issue does not arise. 28
31 Best Practices and Deployment Question: Can I use CA hierarchy for certificate emulation? Answer: Some enterprises have a well-defined CA Certificate hierarchy (chain) in place. Consider the hypothetical example of Clothing-Max, a retail clothing outlet with 150 stores in the U.S. and Canada. The Clothing-Max Root CA Certificate is at the top of the hierarchy and has issued a CA certificate for the Clothing-Max IT department. In turn, the IT department issues a CA certificate for the IT security team. If the security team wants to deploy the SSL proxy using its CA certificate as the issuer for emulated certificates, the team will import this certificate and its private key on the ProxySG. The intermediate CA must be imported in two places on the ProxySG: Under the Keyrings panel where both the private key and the certificate are stored. Under CA Certificates panel on ProxySG. This second step ensures that the SSL Proxy chains the intermediate CA certificate along with the emulated certificate. The ProxySG now signs the emulated certificates using the private key of the Clothing-Max IT Security Team CA Certificate. The certificate chain for an emulated certificate for a Clothing-Max server will be: Root CA Intermediate CAs Emulated Certificate Clothing-Max Clothing-Max IT Clothing-Max IT Security Team Clothing-Max Server In this case, the browser does not show a security pop-up if it is able to verify all certificates in the certificate hierarchy. If you use Internet Explorer, additional requirements are necessary on the intermediate CA certificates in the certificate chain. Intermediate CA certificates must contain the basic constraints certificate extension with the Subject Type set to CA. Also, if your intermediate CA certificate has a KeyUsage extension, make sure it has the Certificate Signing attribute present. Root CA certificates are exempt from this requirement: Root CA Intermediate CA Intermediate CA Clothing-Max Clothing-Max IT Clothing-Max IT Security Team 29
32 Reference Guide: SSL Proxy The illustration below shows a Verisign Class 2 Intermediate Certificate Basic Constraints Extension. d For detailed information on creating an Intermediate CA using OpenSSL, refer to the Managing X.509 Certificates chapter of the SGOS 5.5.x Administration Guide. Question: How does the HTTP Proxy securely process the CONNECT method? Answer: It follows the rules outlined in the flow chart on the next page. 30
33 Best Practices and Deployment Note: For more information about authentication modes, refer to SGOS 5.5.x Administration Guide. Note: For more information about creating policy, refer to the SGOS 5.5.x Content Policy Language Referece 31
34 Reference Guide: SSL Proxy Question: How do I authenticate intercepted SSL traffic and add the username to the access log? Answer:For transparent authentication, continue with the next section. For explicit authentication, skip to Explicit Authentication on page 36. Transparent Authentication Complete the following steps on the ProxySG: 1. Create an authentication realm, such as LDAP, IWA, or RADIUS, based on the environment. (Management Console Location: Configuration > Authentication > Realm_Name) 2. As part of realm authentication, change the virtual URL for the realm to hostname:444. The hostname, which must not be a fully qualified domain name, must resolve to the IP address of the ProxySG. (Management Console Location: Configuration > Authentication > Realm_Name > General) 3. Make sure that transparent proxy is set to the session cookie method. This is the default. (Management Console Location: Configuration > Authentication > Transparent Proxy) 4. An HTTPS (SSL) Service already exists on the system by default. Modify the default HTTPS service, if needed, to intercept traffic on port 443. (Management Console Location: Configuration > Services > Proxy Services > Encrypted Service Group > HTTPS > Edit Service) 5. Create an HTTPS reverse proxy on theproxysg so that connections to the virtual URL are intercepted by the ProxySG (Management Console Location: Configuration > Services > Proxy Services > Reverse Proxy Service Group > New Service) 6. (Optional) If you use a TCP-tunnel service on 443 in transparent mode instead of the SSL service, enable protocol detection on the TCP-tunnel service. (Management Console Location: Configuration > Services > Proxy Services > Other Service Group > New Service) 7. The following steps describe how to write policy to enable SSL Proxy functionality using the Visual Policy Manager. For an example of policy using CPL, see Sample CPL for Transparent Authentication on page 35. a. From the Management Console, launch the Visual Policy Manager: Configuration > Policy > Visual Policy Manager > Launch b. From the Policy menu, select Add SSL Intercept Layer. 32
35 Best Practices and Deployment c. Right-click the Action cell and select Set. Click New and select Enable HTTPS Interception. d. Click OK to add the interception object, and then click OK to close the Set Action Object dialog. e. From the Policy menu, select Add Web Authentication Layer. You will be creating a combined object containing two Request URL objects: HTTPS, and HTTP. f. Right-click the Destination cell and select Set. Click New and select Request URL. 33
