How to configure the Panda GateDefender Performa explicit proxy in a Local User Database or in a LDAP server



Similar documents
How to configure DNAT in order to publish internal services via Internet

How to Create a Basic VPN Connection in Panda GateDefender eseries

Panda Security for Exchange Servers

HOWTO: How to configure IPSEC gateway (office) to gateway

Howto: How to configure static port mapping in the corporate router/firewall for Panda GateDefender Integra VPN networks

Panda Perimeter Management Console. Guide for Partners

HTTPS HTTP. ProxySG Web Server. Client. ProxySG TechBrief Reverse Proxy with SSL. 1 Technical Brief

Reverse Proxy Guide. Version 2.0 April 2016

LDAP Authentication and Authorization

ProxySG TechBrief LDAP Authentication with the ProxySG

Secure Web Service - Hybrid. Policy Server Setup. Release Manual Version 1.01

Technical Note. Configuring Outlook Web Access with Secure WebMail Proxy for eprism

ProxySG TechBrief Implementing a Reverse Proxy

DIGIPASS Authentication for GajShield GS Series

Hosting more than one FortiOS instance on. VLANs. 1. Network topology

SCENARIO EXAMPLE. Case study of an implementation of Swiss SafeLab M.ID with Citrix. Redundancy and Scalability

User Identification and Authentication

Application Note. ShoreTel 9: Active Directory Integration. Integration checklist. AN June 2009

Implementing SSL Offload with JAGUAR Ver.1.0

HOWTO: How to configure VPN SSL roadwarrior to gateway

TIBCO Spotfire Web Player 6.0. Installation and Configuration Manual


Integrating LANGuardian with Active Directory

Cyclope Internet Filtering Proxy. - Installation Guide -

SMART Vantage. Installation guide

M86 Web Filter USER GUIDE for M86 Mobile Security Client. Software Version: Document Version:

DIGIPASS Authentication for Citrix Access Gateway VPN Connections

How to set up the HotSpot module with SmartConnect. Panda GateDefender 5.0

eprism Security Suite

Deploying F5 to Replace Microsoft TMG or ISA Server

Multi-factor Authentication using Radius

Dell SonicWALL SRA 7.5 Citrix Access

PRODUCT VERSION: LYNC SERVER 2010, LYNC SERVER 2013, WINDOWS SERVER 2008

Microsoft Lync Server 2010

Avatier Identity Management Suite

Application Note. Configuring McAfee Firewall Enterprise for McAfee Web Protection Service

Use FortiWeb to Publish Applications


CONFIGURING AND USING WEBDAV IN LENOVO EMC LIFELINE

Reverse Proxy with SSL - ProxySG Technical Brief

Owner of the content within this article is Written by Marc Grote

1 You will need the following items to get started:

ISA Server Plugins Setup Guide

V Series Rapid Deployment Version 7.5

Installation and configuration guide

BusinessObjects Enterprise XI Release 2

DameWare Server. Administrator Guide

Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview

Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions

Installation Guide Supplement

HP Device Manager 4.6

Installation and configuration guide

About Archiving for Microsoft Exchange Server

Apache Server Implementation Guide

Active Directory 2008 Implementation. Version 6.410

Folder Proxy + OWA + ECP/EAC Guide. Version 2.0 April 2016

Customer Tips. Xerox Network Scanning HTTP/HTTPS Configuration using Microsoft IIS. for the user. Purpose. Background

Acano Solution 1.1. Multi-tenancy Considerations. Acano. April B

Integrated SSL Scanning

SuperLumin Nemesis. Administration Guide. February 2011

Use Enterprise SSO as the Credential Server for Protected Sites

F-Secure Messaging Security Gateway. Deployment Guide

Configuring SonicWALL TSA on Citrix and Terminal Services Servers

How To Set Up A Load Balancer With Windows 2010 Outlook 2010 On A Server With A Webmux On A Windows Vista V (Windows V2) On A Network With A Server (Windows) On

Basic Exchange Setup Guide

Microsoft SQL Server Installation Guide

Two Factor Authentication in SonicOS

Name Services (DNS): This is Quick rule will enable the Domain Name Services on the firewall.

