Advanced Secure Gateway Proxy Admin
Advanced Secure Gateway Proxy Admin
6.6.x
i
Advanced Secure Gateway 6.6.x Proxy Administration Guide
Contact Information
Americas:
Blue Coat Systems Inc.
384 Santa Trinita Avenue
Sunnyvale, CA 94085
http://www.bluecoat.com/contact/customer-support
http://www.bluecoat.com
For concerns or feedback about the documentation:
[email protected]
ii
© 2016 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW,
INTELLIGENCECENTER, CACHEOS, CACHEPULSE, CROSSBEAM, K9, DRTR, MACH5, PACKETWISE, POLICYCENTER,
PROXYAV, PROXYCLIENT, SGOS, WEBPULSE, SOLERA NETWORKS, DEEPSEE, DS APPLIANCE, SEE EVERYTHING. KNOW
EVERYTHING., SECURITY EMPOWERS BUSINESS, BLUETOUCH, the Blue Coat shield, K9, and Solera Networks logos and other
Blue Coat logos are registered trademarks or trademarks of Blue Coat Systems, Inc. or its affiliates in the U.S. and certain other
countries. This list may not be complete, and the absence of a trademark from this list does not mean it is not a trademark of Blue
Coat or that Blue Coat has stopped using the trademark. All other trademarks mentioned in this document owned by third parties
are the property of their respective owners. This document is for informational purposes only.
BLUE COAT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS
DOCUMENT. BLUE COAT PRODUCTS, TECHNICAL SERVICES, AND ANY OTHER TECHNICAL DATA REFERENCED IN THIS
DOCUMENT ARE SUBJECT TO U.S. EXPORT CONTROL AND SANCTIONS LAWS, REGULATIONS AND REQUIREMENTS,
AND MAY BE SUBJECT TO EXPORT OR IMPORT REGULATIONS IN OTHER COUNTRIES. YOU AGREE TO COMPLY STRICTLY
WITH THESE LAWS, REGULATIONS AND REQUIREMENTS, AND ACKNOWLEDGE THAT YOU HAVE THE RESPONSIBILITY
TO OBTAIN ANY LICENSES, PERMITS OR OTHER APPROVALS THAT MAY BE REQUIRED IN ORDER TO EXPORT,
RE-EXPORT, TRANSFER IN COUNTRY OR IMPORT AFTER DELIVERY TO YOU.
iii
Advanced Secure Gateway 6.6.x Proxy Administration Guide
iv
Contents
Chapter 1: Introduction
Document Conventions ................................................................................................................... 22
Notes and Warnings......................................................................................................................... 23
About Procedures ............................................................................................................................. 24
Chapter 3: Licensing
License Types.............................................................................................................................. 57
Licensing Terms ......................................................................................................................... 57
License Expiration...................................................................................................................... 58
Locating the System Serial Number ........................................................................................ 59
MACH5 or Secure Web Gateway Obtaining a BlueTouch Online Account .................... 59
Registering and Licensing Blue Coat Appliance and Software........................................... 60
Installing a License on a Registered System........................................................................... 60
Manually Installing the License ............................................................................................... 61
Enabling Automatic License Updates ........................................................................................... 64
Viewing the Current License Status............................................................................................... 65
1
Chapter 5: Backing Up the Configuration
Archiving Quick Reference Table .................................................................................................. 81
Creating a Transferable Archive..................................................................................................... 91
Creating and Uploading an Archive to a Remote Server ......................................................... 101
2
Specifying an Issuer Keyring and CCL Lists for SSL Interception ................................... 234
Using Client Consent Certificates.......................................................................................... 234
Downloading an Issuer Certificate ........................................................................................ 235
Warn Users When Accessing Websites with Untrusted Certificates ...................................... 238
Presenting Untrusted Certificates to a Browser .................................................................. 238
Set the Behavior when Encountering Untrusted Certificates ............................................ 238
Viewing SSL History Statistics...................................................................................................... 245
Unintercepted SSL Data .......................................................................................................... 245
Unintercepted SSL Clients ...................................................................................................... 246
Unintercepted SSL Bytes ......................................................................................................... 246
Configuring STunnel...................................................................................................................... 248
Viewing STunnel Results............................................................................................................... 250
Application Mix........................................................................................................................ 252
Viewing Session Statistics ....................................................................................................... 252
Viewing Protocol Details ........................................................................................................ 253
Access Logging......................................................................................................................... 253
Viewing Encrypted Tap Results ............................................................................................ 256
Working with the SafeNet Java HSM .......................................................................................... 257
Before You Begin ...................................................................................................................... 257
Add an HSM ............................................................................................................................. 258
Add an HSM Keyring.............................................................................................................. 258
Add an HSM Keygroup .......................................................................................................... 259
Write HSM Policy ........................................................................................................................... 260
3
Chapter 12: Managing the Domain Name Service (DNS) Proxy
Chapter 16: Using the Advanced Secure Gateway Appliance in an IPv6 Environment
Using the Advanced Secure Gateway Appliance in an ISATAP Network............................ 327
IPv6 Support on the Advanced Secure Gateway....................................................................... 330
Configuring an ADN for an IPv6 Environment......................................................................... 340
Optimizing ISATAP Traffic........................................................................................................... 341
Configuring IPv6 Global Settings................................................................................................. 342
4
Considerations Before Configuring WebPulse Services..................................................... 367
Enabling a Content Filter Provider .............................................................................................. 373
Specifying a Blue Coat Data Source ...................................................................................... 374
Downloading the Content Filter Database ................................................................................. 375
About Database Updates ........................................................................................................ 375
Downloading a Content Filter Database .............................................................................. 376
Viewing the Status of a Database Download....................................................................... 377
Expiry Date for the Database.................................................................................................. 378
Viewing the Available Categories or Testing the Category for a URL ............................ 378
Testing the Application and Operation for a URL.............................................................. 378
Disabling Dynamic Categorization ....................................................................................... 380
Specifying a Custom Time Period to Update Blue Coat WebFilter.................................. 381
Configuring Dynamic Categorization Requests for HTTP/HTTPS (CLI only).............. 385
Verify Subscribed Bundles...................................................................................................... 387
Configure Intelligence Services.............................................................................................. 387
Download a New Version of the Database .......................................................................... 388
Monitor Content Filter Health Status.................................................................................... 388
Troubleshoot Health Monitoring Errors............................................................................... 389
Enable Application Classification.......................................................................................... 391
Review Applications and Operations ................................................................................... 392
Download a New Version of the Application Classification Database ........................... 394
Review Application Attributes .............................................................................................. 394
Monitor Application Classification and Application Attributes Health Status.............. 398
Local Database Matching Example ....................................................................................... 400
Selecting and Downloading the Local Database........................................................................ 402
Setting the YouTube Server Key ............................................................................................ 406
Distinguishing Blue Coat Categories for YouTube in the Access Log ............................. 406
Scenario: Limit a User’s Daily Access to YouTube Videos ................................................ 407
Scenario: Limit a User’s Weekly Data Usage ....................................................................... 408
View Quota Statistics............................................................................................................... 408
Reset Usage Quotas ................................................................................................................. 409
Policy Examples Using the Application Control Objects................................................... 423
5
Configure Threat Risk Levels ....................................................................................................... 441
Requirements for Using Threat Risk Levels......................................................................... 441
Enable Threat Risk Levels....................................................................................................... 442
Write Threat Risk Policy ......................................................................................................... 443
Use Threat Risk Features ............................................................................................................... 446
Look up Threat Risks for a Web Page ................................................................................... 446
Download a New Version of the Database .......................................................................... 446
Monitor Threat Risk Statistics ................................................................................................ 447
Monitor Threat Risk Health Status ........................................................................................ 448
Troubleshoot Threat Risk Levels ........................................................................................... 449
6
Apple HLS Authentication ..................................................................................................... 556
Configuring the HTTP Streaming Proxy..................................................................................... 558
Configuring the Windows Media, Real Media, and QuickTime Proxies............................... 562
Limiting Bandwidth ....................................................................................................................... 565
"Viewing Streaming History Statistics" on page 571Configuring Bandwidth
Limitation—Fast Start (WM)............................................................................................ 565
Limiting Bandwidth for Smooth Streaming......................................................................... 566
Configuring the Multicast Network ............................................................................................ 567
Legacy Streaming Log Format ............................................................................................... 568
Reporter Streaming Log Format ............................................................................................ 569
Viewing Streaming History Statistics .......................................................................................... 571
Viewing Current and Total Streaming Data Statistics........................................................ 571
Configuring the Flash Streaming Proxy...................................................................................... 595
Configuring Client Browsers for Explicit Proxy.................................................................. 595
Intercepting the RTMP Service (Transparent Deployment) .............................................. 596
Intercepting the Explicit HTTP Service (Explicit Deployment) ........................................ 596
When VOD Content Gets Cached ......................................................................................... 599
Proxy Chaining......................................................................................................................... 599
CDN Interoperability Support ............................................................................................... 600
7
Chapter 28: Creating and Editing an Access Log Facility
Creating a Log Facility ................................................................................................................... 654
Editing an Existing Log Facility.................................................................................................... 656
Associating a Log Facility with a Protocol.................................................................................. 658
Configuring Global Settings.......................................................................................................... 660
8
Viewing WCCP Statistics and Service Group Status................................................................. 794
9
Chapter 41: TCP Connection Forwarding
Configuring TCP Connection Forwarding ................................................................................. 876
Copying Peers to Another Advanced Secure Gateway in the Cluster............................. 877
Removing a Peer....................................................................................................................... 877
10
Chapter 48: Certificate Realm Authentication
Configuring Certificate Realms .................................................................................................... 985
Creating a Certificate Realm................................................................................................... 985
Configuring Certificate Realm Properties ............................................................................ 985
Defining General Certificate Realm Properties ................................................................... 988
Specifying an Authorization Realm............................................................................................. 990
11
Chapter 51: Integrating the Appliance with Your Windows Domain
Integrate the Advanced Secure Gateway Appliance into the Windows Domain............... 1040
Join the Advanced Secure Gateway Appliance to the Windows Domain..................... 1041
Edit a Windows Domain....................................................................................................... 1042
Configure SNMP Traps for the Windows Domain ................................................................. 1044
Chapter 52: Integrating Advanced Secure Gateway Authentication with Active Directory Using IWA
About IWA Challenge Protocols.......................................................................................... 1046
About IWA Failover .............................................................................................................. 1046
Preparing for a Kerberos Deployment ...................................................................................... 1048
Enabling Kerberos in an IWA Direct Deployment............................................................ 1048
Enabling Kerberos in a BCAAA Deployment.................................................................... 1049
Configuring IWA on the Advanced Secure Gateway Appliance.......................................... 1050
Creating an IWA Realm ........................................................................................................ 1050
Configuring IWA Servers ..................................................................................................... 1052
Defining IWA Realm General Properties ........................................................................... 1057
Creating the IWA Authentication and Authorization Policies.............................................. 1059
Creating an IWA Authentication Policy ............................................................................. 1060
Creating a Guest Authentication Policy ............................................................................. 1062
Creating an IWA Authorization Policy .............................................................................. 1063
Configuring Client Systems for Single Sign-On....................................................................... 1065
Configure Internet Explorer for Single Sign-On................................................................ 1065
Configure Firefox for Single Sign-On.................................................................................. 1066
Using IWA Direct in an Explicit Kerberos Load Balancing/Failover Scenario................... 1066
12
Querying the LDAP Novell SSO Search Realm ....................................................................... 1105
Configuring Authorization ......................................................................................................... 1106
Defining Novell SSO Realm General Properties...................................................................... 1107
13
Configuring Download of CCL Updates from Blue Coat................................................ 1193
Managing Cached Intermediate Certificates ............................................................................ 1196
Turn off Intermediate Certificate Caching ......................................................................... 1196
View Cached Intermediate Certificates .............................................................................. 1196
Clear Cached Intermediate Certificates .............................................................................. 1198
Creating and Configuring an OCSP Responder ...................................................................... 1204
14
Chapter 67: Software and Hardware Bridges
Configuring a Software Bridge ................................................................................................... 1312
15
Thresholds and Notifications for Licensing Metrics......................................................... 1399
Notifications for Status Metrics............................................................................................ 1401
Thresholds and Notifications for Subscription Metrics.................................................... 1403
Quick Reference: Default Threshold Values and States ................................................... 1404
Changing Threshold and Notification Settings ................................................................. 1406
Viewing Health Monitoring Statistics................................................................................. 1408
Chapter 72: Verifying the Health of Services Configured on the Advanced Secure Gateway
Background DNS Resolution ...................................................................................................... 1414
Health Check Tests ....................................................................................................................... 1417
Changing Health Check Default Settings ................................................................................. 1425
Configuring Health Check Notifications .................................................................................. 1429
About Health Check Statistics .................................................................................................... 1453
16
Chapter 1: Introduction
This audience for this document is network administrators who are responsible
for managing Blue Coat® Advanced Secure Gateway® appliances. This
document provides reference information and procedures to configure
Advanced Secure Gateway.
The information in this document supersedes information in the appliance’s
Management Console online help.
Supporting Documentation
Supporting documentation for Advanced Secure Gatewayis available on
BlueTouch Online (BTO):
https://bto.bluecoat.com/documentation/All-Documents/
Note: Release Notes are available on BTO on the Downloads page. Log in to BTO
with your username and password to access the release image and release
notes.
21
Advanced Secure Gateway Administration Guide
Conventions Definition
22
Section 2 Notes and Warnings
The following is provided for your information and to caution you against actions
that can result in data loss or personal injury:
23
Advanced Secure Gateway Administration Guide
Blue Coat assumes that you are logged into the first page of the Management
Console or entered into configuration mode in the CLI.
In most cases, procedures in this guide tell you how to perform a task in the
Management Console, even if there is a CLI equivalent.
24
Chapter 2: Accessing the Appliance
This section provides procedures for accessing the Advanced Secure Gateway
so that you can perform administrative tasks using the Management Console
and/or the command-line interface. It assumes that you have performed the
first-time setup using the Serial Console or the front panel and that you have
minimally specified an IP address, IP subnet mask, IP gateway, and DNS
server, and that you have tested the appliance and know that it is up and
running on the network. If you have not yet done this, refer to the hardware
guides for your appliance model.
This section includes the following topics:
❐ "Accessing the Advanced Secure Gateway Appliance Using the
Management Console" on page 26
❐ "Accessing the Advanced Secure Gateway Using the CLI" on page 41
❐ "Configuring Basic Settings" on page 43
25
Advanced Secure Gateway Administration Guide
Note: When you access the Management Console home page, if you see a host
mismatch or an invalid certificate message, you must recreate the security
certificate used by the HTTPS-Console. For information on changing the security
certificate, see "Managing the HTTPS Console (Secure Console)" on page 1326.
26
Table 2–1 Ways to Access the Management Console
You want to run the Your deployment must have all of the See "Load the
Management Console following: Management Console
directly in a browser. • Any Advanced Secure Gateway version. Directly in a Browser" on
• A browser with NPAPI support. page 27.
• Browsers enabled with the minimum
supported version of Java to run the
Management Console.
You require an alternative Your deployment must have workstations with See "Run the
to running the the minimum supported version of Java to run Management Console
Management Console the Management Console (browsers need not using Java Web Start" on
directly in a browser be Java-enabled), and at least one of the page 28.
because: following:
• You know that the • Advanced Secure Gateway 6.6.5.x and
browser does not later and a browser without NPAPI
support NPAPI. support.
• Your browser is not • Any Advanced Secure Gateway version
configured to run and any browser version, provided you can
Java or JavaScript. access the Internet or can host the Launcher
applet internally.
