PAC File Best Practices with Web Security Gateway and Web Security Gateway Anywhere
|
|
|
- Arabella Newton
- 10 years ago
- Views:
Transcription
1 PAC File Best Practices with Web Security Gateway and Web Security Gateway Anywhere PAC File Best Practices Web Security Gateway (Anywhere) Version 7.x This article examines Proxy Auto-Configuration (PAC) files and their use and best practices with Websense Web Security Gateway and Web Security Gateway Anywhere (hybrid Web filtering). Topics include: What is a PAC file? How is a PAC file consumed? Using a PAC file with Web Security Gateway Using a PAC file with Web Security Gateway Anywhere Sample PAC file PAC file best practices What is a PAC file? PAC File Best Practices Web Security Gateway (Anywhere) Version 7.x A Proxy Auto-Configuration (PAC) file is a JavaScript function definition that determines whether web browser requests (HTTP, HTTPS, and FTP) go direct to the destination or are forwarded to a web proxy server. PAC files are used to support explicit proxy deployments in which client browsers are explicitly configured to send traffic to the web proxy. The big advantage of PAC files is that they are usually relatively easy to create and maintain. The use of a PAC file is highly recommended with explicit proxy deployments of Websense Web Security Gateway (for the Content Gateway -- web proxy Websense, Inc.
2 component) and is required to support the hybrid web filtering feature of Web Security Gateway Anywhere. Note These Internet resources provide excellent information, including PAC file JavaScript reference information, PAC file examples, and links to additional information: This website: ( The Wikipedia article titled: Proxy auto-config ( These Microsoft knowledge base articles: An IE10 presentation that focuses on WPAD files: Enable Automatic Detection and Configuration of Browser Settings ( An older discussion with more information about PAC files: Using Automatic Configuration, Automatic Proxy, and Automatic Detection ( dd aspx) A PAC file is a JavaScript function definition for FindProxyForURL(url, host). The complexity of the function varies with the requirements of each organization. A PAC file is: Flexible and extensible Supported by all popular browsers Easy to administer and maintain in any size network; however, as this paper explains, PAC files are easiest to administer when the browser is Internet Explorer Able to support mobile devices that use standard browsers A PAC file can: Determine where Internet and intranet requests are routed Allow for exceptions in the form of bypassing the proxy for specified destinations Perform load distribution Handle proxy failover Because PAC files are written in JavaScript, they support the structure, logic, and extensibility of JavaScript. See JavaScript functions most commonly used in a PAC file. Proxy Auto-Configuration Best Practices 2
3 Why use a PAC file? In explicit proxy and hybrid deployments of Web Security Gateway and Web Security Gateway Anywhere, using a PAC file fulfills several vital functions: 1. The PAC file provides critical security, ensuring that traffic is always proxied when it should be, while allowing secure requests to go direct to the destination. Typically, Internet-bound HTTP, HTTPS, and FTP traffic is sent to the proxy. Typically, intranet traffic goes direct to the destination. Exceptions can be made for internal or external sites that, for whatever reason, must go to or bypass the proxy. 2. The PAC file locks down the web browser s LAN egress configuration. The PAC file should be appropriately permission-protected so that end-users cannot change it. This is most easily accomplished when the PAC file is administered with a Group Policy Object. See How do I configure a Group Policy so that Internet Explorer uses the PAC file? 3. The PAC file provides a flexible, easy to maintain, script-driven method of controlling the routing of web requests. 4. The PAC file can include code that handles proxy load distribution and failover. Note It is important from an organizational security perspective that end users be prohibited from installing unapproved applications on their computers. Without such restrictions, users could install alternate browsers in an attempt to circumvent PAC controls. Within the organizational perimeter, by application of appropriate firewall rules, users should be forced to browse through the designated proxy server(s) only. How is a PAC file consumed? PAC File Best Practices Web Security Gateway (Anywhere) Version 7.x Web browsers are configured to look for and read the PAC file each time the browser is started, or at regular intervals when pushed by a Group Policy Object (GPO). When a URL request is made, the browser calls the FindProxyForURL(url, host) function to determine the request s routing disposition (to a proxy or direct to the destination). Although the PAC file can be placed on each individual client machine, this is an uncommon and inefficient approach. The common arrangement is to host the PAC file on a server that all clients have access to. In smaller deployments, the Content Proxy Auto-Configuration Best Practices 3
4 Gateway host system can be used. In large enterprises the PAC file should be hosted on an existing (dedicated) web server that all clients have access to. Alternatively, the Web Proxy Auto-discovery Protocol (WPAD) can be used to assist browsers in locating and retrieving the WPAD file, which contains the PAC function definition. WPAD not an option for hybrid; see Using a PAC file with Web Security Gateway Anywhere, below). Note Internet Explorer versions 5.5 and higher include a feature called Automatic Proxy Result Cache. This feature can cause problems in environments that use a PAC file and have multiple proxy servers. See What is Internet Explorer Automatic Proxy Result Cache? WPAD: Web Proxy Autodiscovery Protocol The Web Proxy Autodiscovery Protocol (WPAD) is a method used by web browsers to locate the URL of a PAC file automatically, without manual configuration. WPAD can be used with Content Gateway, but is not an option