36 Reference Guide: SSL Proxy g. Select Advanced Match. In the Name field, type url_scheme_https. From the Scheme drop-down list, select https. h. Click Add to add the Request URL Object for HTTPS. i. Now, repeat the same procedure to add a Request URL Object for HTTP. Select Advanced Match. In the Name field, enter url_scheme_http. From the Scheme drop-down list, select http. j. Click Add and then Close. You should now see both url_scheme_http and url_scheme_https in the Set Destination Object dialog. k. Click New and select Combined Destination Object. l. Shift-click to select both url_scheme_http and url_scheme_https and then click Add. m. Click OK to add the Combined Destination Object to the Web Access Layer, and then click OK to close the Set Destination Object dialog. n. Right-click the Action cell and select Set. o. Click New and select Authenticate. p. Specify the desired Realm and select a redirect Mode: origin-cookie-redirect, where the client is redirected to a virtual URL to be authenticated, and cookies are used as the surrogate credential. 34
37 Best Practices and Deployment origin-ip-redirect (unsecure), where the client is redirected to a virtual URL to be authenticated, and the client ip_address is used as a surrogate credential. form-cookie-redirect, where a form is presented to collect the user's credentials. The user is redirected to the authentication virtual URL before the form is presented. form-ip-redirect (unsecure), where the user is redirected to the authentication virtual URL before the form is presented. In this example, the local realm is set to Origin-Cookie-Redirect. q. Click OK to add the Authenticate Object, and then click OK to close the Set Destination Object dialog. r. In the Visual Policy Manager, click Install Policy. 8. Add the access log field cs-username to the SSL access log format. (Management Console Location: Configuration > Access Logging > Formats > SSL > Edit) Sample CPL for Transparent Authentication You can also use the CPL to write policy. In this example, realm name is called local and the authentication mode is origin-cookie-redirect: 35
38 Reference Guide: SSL Proxy <ssl-intercept> ssl.forward_proxy(https) <Proxy> authenticate(local) authenticate.mode(origin-cookieredirect) ;Definitions define condition client_protocol client.protocol=https client.protocol=http end Explicit Authentication Complete the following steps on the ProxySG: 1. Create an authentication realm, such as LDAP, IWA, or RADIUS, based on the environment. (Management Console Location: Configuration > Authentication > Realm_Name) 2. As part of realm authentication, change the virtual URL for the realm to hostname:444. The hostname, which must not be a fully qualified domain name, must resolve to the IP address of the ProxySG. (Management Console Location: Configuration > Authentication > Realm_Name > General) 3. Create an HTTP proxy service that is the explicit proxy from desktop browsers (Management Console Location: Configuration > Services > Proxy Services > New Service): Give the service a meaningful name. Select the Service Group where you want the service to live. Enable the Detect Protocol attribute. Configure a new listener with an explicit destination address. 4. Create an HTTPS reverse proxy on the ProxySG so that connections to the virtual URL are intercepted by the ProxySG (Management Console Location: Configuration > Services > Proxy Services > Reverse Proxy Service Group > New Service). 5. The following steps describe how to write policy to enable SSL Proxy functionality using the Visual Policy Manager. For an example of policy using CPL, see Sample CPL for Explicit Authentication on page 40. a. From the Management Console, launch the Visual Policy Manager: Configuration > Policy > Visual Policy Manager > Launch b. From the Policy menu, select Add SSL Intercept Layer. 36
39 Best Practices and Deployment c. Right-click the Action cell and select Set. Click New and select Enable HTTPS Interception. d. Click OK to add the interception object, and then click OK to close the Set Action Object dialog. e. From the Policy menu, select Add Web Authentication Layer. You will be creating a combined object containing two Request URL objects: HTTPS, and HTTP. f. Right-click the Destination cell and select Set. Click New and select Request URL. 37
40 Reference Guide: SSL Proxy g. Select Advanced Match. In the Name field, enter url_scheme_https. From the Scheme drop-down list, select https. h. Click Add to add the Request URL Object for HTTPS. i. Repeat the same procedure to add a Request URL Object for HTTP. Select Advanced Match. In the Name field, enter url_scheme_http. From the Scheme drop-down list, select http. j. Click Add and then Close. You should now see both url_scheme_http and url_scheme_https in the Set Destination Object dialog. k. Click New and select Combined Destination Object. l. Shift-click to select both url_scheme_http and url_scheme_https and then click Add. 38
41 Best Practices and Deployment m. Click OK to add the Combined Destination Object to the Web Access Layer, and then click OK to close the Set Destination Object dialog. n. Right-click the Action cell and select Set. o. Click New and select Authenticate. p. Specify the desired Realm and select a redirect Mode: origin-cookie-redirect, where the client is redirected to a virtual URL to be authenticated, and cookies are used as the surrogate credential. origin-ip-redirect (unsecure), where the client is redirected to a virtual URL to be authenticated, and the client IP address is used as a surrogate credential. form-cookie-redirect, where a form is presented to collect the user's credentials. The user is redirected to the authentication virtual URL before the form is presented. form-ip-redirect (unsecure), where the user is redirected to the authentication virtual URL before the form is presented. In this example, the local realm is set to Origin-Cookie-Redirect. q. Click OK to add the Authenticate Object, and then click OK to close the Set Destination Object dialog. r. In the VPM, click Install Policy. 6. Add the access log field cs-username to the SSL access log format. (Management Console Location: Configuration > Access Logging > Formats > SSL > Edit) 39