You want to launch Your deployment has all of the following: See "Launch Multiple
multiple appliances. • Any browser version. Management Consoles"
• Workstations with the minimum supported on page 30.
version of Java to run Java Web Start;
browsers need not be Java-enabled.
• Access to the Internet.
Note: (Version 6.6.5.x and later) If the browser does not load the content
immediately, you can use Java Web Start instead (as described in "Run the
Management Console using Java Web Start" on page 28). A “Click here if your
browser does not support embedded applets” link appears at the bottom of the
Management Console; if you click the link, you are prompted to open or save a
Java Network Launch Protocol (JNLP) file. Otherwise, refresh the browser or wait
for the console to load the legacy Management Console.
27
Advanced Secure Gateway Administration Guide
2. Enter the user name and password that you created during initial
configuration. Upon successful login, the browser displays the Proxy tab of
the Advanced Secure Gateway Management Console.
Note: The event log records all successful and failed login attempts.
28
2. In the browser’s address bar, enter https://appliance_IP_address:port
The default management port is 8082.
For example, if the IP address configured during initial configuration is
192.168.0.6, type https://192.168.0.6:8082 in the address bar.
The browser prompts you to enter your user name and password.
3. Enter the user name and password that you created during initial
configuration.
The browser displays a message stating that NPAPI is not supported.
4. In the message, click the link to download the JNLP file (mc.jnlp).
Alternatively, in the Management Console footer, click the “Click here if your
browser does not support embedded applets” link to download the file.
If you have already downloaded the JNLP file, you can run it instead of
downloading a copy; go to step 5.
Save the file to a convenient location on disk. To avoid downloading copies of
the JNLP file, note the location for future use.
29
Advanced Secure Gateway Administration Guide
5. Open the JNLP file. When prompted, enter your user name and password
again.
Note: The event log records all successful and failed login attempts.
Note: If none of the appliances in your deployment run version 6.6.5.x or later,
you must have access to the internet to download the launcher.JNLP file from
BTO.
30
4. Run the JNLP file. The Management Console Launcher opens.
Figure 2–2 Management Console Launcher - Main dialog
31
Advanced Secure Gateway Administration Guide
Note: If you ran Launcher using the Launcher link in the Management
Console banner, the IP address and port fields are pre-populated with the
appliance’s console IP address and port.
a. Select the protocol (HTTP or HTTPS) and type the IP address in the
field.
b. In the Port field, type the port number of the appliance’s Management
Console.
c. (Recommended) In the Description field, enter a description for the
appliance to help identify it.
d. Click Add as New. The appliance you added appears in the list of
devices.
e. (Recommended) Test connectivity to the appliance you added. Select
the appliance in the list and click Test.
If the test is successful, a green checkmark appears beside the Test button.
If the test is unsuccessful, a red “X” appears beside the Test button. Check
the settings you entered and modify them if needed (see "Modify a
Device’s Properties" on page 33). Then, test the connection again.
32
3. To remove an appliance, select it in the list and click Delete. The appliance is
deleted from the list.
4. Click Done. Return to Launcher. The dialog displays the updated list of devices.
Note: You can also add appliances from the main Launcher dialog. The steps are
similar to the ones outlined previously.
Note: Deleting installed applications and applets in the Java Control Panel
removes the list of appliances from Launcher; thus, to prevent inadvertent
deletion, export the list periodically or when you make significant changes to
it.
33
Advanced Secure Gateway Administration Guide
Import/export devices:
1. On the Launcher dialog, click the Manage Devices link. The dialog displays a
“Device Connection Manager” list.
2. To import a list of devices:
a. Click the Import link at the top right of the dialog. See Figure 2–3 on
page 31.
b. In the dialog that opens, browse to the location of the CSV file to
import and select the file.
c. Specify what to do if devices already exist in the Launcher list:
• - This is selected by default. If devices exist in
Merge with current list
Launcher already, they are combined with the list of devices you
import.
• Replace the current list - If devices exist in Launcher already, the list of
devices you import replaces the existing list.
d. Click Done. Return to Launcher. The list of devices is imported.
3. To export the list of devices:
a. Click the Export link at the top right of the dialog. See Figure 2–3 on
page 31.
b. In the dialog that opens, browse to the location where you want to
save the CSV file. Enter a name for the file and save it.
4. Click Done. Return to Launcher. The list of devices is exported.
34
About the Management Console Banner
After you log in to the Advanced Secure Gateway appliance, the Management
Console displays a banner at the top of the page.
This guide covers the functions of the Advanced Secure Gateway Proxy tab.
The Proxy Management Console banner provides the following information:
❐ Appliance identification— the appliance name, hardware serial number, and
the software version.
❐ Appliance health status— Visible when the Proxy tab is selected. The health
state is represented by a text box and a color that corresponds to the health of
the system (OK-green, Warning- yellow or Critical -red). The system health
changes when one or more of the health metrics reaches a specified threshold
or returns to normal. The health state indicator is polled and updated every 10
seconds on the Advanced Secure Gateway.
To obtain more information about the health state, click the Health: status link
— OK, Warning, Critical. The Statistics > Health page displays; it lists the
current condition of the system’s health monitoring metrics. See "Verifying the
Health of Services Configured on the Advanced Secure Gateway" on page
1411 for more information about the health monitoring metrics.
❐ License status and version— Your Advanced Secure Gateway license includes
all the component licenses for the Proxy and Content Analysis features that
you have purchased. To view a list of the license components and their
expiration date, go to the Maintenance > Licensing > View tab.
❐ Blue Coat product documentation and customer support links. You must have
a Blue Touch Online account to access documentation and to request support.
To log out of the Management Console, click the Log Out link.
❐ Proxy and Content Analysis tabs. Advanced Secure Gateway appliances
include both a module and a Content Analysis module. Use the tabs to switch
from one to the next. For information on configuring ICAP services to use the
internal Content Anlaysis service, see Chapter 22: "Malicious Content
Scanning Services" or the help icon (?) in the Content Anlaysis module.
35
Advanced Secure Gateway Administration Guide
performance of traffic within your network using its optimization, policy control,
and caching techniques. The Summary page visually demonstrates the overall
performance and efficiency of your network.
If you have just completed initial setup and have not configured the Advanced
Secure Gateway to intercept any traffic, the Summary page will not display much
information. For example, you cannot view bandwidth efficiency for traffic being
intercepted by the Advanced Secure Gateway.
❐ Service: A service represents the type of traffic that is being intercepted; the top
5 services are ranked in descending order of bytes saved.
❐ Bytes Saved Last Hour:Bytes saved display bandwidth savings in the last 60
minutes. It represents data that did not traverse the WAN because of object
and byte caching, protocol optimization, and compression. It is calculated as:
Client Bytes - Server Bytes,
where Client Bytes is the data rate calculated to and from the client on the
client-side connection, and Server Bytes is the data rate calculated to and
from the server on the server-side connection.
36
❐ Percent Savings: A percentage value of bytes saved, calculated as:
{(Client Bytes - Server Bytes)/ Client Bytes} * 100
In the Savings panel shown above, the Percent Savings for FTP is 50% and
bandwidth savings is 2x, which is calculated as Client Bytes/Server Bytes.
Note: The graph in the percent savings column represents savings over the
last hour, while the label reflects the percent savings in the last minute. For
more information on bandwidth savings, click on any row and navigate to the
Statistics > Traffic History page. By default, the traffic history page displays
bandwidth usage and bandwidth gain statistics for the corresponding service
over the last hour.
The Interface Utilization panel displays statistics on interface use, reveals network
performance issues, if any, and helps determine the need to expand your network.
❐ Interface:
The interfaces are labeled with an adapter number followed by an
interface number. For example, on 2-port bridge cards, the interface number is
0 for WAN and 1 for LAN connections; 4-port bridge cards have 0 and 2 for
WAN and 1 and 3 for LAN.
❐ Link state:
Indicates whether the interface is in use and functioning. It also
displays the duplex settings and includes the following information:
• Up or Down: Up indicates that the link is enabled and can receive and
transmit traffic. Down indicates that the link is disabled and cannot pass
traffic.
• Auto or Manual: Indicates whether the link is auto-negotiated or manually
set
• 10Mbps, 100 Mbps or 1Gbps: Displays the capacity of the link.
• FDX or HDX: Indicates whether the interface uses full duplex or half duplex
connection, respectively. In some cases, if a duplex mismatch occurs when
the interface is auto-negotiated and the connection is set to half-duplex,
the display icon changes to a yellow warning triangle. If you view a
duplex mismatch, you can adjust the interface settings in the Configuration
> Network > Adapters tab.
37
Advanced Secure Gateway Administration Guide
❐ Transmit Rate and Receive Rate: Displays number of bits processed per second,
on each interface.
The graphs in the transmit rate and receive rate columns represent interface
activity over the last hour, while the value in the label represents interface
activity over the last minute.
❐ Errors: Displays the number of transmission errors, if any, in the last hour.
Interfaces with input or output errors are displayed in red.
For more information on an interface, click on any row; the Statistics > Network >
Interface History page displays.
This information is also displayed on the Management Console banner and under
Configuration > General > Identification. To assign a name to your Advanced Secure
Gateway, see "Configuring the Advanced Secure Gateway Appliance Name" on
page 44.
38
The Statistics area displays the current percentages of CPU usage and memory
utilization, and the number of concurrent users. Concurrent users represents the
number of unique IP addresses that are being intercepted by the Advanced Secure
Gateway. For more information on these key resources, click the link; the
corresponding panel under Statistics > System > Resources displays.
❐ The Statistics panel also displays whether the Advanced Secure Gateway is
enabled to act as Client Manager for ProxyClient and Unified Agent users.
The status information displayed for the remote clients include the following
options:
The Connectivity area displays the status of external devices and services that the
Advanced Secure Gateway appliance relies on, for effective performance. The
status indicates whether the appliance is able to communicate with the external
devices and services that are configured on it.
The external devices or services, that can be configured on the Advanced Secure
Gateway, include:
❐ WCCP capable routers/switches
❐ External ICAP devices (such as Blue Coat ProxyAV or Content Analysis
appliances)
❐ DNS Servers
❐ Authentication realms
Only those external devices or services that are configured on the Advanced
Secure Gateway are displayed on this panel. If, for example, ICAP is not yet
enabled on the Advanced Secure Gateway, ICAP is not listed in the connectivity
panel.
The connectivity status for these external devices is represented with an icon —
Ok, Warning, or Critical. The icon and the text portray the most severe health
status, after considering all the health checks configured, for the device or service.
39
Advanced Secure Gateway Administration Guide
With the exception of WCCP, click on any row to view the health status details in
the Statistics > Health Checks tab. The Statistics > Health Checks tab provides
information on the general health of the Content Analysis services configured on
the Advanced Secure Gateway, allows you to perform routine maintenance tasks
and to diagnose potential problems. For more information on health checks, see
"Verifying the Health of Services Configured on the Advanced Secure Gateway"
on page 1411.
To view details on the status of WCCP capable devices in your network, click on
the WCCP service row, the Statistics> Network > WCCP tab displays. The Statistics >
Network > WCCP tab provides information on the configured service groups and
their operational status. For more information on how to configure WCCP on the
Advanced Secure Gateway, see Chapter 33: "WCCP Configuration" on page 813.
For more detailed information about WCCP, refer to the WCCP Reference Guide.
If you do not respond within the 30-second period, you are logged out and lose all
unsaved changes. To log in again, click the You need to log in again to use the console
hyperlink in the browser (legacy Management Console only). To log out
completely, close the browser window.
40
Section 2 Accessing the Advanced Secure Gateway Using the CLI
You can connect to the Advanced Secure Gateway command-line interface via
Secure Shell (SSH) using the IP address, username, password that you defined
during initial configuration. The SSH management console service is configured
and enabled to use SSHv2 and a default SSH host key by default. If you wish to
access the CLI, you can use SSHv2 to connect to the Advanced Secure Gateway.
An SSH host key for SSHv2 and an SSH management service are configured by
default. If you want to use SSHv1 or Telnet without additional configuration.
Note: You can also access the CLI using Telnet or SSH v1. However, these
management services are not configured by default. For instructions on
configuring management services, see Chapter 68: "Configuring
Management Services" on page 1323.
41
Advanced Secure Gateway Administration Guide
Note: Most tasks can be performed in both the Management Console and the
CLI. This guide covers procedures for the Management Console; refer to the
Command Line Interface Reference for related CLI tasks. Tasks that are available only
in the Management Console or only in the CLI are noted as such.
42
Section A: Configuring Basic Settings
This sections describes how to configure basic settings, such as the Advanced
Secure Gatewayappliance name, time settings, and login parameters. It includes
the following topics:
❐ "How Do I...?" on page 43
❐ "Configuring the Advanced Secure Gateway Appliance Name" on page 44
❐ "Changing the Login Parameters" on page 45
❐ "Viewing the Appliance Serial Number" on page 48
❐ "Configuring the System Time" on page 49
❐ "Synchronizing to the Network Time Protocol" on page 52
How Do I...?
To navigate this section, identify the task to perform and click the link:
Locate the Appliance Serial Number? "Viewing the Appliance Serial Number" on
page 48
Configure the local time on the "Configuring the System Time" on page 49
Advanced Secure Gateway?
Configure the time for console log out on "Changing the Advanced Secure Gateway
the Advanced Secure Gateway? Timeout" on page 47
43
Advanced Secure Gateway Administration Guide
44
Section 4 Changing the Login Parameters
You can change the console username and password, the console realm name
which displays when you log in to the appliance, and the auto-logout time. The
default value is 900 seconds.
The Management Console requires a valid administrator username and password
to have full read-write access; you do not need to enter a privileged-mode
password as you do when using the CLI. A privileged-mode password, however,
must already be set.
2. Edit the username of the administrator that is authorized to view and revise
console properties. Only one console account exists on the Advanced Secure
Gateway. If you change the console account username, that username
overwrites the existing console account username. The console account
username can be changed to anything that is not null and contains no more
than 64 characters.
45
Advanced Secure Gateway Administration Guide
Note: This does not change the enabled-mode password. You can only
change the enabled-mode password through the CLI.
4. Refresh the screen, which forces the SGOS software to re-evaluate current
settings. When challenged, enter the new password.
5. (Optional) Restrict access by creating an access control list or by creating a
policy file containing <Admin> layer rules. For more information, see
"Limiting Access to the Advanced Secure Gateway" on page 67.
46
Realm Name
47
Advanced Secure Gateway Administration Guide
48
Section 2 Configuring the System Time
To manage objects, the Advanced Secure Gateway must know the current
Coordinated Universal Time (UTC), which is the international time standard and
is based on a 24-hour clock. The Advanced Secure Gateway accesses the Network
Time Protocol (NTP) servers to obtain accurate UTC time and synchronizes its
time clock.
By default, the Advanced Secure Gateway connects to an NTP server in the order
they are listed on the NTP tab and acquires the UTC time. You can view UTC time
under UTC in the Configuration > General > Clock > Clock tab. If the appliance cannot
access any of the listed NTP servers, you must manually set the UTC time.
You can, however, also record time stamps in local time. To record time stamps in
local time, you must set the local time based on your time zone. The Advanced
Secure Gateway appliance ships with a limited list of time zones. If a specific time
zone is missing from the included list, you can update the list at your discretion.
The list can be updated by downloading the full time zone database from http://
download.bluecoat.com/release/timezones.tar. Also, the time zone database
might need to be updated if the Daylight Savings rules change in your area.
49
Advanced Secure Gateway Administration Guide
2. Click Set Time zone. The Time Zone Selection dialog displays.
3. Select the time zone that represents your local time. After you select the local
time zone, event logs record the local time instead of GMT. To add additional
time zones to the list, update the appliance's time zone database, as described
in the following procedure.