with hybrid web filtering. WPAD uses two methods to publish the location of the proxy configuration file the Dynamic Host Configuration Protocol (DHCP), and the Domain Name System (DNS). A web browser using this method sends a query to the local DHCP server and if it does not send back the desired information, uses DNS. For more information about using WPAD with Content Gateway, see Using WPAD. Specifying the PAC location The exact mechanism for configuring a browser to locate and use a PAC file depends on the browser and network environment. If you are using Microsoft Active Directory and Internet Explorer, you can automate the process via a Group Policy Object (GPO). This is the recommended, best practice. A GPO is a simple, versatile tool for configuring computers and user settings for members of Active Directory Domain Services. For configuration details, see How do I configure a Group Policy so that Internet Explorer uses the PAC file? For an introduction to Group Policy, see these Microsoft TechNet articles: Group Policy for Beginners and Managing Browser Settings with Group Policy Tools. Unfortunately, use of GPO to configure other browsers is usually unsupported. Search the Internet for the availability of GPO add-on support for the browser used in your organization. Users can also set up their browsers manually. The most popular browsers implement this feature in very similar ways. Proxy Auto-Configuration Best Practices 4
5 For Internet Explorer 7.0 and later: 1. Navigate to Tools > Internet Options > Connections > LAN Settings. 2. Select Use automatic configuration script field, and enter the following in the Address field: Ensure everything under Proxy server panel is unchecked. 3. Click OK. For Mozilla Firefox 2.0 and later: 1. Navigate to Tools > Options > Advanced > Network > Connection > Settings. 2. Select Automatic proxy configuration URL field, and enter: 3. Click Reload, and then click OK. For Opera: 1. Navigate to Tools > Preferences > Advanced tab. 2. Select Network > Proxy Servers > Use Automatic proxy configuration (check only this option). 3. Enter the location of the PAC file. For example, file://c:/proxy.pac See the documentation for your browser for details. Using a PAC file with Web Security Gateway PAC File Best Practices Web Security Gateway (Anywhere) Version 7.x Content Gateway is the on-premises web proxy component of the Web Security Gateway and Web Security Gateway Anywhere solutions. For smaller enterprises where the user load requires only a single proxy, the Content Gateway host system may also host the PAC file. For larger enterprises that require more scale, the PAC file should be hosted on an existing (dedicated) web server that all of the client machines can access. The Content Gateway manager provides a UI page for specifying and maintaining a PAC or WPAD file. In the Content Gateway manager, go to Configure > Content Routing > Browser Auto-Config > PAC. For step-by-step instructions, see Using a PAC file. Proxy Auto-Configuration Best Practices 5
6 If you have enabled SSL support to inspect HTTPS traffic as it transits Content Gateway, see Running in explicit proxy mode. Important If you have configured Content Gateway to use Integrated Windows Authentication to perform user authentication, you must specify the fully qualified domain name (FQDN) of the proxy whenever a request is directed to the proxy in the PAC file. For example: wgc1.example.com:8080 Using a PAC file with Web Security Gateway Anywhere PAC File Best Practices Web Security Gateway (Anywhere) Version 7.x Websense Web Security Gateway Anywhere combines on-premises and hybrid (in-the-cloud) filtering as needed, to manage Internet activity. Typically, the on-premises software provides web security for the main office or campus, while smaller regional offices or satellite locations send their Internet requests through the hybrid service. Hybrid filtering is also useful for users who are off-network, such as telecommuters and those who travel for business. In this hybrid web security solution, the PAC file used to enable hybrid filtering contains a number of global settings, and also allows you to configure sites that users can access directly without sending the request to the hybrid service (for example, intranet sites or organizational web mail). All users are configured with a single PAC file. This PAC file applies whether the user is inside the network or outside the network. A common PAC file definition will direct users to the on-premises Content Gateway when they are inside the network, and to the hybrid service when they are outside the network. However, other configurations are possible. For complete information on configuring hybrid filtering, including information about customizing the PAC file, see Configure Hybrid Filtering and the sections it links to. Proxy Auto-Configuration Best Practices 6
7 Sample PAC file PAC File Best Practices Web Security Gateway (Anywhere) Version 7.x This example PAC file illustrates how to: Normalize the requested URL for pattern matching Bypass the proxy when the destination is a plain hostname (a hostname that does not include a domain) Bypass the proxy for a defined set of local domains Bypass the proxy for Windows Update Bypass non-routable addresses (RFC 3330) Send remaining HTTP, HTTPS, and FTP traffic to a specific proxy function FindProxyForURL(url, host) /* Normalize the URL for pattern matching url = url.tolowercase(); host = host.tolowercase(); /* Don't proxy local hostnames */ if (isplainhostname(host)) return 'DIRECT'; /* Don't proxy local domains */ if (dnsdomainis(host, ".example1.com") (host == "example1.com") dnsdomainis(host, ".example2.com") (host == "example2.com") dnsdomainis(host, ".example3.com") (host == "example3.com")) return 'DIRECT'; /* Don't proxy Windows Update */ if ((host == "download.microsoft.com") (host == "ntservicepack.microsoft.com") (host == "cdm.microsoft.com") (host == "wustat.windows.com") (host == "windowsupdate.microsoft.com") (dnsdomainis(host, ".windowsupdate.microsoft.com")) (host == "update.microsoft.com") (dnsdomainis(host, ".update.microsoft.com")) (dnsdomainis(host, ".windowsupdate.com"))) Proxy Auto-Configuration Best Practices 7