42 Reference Guide: SSL Proxy Sample CPL for Explicit Authentication You can also use the CPL to write policy. In this example, realm name is called local and the authentication mode is origin-cookie-redirect: <ssl-intercept> ssl.forward_proxy(https) <Proxy> condition=client_protocol http.method=!connect authenticate(local) authenticate.mode(origin-cookieredirect) ;Definitions define condition client_protocol client.protocol=https client.protocol=http end Question: How can I enable LDAP over SSL with a thirdparty certification authority? Answer:For instructions on configuring an LDAP server to accept LDAP queries over SSL, see the following article on the Microsoft Support site: How to enable LDAP over SSL with a third-party certification authority 40
43 Troubleshooting Tips If a site is rejected by the ProxySG, it does not necessarily mean the certificate is selfsigned or not valid. Certificates not signed by a commercial signing authority, such as those signed by the United States Department of Defense, are rejected until the CA is added to the ProxySG s store. Cannot Reach an HTTPS Site Description: A request to an HTTPS site results in a failure to reach the site and the browser displays an HTML error page that describes a certificate error. In the ProxySG event log, one of the following is displayed: "Server certificate validation failed for support.bluecoat.com at depth 0, reason Untrusted Issuer" :1../ssl_proxy/sslproxy_worker.cpp:1157 "Server certificate validation failed for at depth 0, reason Certificate expired or not valid yet" :1../ssl_proxy/sslproxy_worker.cpp:1157 Solutions: Option 1 (Most Secure): For untrusted issuer errors: Get the CA certificate from the server administrator and import it to the ProxySG. This is secure only if you can trust the CA s policies when they issue server certificates. When validating the new server certificate, make sure that a new browser instance is used. For expired certificate errors: First check the clock on your proxy. Since the expiration check compares the dates in the certificate against the proxy s clock, make sure that the correct date and time is set. If you still get certificate expired errors, the most secure solution is to get a new certificate with valid dates. This may not possible if you do not control the server. 41
44 Reference Guide: SSL Proxy Option 2 (Less Secure): Create and install policy to ignore specific errors. To ignore untrusted issuer errors <ssl> server_url.host="intranet.company.com" \ server.certificate.validate.ignore.untrusted_issuer(yes) To ignore certificate expiration errors: <ssl> server_url.host= intranet.company.com \ server.certificate.validate.ignore_expiration(yes) Upgrading and Using SSL Client Certificates with Internet Explorer After upgrading to SGOS 4.2.x or higher, client certificate authentication can stop working with Internet Explorer if the HTTPS reverse proxy service in question is not using a CA-Certificate List (CCL). This is because IE cannot handle the long list of CAs presented by SG in he handshake messages. Problem: Client certificates do not work with Internet Explorer This problem only affects Internet Explorer. Other browsers do not have this issue. Description: When the ProxySG requests a client certificate from the browser, it includes the list of CAs it trusts in the Certificate Request message. The default list of CA certificates configured on the ProxySG has grown and now spans multiple SSL records. Internet Explorer cannot handle SSL handshake messages than span multiple SSL records. Solutions: For the SSL Proxy, this issue means that the client consent certificate feature that allows the ProxySG to notify users in advance of HTTPS interception does not work with Internet Explorer. No workaround exists. For the HTTPS Reverse Proxy, you can create a CCL, which reduces the number of CAs trusted by a service to the point where Internet Explorer can handle it. Problem: How to use client certificates to communicate with servers using the SSL Proxy Description: When the SSL Proxy is intercepting HTTPS traffic, requests to a HTTPS site result in failure if the server requires a client certificate. Solution: You can use client certificates to communicate with the server when the SSL proxy is used in tunnel mode. You cannot use client certificates to communicate with the server when the SSL proxy is intercepting traffic. 42