4. Click OK to close the dialog.
5. Click Apply.
50
To update the database:
1. Select Configuration > General > Clock > Clock.
2. Enter the URL from which the database will be downloaded or click Set to
default.
3. Click Install.
51
Advanced Secure Gateway Administration Guide
52
To add an NTP server:
1. Select Configuration > General > Clock > NTP.
Basic Ports
This table presents the non-configurable ports which must be available.
53
Advanced Secure Gateway Administration Guide
Networking Ports
This table presents ports required for networking, when the listed features are
enabled.
54
This table presents ports required for ADNs and Proxy Client, when the listed
features are enabled.
Other Ports
This table presents other ports which are required when the indicated
feature is in use.
55
Advanced Secure Gateway Administration Guide
56
Chapter 3: Licensing
About Licensing
Each Advanced Secure Gateway requires a license to function. The license is
associated with an individual Advanced Secure Gateway serial number and
determines what software features are available and the number of concurrent
users that are supported.
When you configure a new Advanced Secure Gateway appliance, a license
must be installed before it can intercept and process user traffic.
The following sections describe the licensing options:
❐ "License Expiration" on page 58
❐ "License Types" on page 57
❐ "License Expiration" on page 58
License Types
The following license types are available:
❐ Permanent—A license for hardware platforms that permanently unlocks
the software features you have purchased. When a permanent license is
installed, any user limits imposed by that license are enforced, even if the
trial period is still valid.
❐ Subscription-based—A license that is valid for a set period of time. After
you have installed the license, the Advanced Secure Gateway appliance
will have full functionality, and you will have access to software upgrades
and product support for the subscription period.
Licensing Terms
Advanced Secure Gateway Appliances
Within sixty (60) days of the date from which the user powers up the Advanced
Secure Gateway (“Activation Period”), the Administrator must complete the
Advanced Secure Gateway licensing requirements as instructed by the
Advanced Secure Gateway appliance to continue to use all of the features. Prior
57
Advanced Secure Gateway Administration Guide
to the expiration of the Activation Period, the Advanced Secure Gateway software
will deliver notices to install the license each time the Administrator logs in to
manage the product. Failure to install the license prior to the expiration of the
Activation Period may result in some Advanced Secure Gateway features
becoming inoperable until the Administrator has completed licensing.
ProxyClient/Unified Agent
The Administrator may install ProxyClient or Unified Agent only on the number
of personal computers licensed to them. Each personal computer shall count as
one “user” or “seat.” The ProxyClient or Unified Agent software may only be
used with Blue Coat Advanced Secure Gateway appliances. The Administrator
shall require each user of the Blue Coat ProxyClient software to agree to a license
agreement that is at least as protective of Blue Coat and the Blue Coat ProxyClient
or Unified Agent software as the Blue Coat EULA.
License Expiration
When the base license expires, the appliance stops processing requests and a
license expiration notification message is logged in the Event Log (see "Viewing
Event Log Configuration and Content" on page 1375 for details on how to view
the event log).
In addition, for services set to Intercept:
❐ In a transparent deployment, Advanced Secure Gateway if the default policy
is set to Allow, the appliance acts as if all services are set to Bypass, passing
traffic through without examining it. If default policy is set to Deny, traffic to
these services is denied with an exception. For details, see "Exceptions Due to
Base License Expiration" .
❐ In an explicit deployment, regardless of the default policy setting, traffic to
these services is denied with an exception. For details, see "Exceptions Due to
Base License Expiration" .
58
❐ You can still perform configuration tasks through the CLI, SSH console, serial
console, or Telnet connection. Although a component is disabled, feature
configurations are not altered. Also, policy restrictions remain independent of
component availability.
Content Analysis—When the subscription licenses expire for your Antivirus, File
Reputation (Whitelisting), or Sandboxing services, files are not scanned with
those options. If policy is configured to ICAP scan all content, users may receive
exception messages relating to ICAP processing.
59
Advanced Secure Gateway Administration Guide
5. Enter your Blue Touch Online (BTO) credentials and click Login. If you do not
have a Blue Touch Online account, or you do not remember your credentials,
click the Forgot your password? link on this page.
6. Enter the serial number and hardware appliance model for your appliance
into the available fields and click Register New Appliance.
60
• In the Management Console, select Proxy > Maintenance > Tasks.
• Click Hardware and Software.
• Click Restart now.
5. When the appliance completes the restart, browse to the Content Analysis tab in
the Management Console.
6. Enable File inspection subscriptions:
• Browse to Content Analysis > System > Licensing.
• Select each available subscription element and click Save Changes.
Note: Locate the email from Blue Coat that contains the activation code(s) for
your software. You require these activation codes, as well as your appliance serial
number, to complete the licensing process on the Blue Coat Licensing Portal.
61
Advanced Secure Gateway Administration Guide
62
2. Follow the prompts to enter your serial number and download the license file.
3. Save the license file to a location that your appliance can access.
4. In the Management Console, select Maintenance > Licensing > Install, and then
select the appropriate option from the License Key Manual Installation drop-down
list:
Note: A message is written to the event log when you install a license through
the Advanced Secure Gateway.
63
Advanced Secure Gateway Administration Guide
64
Section 2 Viewing the Current License Status
You can view the license status in the Management Console in the following
ways:
❐ Select Statistics > Configuration > Maintenance. The license status displays as a link
in the upper right hand-corner. Hovering over the license link displays
information, such as the expiration date of the trial period. Click the link to
switch to the View license tab.
❐ Select Maintenance > Licensing > View. The tab displays the license components
with expiration dates.
❐ Select Maintenance > Health Monitoring. The tab displays thresholds for license
expiration dates.
Current high-
level license
data
License
components
For more
details, select a
component and
click.
Each licensable component is listed, along with its validity and its expiration
date.
• To view the most current information, click Refresh Data.
• Highlight a license component and click View Details. A dialog displays
more detailed information about that component.
See Also
❐ "About Licensing" on page 57
❐ "Locating the System Serial Number" on page 59
❐ "MACH5 or Secure Web Gateway Obtaining a BlueTouch Online Account" on
page 59
❐ "Registering and Licensing Blue Coat Appliance and Software" on page 60
65
Advanced Secure Gateway Administration Guide
66
Chapter 4: Controlling Access to the Advanced Secure
Gateway
This section describes how to control user access to the Advanced Secure
Gateway. It includes the following topics:
❐ "Limiting Access to the Advanced Secure Gateway" on page 67
❐ "About Password Security" on page 68
❐ "Limiting User Access to the Advanced Secure Gateway—Overview" on
page 69
❐ "Moderate Security: Restricting Management Console Access Through the
Console Access Control List (ACL)" on page 72
❐ "Maximum Security: Administrative Authentication and Authorization
Policy" on page 73
67
Advanced Secure Gateway Administration Guide
❐ Use the reset button (if the appliance has a reset button) to delete all system
settings. Otherwise, reset the to its factory settings by holding down the left
arrow key on the front-panel for 5 seconds. The appliance will be reinitialized.
To reconfigure the appliance or secure the serial port, refer to the hardware guides
for your appliance.
68
❐ RADIUS primary and alternate secret—For configuration information, see
Chapter 57: "RADIUS Realm Authentication and Authorization" on page
1125.
❐ LDAP search password—For configuration information, see "Defining LDAP
Search & Group Properties" on page 1084.
❐ Content filter download passwords—For configuration information, see
"Downloading the Content Filter Database" on page 375.
Note: If Telnet Console access is configured, Telnet can be used to manage the
Advanced Secure Gateway with behavior similar to SSH with password
authentication.
SSL configuration is not allowed through Telnet, but is permissible through SSH.
Behavior in the following sections that applies to SSH with password
authentication also applies to Telnet. Use of Telnet is not recommended because it
is not a secure protocol.
69
Advanced Secure Gateway Administration Guide
Table 4–1 Advanced Secure Gateway Console Access Methods/Available Security Measures
Security Measures Available Serial SSH with SSH with RSA Management
Console Password Authentication Console
Authentication
70
Table 4–1 Advanced Secure Gateway Console Access Methods/Available Security Measures (Continued)
Notes
❐ When using SSH (with a password) and credentials other than the console
account, the enable password is actually the same as the login password. The
privileged mode password set during configuration is used only in the serial
console, SSH with RSA authentication, or when logging in with the console
account.
❐ In this case, user credentials are evaluated against the policy before executing
each CLI command. If you log in using the console account, user credentials
are not evaluated against the policy.
71
Advanced Secure Gateway Administration Guide
To create an ACL:
1. Select Configuration > Authentication > Console Access > Console Access.
2b
2a
c. Click OK to add the workstation to the ACL and return to the Console
Access tab.
Important: Before you enforce the ACL, verify the IP address for the
workstation you are using is included in the list. If you forget, or you find
that you mis-typed the IP address, you must correct the problem using the
serial console.
72
5. Click Apply.
Note: If you choose a realm that relies on an external server and that server is
unavailable, the appliance will not be able to authenticate against that realm.
For best security, the following authentication realms are recommended by Blue
Coat for administrative authentication to the appliance.
❐ IWA-BCAAA (with TLS -- not SSL) with basic credentials
❐ Local
❐ .509 certificate based (including certificate realms; refer to the Common Access
Card Solutions Guide for information)
❐ LDAP with TLS (not SSL)
❐ IWA-Direct with basic credentials
73
Advanced Secure Gateway Administration Guide
❐ RADIUS
The following realms can be configured for administrative authentication, but
pass administrative credentials in clear text. These realms should not be used for
administrative authentication:
❐ Windows SSO
❐ Novell SSO
❐ IWA-BCAAA without SSL or TLS
❐ LDAP without SSL or TLS
Note: Other authentication realms can be used, but will result in administrative
credentials being sent in clear text.
2. Using the Command Line Interface (CLI), create a list of users who need read-
only access. The list must include a username and password for each user.
a. Enter configuration mode in the CLI; this example creates a list called
Read_Access.
#(config)security local-user-list create Read_Access
74
b. Edit the list to add user(s) and to create usernames and passwords.
This example adds a user named Bob Kent.
#(config)security local-user-list edit Read_Access
#(config)user create Bob_Kent
#(config)user edit Bob_Kent
#(config)password 12345
3. Connect the user list (created in Step 2) to the local realm (created in Step 1).
a. In the Configuration > Authentication > Local > Local Main tab, select
MC_Access from the Realm name drop-down menu.
c. In the Action column, right click and select Set. In the Set Action dialog
that displays, click New and select Authenticate. The Add Authentication
Object displays.
75
Advanced Secure Gateway Administration Guide
d. In the Add Authenticate Object dialog that displays, select the local realm
you created in Step 1.
e. Create an Admin Access Layer.
f. In the Source column, right click and select Set. In the Set Source Object
dialog that displays, click New and select User. The Add User Object
dialog displays.
g. Enter the name of the user for whom you want to provide read-only
access.
h. Click OK in both dialogs.
i. In the Action column, right click and select Allow Read-only Access.
5. Click Install Policy.
The user can now log in the Management Console as a user with read-only
access. Repeat step 4 and use Allow Read/Write access to define user access
with read/write privileges
76
Chapter 5: Backing Up the Configuration
77
Advanced Secure Gateway Administration Guide
78
To create signed archives, your appliance must have an SSL certificate guaranteed
by a CA. You can then use a trusted CA Certificate List (CCL) to verify the
authenticity of the archive.
Use signed archives only when security is high priority. Otherwise, use unsigned
archives. For information about creating secure archives, see "Creating and Saving
a Secure (Signed) Archive" on page 86.
79
Advanced Secure Gateway Administration Guide
80
Section 1 Archiving Quick Reference Table
The following table lists common archive management tasks and where to get
more information.
Learn about the archive types "About the Archive Types and Saved
Information" on page 78
81
Advanced Secure Gateway Administration Guide
82
8. Restore the archive, as described in "Restoring a Configuration Archive" on
page 105.
Figure 5–1 on page 83 describes the archive creation process.
83
Advanced Secure Gateway Administration Guide
2. Select Configuration > General > Archive. The Archive Configuration tab displays.
3b
3a
Note: You can also view the file by selecting Text Editor in the Install
Configuration panel and clicking Install.
84
3. Browse to the location of the archive and click Open. The configuration is
installed, and the results screen displays.
85
Advanced Secure Gateway Administration Guide
The appliance certificate displays if the appliance has one. Otherwise, the
following error is displayed:
Certificate "appliance-key" not found
4. If the appliance does not have an appliance certificate, create one as follows:
86
a. Create a keyring on the appliance.
A keyring contains a public/private key pair. It can also contain a
certificate signing request or a signed certificate.
b. Create a Certificate Signing Request (CSR) and send it to a Certificate
Signing Authority (CA).
c. Have the CA sign the CSR (this process results in a digital certificate).
d. Import the keyring and certificate as described in "Restoring an
Archived Key Ring and Certificate" on page 98.
For more information about appliance certificates, see "Managing X.509
Certificates" on page 1153.
2. Select the Configuration > General > Archive > Archive Storage tab.
3. From the Sign archives with keyring drop-down list, select a signing keyring to
use or accept the default (appliance-key).
4. Click Apply.
Note: If you do not click Apply, a pop-up displays when you click Save that
indicates that all unsaved changes will be saved before storing the archive
configuration. The unsaved changes are the Sign archives with keyring option
changes you made in Step 3.
5. From the Save archive drop-down list, select the archive type (Blue Coat
recommends Configuration - expanded).
6. Click Save.
87
Advanced Secure Gateway Administration Guide
2. Go to the Management Console Home page and view the Software version:
information to verify that the appliance is running the same software version
that was used to create the archive. For example:
Software version: SGOS 6.6.2.2
You can also verify the version from the appliance CLI:
# enable
# show version
88
Section E: Preparing Archives for Restoration on New Devices
While a configuration archive will back up the appliance configuration, that
configuration cannot be transferred to another device unless you save the SSL
keyrings on the appliance—especially the configuration-passwords-key keyring.
The process of creating the archive and saving the associated SSL keyrings is
called creating a transferable archive.
Note: You must also save the SSL keyrings if you plan to restore an encrypted
archive after a reinitialization. When you reinitialize the appliance, new keys get
created, and you will therefore not be able to restore the configuration unless you
first restore the configuration-passwords-key.
89
Advanced Secure Gateway Administration Guide
To ensure that the archive can be transferred to another appliance, you must do
one of the following:
❐ Restore the original configuration-passwords-key keyring
While it is possible to reset each of the passwords using the Management
Console, it is easier to save the original keyring so that you can import it to the
new appliance (before restoring the configuration). Restoring the keyring
allows all previously configured passwords to remain valid after archive
restoration.
❐ Change the encrypted passwords to clear text so that they can be regenerated.
Note: To save an SSL keyring, you must be able to view it. If the key is marked
no-show, you cannot save it.
90
Section 1 Creating a Transferable Archive
This section describes the steps required to create a transferable archive.
2. Go to the Management Console Home page and view the Software version:
information to verify that the appliance is running the same software version
that was used to create the archive. For example:
Software version: SGOS 5.3.0.2 Proxy Edition
You can also verify the version from the appliance CLI:
# enable
# show version
3. Restore the configuration-passwords-key data and any other SSL key data.
Import the configuration-passwords-key keyring as described in "Restoring
an Archived Key Ring and Certificate" on page 98.
4. Select Configuration > General > Archive.
5. Select Local File and click Install.
6. Browse to the location of the archive and click Open. The configuration is
installed, and the results screen displays.
91
Advanced Secure Gateway Administration Guide
You can also use the following procedure to save any other keyrings required to
reload SSL-related configuration that references those keyrings.