8 return 'DIRECT'; if (isresolvable(host)) var hostip = dnsresolve(host); /* Don't proxy non-routable addresses (RFC 3330) */ if (isinnet(hostip, ' ', ' ') isinnet(hostip, ' ', ' ') isinnet(hostip, ' ', ' ') isinnet(hostip, ' ', ' ') isinnet(hostip, ' ', ' ') isinnet(hostip, ' ', ' ') isinnet(hostip, ' ', ' ') isinnet(hostip, ' ', ' ') isinnet(hostip, ' ', ' ') isinnet(hostip, ' ', ' ') isinnet(hostip, ' ', ' ')) return 'DIRECT'; /* Don't proxy local addresses.*/ if (false) return 'DIRECT'; if (url.substring(0, 5) == ' url.substring(0, 6) == ' url.substring(0, 4) == 'ftp:') return 'PROXY wcg1.example.com:8080'; return 'DIRECT'; The following is a simple example of load distribution and failover using DNS. Search the Internet for other methods. if (isinnet(myipaddress(), " ", " ")) return "PROXY wcg1.example.com:8080; " + "PROXY wcg2.example.com:8080"; if (isinnet(myipaddress(), " ", " ")) return "PROXY wcg1.example.com:8080; " + "PROXY wcg2.example.com:8080"; Proxy Auto-Configuration Best Practices 8
9 if (isinnet(myipaddress(), " ", " ")) return "PROXY wcg2.example.com:8080; " + "PROXY wcg1.example.com:8080"; if (isinnet(myipaddress(), " ", " ")) return "PROXY wcg2.example.com:8080; " + "PROXY wcg1.example.com:8080"; else return "DIRECT"; PAC file best practices PAC File Best Practices Web Security Gateway (Anywhere) Version 7.x JavaScript best practices for PAC files JavaScript functions most commonly used in a PAC file How do I restrict the browsers allowed in my network to only those that can be configured with a PAC or WPAD file? How do I configure a Group Policy so that Internet Explorer uses the PAC file? What is Internet Explorer Automatic Proxy Result Cache? How do I specify a URL in a PAC file to bypass Content Gateway? JavaScript best practices for PAC files The Javascript skills needed for most PAC file development are modest. Occasionally, an advanced understanding is needed. A good Internet resource is the website Whether you are creating a new PAC file or assuming responsibilities for an existing file, these best practices are worth consideration. The list is inspired by and incorporates many entries from a blog post by Lee Harvey titled Proxy Automatic Config (PAC) File Tips. Thoroughly review and understand the PAC file before making changes. Use the PAC or WPAD facility in Content Gateway to maintain the PAC or WPAD file. If you choose to edit the file separately, be sure to use a text editor that does not add or change formatting (e.g. vi, notepad, etc.). Comment the code consistent with programming best practices. Successors should have no questions about the intent of the code. Keep the file as small and efficient as possible. Validate support for built-in JavaScript functions before using them. Check URL and host parameters before using them. Proxy Auto-Configuration Best Practices 9
10 Check simple rule exceptions first. Place high-probability checks near the top. Use efficient regular expressions, and avoid capturing matches that will not be used. Because return is immediate, avoid using else with if statements. Single-line if() statements do not require begin and end brackets. Carefully consider the use (overuse) of isresolvable(), dnsresolve(), and isinnet() for potential DNS performance issues. Avoid using external or global variables and functions. Because.pac files are text and can be downloaded and viewed by anyone, use appropriate file permissions and avoid revealing secrets. When possible, sort lists of IP addresses and/or domains to ease future maintenance efforts. When possible, group common return values into single conditional if() checks. For single proxy server environments, return the proxy s static IP address to bypass the DNS lookup overhead. Test all conditions and exceptions used in your.pac file prior to deployment. Verify that your JavaScript is error-free. JavaScript functions most commonly used in a PAC file From PAC Functions Explained ( isplainhostname() This function returns true if the hostname contains no dots. Useful when applying exceptions for internal websites that may not require resolution of a hostname to IP address to determine if local. if (isplainhostname(host)) return "DIRECT"; dnsdomainis() Evaluates hostnames and returns true if hostnames match. Used mainly to match and exception individual host names. if (dnsdomainis(host, ".google.com")) return "DIRECT"; Proxy Auto-Configuration Best Practices 10
11 localhostordomainis() Evaluates hostname and only returns true if an exact hostname match is found. if (localhostordomainis(host, " return "DIRECT"; isresolvable() Attempts to resolve a hostname to an IP address and returns true if successful. WARNING - This may cause a browser to temporarily hang if a domain is not resolvable. if (isresolvable(host)) return "PROXY proxy1.example.com:8080"; isinnet() This function evaluates the IP address of a hostname and if a specified subnet returns true. If a hostname is passed, the function will resolve the hostname to an IP address. if (isinnet(host, " ", " ")) return "DIRECT"; dnsresolve() Resolves hostnames to an IP address. This function can be used to reduce the number of DNS lookups. var resolved_ip = dnsresolve(host); if (isinnet(resolved_ip, " ", " ") isinnet(resolved_ip, " ", " ") isinnet(resolved_ip, " ", " ") isinnet(resolved_ip, " ", " ")) return "DIRECT"; myipaddress() Returns the IP address of the host machine. if (isinnet(myipaddress(), " ", " ")) return "DIRECT"; Proxy Auto-Configuration Best Practices 11