App Orchestration 2.0

Configuring Steel-Belted RADIUS Proxy to Send Group Attributes

Virtual Web Appliance Setup Guide

Immotec Systems, Inc. SQL Server 2005 Installation Document

Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication

Configuring Load Balancing

Configuring Microsoft Active Directory for Integration with NextPage NXT 3 Access Control

DEPLOYMENT OF I M INTOUCH (IIT) IN TYPICAL NETWORK ENVIRONMENTS. Single Computer running I m InTouch with a DSL or Cable Modem Internet Connection

Configuring Multiple ACE Management Servers VMware ACE 2.0

Polycom RealPresence Resource Manager System Getting Started Guide

Wavecrest Certificate

Product Manual. Administration and Configuration Manual

2X Cloud Portal v10.5

Web Security Firewall Setup. Administrator Guide

ADFS Integration Guidelines

Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008

A Guide to New Features in Propalms OneGate 4.0

Lepide Exchange Recovery Manager

Microsoft SQL Server 2008 R2 Express Edition with Advanced Services Installation Guide

Configuration Guide. How to Configure SSL VPN Features in DSR Series. Overview

Citrix Access on SonicWALL SSL VPN

Product Guide Addendum. SafeWord Check Point User Management Console Version 2.1

Technical Brief ActiveSync Configuration for WatchGuard SSL 100

Integrated Citrix Servers

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2

Virtual Managment Appliance Setup Guide

GFI Product Manual. Web security, monitoring and Internet access control. Administrator Guide

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.

Quadro Configuration Console User's Guide. Table of Contents. Table of Contents

Configuration Guide. for the Lepide User Password Expiration Reminder

HP Device Manager 4.7

Transcription:

How to configure the Panda GateDefender Performa explicit proxy in a Local User Database or in a LDAP server Copyright notice Panda Security 2010. All rights reserved. Neither the documents nor the programs that you may access may be copied, reproduced, translated or transferred to any electronic or readable media without prior written permission from Panda Security, c/ Gran Vía Don Diego López de Haro 4, 48001 Bilbao (Biscay) Spain. Registered Trademark Panda Security. TruPrevent: Registered in U.S.A Patent and Trademark Office. Windows Vista and the Windows logo are trademarks or registered trademarks of Microsoft Corporation in the United States and other countries. All other product names may be registered trademarks of their respective owners. D. L. BI- 1915-07 Panda Security 2010. All rights reserved. Panda GateDefender Performa Page 2 of 13

Table of contents 1. Introduction... 4 2. Scenarios... 4 2.1 Scenario A Panda GateDefender Performa Local User Database... 4 2.2 Scenario B Panda GateDefender Performa LDAP User Database... 8 3. Steps to add the Web Proxy information into the web browse... 12 Table of Figures Figure 1 - Local groups and users... 4 Figure 2 - Explicit proxy... 5 Figure 3 - User groups allowed for the explicit proxy... 5 Figure 4 - User authentication... 6 Figure 5 - List of settings... 6 Figure 6 - Profiles: Settings... 6 Figure 7 - Assign settings to local profiles... 7 Figure 8 - Protection profile management... 7 Figure 9 - Protection profile settings... 7 Figure 10 - LDAP servers... 8 Figure 11 -HTTP/HTTPS - Enable operation as proxy... 9 Figure 12 - User groups allowed for the explicit proxy... 9 Figure 13 - User authentication... 10 Figure 14 - List of settings... 10 Figure 15 - Profiles: settings... 10 Figure 16 - Assign settings to local profiles... 10 Figure 17 - Protection profile management... 11 Figure 18 - Protection profile settings... 11 Figure 19 - Internet Explorer Lan Settings... 12 Figure 20 - Access to page denied... 12 Panda GateDefender Performa Page 3 of 13

1. Introduction This document describes the steps that need to be followed in order to enable and configure the Panda GateDefender Performa explicit proxy server. The examples used in this documentation correspond to a network schema with the following general settings: GD Console IP: 172.16.1.1 GD Network IP Defined: 192.168.201.199 GD Explicit Proxy IP to be created: 192.168.201.10 Default Network Gateway: 192.168.201.1 Depending on the customer s scenario, you will need to apply the configuration that best matches the network. In this document, the following scenarios are described: 1. Scenarios a. Scenario A Panda GateDefender Performa Local User Database b. Scenario B - LDAP Server (Active Directory): 192.168.201.2 2. Steps to add the Web Proxy information into the web browser. 2. Scenarios 2.1 Scenario A Panda GateDefender Performa Local User Database 1. Users definition. In order to define users, go to Settings >> System >> Domain users >> Local groups and users and add the required users and groups. Figure 1 - Local groups and users Panda GateDefender Performa Page 4 of 13