!
ssl ; switches from config mode to config ssl
!
inline keyring show configuration-passwords-key "end-inline"
!
end-inline
inline keyring show default "end-inline"
!
end-inline
!
inline certificate default "end-inline"
!
end-inline
!
! repeat this process for each keyring. Be sure to import the private
key first, then the keyrings certificate
!
exit ; returns to config mode
!
Do not specify your passwords; the system will prompt you for them when
you restore the keys. You can modify the template to include other keyrings
and certificates.
2. From the CLI, access the config prompt (using the serial console or SSH):
# config terminal
92
Keyring ID: appliance-key
Private key showability: no-show
Signing request: present
Certificate: absent
Note: The aes128 and aes256 encryption options are also supported.
This password is used to encrypt the private-key before displaying it. After
confirming the password, the Advanced Secure Gateway appliance displays the
encrypted private-key associated with that keyring.
Important: Do not lose the password used to encrypt the private key. If you
do, you will not be able to recover your private keys.
For example:
#(config ssl)view keypair des3 configuration-passwords-key
Encryption password: *****
Confirm encryption password: *****
93
Advanced Secure Gateway Administration Guide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-----END RSA PRIVATE KEY-----
For example:
#(config ssl)view certificate appliance-key
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
8. Copy the certificate and paste it into the template (copied in step 1) beneath
the inline certificate cert_name "end-inline" line).
94
9. Optional—For each named keyring that you want to restore, repeat steps 4
to 8.
Note: The appliance-key keyring's private key is not viewable, and cannot be
transferred to another Advanced Secure Gateway appliance. The default and
passive-attack-protection-only-key keys typically do not need to be
restored either.
10. Save the template with the configuration-passwords-key and other SSL key
data on a secure server.
11. Save the password information (that you used to encrypt the keys) in a secure
place, for example, a restricted access cabinet or safe.
After saving this data, create a configuration archive as described in "Creating a
Transferable Archive" on page 91. When you are ready to restore the archive, you
must first restore the SSL data on the target appliance as described in "Restoring
an Archived Key Ring and Certificate" on page 98.
Note: The commands in the following example are bounded by the document
text area and wrap to the next line. They are not shown here as they would
appear in the CLI. See Step 1 in "Option 1: Recording SSL Keyring and Key Pair
Information" on page 91 to view an example of how the commands should
appear.
!
ssl ; switches from config mode to config ssl
!
inline keyring show configuration-passwords-key "end-inline"
-----BEGIN RSA PRIVATE KEY-----
Proc-Type: 4,ENCRYPTED
DEK-Info: DES-EDE3-CBC,2F6148C8A9902D7F
1lJjGKxpkcWBXj424FhyQJPKRdgHUIxl2C6HKigth6hUgPqsSJj958FbzEx6ntsB
lI+jXj34Ni6U94/9ugYGEqWLCqed77M1/WA4s6U5TCI9fScVuGaoZ0EVhx48lI3N
LGQplOJXmr0L5vNj/e1/LSeCOHg+7ASyY/PaFr9Dk8nRqAhoWMM/PQE1kvAxuXzE
8hccfZaa1lH1MiPWfNzxf1RXIEzA2NcUirDHO63/XU3eOCis8hXZvwfuC+DWw0Am
tGVpxhZVN2KnfzSvaBAVYMh/lGsxdEJjjdNhzSu3uRVmSiz1tPyAbz5tEG4Gzbae
sJY/Fs8Tdmn+zRPE5nYQ/0twRGWXzwXOeW+khafNE3iQ1u6jxbST6fCVn2bxw+q/
95
Advanced Secure Gateway Administration Guide
bB/dEFUMxreYjAO8/Tu86R9ypa3a+uzrXULixg1LnBcnoSvOU+co5HA6JuRohc5v
86ZPklQ9V4xvApY/+3Q+2mF9skJPsOV01ItYWtrylg9Puw17TE56+k0EAOwU6FWd
dTpGJRguh7lFVmlQl2187NEoyHquttlIHxRPEKRvNxgCzQI3GEOfmD9wcbyxd1nT
X11U2YgwwwH0gzJHBQPIfPhE9wJTedm1dhW268kPFonc1UY3dZTq0tiOLwtDfsyx
ForzG9JHhPmlUgLtujsiG5Cg8S183GSyJFqZs8VKxTyby7xa/rMkjtr/lpS++8Tz
GZ4PimFJM0bgcMsZq6DkOs5MmLSRCIlgd3clPSHjcfp+H4Vu0OPIPL98YYPvcV9h
0Io/zDb7MPjIT5gYPku86f7/INIimnVj2R0a0iPYlbKX7ggZEfWDPw==
-----END RSA PRIVATE KEY-----
end-inline
!
inline keyring show default "end-inline"
-----BEGIN RSA PRIVATE KEY-----
Proc-Type: 4,ENCRYPTED
DEK-Info: DES-EDE3-CBC,2F6148C8A99AAAA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-----END RSA PRIVATE KEY-----
end-inline
!
inline certificate default "end-inline"
-----BEGIN CERTIFICATE-----
MIICUzCCAbygAwIBAgIEFjnHtzANBgkqhkiG9w0BAQQFADBuMQswCQYDVQQGDAJB
VTETMBEGA1UECAwKU29tZS1TdGF0ZTEfMB0GA1UECgwWQmx1ZSBDb2F0IFNHMjAw
IFNlcmllczETMBEGA1UECwwKMjEwNzA2MzI1ODEUMBIGA1UEAwwLMTAuOS41OS4x
NTwwHhcNMDcxMDI1MTkxNzExWhcNMTcxMDI1MTkxNzExWjBuMQswCQYDVQQGDAJB
VTETMBEGA1UECAwKU29tZS1TdGF0ZTEfMB0GA1UECgwWQmx1ZSBDb2F0IFNHMjAw
IFNlcmllczETMBEGA1UEdwwKMjEwNzA2MzI1ODEUMBIGA1UEAwwLMTAuOS41OS4x
NTEwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBANF9BL25FOJuBIFVyvjo3ygu
ExUM0GMjF1q2TRrSi55Ftt5d/KNbxzhhz3i/DLxlwh0IFWsjv9+bKphrY8H0Ik9N
Q81ru5HlXDvUJ2AW6J82CewtQt/I74xHkBvFJa/leN3uZ+D+fiZTXO15m9+NmZMb
zzGGbCWJRzuqp9z1DVNbqgMBAAEwDQYJKoZIhvcNAQEEBQADgYEAwMUYIa1KFfI0
J+lS/oZ+9g9IVih+AEtk5nVVLoDASXuIaYPG5Zxo5ddW6wT5qvny5muPs1B7ugYA
wEP3Eli+mwF49Lv4NSJFEkBuF7Sgll/R2Qj36Yjpdkxu6TPX1BKmnEcpoX9Q1Xbp
96
XerHBHpMPwzHdjl4ELqSgxFy9aei7y8=
-----END CERTIFICATE-----
end-inline
!
! repeat this process for each keyring. Be sure to import the private
key first, then the keyrings certificate
!
exit ; returns to config mode
!
Important: Blue Coat strongly recommends recording your SSL keyring and
key pair data because changing encrypted passwords to clear text is highly
insecure. Use the following procedure at your own risk.
You can edit the configuration to change encrypted passwords to clear text if you
choose to keep the existing configuration-passwords-key keyring intact on the
new appliance. You do not need to change hashed passwords to clear text—when
you restore the archive, new hashed-passwords are automatically generated using
the target Advanced Secure Gateway appliance’s configuration-passwords-key
keyring.
Important: This procedure is not valid for signed archives. Signing guarantees
that the archive has not been modified.
Note: Hashed passwords do not have to be changed to clear text. When you
restore the archive, they are restored as specified on the source device. The
difference between hashing and encryption is that encryption enables
information to be decrypted and read, while hashing is a mathematical
function used to verify the validity of data. For example, a system might not
need to know a user’s password to verify that password. The system can run a
hash function on the password and confirm that the mathematical result
matches that specified for the user.
97
Advanced Secure Gateway Administration Guide
Note: You can also import a certificate chain containing multiple certificates.
Use the inline certificate command to import multiple certificates through
the CLI. See "Example: Completed SSL Data Template" on page 95 for more
information.
If you are importing a keyring and one or more certificates onto a Advanced Secure
Gateway appliance, first import the keyring, followed by its related certificate. The
certificate contains the public key from the keyring, and the keyring and
certificate are related.
5a
5b
5c
5d
5e
98
e. Select Private Key Password and enter the configuration-passwords-key
password into the field. This is the password you saved when you
archived the keyring.
6. Click OK.
7. Click Apply.
The configuration-passwords-key does not have a certificate. However, if one or
more keyrings has a certificate, you must import it and associate it with a keyring.
99
Advanced Secure Gateway Administration Guide
100
Section 2 Creating and Uploading an Archive to a Remote Server
Use the following procedure to create a signed or unsigned archive and upload it
to a secure, remote host.
1. If you use HTTPS, you must specify an SSL device profile to use for the SSL
connection.
An SSL device profile, which can be edited, contains the information required
for device authentication, including the name of the keyring with the private
key and certificate this device uses to authenticate itself. The default keyring is
appliance-key. (For information on private keys, public keys, and SSL device
profiles, see "Managing X.509 Certificates" on page 1153.)
2. Obtain write permission to a directory on a secure, remote host. This is where
the archive will be stored.
3. Access the Management Console of the Advanced Secure Gateway appliance
you want to back up:
https://Appliance_IP:8082
7a
7b
7c
7d
7e
6. For signed archives, ensure that a keyring has been selected in the Sign archive
with keyring option.
101
Advanced Secure Gateway Administration Guide
In the preceding example, the %H%A prefix adds the hour (in 24-hour
format) and the full weekday name. Various combinations can be used.
See "Adding Identifier Information to Archive Filenames" on page 103 for
a list of allowed substitution values.
c. Optional, for HTTPS—Select an SSL device profile to use for the SSL
connection.
See "Uploading Archives to a Remote Server" on page 100 for more
information about device profiles.
d. Enter the remote server host name or IP address and port number. The
remote server can have an IPv4 or IPv6 address, or be a domain name
that resolves to an IPv4 or IPv6 address.
e. Enter the remote server upload path (not required for TFTP).
102
f. Enter the user name associated with the remote host (not required for
TFTP).
g. Optional—Change the HTTP, HTTPS, or FTP password.
8. Click Upload.
Specifier Description
%% Percent sign.
%a Abbreviated weekday name.
%A Full weekday name.
%b Abbreviated month name.
%B Full month name.
%C The Advanced Secure Gateway appliance name.
%d Day of month as decimal number (01 – 31).
%H Hour in 24-hour format (00 – 23).
%i First IP address of the Advanced Secure Gateway appliance, displayed in
x_x_x_x format, with leading zeros removed.
103
Advanced Secure Gateway Administration Guide
104
Section G: Restoring a Configuration Archive
To restore a configuration archive, you must:
❐ Perform pre-restoration tasks, for example, restoring the SSL configuration.
❐ For signed archives—Select a CCL to use to verify the archive.
❐ Restore the archive.
3. In the Management Console, click the Home link and look for the software
version in the banner to verify that the appliance is running the same software
version that was used to create the archive. The banner displays a version
such as:
SGOS 6.6.2.1 Proxy Edition
You can also verify the version from the appliance CLI:
# enable
# show version
4. Restore the configuration-passwords-key data and any other SSL key data.
Import the configuration-passwords-key keyring as described in "Restoring
an Archived Key Ring and Certificate" on page 98.
5. Select Configuration > General > Archive.
105
Advanced Secure Gateway Administration Guide
6. Optional, for signed archives—Select a CCL to use to verify the archive from
the Verify signed archive with CCL drop-down list. If you used the appliance-key
keyring, select appliance-ccl.
7. Optional, for signed archives—In the Install Configuration panel, check the
setting of the Enforce installation of signed archives option. If this option is
selected, only signed archives can be restored.
Note: Depending on the CA that was used to sign the certificate used for the
archive signature, you might have to import a CA certificate and create an
appropriate CCL. For details, see Chapter 60: "Managing X.509 Certificates"
on page 1153.
106
Section H: Sharing Configurations
To ease initial configuration, you can take a configuration from a running
appliance and use it to configure another appliance. This process is called
configuration sharing. You can take a post-setup configuration file (one that does not
include those configuration elements that are established in the setup console)
from an already-configured Advanced Secure Gateway appliance and push it to a
newly-manufactured or restored system that is to have the same or similar
configuration.
To create a configuration archive of the source device’s settings using the CLI:
1. Use an SSH client to establish a CLI session with the already configured
Advanced Secure Gateway appliance.
2. From the enable prompt (#), enter the following command:
show configuration post-setup
107
Advanced Secure Gateway Administration Guide
108
Section I: Troubleshooting
When pushing a shared configuration or restoring an archived configuration,
keep in mind the following issues:
❐ If the content-filtering database has not yet been downloaded, any policy that
references categories is not recognized.
❐ Unless you restore the SSL configuration-passwords-key keyring from the
source device, archives can only be restored onto the same device that was the
source of the archive. This is because the encrypted passwords in the
configuration (login, enable, FTP, etc.) cannot be decrypted by a device other
than that on which it was encrypted.
❐ Do not take an expanded archive from an operational Advanced Secure
Gateway appliance and install it onto another Advanced Secure Gateway
appliance. Expanded archives contain system-specific settings (for example,
hostnames, IP addresses, and connection forwarding settings) that will cause
conflicts.
❐ To use signed archives, your appliance must have an SSL certificate
guaranteed by a CA. If your appliance has a built-in appliance certificate, you
can use it and the corresponding appliance-ccl CCL to sign the archive.
Devices manufactured before July 2006 do not support appliance certificates.
If your appliance does not have a built-in appliance certificate, you must do
the following:
• Create a keyring on the appliance.
A keyring contains a public/private key pair. It can also contain a
certificate signing request or a signed certificate.
• Create a Certificate Signing Request (CSR) and send it to a Certificate
Signing Authority (CA).
• Have the CA sign the CSR.
To determine if your appliance has a built-in certificate, see "Using the
Appliance Certificate to Sign the Archive" on page 86.
See Also
For more information about appliance certificates, see Chapter 60:
"Managing X.509 Certificates" on page 1153.
109
Advanced Secure Gateway Administration Guide
110
Chapter 6: Explicit and Transparent Proxy
111
Advanced Secure Gateway Administration Guide
Internet Explorer Tools > Internet Options > Connections > LAN
Settings
Firefox Tools > Options > Advanced > Network > Settings >
Manual Proxy Configuration
Note: NEVER use the Advanced Secure Gateway management port (8081/8082)
to host the PAC file.
112
For additional information about PAC files, see the following:
http://www.proxypacfiles.com/proxypac/
Note: Only the accelerated_pac_base.pac file can be edited. Any text editor can
be used to edit and customize the accelerated PAC file to meet your needs. After
editing the file, you can load a PAC file only through the CLI:
#(config)inline accelerated-pac 123
-paste PAC file here-
123
Then set the browser to use the following URL as the automatic configuration
script: http://Appliance_IP_Address:8080/accelerated_pac_base.pac
113
Advanced Secure Gateway Administration Guide
114
#load accelerated-pac
115
Advanced Secure Gateway Administration Guide
Note: You can also use port 8080, but port 80 is preferred because it doesn’t
require that you specify a port for the PAC-URL in the users’ browsers.
116
❐ For a web page that contains a large number of URLs, a poorly written PAC
file may cause browser performance problems.
❐ It’s best to write your PAC files as small and efficiently as possible. Fast and
efficient Javascript will perform better within the browser, especially on
“busy” web pages.