12 dnsdomainlevels() This function returns the number of DNS domain levels (number of dots) in the hostname. Can be used to exception internal websites which use short DNS names, such as: if (dnsdomainlevels(host) > 0) return "PROXY proxy1.example.com:8080"; else return "DIRECT"; shexpmatch() Attempts to match hostname or URL to a specified shell expression and returns true if matched. if (shexpmatch(url, "*vpn.domain.com*") shexpmatch(url, "*abcdomain.com/folder/*")) return "DIRECT"; weekdayrange() Can be used to specify different proxies for a specific day range. Note: the example employs 'proxy1.example.com' Monday through Friday. if (weekdayrange("mon", "FRI")) return "PROXY proxy1.example.com:8080"; else return "DIRECT"; daterange() Can be used to specify different proxies for a specific date range. Note: The example employs 'proxy1.example.com' January through March. if (daterange("jan", "MAR")) return "PROXY proxy1.example.com:8080"; else return "DIRECT"; timerange() Can be used to specify different proxies for a specific time range. Note: The example employs 'proxy1.example.com' 8 AM to 6 PM. if (timerange(8, 18)) return "PROXY proxy1.example.com:8080"; else return "DIRECT"; Proxy Auto-Configuration Best Practices 12
13 Potential PAC function issues From the Wikipedia article titled Proxy auto-config ( Proxy_auto-config) with additions from the Websense knowledge base. A PAC file may have the following limitations: dnsresolve The function dnsresolve (and similar other functions) performs a DNS lookup that can block your browser for a long time if the DNS server does not respond. If you cache proxy auto-configuration results by domain name in your browser (such as Microsoft s Internet Explorer 5.5 or higher) instead of the path of the URL, it limits the flexibility of the PAC standard. Alternatively, you can disable caching of proxy auto-configuration results by editing the registry. It is recommended to always use IP addresses instead of host domain names in the isinnet function for compatibility with other Windows components that make use of the Internet Explorer PAC settings, such as.net 2.0 Framework. For example, if (isinnet(host, dnsresolve(sampledomain), " ")) //.NET 2.0 will resolve proxy properly if (isinnet(host, sampledomain, " ")) //.NET 2.0 will not resolve proxy properly The current convention is to fail over to the direct connection when a PAC file is unavailable. When switching quickly between network configurations (for example, when entering or leaving a VPN), dnsresolve may give outdated results due to DNS caching. For instance, Firefox usually keeps 20 domain entries cached for 60 seconds. This may be configured via the network.dnscacheentries and network.dnscacheexpiration preference variables. Flushing the system s dns cache may also help, (such as by using the sudo service dns-clean start in Linux). myipaddress The myipaddress function has often been reported to give wrong or unusable results (for example, , the IP address of the localhost). It may help to remove any lines referring to the machine hostname on the system s host file (such as /etc/hosts on Linux). Also, when the browser is Firefox 3 or higher, and the operating system has IPv6 enabled, which is the default in Windows 7 and Vista, the myipaddress function returns the IPv6 address, which is not usually expected nor programed for in the PAC file. For a discussion of solutions, see this Mozilla forum discussion. Proxy Auto-Configuration Best Practices 13
14 Others Further limitations are related to the JavaScript engine on the local machine. Note Some versions of Java have had problems with common proxy PAC file functions such as isinnet(). Please review the Java open issues in the release notes for the versions of Java used by your client browsers. How do I restrict the browsers allowed in my network to only those that can be configured with a PAC or WPAD file? If you are using Microsoft Active Directory and Internet Explorer, the recommended approach is to use a Group Policy Object (GPO). Windows Group Policy is designed for centralized IT control and configuration of Windows computers that are members of Active Directory Domain Services. For configuration details, see How do I configure a Group Policy so that Internet Explorer uses the PAC file? For an introduction to Group Policy, see these Microsoft TechNet articles: Group Policy for Beginners and Managing Browser Settings with Group Policy Tools. Most other browsers will consume a PAC file but do not provide support for GPO. This makes it much more challenging for administrators to control the configuration and use of alternate browser (Firefox 3 offered a GPO add-on, but Firefox 3 is long gone). Search the Internet for tools and strategies available for your organization s chosen browser. Note In addition to controlling which browsers are allowed and managing their configuration, it is essential that proper firewall policy is in place. No traffic should be allowed to go direct to the Internet, bypassing the proxy, unless it is explicitly allowed by policy. How do I configure a Group Policy so that Internet Explorer uses the PAC file? 1. Log on to a server in the domain, and, with administrative permissions, open Start > Programs > Administrative Tools > Active Directory Users & Computers and expand your domain. 2. Right click the top-level domain or Organizational Unit where the policy should be applied, select Properties, and then select the Group Policy tab. 3. Create a GPO and give it a meaningful name (Hosted Web Security, for example). Proxy Auto-Configuration Best Practices 14
15 4. Edit the GPO from the following location: User configuration > Windows Settings > Internet Explorer Maintenance > Connection > Automatic Browser Configuration 5. Select Enable Automatic Configuration. 