45 Troubleshooting Tips Logging Problem: How to include other information in the SSL access log Description: The default access log fields for the SSL log do not contain any sensitive information. Only information that can be seen in the clear on the wire is included in the SSL access log. Solution: The SSL access log is customizable, meaning that you can add fields that containing sensitive information. For more information on configuring access logs, refer to Chapter 21 in the Blue Coat ProxySG Configuration and Management Guide. Problem: SSL access log contains no data Description: When you intercept and log all traffic, the log remains empty. Solution: You might be logging all https-forward-proxy connections (that is, intercepted connections) to the main facility instead of the SSL facility. Microsoft Problem: Windows Update Description: Windows Update fails when the SSL Proxy intercepts Windows Update connections. This is because Windows Update does not trust the emulated certificate presented by the SSL Proxy. Solution: Always tunnel SSL connections for Windows Update. <ssl-intercept> server.certificate.hostname=update.microsoft.com \ ssl.forward_proxy(no) ssl.forward_proxy(https) Problem: Login through HTTP with MSN IM client fails Description: Logging in to the MSN IM client fails if the SSL Proxy is intercepting HTTP traffic, and the proxy does not display a certificate pop-up. This is because the IM client does not trust the emulated certificate presented by the SSL Proxy. Solution: Write policy to disable SSL interception for login.live.com, such as: ssl-intercept> condition=!donotinterceptlist ssl.forward_proxy(https) ; Definitions define condition DoNotInterceptList server.certificate.hostname=login.live.com server.certificate.hostname=loginnet.passport.com end Solution: Import the ProxySG s issuer certificate as trusted in the browser. 43
46 Reference Guide: SSL Proxy SKYPE Problem: How to allow Skype for a specific user Description: While Skype uses HTTP and SSL as transport protocol, the application content is proprietary to Skype and does not adhere to HTTP standards. Solution: To allow Skype for a specific user: Create a firewall policy that denies clients from going directly to the Internet. Allow only the ProxySG to connect to the Internet for HTTP, HTTPS and FTP services. Install SGOS or higher with a valid SSL proxy license. Ensure that the ProxySG has SSL detection enabled for HTTP CONNECT, SOCKS, and TCP Tunnel under Configuration > Services > SSL Proxy. Verify the policy as described in Verifying Skype Request Blocking in the following TechBrief: Problem: Failed Skype logins Description: Users cannot log in to Skype. Solution: This might be caused by a known issue that occurs if you enable the Tunnel on Protocol Error option (Configuration > Proxy Settings > General tab) and the following conditions are present. Skype has a TCP read timeout (typically 20 seconds) that is usually lower than the ProxySG timeout value (the default is 300 seconds). When Tunnel on Protocol Error is enabled and all ports except 80 and 443 are blocked on the Skype client, Skype logins fail. This occurs because when the Skype node connects to port 443 through the ProxySG (that is intercepting SSL traffic), the ProxySG waits for the server certificate for 300 seconds; however, the Skype node is not sending one. The Skype node breaks the connection after its second read timeout, which causes a login failure. The workaround is to set the ProxySG value to less than the Skype timeout value seconds, which switches the connection to a tunnel because of the server certificate absence. The CLI command to change this value is: # (config ssl) ssl-nego-timeout seconds Error Messages Problem: How do I decipher error messages? Description: How do error messages indicate whether the ProxySG was acting as an SSL server or as an SSL client? Solution: When reading SSL-related event log messages, remember that: 44
47 Troubleshooting Tips If an error message begins with CFSSL:SSL_accept error, that means the ProxySG encountered errors on the client-side connection when acting as an SSL server. If an error message begins with CFSSL:SSL_connect error, that means the ProxySG encountered errors on the server side or upstream connection when acting as an SSL client. For example, the following are errors when the ProxySG was acting as an SSL server: :43:57+02:00CEST "CFSSL:SSL_accept error:1408e0f4:ssl routines:ssl3_get_message:unexpected message" :1../cf_ssl.cpp: :44:03+02:00CEST "CFSSL:SSL_accept error: :ssl routines:ssl3_get_client_certificate:cert length mismatch" :1../cf_ssl.cpp:
48 Reference Guide: SSL Proxy The following are errors when the ProxySG was acting as an SSL client: :43:57+02:00CEST "CFSSL:SSL_connect error:1408e0f4:ssl routines:ssl3_get_message:unexpected message" :1../cf_ssl.cpp: :44:03+02:00CEST "CFSSL:SSL_connect error: 1408E10B: SSL routines: SSL3_GET_SERVER_HELLO: wrong ssl version" :1../cf_ssl.cpp:
Blue Coat Systems. Reference Guide. SSL Proxy. For SGOS 5.3.1
Blue Coat Systems Reference Guide SSL Proxy For SGOS 5.3.1 Contact Information Blue Coat Systems Inc. 420 North Mary Ave Sunnyvale, CA 94085-4121 http://www.bluecoat.com/support/contactsupport http://www.bluecoat.com
Deploying the SSL Proxy
Blue Coat Systems Deployment Guide Deploying the SSL Proxy For SGOS 5.1.4 Contact Information Blue Coat Systems Inc. 420 North Mary Ave Sunnyvale, CA 94085-4121 http://www.bluecoat.com/support/contact.html
Contact Information. Document Number: 231-02909 Document Revision: SSL Proxy Deployment Guide SGOS 5.1.4
Contact Information Blue Coat Systems Inc. 420 North Mary Ave Sunnyvale, CA 94085-4121 http://www.bluecoat.com/support/contact.html [email protected] http://www.bluecoat.com For concerns or feedback
Blue Coat Security First Steps Solution for Controlling HTTPS
Solution for Controlling HTTPS SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE,