117
Advanced Secure Gateway Administration Guide
Transparent Proxies
Configure transparent proxy in the following ways:
❐ Through hardware: See "Configuring Transparent Proxy Hardware" on page
118.
❐ Through bridging: "Bridging" on page 118.
❐ Through using the Advanced Secure Gateway as a gateway: See "Configuring
IP Forwarding" on page 119.
In addition to the transparent proxy configuration, you must create a proxy
service for the transparent proxy and enable the service. At this time, you can also
set other attributes for the service, including the destination IP address and port
range. For information on creating or editing a proxy service for transparent
configuration, see Chapter 7: "Managing Proxy Services" on page 121.
Bridging
Network bridging through the Advanced Secure Gateway provides transparent
proxy pass-through and failover support. This functionality allows Advanced
Secure Gateways to be deployed in environments where L4 switches and WCCP-
capable routers are not feasible options.
The Advanced Secure Gateway provides bridging functionality by two methods:
❐ Software—A software, or dynamic, bridge is constructed using a set of
installed interfaces. Within each logical bridge, interfaces can be assigned or
removed. Note that the adapters must of the same type. Although the
software does not restrict you from configuring bridges with adapters of
different types (10/100 or GIGE), the resultant behavior is unpredictable.
For instructions on setting up a software bridge, see "Configuring a Software
Bridge" on page 1312.
❐ Hardware—The Blue Coat Pass-Through card is a 10/100 dual interface
Ethernet device that enables a bridge, using its two adapters, so that packets
can be forwarded across it. However, if the system crashes, the Pass-Through
card becomes a network: the two Ethernet cables are connected so that traffic
can continue to pass through without restriction.
When the Pass-Through card is installed on the Advanced Secure Gateway, a
bridge is automatically created and traffic going through the bridge is
intercepted according to the proxy-service setting. Note that:
• Forwarding traffic behavior: By default, the bridge forwards packets that
are not to be intercepted.
118
• Proxy request behavior: Requests are proxied on either adapter, so if you
connect one side of the bridge to your Internet connection, there might be
a number of issues.
Configuring IP Forwarding
IP Forwarding is a special type of transparent proxy. The Advanced Secure Gateway
is configured to act as a gateway and is configured so that if a packet is addressed
to the Advanced Secure Gateway adapter, but not its IP address, the packet is
forwarded toward the final destination. If IP forwarding is disabled, the packet is
rejected as being mis-addressed.
By default, IP forwarding is disabled to maintain a secure network.
119
Advanced Secure Gateway Administration Guide
To enable IP forwarding:
1. Select the Configuration > Network > Routing > Gateways tab.
2. Select the Enable IP forwarding option at the bottom of the pane.
3. Click OK; click Apply.
120
Chapter 7: Managing Proxy Services
This chapter discusses proxy services and service groups and their roles in
intercepting traffic.
121
Advanced Secure Gateway Administration Guide
A collection of attributes that control what type of processing the Advanced Secure
Gateway appliance performs on the intercepted traffic. A proxy service listener
specifies where a Advanced Secure Gateway service listens for traffic. Four
attributes comprise the listener:
❐ Source address—Most of the time, this attribute is set to all source addresses,
which means any IPv4 or IPv6 address that originates the request. You can
also specify specific IP addresses and subnets. For example, you want to
exclude a network segment, so you specify a subnet and set to Bypass.
❐ Destination address—
122
• Explicit—Requires Web browser and service configuration. It sends
requests explicitly to a proxy instead of to the origin content servers. Only
destination addresses that match one of the IPv4 or IPv6 addresses on the
Advanced Secure Gateway appliance are intercepted.
• Destination IP address or subnet/prefix length—This listener type ensures
that only destination addresses matching the IPv4/IPv6 address or
subnet/prefix length are intercepted.
❐ Port—A specific port or port range. All default Advanced Secure Gateway
services are configured to their industry-standard ports. For example, the
explicit HTTP service is configured to listen on ports 80 and 8080.
❐ Action—The aforementioned action to take on traffic detected by this service:
Intercept or Bypass.
Note: For a complete list of supported proxy services and listeners, see
"Reference: Proxy Services, Proxy Configurations, and Policy" on page 156.
Note: This list applies to new installations or the result of restoring the appliance
to factory defaults after the ab upgraded from a lower version. Upon upgrading
to the current version, the Services tab retains existing services, service group
names, and policies.
123
Advanced Secure Gateway Administration Guide
Note: The HTTPS Reverse Proxy service is also available but not created by
default. For information about configuring the HTTPS Reverse Proxy, see
Chapter 15: "Configuring and Managing an HTTPS Reverse Proxy" on page 313.
124
The destination IP address of a connection can match multiple proxy service
listeners. Multiple matches are resolved using the most-specific match algorithm
used by routing devices. A listener is more specific if it has a larger Destination IP
subnet prefix. For example, the subnet 10.0.0.0/24 is more specific than
10.0.0.0/16, which is more specific than 10.0.0.0/8.
When a new connection is established, the Advanced Secure Gateway appliance
first finds the most specific listener destination IP. If a match is found, and the
destination port also matches, the connection is then handled by that listener. If
the destination port of the listener with the most specific destination IP does not
match, the next most-specific destination IP is found; this process continues until
either a complete match is found or no more matching addresses are found. If a
destination IP address is not specified, the closest matching explicit proxy service
listener has priority over a subnet match. In that instance, the explicit proxy
service listener handles the connection instead of the subnet listener. Explicit port
80 listeners with a destination host IP identical to the Advanced Secure Gateway
appliance have priority over other explicit listeners.
For example, assume the following services were defined as given in the
following table.
An HTTP connection initiated to server 10.167.10.2 could match any of the three
listeners in the above table. The most specific match algorithm finds that a listener
in the New York CRM service is the most specific and since the destination port of
the connection and the listener match, the connection is handled by this service.
The advantage of the most specific match algorithm becomes evident when at
some later point another server is added in the New York Data Center subnet. If
that server needs to be handled by a different service than the New York Data
Center service, a new service with a listener specific to the new server would be
added. The administrator does not need to be concerned about rule order in order
to intercept traffic to this particular server using the new, most specific service
listener.
As another example, assume the following service and listeners were defined:
Table 7–3 Second Example Configuration for Most Specific Match Algorithm
L1 HTTP Explicit 80
L2 HTTP 10.0.0.0/8 80
125
Advanced Secure Gateway Administration Guide
About Authenticate-401
Available on the Explicit HTTP and External HTTP services.
When this option is selected, all transparent and explicit requests received on the
port always use transparent authentication (cookie or IP, depending on the policy
configuration).
If you have deployed Authentication in the way recommended by Blue Coat—
where only the Advanced Secure Gateway appliance nearest the user performs the
authentication tasks—configuring Authenticate-401 is not necessary. However,
multiple, explicitly-configured Advanced Secure Gateway appliances in a proxy
chain are all attempting to perform authentication tasks can cause issues with
browsers. By forcing one of the proxies (recommended: the one furthest away
from the client) to use 401-style authentication instead of the standard proxy 407-
style authentication, the browser can better handle the multiple authentication
challenges.
126
❐ The URL used while evaluating policy is an http:// URL of the tunneled
HTTP request, not a tcp:// URL to which the tunnel was connecting.
❐ Forwarding policy is applied based on the new HTTP request; therefore, the
selected forwarding host selected support HTTP. A forwarding host of type
TCP cannot handle the request, which forces the request to be blocked.
Enabling protocol detection helps accelerate the flow of traffic. However, the TCP
session must be fully established with the client before either the application
proxy or the TCP tunnel proxy contacts the origin server. In some cases, like in the
active-mode FTP data connections, enabling protocol detection might cause a
delay in setting up the connection.
To avoid this connection delay, either use a protocol specific proxy, such as the
FTP proxy, or disable protocol detection.
If protocol detection is disabled, traffic flows over a TCP tunnel without
acceleration provided by a protocol-specific proxy.
127
Advanced Secure Gateway Administration Guide
❐ For TCP Tunnel, you have the option to select either (disabled by default). For
the TCP Tunnel service, the Early Intercept option is selectable and disabled by
default. When this option is disabled, the proxy delays responding to the
client until after it has attempted to contact the server. For maximum
transparency, disable this option. If reduced latency is more important, enable
it.
128
Section B: Configuring a Service to Intercept Traffic
This section describes:
❐ "Changing the State of a Service (Bypass/Intercept)" on page 130
❐ "Moving a Service" on page 136
❐ "Deleting a Service or Service Group" on page 137
❐ "Bypassing All Proxy Services (Troubleshooting)" on page 137
❐ "Importing a Service from the Service Library" on page 138
To learn more details about Blue Coat services, see "Proxy Services Concepts" on
page 122.
129
Advanced Secure Gateway Administration Guide
2: Click to
expand a group
3 (optional)
2. Click the group name to expand the group. For example, you want to
intercept the CIFS services.
3. Optional: Select the Default Action for traffic that does not match any current
service.
130
Source IP->Destination IP/Port Select action
4. From the drop-down for the service or an individual service port, select to
Bypass or Intercept.
Next Tasks
As previously mentioned, setting a service to Intercept is one step in controlling
specific traffic types. There are other options for the services themselves, plus
proxy configurations and policy definitions. You can also create custom services
and service groups.
131
Advanced Secure Gateway Administration Guide
Note: If you only need to change the state of the proxy service (Bypass/Intercept),
you can do so from the main Proxy Services tab. You do not need to enter New/
Edit mode to change this setting.
Before you begin, you must understand the goal of your deployment, how the
application proxy operates, and the IP addresses (source and/or destination) and
ports to intercept. Some proxy services, such as DNS, are simple—comprised only
of IP addresses and ports. Others, such as HTTP, have more attributes to consider.
For a high-level description of these options, see "About Proxy Attributes in the
Services" on page 126.
For specific proxy descriptions, see
2
3
2. At the bottom of the tab, click New Service Group. The New Service Group dialog
displays.
3. In the Service Group field, name the custom service group.
132
4. Click OK. The new service group displays under Custom Service Groups.
6a
6b
6c
6d
133
Advanced Secure Gateway Administration Guide
Note: The Detect Protocol setting is disabled by default. You must select
this check box for filtering to be recognized.
7. Create a listener, or the IP address(es) and ports that this application protocol
uses. In the Listeners area, click New. The New Listener dialog displays.
8a
8b
8c
8d
134
c. In the Port Range field, enter a single port number or a port range on
which this application protocol broadcasts. For a port ranges, enter a
dash between the start and end ports. For example: 8080-8085
d. In the Action area, select the default action for the service: Bypass
configures the service to ignore any traffic matching this listener.
Intercept configures the service to intercept and proxy the associated
traffic.
e. Click OK to close the dialog. The new listener displays in the Listeners
area.
9. Click Ok add the new service to the selected service group.
10. Click Apply.
See Also
❐ "Moving a Service"
❐ "Importing a Service from the Service Library"
135
Advanced Secure Gateway Administration Guide
Moving a Service
The predefined services are not anchored to their default groups. You can move a
service to any other predefined or custom group.
Note: You must move the entire service; that is, you cannot move individual
service listeners.
2a
2b
2c
136
3. Click Apply.
To delete a service:
1. From the Management Console, select the Configuration > Services > Proxy
Services tab.
Note: Downgrading to a version that does not support force bypass while
running in bypass mode will result in restoration of proxy services.
2. In the Force Bypass area, select the Temporarily bypass all proxy services option.
The bypass statement to red.
3. Click Apply.
137
Advanced Secure Gateway Administration Guide
3a
3b
3c
138
d. Click OK.
4. Click Apply.
139
Advanced Secure Gateway Administration Guide
140
Section 2 Proxy Service Global Options
Blue Coat provides optional settings that apply to all proxy services when
configured:
❐ "Ensuring Application Availability (Tunnel on Protocol Error)"
❐ "Using the Client IP Address for Server Connections" on page 143
❐ "Improving Performance by Not Performing a DNS Lookup" on page 144
❐ "Exempting Requests From Specific Clients" on page 148
Note: You can subscribe to the CachePulse service to optimize HTTP traffic. For
information, see "Enabling CachePulse" on page 192.
141
Advanced Secure Gateway Administration Guide
SSL Proxy
For the SSL proxy, the Tunnel on Protocol Error option applies when non-SSL
traffic arrives at the SSL port (443 by default). A common scenario that causes this
is having peer-to-peer applications (viz, Skype, BitTorrent, Gnutella, older AOL-
IM and eMule) configured to enable port 443 for peer-to-peer traffic without SSL
set as the transport protocol. A Advanced Secure Gateway appliance
transparently intercepting all 443 traffic cannot process these connections,
rendering the application unusable.
With an explicit proxy deployment, SSL errors during the initial handshake
causes the same issue. The following example illustrates this:
❐ The Advanced Secure Gateway appliance is configured to have an explicit
HTTP service on port 8080.
❐ The HTTP service is configured with detect protocol enabled, which hands off
SSL traffic to the SSL proxy from an HTTP CONNECT request. Detect Protocol is
set to OFF by default.
Note: The same applies to an explicit SOCKS proxy deployment with protocol
detection enabled or an explicit TCP listener.
Forwarding Note
Enabling the TCP Tunnel on Error option might cause issues if the Advanced
Secure Gateway appliance has forwarding rules that direct traffic to upstream
proxies or other devices:
❐ Forwarding hosts are not viewed as HTTP proxies (even if they are). The
initial Advanced Secure Gateway HTTP proxy connects with a TCP tunnel to
the forwarding host. If the appliance has a policy to forward and tunnels on
error, the forwarding rule might not match if the forwarding rule has a
condition based on information that is not present—any HTTP conditions,
such as:
• Request method
• Request URL
• Request headers
❐ In the case of tunnel on error with explicit proxy, HTTP must match a
forwarding host for the connection of a successful TCP tunnel to occur. If no
forwarding host matches, HTTP will not tunnel on error.
142
2. In the Tunnel on Protocol Error area, select TCP tunnel requests when a protocol error
is detected.
3. Click Apply.
Related Policy
The Visual Policy Manager (VPM) provides the Client Certificate Requested object in
the SSL Intercept Layer > Service column (the equivalent CPL is
client.certificate.requested={yes|no}).Use this policy in conjunction with an
SSL.Intercept(no) action, or a Do Not Intercept SSL action in the VPM, to minimize
traffic disruption when the SSL proxy intercepts secure traffic where the OCS
requests a client certificate.
When Tunnel on Error is enabled, the first detection of a client certificate request
from an OCS causes the connection to fail. The appliance adds the details for that
exchange to an internal list of connections for which SSL interception should be
negated. Subsequent requests function as expected.
You can globally enable the Reflect Client IP option for all services that will be
intercepted. To apply Reflect Client IP option to only a few services, first enable
this option globally and then create policy to disable the Reflect Client IP option
for the exceptions. Or, disable the option globally and create policy to enable it.
143
Advanced Secure Gateway Administration Guide
2. In the Reflect Client IP area, select Reflect client’s source IP when connecting to
servers.
3. Click Apply.
Important:If you enable Reflect Client IP and want the Advanced Secure
Gateway appliance to preserve persistent client connections, you must also add
policy.
VPM object: Web Access Layer > Action > Support Persistent Client Requests (static)
CPL:
<proxy>
http.client.persistence(preserve)
144
❐ DNS imputing on the Advanced Secure Gateway appliance is not configured
correctly. On the Advanced Secure Gateway appliance, you can configure a
list of suffixes to help with DNS resolution. In the event that the host name is
not found, these suffixes are appended to the host name provided by the
client. For information on DNS imputing, see "Resolving Hostnames Using
Name Imputing Suffixes" on page 833.