6. Under Auto-proxy URL (.JS,.JVS, or.pac file), enter the path to the PAC file. If you are running Websense Web Security Gateway Anywhere (hybrid) you will find the path for the PAC file located in the Web Security manager under Settings > Hybrid Configuration > User Access > Proxy Auto- Configuration (PAC). It will look something like this: 7. In Automatically configure every field, specify how often the web browser should query for the auto-configuration. For example, if you enter 240 minutes, every 4 hours the web browser checks for an updated PAC file. If you leave this field blank or set it to 0 the web browser is only configured when it is started. Note Web clients using Internet Explorer pick up the settings in this GPO the next time that group policy refreshes, which by default is every 90 minutes for clients, and every 5 minutes for Domain Controllers (or the next time a user logs off and on again). You can change the refresh interval in the default domain policy, or by going to a particular client and entering the following at the command prompt: gpupdate /force Also note that if the GPO is not applying the settings to the browser, then it is possible that another GPO is being applied that contains different settings; raising the link order for the new GPO should resolve the problem. What is Internet Explorer Automatic Proxy Result Cache? With most browsers, the PAC file FindProxyForURL() function is called every time a request is made. However, versions of Internet Explorer since 5.5 include a feature called Automatic Proxy Result Cache that caches the hostname of the requested URL and the proxy that is returned by the FindProxyForURL() function (as <hostname, server>). This has the advantage of minimizing calls to FindProxyForURL(), but imposes 2 important limits: 1. Because the Automatic Proxy Result Cache is indexed by hostname, it is impossible for a PAC file to distribute traffic to distinct proxy servers based on any part of a URL in addition to the hostname. In other words, it is impossible to direct traffic to different proxy servers based on the path portion of URLs on a single host. Proxy Auto-Configuration Best Practices 15
16 2. Because Automatic Proxy Result Cache caches the hostname/first_server pair, rather than the full results of the FindProxyForURL() function (full URL and multiple servers, if so scripted), the failover from one proxy to another does not occur in the event of a problem, even if the FindProxyForURL() function returned a list of proxy servers. This feature is discussed in more detail in the Microsoft knowledge base article titled How to disable automatic proxy caching in Internet Explorer. How do I specify a URL in a PAC file to bypass Content Gateway? PAC files are easily modified to specify any number of URLs that will bypass the proxy. Such entries are often referred to as exceptions. Most PAC files already have 1 or more exceptions. A common exception is for internal networks. For example: if (isinnet(host, " ", " ")) return "DIRECT"; An entry for an external site might look like: if (shexpmatch(url, "*.webex.com/*")) return "DIRECT"; Warning Some versions of Java have had problems with common proxy PAC file functions such as isinnet(). Please review the Java open issues in the release notes for the versions of Java used by your client browsers. Proxy Auto-Configuration Best Practices 16
Smart Connect. Deployment Guide
Smart Connect Deployment Guide Smart Connect Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo,
Quickstart guide to Configuring WebTitan
Quickstart guide to Configuring WebTitan 1. Install the License Once you have received the evaluation license by e-mail, you log on to WebTitan as follows using a browser as admin/hiadmin. Then navigate
Blue Coat Security First Steps Solution for Deploying an Explicit Proxy
Blue Coat Security First Steps Solution for Deploying an Explicit Proxy SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW,
Designing and implementing effective PAC file solutions
Designing and implementing effective PAC file solutions Copyright 2006 ScanSafe. All Rights Reserved. This document may not, in whole or in part, be copied, photocopied, reproduced, translated, or reduced
User Guide. Cloud Gateway Software Device
User Guide Cloud Gateway Software Device This document is designed to provide information about the first time configuration and administrator use of the Cloud Gateway (web filtering device software).
Web Protection Services Setup Guide Product Version: Web Protection
Web Protection Services Setup Guide Product Version: Web Protection Release Date: November, 2010 Document Version: 0.3 RESTRICTION ON USE, PUBLICATION, OR DISCLOSURE OF PROPRIETARY INFORMATION. Copyright
Setup Guide Revision C. McAfee SaaS Web Protection Service
Setup Guide Revision C McAfee SaaS Web Protection Service COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
Direct or Transparent Proxy?
Direct or Transparent Proxy? Choose the right configuration for your gateway. Table of Contents Direct Proxy...3 Transparent Proxy...4 Other Considerations: Managing authentication made easier.....4 SSL
V Series Rapid Deployment Version 7.5
V Series Rapid Deployment Version 7.5 Table of Contents Module 1: First Boot Module 2: Configure P1 and N interfaces Module 3: Websense Software installation (Reporting Server) Module 4: Post installation
NetSpective Global Proxy Configuration Guide
NetSpective Global Proxy Configuration Guide Table of Contents NetSpective Global Proxy Deployment... 3 Configuring NetSpective for Global Proxy... 5 Restrict Admin Access... 5 Networking... 6 Apply a
Using RADIUS Agent for Transparent User Identification
Using RADIUS Agent for Transparent User Identification Using RADIUS Agent Web Security Solutions Version 7.7, 7.8 Websense RADIUS Agent works together with the RADIUS server and RADIUS clients in your
DC Agent Troubleshooting
DC Agent Troubleshooting Topic 50320 DC Agent Troubleshooting Web Security Solutions v7.7.x, 7.8.x 27-Mar-2013 This collection includes the following articles to help you troubleshoot DC Agent installation
Quick Start 5: Introducing and configuring Websense Cloud Web Security solution
Quick Start 5: Introducing and configuring Websense Cloud Web Security solution Websense Support Webinar April 2013 TRITON STOPS MORE THREATS. WE CAN PROVE IT. 2013 Websense, Inc. Page 1 Presenter Greg
Secure Web Appliance. SSL Intercept
Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...
Investment Management System. Connectivity Guide. IMS Connectivity Guide Page 1 of 11
Investment Management System Connectivity Guide IMS Connectivity Guide Page 1 of 11 1. Introduction This document details the necessary steps and procedures required for organisations to access the Homes
Centralized Cloud Firewall. Ivan Ivanovic BUCC/AMRES Tbilisi, December 2013.