Blue Coat Systems. Client Manager Redundancy for ProxyClient Deployments
Blue Coat Systems Client Manager Redundancy for ProxyClient Deployments Copyright 1999-2013 Blue Coat Systems, Inc. All rights reserved worldwide. No part of this document may be reproduced by any means
Blue Coat Security First Steps Solution for Deploying an Explicit Proxy
Blue Coat Security First Steps Solution for Deploying an Explicit Proxy SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW,
SSL Proxy Deployment Guide
SSL Proxy Deployment Guide SGOS 6.5 and later Version: 02-07.14.15 - 2 - Copyrights 2015 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS,
Blue Coat Security First Steps Transparent Proxy Deployments
Transparent Proxy Deployments SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE,
Blue Coat Security First Steps Solution for Integrating Authentication
Solution for Integrating Authentication using IWA Direct SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
Reverse Proxy with SSL - ProxySG Technical Brief
SGOS 5 Series Reverse Proxy with SSL - ProxySG Technical Brief What is Reverse Proxy with SSL? The Blue Coat ProxySG includes the functionality for a robust and flexible reverse proxy solution. In addition
Blue Coat Security First Steps. Solution for HTTP Object Caching
Solution for HTTP Object Caching Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE, CROSSBEAM,
Blue Coat Systems. Reference Guide. WCCP Reference Guide. For SGOS 5.5-6.2
Blue Coat Systems Reference Guide WCCP Reference Guide For SGOS 5.5-6.2 Contact Information Americas: Blue Coat Systems Inc. 410 North Mary Ave Sunnyvale, CA 94085-4121 Rest of the World: Blue Coat Systems
Integrated SSL Scanning
Software Version 9.0 Copyright Copyright 1996-2008. Finjan Software Inc. and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included in this publication are the exclusive
Blue Coat Security First Steps Solution for Streaming Media
Blue Coat Security First Steps Solution for Streaming Media SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
ProxySG TechBrief Enabling Transparent Authentication
ProxySG TechBrief Enabling Transparent Authentication What is Transparent Authentication? Authentication is a key factor when defining a web access policy. When the Blue Coat ProxyxSG is configured for
Blue Coat Systems SG Appliance
Blue Coat Systems SG Appliance Configuration and Management Guide Volume 6: Advanced Networking Version SGOS 5.1.x Volume 6: Advanced Networking Contact Information Blue Coat Systems Inc. 420 North Mary
Blue Coat Systems Cloud Security Service Overview. Blue Coat Cloud Security Service (ThreatPulse)
Blue Coat Systems Cloud Security Service Overview Blue Coat Cloud Security Service (ThreatPulse) Blue Coat Cloud Security Service: Security Statements Contact Information Americas: Blue Coat Systems Inc.
Blue Coat Security First Steps Solution for Controlling Web Applications
Blue Coat Security First Steps Solution for Controlling Web Applications SGOS 6.5 Third Party Copyright Notices 2015 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW,
ProxySG 510/810 Series. Hard Disk Drive Installation
Blue Coat 510/810 Series Disk Drive Installation Blue Coat ProxySG 510/810 Series Hard Disk Drive Installation Section A: Before You Begin About this Document This document describes how to replace disk
Reverse Proxy Deployment Guide
Reverse Proxy Deployment Guide PDF of the Online WebGuide SGOS 6.5.x and Later Third Party Copyright Notices 2015 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW,
Implementing Exception Pages
Technical Brief: Implementing Exception Pages Implementing Exception Pages SGOS 5 Series Developed using SGOS 5.3.1.4 What are Exception Pages? Exception pages are Web pages (messages sent to users under
Blue Coat Systems. PacketShaper Redundant Setup
Blue Coat Systems PacketShaper Redundant Setup Copyright 1999-2013 Blue Coat Systems, Inc. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified, decompiled,
HTTPS HTTP. ProxySG Web Server. Client. ProxySG TechBrief Reverse Proxy with SSL. 1 Technical Brief
ProxySG TechBrief Reverse Proxy with SSL What is Reverse Proxy with SSL? The Blue Coat ProxySG includes the basis for a robust and flexible reverse proxy solution. In addition to web policy management,
Blue Coat Systems. Reference Guide. WCCP Reference Guide. For SGOS 5.3
Blue Coat Systems Reference Guide WCCP Reference Guide For SGOS 5.3 Contact Information Blue Coat Systems Inc. 420 North Mary Ave Sunnyvale, CA 94085-4121 http://www.bluecoat.com/support/contact.html [email protected]
Integrated SSL Scanning
Version 9.2 SSL Enhancements Copyright 1996-2008. Finjan Software Inc. and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included in this publication are the exclusive
Blue Coat Security First Steps Solution for Integrating Authentication Using LDAP
Solution for Integrating Authentication Using LDAP SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
SuperLumin Nemesis. Administration Guide. February 2011
SuperLumin Nemesis Administration Guide February 2011 SuperLumin Nemesis Legal Notices Information contained in this document is believed to be accurate and reliable. However, SuperLumin assumes no responsibility
ProxySG ICAP Integration
ProxySG ICAP Integration Blue Coat s proxies can utilize the Internet Content Adaptation Protocol (ICAP) to hand off HTTP requests and/or responses to an external server for configured processing and transformation.