In each of the cases above, the Advanced Secure Gateway appliance cannot obtain
the destination IP address to serve client requests. When you enable the
Advanced Secure Gateway appliance to trust a client-provided destination IP
address, the Advanced Secure Gateway appliance uses the IP address provided
by the client and does not perform a DNS lookup.
Figure 7–1 No DNS lookup occurs; the transactions goes straight to the OCS.
Figure 7–2 The Advanced Secure Gateway appliance initiates a DNS lookup and initiates a new
connection to the server.
The Advanced Secure Gateway appliance cannot trust the client-provided
destination IP address in the following situations:
❐ The Advanced Secure Gateway appliance receives the client requests in an
explicit proxy deployment.
❐ The Advanced Secure Gateway appliance has a forwarding rule configured
for the request.
❐ The Advanced Secure Gateway appliance has a SOCKS gateway rule
configured for the request.
145
Advanced Secure Gateway Administration Guide
❐ The Advanced Secure Gateway appliance has policy that rewrites the server
URL.
A transproxy deployment is one where a client is configured to contact a
Advanced Secure Gateway appliance explicitly, and a new Advanced Secure
Gateway appliance is deployed between the client and its explicit proxy. The new
Advanced Secure Gateway appliance, now transparently intercepts the traffic
between the client and its explicit proxy. In a transproxy deployment, the
destination IP address used by the client does not match the host header in the
HTTP request, since the client is configured to use the explicit proxy. The path that
the client request takes in a transproxy deployment depends on whether or not
Trust Destination IP is enabled on the transparently deployed Advanced Secure
Gateway appliance.
❐ When Trust Destination IP is enabled on the transparent Advanced Secure
Gateway appliance, the transparent proxy trusts the destination IP included in
the request and forwards the request to the explicit proxy which is serviced
either from cache or from the Origin Content Server (OCS).
❐ When Trust Destination IP is disabled on the transparent Advanced Secure
Gateway appliance, the transparent proxy performs a DNS resolution on the
host header in the request. The request is then completed based on the
configured policy—forwarding rules, SOCKS gateway policy, and server URL
rewrite policy.
Note: If a client gives the destination address of a blocked site but the host name
of a non-blocked site, with Trust Destination IP enabled, the Advanced Secure
Gateway appliance connects to the destination address. This might allow clients
to bypass the configured security policy for your environment.
146
About the Default Settings
During the initial configuration tasks, the administrator determined the default
Trust Destination IP setting. In most deployments, the role of the appliance
determines the setting:
❐ Acceleration role: enabled.
❐ Most other proxy deployments: disabled for tighter security.
You can change these defaults through the Management Console, the CLI, or
through policy. If you use policy, however, be aware that it overrides the setting in
the in Management Console.
For information about using the trust_destination_ip(yes|no) CPL property,
refer to the Content Policy Language Guide.
147
Advanced Secure Gateway Administration Guide
Note: This prevents the appliance from enforcing any policy on these requests
and disables any caching of the corresponding responses. Because bypass entries
bypass Blue Coat policy, use bypass sparingly and only for specific situations.
148
Section 3 Adding Static Bypass Entries
You can add entries to prevent the Advanced Secure Gateway appliance from
intercepting requests from specified systems.
2. Click New to create a new list entry (or click Edit to modify a list entry). The
New Bypass List Entry dialog displays.
3. Create a Client Address or Server Address entry. The IP address can be IPv4 or
IPv6. If you enter an IPv4 address, you can specify a subnet mask. For IPv6
addresses, you can specify a prefix length.
4. (Optional) Add a Comment that indicates why you are creating the static
bypass rule for the specific source/destination combination. This is useful if
another administrator needs to tune the settings later.
5. Click OK to close the dialog.
6. Click Apply.
149
Advanced Secure Gateway Administration Guide
Note: Because bypass entries bypass Blue Coat policy, the feature should be used
sparingly and only for specific situations.
Notes
❐ Dynamic bypass entries are lost when the Advanced Secure Gateway
appliance is restarted.
❐ No policy enforcement occurs on client requests that match entries in the
dynamic or static bypass list.
❐ If a site that requires forwarding policy to reach its destination is entered into
the bypass list, the site is inaccessible.
150
Adding Dynamic Bypass Parameters to the Local Bypass List
The first step in configuring dynamic bypass is to set the server-threshold,
max-entries, or timeout values in the CLI.
Note: This step is optional because the Advanced Secure Gateway appliance uses
default configurations if you do not specify them. Use the default values unless
you have specific reasons for changing them. Contact Blue Coat Technical
Support for detailed advice on customizing these settings.
151
Advanced Secure Gateway Administration Guide
152
Section G: Trial or Troubleshooting: Restricting Interception From
Clients or To Servers
This section discusses Restricted Intercept topics. See "Restricted Intercept Topics"
for details.
153
Advanced Secure Gateway Administration Guide
Notes
❐ Restricted intercepts lists are only applicable to transparent connections.
❐ An entry can exist in both the Static Bypass List and the Restricted Intercept List.
However, the Static Bypass List overrides the entries in the Restricted Intercept
List.
154
2
3a
2. Select Restrict Interception to the servers and clients listed below-- all other
connections are bypassed.
155
Advanced Secure Gateway Administration Guide
156
Table 7–4 Proxy Types (Continued)
157
Advanced Secure Gateway Administration Guide
158
Table 7–5 Proxy Name and Listeners (alphabetical order) (Continued)
Note: The x-service-name field replaces the s-sitename field. The s-sitename
field can still be used for backward compatibility with squid log formats, but it
has no CPL equivalent.
Note: See Chapter 29: "Creating Custom Access Log Formats" on page 663 and
Chapter 30: "Access Log Formats" on page 671 for detailed information about
creating and editing log formats.
159
Advanced Secure Gateway Administration Guide
160
Chapter 8: Intercepting and Optimizing HTTP Traffic
This chapter describes how to configure the HTTP proxy to manage traffic and
accelerate performance in your environment.
How Do I...?
To navigate this chapter, identify the task to perform and click the link:
Configure the HTTP Proxy for object "Allocating Bandwidth to Refresh Objects
freshness? in Cache" on page 195
Step 4 in "To set HTTP default object
caching policy:" on page 180
161
Advanced Secure Gateway Administration Guide
Cache content without having to use "Using a Caching Service" on page 191
policy?
Fine-tune the HTTP Proxy for "Using a Caching Service" on page 191
bandwidth gain? "Using Byte-Range Support" on page 196
162
Section A: About the HTTP Proxy
Before Reading Further
Before reading this section, Blue Coat recommends that you be familiar with the
concepts in these sections:
❐ "About Proxy Services" on page 122.
The HTTP proxy is designed to manage Web traffic from the Internet, providing:
❐ Security
❐ Authentication
❐ Virus Scanning and Patience Pages
❐ Performance, achieved through Object Caching and Object Pipelining
❐ Transition functionality between IPv4-only and IPv6-only networks
The proxy can serve requests without contacting the Origin Content Server (OCS)
by retrieving content saved from a previous request made by the same client or
another client. This is called caching. The HTTP proxy caches copies of frequently
requested resources on its local hard disk. This significantly reduces upstream
bandwidth usage and cost and significantly increases performance.
Proxy services define the ports and addresses where a Advanced Secure Gateway
listens for incoming requests. The Advanced Secure Gateway has three default
HTTP proxy services: External HTTP, Explicit HTTP, and Internal HTTP. Explicit HTTP and
External HTTP use the HTTP proxy, while Internal HTTP uses TCP tunnel.
❐ The Explicit HTTP proxy service listens on ports 80 and 8080 for explicit
connections.
❐ The Internal HTTP proxy service listens on port 80 and transparently intercepts
HTTP traffic from clients to internal network hosts.
❐ The External HTTP proxy service listens on port 80 for all other transparent
connections to the Advanced Secure Gateway. Typically, these requests are for
access to Internet resources.
Although you can intercept SSL traffic on either port, to enable the Advanced
Secure Gateway to detect the presence of SSL traffic you must enable Detect
Protocol on the explicit HTTP service so that the SSL traffic is handed off to the SSL
Proxy. Default is set to OFF. For more information on SSL proxy functionality, see
Chapter 9: "Managing the SSL Proxy" on page 227.
Furthermore, you can create a bypass list on the Advanced Secure Gateway to
exclude the interception of requests sent from specific clients to specific servers
and disable caching of the corresponding responses. The static bypass list also
turns off all policy control and acceleration for each matching request. For
example, for all clients visiting www.bluecoat.com you might exclude interception
and caching of all requests, the corresponding responses, acceleration and policy
control. To create a static bypass list, used only in a transparent proxy
environment, see "Adding Static Bypass Entries" on page 149.
163
Advanced Secure Gateway Administration Guide
When accessing internal IP addresses, Blue Coat recommends using the TCP
tunnel proxy instead of the HTTP proxy. Some applications deployed within
enterprise networks are not always fully compatible with HTTP specs or are
poorly designed. Use of these applications can cause connection disruptions
when using HTTP proxy. As a result internal sites and servers use the Internal HTTP
service, which employs the TCP tunnel proxy.
Important: The TCP tunnel does not support HTTP proxy service functionality.
That is, only the TCP header of a request, (containing source and destination port
and IP) will be visible to the Advanced Secure Gateway for policy evaluation. To
ensure you get the most from the appliance, you must edit the External
(transparent) HTTP service to use the HTTP proxy instead of the default TCP
tunnel.
IPv6 Support
The HTTP proxy is able to communicate using either IPv4 or IPv6, either
explicitly or transparently.
In addition, for any service that uses the HTTP proxy, you can create listeners that
bypass or intercept connections for IPv6 sources or destinations.
164
Section B: Changing the External HTTP (Transparent) Proxy Service
to Intercept All IP Addresses on Port 80
By default, the External HTTP service includes an HTTP proxy service listener
configured on port 80. During the initial Advanced Secure Gateway
configuration, if it hasn’t already been set, you can set External HTTP to Intercept.
The following procedure describes how to set the service to Intercept mode.
2a
2b
165
Advanced Secure Gateway Administration Guide
HTTP Optimization
The HTTP proxy alleviates the latency in data retrieval and optimizes the delivery
of HTTP traffic through object caching and object pipelining. Caching minimizes
the transmission of data over the Internet and over the distributed enterprise,
thereby improving bandwidth use. Pipelining allows the Advanced Secure
Gateway to open several connections to a server, speeding up the delivery of
content into the cache. Pre-fetching is another method the Advanced Secure
Gateway uses to improve the user experience. Content on a requested web page
several levels deep is requested and cached for fast delivery to users.
For objects in cache, an intelligent caching mechanism in the Advanced Secure
Gateway maintains object freshness. This is achieved by periodically refreshing
the contents of the cache, while maintaining the performance within your
network.
The method of storing objects on disk is critical for performance and scalability.
SGOS, the operating system on the Advanced Secure Gateway, uses an object
store system which hashes object lookups based on the entire URL. This hashing
allows access to objects with far fewer lookups, as compared to a directory-based
file system found in traditional operating systems. While other file systems run
poorly when they are full, the Advanced Secure Gateway’s cache system achieves
its highest performance when it is full.
166
For more information on how the Advanced Secure Gateway executes permission
checks to ensure authentication over HTTP, see Section G: "Caching
Authenticated Data (CAD) and Caching Proxy Authenticated Data (CPAD)" on
page 202.
In case of a reverse proxy, object caching reduces the load on the OCS and
improves scalability of the OCS.
167
Advanced Secure Gateway Administration Guide
Although current browsers open multiple connections with the OCS to retrieve
objects in parallel, the Advanced Secure Gateway further accelerates the process
with its Object Pipelining algorithm which supports nested pipelines that are up
to three levels deep.
❐ The Object Pipelining algorithm allows the Advanced Secure Gateway to
open as many simultaneous TCP connections as the origin server allows, and
retrieves objects in parallel. The proxy also pre-fetches objects based on
pipelined requests. For example, if a pipelined HTML object has other
embedded objects, the HTTP proxy will pre-fetch those embedded objects
from the Web server without a request from the client. The objects are then
ready to be delivered from the cache straight to the user, as fast as the client
can request them.
While object pipelining enhances the user experience by minimizing latency and
improving response times for first-time Web page requests, it could increase
bandwidth utilization. Therefore by default, to avoid an increase in bandwidth
utilization, object pipelining is disabled for the reverse proxy and bandwidth gain
profiles. It is enabled, by default, only on the forward proxy — Normal profile,
where enhancing the response time for clients is vital.
168
Therefore, AAR is now disabled by default on systems running SGOS 6.2.6 and
later. However, if you upgrade from a pre-SGOS 6.2.6 release, AAR may still be
enabled. For information on how to configure this feature to best serve your
environment, see "Allocating Bandwidth to Refresh Objects in Cache" on page 195.
Planning Considerations
You can use CPL properties in the <Cache> layer to control meta tag processing.
The CPL commands can be used in lieu of the check boxes for parsing meta tags
through the Management Console. For details on the meta-tags, see Step 7 in "To
set HTTP default object caching policy:" on page 180.
The following CPL commands are applicable for HTTP proxy, HTTP refresh, and
HTTP pipeline transactions:
http.response.parse_meta_tag.Cache-Control(yes|no)
http.response.parse_meta_tag.Expires(yes|no)
http.response.parse_meta_tag.Pragma.no-cache(yes|no)
VPM support to control the processing of meta tags is not available.
169
Advanced Secure Gateway Administration Guide
From the (config) prompt, enter the following command to enable tolerant HTTP
request parsing (the default is disabled):
#(config) http tolerant-request-parsing
To disable HTTP tolerant request parsing:
#(config) http no tolerant-request-parsing
170
Compression is disabled by default. If compression is enabled, the HTTP proxy forwards
the supported compression algorithm (gzip and deflate) from the client’s request
(Accept-Encoding: request header) to the server as is, and attempts to send compressed
content to client whenever possible. This allows the Advanced Secure Gateway
appliance to send the response as is when the server sends compressed data, including
non-cacheable responses. Any unsolicited encoded response is forwarded to the client as
is.
Note: If compression is not enabled, the Advanced Secure Gateway appliance does
not compress the content if the server sends uncompressed content. However, the
appliance continues to uncompress content if necessary to apply transformations.
Any unsolicited encoded response is forwarded to the client as is.
For cache-hit compression behavior, see Table 8-1 below. For cache-miss compression
behavior, see Table 8-2.
.
171
Advanced Secure Gateway Administration Guide
Compression Exceptions
❐ The Advanced Secure Gateway appliance issues a transformation_error exception
(HTTP response code 403), when the server sends an unknown encoding and the
appliance is configured to do content transformation.
❐ The Advanced Secure Gateway appliance issues an unsupported_encoding
exception (HTTP response code 415 - Unsupported Media Type) when the appliance
is unable to deliver content due to configured policy.
The messages in the exception pages can be customized. For information on using
exception pages, refer to “Advanced Policy Tasks” in the Visual Policy Manager Reference.
Configuring Compression
Compression behavior can only be configured through policy—VPM or CPL.
172
❐ Client HTTP compression object: Allows you to determine the behavior when the
client wants the content in a different form than is in the cache.
❐ Server HTTP compression object: Allows you to enable or disable compression and to
set options.
❐ HTTP compression level object: Allows you to set a compression level of low,
medium, or high.
Refer to the Visual Policy Manager Reference to configure these HTTP compression
options.
You can use server-side or client-side controls to manage compression through policy, as
described in the following table.
173
Advanced Secure Gateway Administration Guide
Default Behavior
By default, Blue Coat sends the client’s list of the accept encoding algorithms, except for
unknown encodings. If compression is not enabled, the default overrides any configured
CPL policy.