Centralized Cloud Firewall Ivan Ivanovic BUCC/AMRES Tbilisi, December 2013. AMRES NREN 172 institutions ~2200 km dark fiber links 22 cities 3 cross border optical links Redundant Geant internet links 1
Blue Coat Security First Steps Solution for Integrating Authentication
Solution for Integrating Authentication using IWA Direct SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
Transparent Identification of Users
Transparent Identification of Users Websense Web Security Solutions v7.5, v7.6 Transparent Identification of Users 1996 2011, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA
Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01
Secure Web Service - Hybrid Policy Server Setup Release 9.2.5 Manual Version 1.01 M86 SECURITY WEB SERVICE HYBRID QUICK START USER GUIDE 2010 M86 Security All rights reserved. 828 W. Taft Ave., Orange,
Fasthosts Internet Parallels Plesk 10 Manual
Fasthosts Internet Parallels Plesk 10 Manual Introduction... 2 Before you begin... 2 Logging in to the Plesk control panel... 2 Securing access to the Plesk 10 control panel... 3 Configuring your new server...
Configuration Manual English version
Configuration Manual English version Frama F-Link Configuration Manual (EN) All rights reserved. Frama Group. The right to make changes in this Installation Guide is reserved. Frama Ltd also reserves the
ez Agent Administrator s Guide
ez Agent Administrator s Guide Copyright This document is protected by the United States copyright laws, and is proprietary to Zscaler Inc. Copying, reproducing, integrating, translating, modifying, enhancing,
Trouble Shooting SiteManager to GateManager access
Trouble Shooting SiteManager to GateManager access If you are unsure if a SiteManager will be able to access the GateManager through the corporate firewall, or you experience connection issues, this document
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
DEPLOYMENT GUIDE Version 2.1. Deploying F5 with Microsoft SharePoint 2010
DEPLOYMENT GUIDE Version 2.1 Deploying F5 with Microsoft SharePoint 2010 Table of Contents Table of Contents Introducing the F5 Deployment Guide for Microsoft SharePoint 2010 Prerequisites and configuration
Network Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
Setting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
Step-by-Step Configuration
Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Printing Date: August 15, 2007 This guide provides detailed description on configuration of the local network which
WPAD TECHNOLOGY WEAKNESSES. Sergey Rublev Expert in information security, "Positive Technologies" ([email protected])
WPAD TECHNOLOGY WEAKNESSES Sergey Rublev Expert in information security, "Positive Technologies" ([email protected]) MOSCOW 2009 CONTENTS 1 INTRODUCTION... 3 2 WPAD REVIEW... 4 2.1 PROXY AUTO CONFIGURATION
Secure Web Appliance. Reverse Proxy
Secure Web Appliance Reverse Proxy Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About Reverse Proxy... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...
Setup Guide Revision A. WDS Connector
Setup Guide Revision A WDS Connector COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee CleanBoot, McAfee
Infor Xtreme Browser References
Infor Xtreme Browser References This document describes the list of supported browsers, browser recommendations and known issues. Contents Infor Xtreme Browser References... 1 Browsers Supported... 2 Browser
Websense Content Gateway v7.x: Troubleshooting
Websense Content Gateway v7.x: Troubleshooting Topic 60042 Content Gateway Troubleshooting Updated: 28-October-2013 Dropped HTTPS connections Websites that have difficulty transiting Content Gateway Low
Web Security Service
Webroot Web Security Service Desktop Web Proxy Configuration Guide Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO 80021 www.webroot.com Desktop Web Proxy Configuration Guide September
Configuring PA Firewalls for a Layer 3 Deployment
Configuring PA Firewalls for a Layer 3 Deployment Configuring PAN Firewalls for a Layer 3 Deployment Configuration Guide January 2009 Introduction The following document provides detailed step-by-step
TRITON - Web Security Help
TRITON - Web Security Help Websense Web Security Websense Web Filter v7.6 1996 2015, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published 2015 Printed in the
Network Agent Quick Start
Network Agent Quick Start Topic 50500 Network Agent Quick Start Updated 17-Sep-2013 Applies To: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere, v7.7 and 7.8 Websense
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Remote Filtering Software
Remote Filtering Software Websense Web Security Solutions v7.7-7.8 1996 2013, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published 2013 The products and/or
Using DC Agent for Transparent User Identification
Using DC Agent for Transparent User Identification Using DC Agent Web Security Solutions v7.7, 7.8 If your organization uses Microsoft Windows Active Directory, you can use Websense DC Agent to identify
The Barracuda Network Connector. System Requirements. Barracuda SSL VPN
Barracuda SSL VPN The Barracuda SSL VPN allows you to define and control the level of access that your external users have to specific resources inside your internal network. For users such as road warriors
vcloud Director User's Guide
vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
Getting Started Guide
Getting Started Guide CensorNet Professional Copyright CensorNet Limited, 2007-2011 This document is designed to provide information about the first time configuration and testing of the CensorNet Professional
Using Logon Agent for Transparent User Identification
Using Logon Agent for Transparent User Identification Websense Logon Agent (also called Authentication Server) identifies users in real time, as they log on to domains. Logon Agent works with the Websense
v7.8.2 Release Notes for Websense Content Gateway
v7.8.2 Release Notes for Websense Content Gateway Topic 60086 Web Security Gateway and Gateway Anywhere 12-Mar-2014 These Release Notes are an introduction to Websense Content Gateway version 7.8.2. New
TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION
TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION Contents 1. Getting Started... 4 1.1 Specops Deploy Supported Configurations... 4 2. Specops Deploy and Active Directory...5 3. Specops Deploy
Installing and Using the vnios Trial
Installing and Using the vnios Trial The vnios Trial is a software package designed for efficient evaluation of the Infoblox vnios appliance platform. Providing the complete suite of DNS, DHCP and IPAM
2 Downloading Access Manager 3.1 SP4 IR1
Novell Access Manager 3.1 SP4 IR1 Readme May 2012 Novell This Readme describes the Novell Access Manager 3.1 SP4 IR1 release. Section 1, Documentation, on page 1 Section 2, Downloading Access Manager 3.1
Product Manual. Administration and Configuration Manual
Product Manual Administration and Configuration Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is" with
Initial Access and Basic IPv4 Internet Configuration
Initial Access and Basic IPv4 Internet Configuration This quick start guide provides initial and basic Internet (WAN) configuration information for the ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
Websense Web Security Gateway: What to do when a Web site does not load as expected
Websense Web Security Gateway: What to do when a Web site does not load as expected Websense Support Webinar November 2011 web security data security email security Support Webinars 2009 Websense, Inc.