2. Explicit Proxy configuration. a. Go to Settings >> System >> General >> Explicit proxy b. Select the Enable operation as proxy for HTTP/HTTPS checkbox. c. Enter the following data: i. Proxy IP address ii. Network mask iii. HTTP and HTTPs ports on which the proxy will listen. Figure 2 - Explicit proxy If you configure the proxy with an IP that already exists on the network, a duplicated IP event is generated, which you will see in the System Report screen (a warning will also be displayed in the Status screen). Note: To enable the explicit proxy you must have previously configured the internal networks. d. Select Use authentication checkbox and click Select users to configure the groups that can use the internal proxy. Check the needed groups and save the configuration. 3. Server Authentication. Figure 3 - User groups allowed for the explicit proxy Panda GateDefender Performa Page 5 of 13

Configure Authentication through the Proxy. IP Address should be set as the Explicit Proxy s address. In the case below we are using HTTP and HTTPS protocols to authenticate. Figure 4 - User authentication 4. Protection profile definition Click Modify or New and set up your modules. Figure 5 - List of settings To set specific information choose Edit Settings to edit the protections for this profile. Figure 6 - Profiles: Settings Panda GateDefender Performa Page 6 of 13

Finally click OK to apply the new settings within the Settings Profile. 5. Apply the settings to a particular group of users: Assign settings to local profiles Figure 7 - Assign settings to local profiles In this exaple, a profile known as Blockl_all is created and it will be assigned to the User group Localusers Test Group. Figure 8 - Protection profile management Next, choose the settings created from step 4 and finally click OK to apply the new profile. Figure 9 - Protection profile settings Panda GateDefender Performa Page 7 of 13

2.2 Scenario B Panda GateDefender Performa LDAP User Database 1. Define the LDAP Sources in: Settings >> System >> Domain users >> LDAP users. 2. In this example: BaseDN: cn=users; dc=samplecompany, dc=local BindDN: cn=administrator, cn=users, dc=samplecompany, dc=local 3. Explicit Proxy configuration. Figure 10 - LDAP servers a. Go to Settings >> System >> General >> Explicit proxy b. Select the Enable operation as proxy for HTTP/HTTPS checkbox. c. Enter the following data: i. Proxy IP address ii. Network mask Panda GateDefender Performa Page 8 of 13

iii. HTTP and HTTPs ports on which the proxy will listen. Figure 11 -HTTP/HTTPS - Enable operation as proxy If you configure the proxy with an IP that already exists on the network, a duplicated IP event is generated, which you will see in the System Report screen (a warning will also be displayed in the Status screen). Note: To enable the explicit proxy you must have previously configured the internal networks. 4. Select Use authentication checkbox and click Select users to configure the groups that can use the internal proxy. Check the needed groups and save the configuration. 5. Server Authentication. Figure 12 - User groups allowed for the explicit proxy Configure Authentication through the Proxy. IP Address should be set as the Explicit Proxy s Address. In the case below HTTP and HTTPS protocols to authenticate is used. Panda GateDefender Performa Page 9 of 13

Figure 13 - User authentication 6. Protection profile definition. Click Modify or New and set up your modules. Figure 14 - List of settings To set specific information choose Edit Settings to edit the protections for this profile. Figure 15 - Profiles: settings Finally click OK to apply the new settings within the Settings Profile. 7. Apply the settings to a particular group of users: Assign settings to local profiles Figure 16 - Assign settings to local profiles Panda GateDefender Performa Page 10 of 13

In this case, a Profile known as GDTest_Admin is created and it will be assigned to the User group from the SampleCompany LDAP group known as GDTest_Admin. Figure 17 - Protection profile management Next choose the Settings that you created from step 6 and finally click OK to apply the new profile. Figure 18 - Protection profile settings Panda GateDefender Performa Page 11 of 13

3. Steps to add the Web Proxy information into the web browse Finally, regardless of the selected scenario, add the Web Proxy information into the web browser. For Internet Explorer go to Internet Options >> Connections >> LAN Settings and check the box to use a Proxy server. Then click Advanced and add the proxy along with the ports. In the case of this test environment, the Panda GateDefender Performa IP was added to the exceptions list. Figure 19 - Internet Explorer Lan Settings Verify that the sites are being blocked. You should be presented with the Access Denied page. Figure 20 - Access to page denied Panda GateDefender Performa Page 12 of 13

Note: The Web filter engine works by querying a cache file. When a page is first visited the file is checked and the appropriate action is taken. If the URL is not in the cache, a query is sent to the servers to determine what type of site the URL is classified under. This query then feeds the cache, so that the information about the URL is available for future access attempts. This means that the first time a brand new website is tried within a network the user will be able to get to the home page. Each subsequent visit will choose the appropriate action as normal. Panda GateDefender Performa Page 13 of 13