If Accept-Encoding request header modification is used, it is overridden by the
compression related policy settings shown in Table 8-3. The Accept-Encoding header
modification can continue to be used if no compression policies are applied, or if
compression is not enabled. Otherwise, the compression-related policies override any
Accept-Encoding header modification, even if the Accept-Encoding header
modification appears later in the policy file.
Adding encoding settings with client-side controls depend on if the client originally listed
that encoding in its Accept-Encoding header. If so, these encodings are added to the list
of candidates to be delivered to the client. The first cache object with an Accept-Encoding
match to the client-side list is the one that is delivered.
174
http.server.accept_encoding(client);If no content transformation
policy is configured
http.server.accept_encoding(identity);If some content transformation
policy is configured
http.allow_compression(no); default
http.allow_decompression(no); default
Notes
❐ Policy-based content transformations are not stored as variant objects. If content
transformation is configured, it is applied on all cache-hits, and objects might be
compressed all the time at the end of such transformation if they are so configured.
❐ The variant that is available in the cache is served, even if the client requests a
compression choice with a higher qvalue. For example, if a client requests Accept-
encoding: gzip;q=1, deflate;q=0.1, and only a deflate-compressed object is
available in the cache, the deflate compressed object is served.
❐ The HTTP proxy ignores Cache-Control: no-transform directive of the OCS. To
change this, write policy to disallow compression or decompression if Cache-
Control: no-transform response header is present.
❐ The Advanced Secure Gateway appliance treats multiple content encoding (gzip,
deflate or gzip, gzip) as an unknown encoding. (These strings indicate the content has
been compressed twice.)
❐ The gzip and deflate formats are treated as completely separate and are not converted
from one to the other.
❐ Blue Coat recommends using gzip encoding (or allowing both gzip and deflate)
when using the HTTP compression feature.
❐ If the Advanced Secure Gateway appliance receives unknown content encoding and if
content transformation is configured (such as popup blocking), an error results.
❐ If the origin server provides compressed content with a different compression level
then that specified in policy, the content is not re-compressed.
❐ If the Advanced Secure Gateway appliance compressed and cached content at a
different compression level than the level specified in a later transaction, the content is
not re-compressed.
❐ Parsing of container HTML pages occurs on the server side, so pipelining
(prefetching) does not work when the server provides compressed content.
❐ Compressing a zip file breaks some browser versions, and compressing images does
not provide added performance.
❐ All responses from the server can be compressed, but requests to the server, such as
POST requests, cannot.
❐ Only 200 OK responses can be compressed.
175
Advanced Secure Gateway Administration Guide
Setting the maximum Determines the maximum object size to store in the Advanced Secure
object cache size Gateway. All objects retrieved that are greater than the maximum size are
delivered to the client but are not stored in the Advanced Secure Gateway.
Default: 1024 MB
Setting the TTL for Determines the number of minutes the SGOS stores negative responses
negative responses in for requests that could not be served to the client.
cache The OCS might send a client error code (4xx response) or a server error
code (5xx response) as a response to some requests. If you configure the
Advanced Secure Gateway to cache negative responses for a specified
number of minutes, it returns the negative response in subsequent
requests for the same page or image for the specified length of time. The
Advanced Secure Gateway will not attempt to fetch the request from the
OCS. Therefore, while server-side bandwidth is saved, you could receive
negative responses to requests that might otherwise have been served by
accessing the OCS.
By default, the Advanced Secure Gateway does not cache negative
responses. It always attempts to retrieve the object from the OCS, if it is
not already in cache.
Default: 0 minutes
Forcing freshness Verifies that each object is fresh upon access. Enabling this setting has a
validation before serving significant impact on performance because the HTTP proxy revalidates
an object from cache requested cached objects with the OCS before serving them to the client.
This results in a negative impact on bandwidth gain. Therefore, do not
enable this configuration unless absolutely required.
For enabling, select the Always check with source before serving object
check box.
Default: Disabled
176
Settings to Configure Notes
Object Caching
Parsing HTTP meta tag Determines how HTTP meta tag headers are parsed in the HTML
headers documents. The meta tags that can be enabled for parsing are:
• Cache-control meta tag
The sub-headers that are parsed when this check box is selected are:
private, no-store, no-cache, max-age, s-maxage, must-re-
validate, proxy-revalidate
• Expires meta tag
This directive parses for the date and time after which the document
should be considered expired.
• Pragma-no-cache meta tag
This directive indicates that cached information should not be used
and instead requests should be forwarded to the OCS.
Default: Disabled
Allocating bandwidth on Allows you to specify a limit to the amount of bandwidth the Advanced
the HTTP proxy for Secure Gateway uses to achieve the desired freshness. For more
maintaining freshness of information see, "Allocating Bandwidth to Refresh Objects in Cache" on
the objects in cache page 195.
Default: Disable refreshing
The above settings serve as defaults on the proxy. If you want a more granular
caching policy, for example— setting the TTL for an object, use Blue Coat Content
Policy Language (CPL). You can also use the VPM or CPL to bypass the cache or
to prohibit caching for a specific domain or server. Refer to the Content Policy
Language Guide for more information.
177
Advanced Secure Gateway Administration Guide
Caching/Optimization (Pipelining)
Configuration: Blue Coat Advanced Secure Gateway pipelining options enabled
(Configuration > Proxy Settings > HTTP Proxy > Acceleration Profile).
Symptom: The OCS becomes overwhelmed; users report slow access times in
their Web browsers.
Bandwidth Gain
Configuration: Blue Coat Advanced Secure Gateway Enable Bandwidth Gain Mode
option enabled (Configuration > Proxy Settings > HTTP Proxy > Acceleration Profile).
Symptom: The OCS becomes overwhelmed.
178
The Advanced Secure Gateway determines that objects in the cache require
refreshing. This operation itself is not costly, but the additional requests to the
OCS adds load to the WAN link. A global and per-server limit prevents the
problem.
For new installations (or following a restoration to factory defaults), clientless
limits are enforced by default; the Advanced Secure Gateway capacity per model
determines the upper default limit.
Continue with "Setting the HTTP Default Object Caching Policy" on page 180.
179
Advanced Secure Gateway Administration Guide
3. Configure default proxy policies (HTTP Proxy Policy area; see "About the HTTP
Object Caching Policy Global Defaults" on page 176):
a. In the Do not cache objects larger than field, enter the maximum object
size to cache. The default is 4096 MB for new installations of SGOS.
b. In the Cache negative responses for field, enter the number of minutes
that SGOS stores negative responses. The default is 0.
c. Force freshness validation. To always verify that each object is fresh
upon access, select the Always check with source before serving object
option. Enabling this setting has a significant impact on performance,
do not enable this configuration unless absolutely required.
d. Disable meta-tag parsing. The default is to parse HTTP meta tag
headers in HTML documents if the MIME type of the object is text/
html.
To disable meta-tag parsing, clear the option for:
• Parse cache-control meta tag
The following sub-headers are parsed when this check box is selected:
private, no-store, no-cache, max-age, s-maxage, must-
revalidate, proxy-revalidate.
180
• Parse expires meta tag
This directive parses for the date and time after which the document
should be considered expired.
• Parse pragma-no-cache meta tag
This directive indicates that cached information should not be used
and instead requests should be forwarded to the OCS.
4. Configure Clientless Request Limits (see "About Clientless Requests Limits" on
page 177):
a. Global Limit—Limits the number of concurrent clientless connections
from the Advanced Secure Gateway to any OCS. Strongly
recommended if Pipeline options or the Enable Bandwidth Gain Mode
option is enabled on the Configuration > Proxy Settings > HTTP Proxy >
Acceleration Profile tab.
See Also
❐ "Customizing the HTTP Object Caching Policy" on page 166.
❐ "Clearing the Object Cache" on page 1461
❐ "Selecting an HTTP Proxy Acceleration Profile" on page 182.
181
Advanced Secure Gateway Administration Guide
Topic Links
❐ "About the Normal Profile"
❐ "About the Portal Profile"
❐ "About the Bandwidth Gain Profile" on page 183
❐ "About HTTP Proxy Profile Configuration Components" on page 183
182
About the Bandwidth Gain Profile
The Bandwidth Gain profile is useful wherever server-side bandwidth is an
important resource. This profile is typically used in Internet Service Provider (ISP)
deployments. In such deployments, minimizing server-side bandwidth is most
important. Therefore, maintaining the freshness of an object in cache is less
important than controlling the use of server-side bandwidth. The Bandwidth-
Gain profile enables various HTTP configurations that can increase page response
times and the likelihood that stale objects are served, but it reduces the amount of
server-side bandwidth required.
183
Advanced Secure Gateway Administration Guide
184
Table 8–2 Description of Profile Configuration Components (Continued)
Substitute Get for PNC http [no] Typically, if a client sends an HTTP GET request
substitute pragma- with a Pragma: no-cache or Cache-Control:
no-cache no-cache header (for convenience, both are
hereby referred to as PNC), a cache must
consult the OCS before serving the content. This
means that HTTP proxy always re-fetches the
entire object from the OCS, even if the cached
copy of the object is fresh. Because of this, PNC
requests can degrade proxy performance and
increase server-side bandwidth utilization.
However, if the Substitute Get for PNC setting
is enabled, then the PNC header from the client
request is ignored (HTTP proxy treats the
request as if the PNC header is not present at
all).
Substitute Get for IE reload http [no] Some versions of Internet Explorer issue the
substitute ie- Accept: */* header instead of the Pragma:
reload no-cache header when you click Refresh. When
an Accept header has only the */* value, HTTP
proxy treats it as a PNC header if it is a type-N
object. You can control this behavior of HTTP
proxy with the Substitute GET for IE Reload
setting. When this setting is enabled, the HTTP
proxy ignores the PNC interpretation of the
Accept: */* header.
185
Advanced Secure Gateway Administration Guide
186
Table 8–2 Description of Profile Configuration Components (Continued)
187
Advanced Secure Gateway Administration Guide
188
Section 3 Configuring the HTTP Proxy Profile
Configure the profile by selecting any of the components discussed in "About
HTTP Proxy Profile Configuration Components" on page 183.
Text displays at the bottom of this tab indicating which profile is selected.
Normal is the default profile. If you have a customized profile, this text does
not display.
Important: If you have a customized profile and you click one of the Use
Profile buttons, no record of your customized settings remains. However,
after the Advanced Secure Gateway is set to a specific profile, the profile is
maintained in the event the Advanced Secure Gateway is upgraded.
Also, if you select any Pipeline option or the Enable Bandwidth Gain Mode
option, Blue Coat strongly recommends limiting clientless requests. See
"About Clientless Requests Limits" on page 177.
3. To select a profile, click one of the three profile buttons (Use Normal Profile, Use
Bandwidth Gain Profile, or Use Portal Profile).
The text at the bottom of the Acceleration Profile tab changes to reflect the new
profile.
Note: You can customize the settings, no matter which profile button you
select.
4. (Optional) To customize the profile settings, select or clear any of the check
boxes (see Table 8–2, "Description of Profile Configuration Components" on
page 183 for information about each setting).
189
Advanced Secure Gateway Administration Guide
See Also
❐ "Selecting an HTTP Proxy Acceleration Profile" on page 182.
❐ "About HTTP Proxy Profile Configuration Components" on page 183.
❐ "About HTTP Object Freshness" on page 168.
❐ "Using a Caching Service" on page 191.
190
Section E: Using a Caching Service
CachePulse is a caching service that provides you with optimal bandwidth gains
for popular or high-bandwidth websites. Utilizing highly effective Web caching
technology, CachePulse saves bandwidth on expensive international links and
backhaul traffic, thereby improving Web experience for users.
CachePulse accelerates the delivery of rich Web 2.0 content, video, and large files
such as:
• YouTube videos
• Netflix streaming media
• Microsoft Windows updates
Subscribing to the CachePulse service eliminates the need to maintain caching
policy; when you first enable the service, it downloads the latest version of the
caching policy database. CachePulse periodically updates the database as long as
the service is enabled and an Internet connection exists.
191
Advanced Secure Gateway Administration Guide
See Also
❐ "Downloading the CachePulse Database"
❐ "Notifications for Status Metrics" on page 1401
192
The License and Download Status field shows statistics about the previous
successful and unsuccessful downloads. If the last download was
unsuccessful, the field contains an error.
If you receive a download error, check your network configuration and make
sure that the appliance can connect to the Internet.
193
Advanced Secure Gateway Administration Guide
194
Section 5 Allocating Bandwidth to Refresh Objects in Cache
The Refresh bandwidth options control the server-side bandwidth used for all forms
of asynchronous adaptive refresh activity. On systems with increased object store
capacity, the value of asynchronous adaptive refresh has diminished markedly,
and can in many instances actually increase latency due to system load. Therefore,
this feature is disabled by default. You can select from the following options:
❐ Disable refreshing—Disables adaptive refresh. This setting is recommended on
systems that use an increased object capacity disk model. This is the default
setting for fresh installations of SGOS 6.2.6 and later.
❐ Let the SG appliance manage refresh bandwidth—The appliance will automatically
use whatever bandwidth is available in its efforts to maintain 99.9% estimated
freshness of the next access. You can also enable this from the CLI using the
#(config caching) refresh bandwidth automatic command. This setting is
recommended only on systems that are not using the increased object capacity
disk model (that is, systems that were manufactured with an SGOS version
prior to 6.2).
❐ Limit refresh bandwidth to x kilobits/sec—If you want to use adaptive refresh but
you want to limit the amount of bandwidth used, select this option and
specify a limit to the amount of bandwidth the Advanced Secure Gateway
uses to achieve the desired freshness. Before making adjustments, review the
logged statistics and examine the current bandwidth used as displayed in the
Refresh bandwidth field. It is not unusual for bandwidth usage to spike
occasionally, depending on access patterns at the time. Entering a value of
zero disables adaptive refresh.
195
Advanced Secure Gateway Administration Guide
The Refresh bandwidth field displays the refresh bandwidth options. The
default setting is to Disable refreshing.
Important: Blue Coat strongly recommends that you not change the setting
from the default if you have a system with an increased object store capacity.
196
When Byte-Range Support is Enabled
If the object is already in cache, the Advanced Secure Gateway serves the byte-
range request from the cache itself. However, if the client’s request contains a
PNC header, the Advanced Secure Gateway always bypasses the cache and serves
the request from the OCS.
If the object is not in cache, the Advanced Secure Gateway always attempts to
minimize delay for the client.
❐ If the byte-range requested is near the beginning of the object, that is the start
byte of the request is within 0 to 14336 bytes, then the Advanced Secure
Gateway fetches the entire object from the OCS and caches it. However, the
client is served the requested byte-range only.
❐ If the byte-range requested is not near the beginning of the object, that is the
start byte of the request is greater than 14336 bytes, then the Advanced Secure
Gateway fetches only the requested byte-range from the OCS, and serves it to
the client. The response is not cached.
Note: The HTTP proxy never caches partial objects, even if byte-range
support is enabled.
Since the Advanced Secure Gateway never caches partial objects, bandwidth gain
is significantly affected when byte-range requests are used heavily. If, for
example, several clients request an object where the start byte offset is greater
than 14336 bytes, the object is never cached. The Advanced Secure Gateway
fetches the same object from the OCS for each client, thereby causing negative
bandwidth gain.
Further, download managers like NetAnts® typically use byte-range requests
with PNC headers. To improve bandwidth gain by serving such requests from
cache, enable the revalidate pragma-no-cache option along with byte-range support.
See "Enabling Revalidate Pragma-No-Cache" on page 198.