Plesk 11 Manual. Fasthosts Customer Support
Fasthosts Customer Support Plesk 11 Manual This guide covers everything you need to know in order to get started with the Parallels Plesk 11 control panel. Contents Introduction... 3 Before you begin...
Filter Avoidance and Anonymous Proxy Guard
March 21, 2011 Author: Audience: SWAT Team Evaluator Product: Cymphonix Network Composer EX Series, XLi OS version 9 Filter Avoidance and Anonymous Proxy Guard Filter Avoidance The award winning XLi technology
XIA Configuration Server
XIA Configuration Server XIA Configuration Server v7 Installation Quick Start Guide Monday, 05 January 2015 1 P a g e X I A C o n f i g u r a t i o n S e r v e r Contents Requirements... 3 XIA Configuration
6421B: How to Install and Configure DirectAccess
Demonstration Overview Introduction In preparation for this demonstration, the following computers have been configured: NYC-DC1 is an Active Directory Domain Services (AD DS) domain controller and DNS
Trouble Shooting SiteManager to GateManager access via a corporate Intranet
Trouble Shooting SiteManager to GateManager access via a corporate Intranet If you are unsure if a SiteManager will be able to access the GateManager through the corporate firewall, or you experience connection
Fundamentals of Windows Server 2008 Network and Applications Infrastructure
Fundamentals of Windows Server 2008 Network and Applications Infrastructure MOC6420 About this Course This five-day instructor-led course introduces students to network and applications infrastructure
Barracuda Link Balancer Administrator s Guide
Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks
Installing and Configuring vcenter Support Assistant
Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION
HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION Version 1.1 / Last updated November 2012 INTRODUCTION The Cloud Link for Windows client software is packaged as an MSI (Microsoft Installer)
Test Case 3 Active Directory Integration
April 12, 2010 Author: Audience: Joe Lowry and SWAT Team Evaluator Test Case 3 Active Directory Integration The following steps will guide you through the process of directory integration. The goal of
Chapter 2 Connecting the FVX538 to the Internet
Chapter 2 Connecting the FVX538 to the Internet Typically, six steps are required to complete the basic connection of your firewall. Setting up VPN tunnels are covered in Chapter 5, Virtual Private Networking.
Websense Support Webinar: Questions and Answers
Websense Support Webinar: Questions and Answers Configuring Websense Web Security v7 with Your Directory Service Can updating to Native Mode from Active Directory (AD) Mixed Mode affect transparent user
How to connect your new virtual machine to the Internet
This excerpt is taken from book Installing and Configuring SharePoint 2010 2 nd Edition. You can download this FREE ebook from the following link: http://walisystemsinc.com/installing_and_configuring_sharepoint2010_2nd_ed.php
www.mvatcybernet.com PRODUCT VERSION: LYNC SERVER 2010, LYNC SERVER 2013, WINDOWS SERVER 2008
PRODUCT VERSION: LYNC SERVER 2010, LYNC SERVER 2013, WINDOWS SERVER 2008 With Forefront Threat Management Gateway 2010 now discontinued, we sought a suitable reverse proxy solution that works with Lync
Lab 5 Explicit Proxy Performance, Load Balancing & Redundancy
Lab 5 Explicit Proxy Performance, Load Balancing & Redundancy Objectives The purpose of this lab is to demonstrate both high availability and performance using virtual IPs coupled with DNS round robin
Remote Filtering Software
Remote Filtering Software Websense Web Security Websense Web Filter v7.5 1996 2010, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published 2010 The products and/or
Step-by-Step Guide for Setting Up IPv6 in a Test Lab
Step-by-Step Guide for Setting Up IPv6 in a Test Lab Microsoft Corporation Published: July, 2006 Author: Microsoft Corporation Abstract This guide describes how to configure Internet Protocol version 6
WHITE PAPER Citrix Secure Gateway Startup Guide
WHITE PAPER Citrix Secure Gateway Startup Guide www.citrix.com Contents Introduction... 2 What you will need... 2 Preparing the environment for Secure Gateway... 2 Installing a CA using Windows Server
Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway
Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway Websense Support Webinar January 2010 web security data security email security
Name Services (DNS): This is Quick rule will enable the Domain Name Services on the firewall.