Decrypt Inbound SSL Traffic for Passive Security Device (D-H)
Decrypt Inbound SSL Traffic for Passive Security Device (D-H) SSL Visibility Appliance First Steps Guide Third Party Copyright Notices 2015 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG,
Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01
Secure Web Service - Hybrid Policy Server Setup Release 9.2.5 Manual Version 1.01 M86 SECURITY WEB SERVICE HYBRID QUICK START USER GUIDE 2010 M86 Security All rights reserved. 828 W. Taft Ave., Orange,
DameWare Server. Administrator Guide
DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx
Blue Coat Systems ProxySG Appliance
Blue Coat Systems ProxySG Appliance Configuration and Management Suite Volume 5: Advanced Networking Version SGOS 5.3.x Volume 5: Advanced Networking Contact Information Blue Coat Systems Inc. 420 North
User Identification and Authentication
User Identification and Authentication Vital Security 9.2 Copyright Copyright 1996-2008. Finjan Software Inc.and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included
Downloading and Configuring WebFilter
Downloading and Configuring WebFilter What is URL Filtering? URL filtering is a type of transaction content filtering that limits a user s Web site access through a policy that is associated with a specific
M86 Web Filter USER GUIDE for M86 Mobile Security Client. Software Version: 5.0.00 Document Version: 02.01.12
M86 Web Filter USER GUIDE for M86 Mobile Security Client Software Version: 5.0.00 Document Version: 02.01.12 M86 WEB FILTER USER GUIDE FOR M86 MOBILE SECURITY CLIENT 2012 M86 Security All rights reserved.
LDAP Authentication and Authorization
LDAP Authentication and Authorization What is LDAP Authentication? Today, the network can include elements such as LANs, WANs, an intranet, and the Internet. Many enterprises have turned to centralized
Blue Coat ProxySG Authentication Guide. SGOS 6.5.x
Blue Coat ProxySG Authentication Guide SGOS 6.5.x 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE, CROSSBEAM, K9,
ProxySG TechBrief Implementing a Reverse Proxy
ProxySG TechBrief Implementing a Reverse Proxy What is a reverse proxy? The Blue Coat ProxySG provides the basis for a robust and flexible Web communications solution. In addition to Web policy management,
QUICK START GUIDE. Cisco S170 Web Security Appliance. Web Security Appliance
1 0 0 0 1 1 QUICK START GUIDE Web Security Appliance Web Security Appliance Cisco S170 303417 Cisco S170 Web Security Appliance 1 Welcome 2 Before You Begin 3 Document Network Settings 4 Plan the Installation
Installation and configuration guide
Installation and Configuration Guide Installation and configuration guide Adding X-Forwarded-For support to Forward and Reverse Proxy TMG Servers Published: May 2010 Applies to: Winfrasoft X-Forwarded-For
Secure Web Appliance. SSL Intercept
Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...
Trustwave SEG Cloud Customer Guide
Trustwave SEG Cloud Customer Guide Legal Notice Copyright 2015 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation
Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
SolarWinds Technical Reference
SolarWinds Technical Reference Using SSL Certificates in Web Help Desk Introduction... 1 How WHD Uses SSL... 1 Setting WHD to use HTTPS... 1 Enabling HTTPS and Initializing the Java Keystore... 1 Keys
Citrix Access Gateway Plug-in for Windows User Guide
Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance
Installation and configuration guide
Installation and Configuration Guide Installation and configuration guide Adding X-Username support to Forward and Reverse Proxy TMG Servers Published: December 2010 Applies to: Winfrasoft X-Username for
Blue Coat Security First Steps Solution for Recording and Reporting Employee Web Activity
Solution for Recording and Reporting Employee Web Activity SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Executive Summary. What is Authentication, Authorization, and Accounting? Why should I perform Authentication, Authorization, and Accounting?