How to configure quick set up rules You can configure rules/policies using Quick setup to get the Firewall up and running in no time. To do this log in to the Firewall, browse to Firewall > Policies >
OUTLOOK ADDIN V1.5 ABOUT THE ADDIN
OUTLOOK ADDIN V1.5 ABOUT THE ADDIN The SpamTitan Outlook Addin v1.5 allows reporting of SPAM and HAM messages to the SpamTitan appliance, these messages are then examined by the SpamTitan Bayesian filter
Docufide Client Installation Guide for Windows
Docufide Client Installation Guide for Windows This document describes the installation and operation of the Docufide Client application at the sending school installation site. The intended audience is
Deploying F5 to Replace Microsoft TMG or ISA Server
Deploying F5 to Replace Microsoft TMG or ISA Server Welcome to the F5 deployment guide for configuring the BIG-IP system as a forward and reverse proxy, enabling you to remove or relocate gateway security
M86 Web Filter USER GUIDE for M86 Mobile Security Client. Software Version: 5.0.00 Document Version: 02.01.12
M86 Web Filter USER GUIDE for M86 Mobile Security Client Software Version: 5.0.00 Document Version: 02.01.12 M86 WEB FILTER USER GUIDE FOR M86 MOBILE SECURITY CLIENT 2012 M86 Security All rights reserved.
Hosting more than one FortiOS instance on. VLANs. 1. Network topology
Hosting more than one FortiOS instance on a single FortiGate unit using VDOMs and VLANs 1. Network topology Use Virtual domains (VDOMs) to divide the FortiGate unit into two or more virtual instances of
GFI Product Manual. Web security, monitoring and Internet access control. Administrator Guide
GFI Product Manual Web security, monitoring and Internet access control Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as
SSL-VPN 200 Getting Started Guide
Secure Remote Access Solutions APPLIANCES SonicWALL SSL-VPN Series SSL-VPN 200 Getting Started Guide SonicWALL SSL-VPN 200 Appliance Getting Started Guide Thank you for your purchase of the SonicWALL SSL-VPN
Installation and Deployment
Installation and Deployment Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Installation and Deployment SmarterStats
DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP system v10 with Microsoft Exchange Outlook Web Access 2007
DEPLOYMENT GUIDE Version 1.2 Deploying the BIG-IP system v10 with Microsoft Exchange Outlook Web Access 2007 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Microsoft Outlook Web
Apache Server Implementation Guide
Apache Server Implementation Guide 340 March Road Suite 600 Kanata, Ontario, Canada K2K 2E4 Tel: +1-613-599-2441 Fax: +1-613-599-2442 International Voice: +1-613-599-2441 North America Toll Free: 1-800-307-7042
Using the XMLA connector with proxies and SSL
Technical Note: Using the XMLA connector with proxies and SSL Revision History: Version Author Details 1 1.0 Laurentiu Iordache Created this document Page 1 of 8 Table of Contents Introduction... 3 XMLA
Customer Tips. Xerox Network Scanning HTTP/HTTPS Configuration using Microsoft IIS. for the user. Purpose. Background
Xerox Multifunction Devices Customer Tips June 5, 2007 This document applies to these Xerox products: X WC Pro 232/238/245/ 255/265/275 for the user Xerox Network Scanning HTTP/HTTPS Configuration using
SyncLockStatus Evaluator s Guide
SyncLockStatus Evaluator s Guide 2011 Table of Contents Introduction... 2 System Requirements... 2 Required Microsoft Components... 2 Contact Information... 3 SyncLockStatus Architecture... 3 SyncLockStatus
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see
Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab
Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab Microsoft Corporation Published: May, 2005 Author: Microsoft Corporation Abstract This guide describes how to create
Introduction to Mobile Access Gateway Installation
Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure
ZyWALL SSL 10. User s Guide. Integrated SSL-VPN Appliance. www.zyxel.com. Version 2.00 12/2008 Edition 1
ZyWALL SSL 10 Integrated SSL-VPN Appliance User s Guide Version 2.00 12/2008 Edition 1 www.zyxel.com About This User's Guide About This User's Guide Intended Audience This manual is intended for people
REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.1.0.XXX Requirements and Implementation Guide (Rev 4-10209) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis Training Series
Chapter 15: Advanced Networks
Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical
Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W
Article ID: 5037 Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W Objective IPSec VPN (Virtual Private Network) enables you to securely obtain remote resources by establishing
Web Request Routing. Technical Brief. What s the best option for your web security deployment?
Web Request Routing and Redirection What s the best option for your web security deployment? Choosing the right method for redirecting traffic to your secure web gateway is absolutely essential to maximize
DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12
DEPLOYMENT GUIDE Version 1.2 Deploying F5 with Oracle E-Business Suite 12 Table of Contents Table of Contents Introducing the BIG-IP LTM Oracle E-Business Suite 12 configuration Prerequisites and configuration
The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.
WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard
Virtual Appliances. Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V. Virtual Appliance Setup Guide for Umbrella Page 1
Virtual Appliances Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V Virtual Appliance Setup Guide for Umbrella Page 1 Table of Contents Overview... 3 Prerequisites... 4 Virtualized Server
RSA Security Analytics
RSA Security Analytics Event Source Log Configuration Guide Microsoft Windows using Eventing Collection Last Modified: Thursday, July 30, 2015 Event Source Product Information: Vendor: Microsoft Event
DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5
DEPLOYMENT GUIDE Version 1.2 Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Microsoft IIS Prerequisites and configuration
How To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap (
WHITEPAPER BackupAssist Version 5.1 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Contents Introduction... 3 Hardware Setup Instructions... 3 QNAP TS-409... 3 Netgear ReadyNas NV+... 5 Drobo rev1...