Executive Summary As the leader in Wide Area Application Delivery, Blue Coat products accelerate and secure applications within your WAN and across the Internet. Blue Coat provides a robust and flexible
Cisco AnyConnect Secure Mobility Solution Guide
Cisco AnyConnect Secure Mobility Solution Guide This document contains the following information: Cisco AnyConnect Secure Mobility Overview, page 1 Understanding How AnyConnect Secure Mobility Works, page
ISA Server Plugins Setup Guide
ISA Server Plugins Setup Guide Secure Web (Webwasher) Version 1.3 Copyright 2008 Secure Computing Corporation. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed,
How to configure SSL proxying in Zorp 3 F5
How to configure SSL proxying in Zorp 3 F5 June 14, 2013 This tutorial describes how to configure Zorp to proxy SSL traffic Copyright 1996-2013 BalaBit IT Security Ltd. Table of Contents 1. Preface...
SSL Certificate Verification
SSL Certificate Verification Websense Content Gateway v7.8.x Websense Content Gateway SSL Certificate Verification October, 2013 R221013781 Copyright 1996-2013 Yahoo, Inc., and Websense, Inc. All rights
Certificate technology on Pulse Secure Access
Certificate technology on Pulse Secure Access How-to Guide Published Date July 2015 Contents Introduction: 3 Creating a Certificate signing request (CSR): 3 Import Intermediate CAs: 5 Using Trusted Client
HTTPS Inspection with Cisco CWS
White Paper HTTPS Inspection with Cisco CWS What is HTTPS? Hyper Text Transfer Protocol Secure (HTTPS) is a secure version of the Hyper Text Transfer Protocol (HTTP). It is a combination of HTTP and a
SSL Interception on Proxy SG
SSL Interception on Proxy SG Proxy SG allows for interception of HTTPS traffic for Content Filtering and Anti Virus, and for Application Acceleration. This document describes how to setup a demonstration
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Applied Technology Abstract The Web-based approach to system management taken by EMC Unisphere
Proxy Forwarding Access Method
Proxy Forwarding Access Method Version 6.8.3/Doc Revision: 12/17/15 Blue Coat Web Security Service Proxy Fowarding Access Method Copyrights 2015 Blue Coat Systems, Inc.All rights reserved. BLUE COAT, PROXYSG,
Installation Guide Supplement
Installation Guide Supplement for use with Microsoft ISA Server and Forefront TMG Websense Web Security Websense Web Filter v7.5 1996 2010, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd.,
Best Practices for Controlling Skype within the Enterprise. Whitepaper
Best Practices for Controlling Skype within the Enterprise Whitepaper INTRODUCTION Skype (rhymes with ripe ) is a proprietary peer-to-peer (P2P) voice over Internet protocol (VoIP) network, founded by
Content Analysis System Guide
Content Analysis System Guide Version 1.1.4.1 - 2 - Content Analysis System Administration Guide Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER,
Citrix Access on SonicWALL SSL VPN
Citrix Access on SonicWALL SSL VPN Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through SonicWALL SSL VPN 5.0. It also includes information about configuring
DEPLOYMENT GUIDE Version 2.1. Deploying F5 with Microsoft SharePoint 2010
DEPLOYMENT GUIDE Version 2.1 Deploying F5 with Microsoft SharePoint 2010 Table of Contents Table of Contents Introducing the F5 Deployment Guide for Microsoft SharePoint 2010 Prerequisites and configuration
Setup Guide Access Manager Appliance 3.2 SP3
Setup Guide Access Manager Appliance 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS
Blue Coat Systems ProxySG Appliance
Blue Coat Systems ProxySG Appliance Configuration and Management Suite Volume 2: Proxies and Proxy Services Version SGOS 5.3.x Volume 2: Proxies and Proxy Services Contact Information Blue Coat Systems
Copyright 2012 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Product Manual. Administration and Configuration Manual
Product Manual Administration and Configuration Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is" with
ProxyCap Help. Table of contents. Configuring ProxyCap. 2015 Proxy Labs
ProxyCap Help 2015 Proxy Labs Table of contents Configuring ProxyCap The Ruleset panel Loading and saving rulesets Delegating ruleset management The Proxies panel The proxy list view Adding, removing and
Blue Coat Systems SG Appliance
Blue Coat Systems SG Appliance Configuration and Management Guide Volume 5: Securing the Blue Coat SG Appliance SGOS Version 5.1.x Volume 5: Securing the Blue Coat SG Appliance Contact Information Blue
Proxy Forwarding Access Method
Proxy Forwarding Access Method Version 6.8.5/Doc Revision: 02/26/16 Blue Coat Web Security Service/Page 2 Proxy Fowarding Access Method/Page 3 Copyrights 2016 Blue Coat Systems, Inc.All rights reserved.
Certificate technology on Junos Pulse Secure Access
Certificate technology on Junos Pulse Secure Access How-to Introduction:... 1 Creating a Certificate signing request (CSR):... 1 Import Intermediate CAs: 3 Using Trusted Client CA on Juno Pulse Secure
ProxySG TechBrief Downloading & Configuring Web Filter
ProxySG TechBrief Downloading & Configuring Web Filter What is Content Filtering? URL filtering is the process of limiting a user s Web site access through a policy that is associated with a specific URL
Initial Configuration Guide
Blue Coat Systems ProxySG VA Initial Configuration Guide For SGOS 5.5.2 or later Platform: ESX / ESXi Server Contact Information Americas: Blue Coat Systems Inc. 410 North Mary Ave Sunnyvale, CA 94085-4121
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
MadCap Software. Upgrading Guide. Pulse
MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished
Application Note Configuring Department of Defense Common Access Card Authentication on McAfee. Firewall Enterprise
Application Note Configuring Department of Defense Common Access Card Authentication on McAfee Firewall Enterprise McAfee Firewall Enterprise version 7.x and 8.x This application note describes how to
Investment Management System. Connectivity Guide. IMS Connectivity Guide Page 1 of 11
Investment Management System Connectivity Guide IMS Connectivity Guide Page 1 of 11 1. Introduction This document details the necessary steps and procedures required for organisations to access the Homes
1 You will need the following items to get started:
QUICKSTART GUIDE 1 Getting Started You will need the following items to get started: A desktop or laptop computer Two ethernet cables (one ethernet cable is shipped with the _ Blocker, and you must provide
Configuration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
Setup Guide Access Manager 3.2 SP3
Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
Deploying with Websense Content Gateway
Deploying with Websense Content Gateway Websense Content Gateway is a high-performance Web proxy that provides realtime content scanning and Web site classification to protect network computers from malicious
SSL-VPN 200 Getting Started Guide
Secure Remote Access Solutions APPLIANCES SonicWALL SSL-VPN Series SSL-VPN 200 Getting Started Guide SonicWALL SSL-VPN 200 Appliance Getting Started Guide Thank you for your purchase of the SonicWALL SSL-VPN
Blue Coat Systems SG Appliance
Blue Coat Systems SG Appliance Volume 2: Proxies and Proxy Services Version SGOS 5.2.2 Contact Information Blue Coat Systems Inc. 420 North Mary Ave Sunnyvale, CA 94085-4121 http://www.bluecoat.com/support/contact.html
Introduction to Mobile Access Gateway Installation
Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure
Web Security Firewall Setup. Administrator Guide
Web Security Firewall Setup Administrator Guide Web Security Firewall Setup Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec,
Installing and Configuring vcenter Support Assistant
Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
Direct or Transparent Proxy?
Direct or Transparent Proxy? Choose the right configuration for your gateway. Table of Contents Direct Proxy...3 Transparent Proxy...4 Other Considerations: Managing authentication made easier.....4 SSL
GFI Product Manual. Web security, monitoring and Internet access control. Administrator Guide
GFI Product Manual Web security, monitoring and Internet access control Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as
TechNote. Contents. Overview. Using a Windows Enterprise Root CA with DPI-SSL. Network Security
Network Security Using a Windows Enterprise Root CA with DPI-SSL Contents Overview... 1 Deployment Considerations... 2 Configuration Procedures... 3 Importing the Public CA Certificate for Trust... 3 Importing
Using PacketShaper to Control Bring Your Own Device Traffic
Blue Coat Systems Using PacketShaper to Control Bring Your Own Device Traffic Tips and Tricks Supporting the BYOD Worldwide Phenomenon Copyright 1999-2013 Blue Coat Systems, Inc. All rights reserved worldwide.
IWA AUTHENTICATION FUNDAMENTALS AND DEPLOYMENT GUIDELINES
IWA AUTHENTICATION FUNDAMENTALS AND DEPLOYMENT GUIDELINES TECHNICAL BRIEF INTRODUCTION The purpose of this document is to explain how Integrated Windows Authentication (IWA) works with the ProxySG appliance,
Deploying the BIG-IP System with Microsoft IIS
Deploying the BIG-IP System with Welcome to the F5 deployment guide for Microsoft Internet Information Services (IIS). This document contains guidance on configuring the BIG-IP system version 11.4 and
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
WebMarshal User Guide
WebMarshal User Guide Legal Notice Copyright 2014 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation is
Dell SonicWALL SRA 7.5 Citrix Access
Dell SonicWALL SRA 7.5 Citrix Access Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through Dell SonicWALL SRA 7.5. It also includes information about
The Benefits of SSL Content Inspection ABSTRACT
The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic
Cisco S380 and Cisco S680 Web Security Appliance
QUICK START GUIDE Cisco S380 and Cisco S680 Web Security Appliance 1 Welcome 2 Before You Begin 3 Document Network Settings 4 Plan the Installation 5 Install the Appliance in a Rack 6 Plug In the Appliance
Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario
Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.2 November 2015 Last modified: November 3, 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing
Deploying F5 for Microsoft Office Web Apps Server 2013
Deploying F5 for Microsoft Office Web Apps Server 2013 Welcome to the F5 - Microsoft Office Web Apps Server deployment guide. This document contains guidance on configuring the BIG-IP Local Traffic Manager