197
Advanced Secure Gateway Administration Guide
To enable or disable the revalidate PNC setting, enter one of the following
commands at the (config) command prompt:
#(config) http revalidate-pragma-no-cache
-or-
#(config) http no revalidate-pragma-no-cache
198
client-side cumulative bytes of traffic is lower than the server-side cumulative
bytes of traffic for a given period of time. It is represented as a unit-less
multiplication factor and is computed by the ratio:
client bytes / server bytes
Some factors that contribute to negative bandwidth gain are:
❐ Abandoned downloads (delete_on_abandonment (no))
When a client cancels a download, the Advanced Secure Gateway continues
to download the requested file to cache it for future requests. Since the client
has cancelled the download, server-side traffic persists while the client-side
traffic is halted. This continued flow of traffic on the server-side causes
negative bandwidth gain.
Further with (delete_on_abandonment (yes)), when a client cancels a
download, the Advanced Secure Gateway terminates the connection and
stops sending traffic to the client. However, the server may have sent
additional traffic to the Advanced Secure Gateway before it received the TCP
RESET from the Advanced Secure Gateway. This surplus also causes negative
bandwidth gain.
❐ Refreshing of the cache
Bandwidth used to refresh contents in the cache contributes to server-side
traffic. Since this traffic is not sent to the client until requested, it might cause
negative bandwidth gain.
❐ Byte-range downloads
When download managers use an open-ended byte-range, such as Range:
bytes 10000-, and reset the connection after downloading the requested byte-
range. The packets received by the Advanced Secure Gateway from the server
are greater than those served to the client, causing negative bandwidth gain.
❐ Download of uncompressed content
If the Advanced Secure Gateway downloads uncompressed content, but
compresses it before serving the content to the client, server-side traffic will be
greater than client-side traffic. This scenario is typical in a reverse proxy
deployment, where the server offloads the task of gzipping the content to the
Advanced Secure Gateway.
❐ Reduced client-side throughput
In the short term, you will notice negative bandwidth gain if the client-side
throughput is lower than the server-side throughput. If, for example, the
Advanced Secure Gateway takes five minutes to download a 100 Mb file and
takes 10 minutes to serve the file to the client. The Advanced Secure Gateway
reflects negative bandwidth gain for the first five minutes.
To view bandwidth usage and bandwidth gain statistics on the HTTP proxy, click
Statistics > Traffic History tab. Select the HTTP proxy service to view statistics over
the last hour, day, week, month, and year. See Chapter 31: "Statistics" on page 733
for information on the graphs.
199
Advanced Secure Gateway Administration Guide
Compression
Compression is disabled by default. If compression is enabled, the HTTP proxy
forwards the supported compression algorithm (either deflate or gzip) from the
client’s request (Accept-Encoding: request header) to the server as is, and
attempts to send compressed content to client whenever possible. This allows
SGOS to send the response as is when the server sends compressed data,
including non-cacheable responses. Any unsolicited encoded response is
forwarded as is to the client.
For more information on compression, see "Understanding HTTP Compression"
on page 205.
200
#(config) http upload-with-pasv disable
#(config) http upload-with-pasv enable
#(config) http version {1.0 | 1.1}
#(config) http [no] www-redirect
#(config) http [no] xp-rewrite-redirect
Note: For detailed information about using these commands, refer to the
Command Line Interface Reference.
201
Advanced Secure Gateway Administration Guide
Figure 8–5 CAD: 200 response from the Origin Content Server.
The OCS then sends back one of the following responses:
❐ HTTP 200 response status, authentication is accepted. The user receives the
requested resource.
202
❐ HTTP 403 response status, user is not allowed to view the requested resource.
The user is authenticated but is not authorized to receive the content, hence
the user receives an error message.
When another user accesses the same URL, the Advanced Secure Gateway
authenticates the user with the OCS and verifies the freshness of the content using
the Get If Modified Since request. If the user is authorized and the content has
not been modified, the OCS returns an HTTP 304 response message to the
Advanced Secure Gateway. The Advanced Secure Gateway then serves the
content from cache.
If the content has been modified, the OCS returns the HTTP 200 response along
with the modified content.
Figure 8–6 CAD: 403 and 304 response codes from the OCS
Note: CAD is applicable only for pure HTTP authentication — the Advanced
Secure Gateway caches authenticated data only when the OCS includes the www-
Authenticate response code in the 401 response header. If, for example, the client
accesses an OCS that uses forms-based authentication, the Advanced Secure
Gateway does not perform CAD.
203
Advanced Secure Gateway Administration Guide
204
Understanding HTTP Compression
Compression reduces a file size but does not lose any data. Whether you should
use compression depends upon three resources: server-side bandwidth, client-
side bandwidth, and Advanced Secure Gateway CPU. If server-side bandwidth is
more expensive in your environment than CPU, always request compressed
content from the origin content server (OCS). However, if CPU is comparatively
expensive, the Advanced Secure Gateway appliance should instead be configured
to ask the OCS for the same compressions that the client asked for and to forward
whatever the server returns.
The default configuration assumes that CPU is costlier than bandwidth. If this is
not the case, you can change the Advanced Secure Gateway appliance behavior.
205
Advanced Secure Gateway Administration Guide
For cache-hit compression behavior, see Table 8-3 below. For cache-miss
compression behavior, see Table 8-4.
.
206
Table 8–5 Cache-Miss Compression Behavior (Continued)
Compression Exceptions
❐ The Advanced Secure Gateway appliance issues a transformation_error
exception (HTTP response code 403), when the server sends an unknown
encoding and the appliance is configured to do content transformation.
❐ The Advanced Secure Gateway appliance issues an unsupported_encoding
exception (HTTP response code 415 - Unsupported Media Type) when the
appliance is unable to deliver content due to configured policy.
The messages in the exception pages can be customized. For information on using
exception pages, The messages in the exception pages can be customized. For
information on using exception pages, refer to the Advanced Policy Tasks chapter, Section
E, of the Visual Policy Manager Reference.
Configuring Compression
Compression behavior can only be configured through policy—VPM or CPL.
207
Advanced Secure Gateway Administration Guide
a. From the Management Console, select Configuration > Policy > Visual
Policy Manager; click Launch.
b. Select Policy > Add Web Access Layer from the menu of the Blue Coat
VPM window that appears.
c. Type a layer name into the dialog that appears and click OK.
2. Add an Action object:
a. Right click on the item in the Action column; select Set.
b. Click New in the Set Action Object dialog that appears; select Set Client
HTTP Compression.
2c
2d
b. Select Policy > Add Web Access Layer from the menu of the Blue Coat
VPM window that appears.
c. Type a layer name into the dialog that appears and click OK.
2. Add an Action object:
a. Right click on the item in the Action column; select Set.
b. Click New in the Set Action Object dialog that appears; select Set Server
HTTP Compression.
208
d. Click OK again; close the VPM window and click Yes in the dialog to
save your changes.
• Select Policy > Add Web Access Layer from the menu of the Blue Coat VPM
window that appears.
• Type a layer name into the dialog that appears and click OK.
2. Add an Action object:
• Right click on the item in the Action column; select Set.
• Click New in the Set Action Object dialog that appears; select Set HTTP
Compression Level.
209
Advanced Secure Gateway Administration Guide
Default Behavior
By default, Blue Coat sends the client’s list of the accept encoding algorithms,
except for unknown encodings. If compression is not enabled, the default
overrides any configured CPL policy.
If Accept-Encoding request header modification is used, it is overridden by the
compression related policy settings shown in Table 8-5. The Accept-Encoding
header modification can continue to be used if no compression policies are
210
applied, or if compression is not enabled. Otherwise, the compression-related
policies override any Accept-Encoding header modification, even if the Accept-
Encoding header modification appears later in the policy file.
Adding encoding settings with client-side controls depend on if the client
originally listed that encoding in its Accept-Encoding header. If so, these
encodings are added to the list of candidates to be delivered to the client. The first
cache object with an Accept-Encoding match to the client-side list is the one that is
delivered.
Notes
❐ Policy-based content transformations are not stored as variant objects. If
content transformation is configured, it is applied on all cache-hits, and
objects might be compressed all the time at the end of such transformation if
they are so configured.
❐ The variant that is available in the cache is served, even if the client requests a
compression choice with a higher qvalue. For example, if a client requests
Accept-encoding: gzip;q=1, deflate;q=0.1, and only a deflate-compressed
object is available in the cache, the deflate compressed object is served.
❐ The HTTP proxy ignores Cache-Control: no-transform directive of the OCS.
To change this, write policy to disallow compression or decompression if
Cache-Control: no-transform response header is present.
211
Advanced Secure Gateway Administration Guide
❐ The gzip and deflate formats are treated as completely separate and are not
converted from one to the other.
❐ Blue Coat recommends using gzip encoding (or allowing both gzip and
deflate) when using the HTTP compression feature.
212
Section H: Viewing HTTP/FTP Statistics
This section discusses the following topics:
❐ "HTTP/FTP History Statistics"
❐ "Viewing the Number of HTTP/HTTPS/FTP Objects Served"
❐ "Viewing the Number of HTTP/HTTPS/FTP Bytes Served" on page 215
❐ "Viewing Active Client Connections" on page 216
❐ "Viewing HTTP/HTTPS/FTP Client and Server Compression Gain Statistics"
on page 217
❐ "Disabling the Proxy-Support Header" on page 219
Note: You can view current HTTP statistics through the CLI using the show http-
stats command.
213
Advanced Secure Gateway Administration Guide
3. (Optional) To set the graph scale to a different value, select a value from the
Graph scale should drop-down list.
214
Section 2 Viewing the Number of HTTP/HTTPS/FTP Bytes Served
The HTTP/HTTPS/FTP Bytes tab shows the sum total of the number of bytes served
from the device over the last 60 minutes, 24 hours, and 30 days. The chart shows
the total number of bytes for objects served by the device, including both cache
hits and cache misses.
3. (Optional) To set the graph scale to a different value, select a value from the
Graph scale should drop-down list.
215
Advanced Secure Gateway Administration Guide
3. (Optional) To set the graph scale to a different value, select a value from the
Graph scale should drop-down list.
216
Section 4 Viewing HTTP/HTTPS/FTP Client and Server Compression
Gain Statistics
Under HTTP/FTP History, you can view HTTP/FTP client and server
compression-gain statistics for the Advanced Secure Gateway over the last 60
minutes, 24 hours, and 30 days in the Client Comp. Gain and the Server Comp.
Gain tabs. Overall client and server compression-gain statistics are displayed
under System Usage. These statistics are not available through the CLI.
The green display on the bar graph represents uncompressed data; the blue
display represents compressed data. Hover your cursor over the graph to see the
compressed gain data.
See one of the following sections for more information:
❐ "Viewing HTTP/FTP Client Compressed Gain Statistics"
❐ "Viewing HTTP/FTP Server Compressed Gain Statistics" on page 218
3. (Optional) To set the graph scale to a different value, select a value from the
Graph scale should drop-down list.
See Also
"Viewing HTTP/HTTPS/FTP Client and Server Compression Gain Statistics" on
page 217
217
Advanced Secure Gateway Administration Guide
3. (Optional) To set the graph scale to a different value, select a value from the
Graph scale should drop-down list.
See Also
"Viewing HTTP/HTTPS/FTP Client and Server Compression Gain Statistics" on
page 217
218
Section I: Supporting IWA Authentication in an Explicit HTTP Proxy
Internet Explorer does not allow IWA authentication through a Advanced Secure
Gateway when explicitly proxied. To facilitate this authentication, Blue Coat
added a Proxy-Support: Session-based-authentication header. By default, when
the Advanced Secure Gateway receives a 401 authentication challenge from
upstream, it sends the Proxy-Support: Session-based-authentication header in
response.
The Proxy-Support header is not supported if:
❐ you are using an older browser (Refer to the SGOS Release Notes for supported
browser versions).
❐ both the Advanced Secure Gateway and the OCS perform IWA
authentication.
In either case, Blue Coat recommends that you disable the header and enable
Force IWA for Server Authentication. The Force IWA for Server Authentication action
converts the 401-type server authentication challenge to a 407-type proxy
authentication challenge that Internet Explorer supports. The Advanced Secure
Gateway also converts the resulting Proxy-Authentication headers in client
requests to standard server authorization headers, which allows an IWA
authentication challenge to pass through when Internet Explorer is explicitly
proxied through the appliance.
Note: To suppress the Proxy-Support header globally, use the http force-ntlm
command to change the option. To suppress the header only in certain situations,
continue with the procedures below.
219
Advanced Secure Gateway Administration Guide
3a
3b
3c
3d
220
Section J: Supporting Authentication on an Upstream Explicit Proxy
Proxy chaining may cause issues in HTTPS configurations. When an upstream
proxy requires Proxy-Authentication, a timeout may occur because by the time
the proxy authentication challenge occurs in the HTTP CONNECT request, the
client has already established a non-authorized connection to the downstream
proxy (which may or may not be a Advanced Secure Gateway).
To avoid this issue, use (command) (am I in the interface too?) when
protocol_detect is enabled. The HTTP proxy will challenge the client on any
CONNECT request for Proxy-Authentication. When the upstream proxy returns
the 200 OK message on receiving the Proxy-Authentication header to authorize
the request, but sends the credentials request on to the server.
Encrypted tap ( linky) works with this gesture...
Deployment Scenarios
Use this configuration when the Advanced Secure Gateway is inserted between a
client and an explicit proxy configured to use authentication. It can also be helpful
in transparent deployments.
• Explicit downstream: The Advanced Secure Gateway supports
authentication to the client for SSL/HTTPS traffic, with an upstream
proxy performing the authentication. The upstream proxy is not in your
(control)
• Transparent downstream: The Advanced Secure Gateway, deployed
transparently, supports authentication to the client for SSL/HTTPS traffic,
with an upstream proxy performing the authentication. For example, in a
chain where two proxies are configured transparently as accelerators and
a third further upstream functions explicitly, authentication requests may
not reach their destinations.
221
Advanced Secure Gateway Administration Guide
222
Section 5 How the Advanced Secure Gateway Appliance Handles an
Upgrade Request
Refer to the following overviews of how the Advanced Secure Gateway appliance
handles a WebSocket upgrade request in transparent proxy and in explicit proxy.
For more information on the policy condition mentioned in the following
overviews, refer to the Content Policy Language Reference and the Visual Policy
Manager Reference.
223
Advanced Secure Gateway Administration Guide
224
Section 6 Feature Limitations
❐ The appliance does not perform ICAP scanning (either REQMOD or
RESPMOD) on transactions using the WebSocket protocol.
❐ You must import the appliance’s signing certificate authority (CA) certificate
into the browser to prevent a trust error from occurring when the appliance
intercepts HTTPS and detects WebSocket over HTTPS.
225
Advanced Secure Gateway Administration Guide
226
Chapter 9: Managing the SSL Proxy
227
Advanced Secure Gateway Administration Guide
IPv6 Support
The SSL proxy is able to communicate using either IPv4 or IPv6, either explicitly
or transparently.
In addition, for any service that uses the SSL proxy, you can create listeners that
bypass or intercept connections for IPv6 sources or destinations.
Checking CRLs
An additional check on the server certificate is done through Certificate
Revocations Lists (CRLs). CRLs show which certificates are no longer valid; the
CRLs are created and maintained by Certificate Signing Authorities that issued
the original certificates.
Only CRLs that are issued by a trusted issuer can be used by the Advanced Secure
Gateway appliance. The CRL issuer certificate must exist as CA certificate on the
Advanced Secure Gateway appliance before the CRL can be imported.
The Advanced Secure Gateway appliance allows:
❐ One local CRL per certificate issuing authority.
❐ An import of a CRL that is expired; a warning is displayed in the log.
228
❐ An import of a CRL that is effective in the future; a warning is displayed in the
log.
229
Advanced Secure Gateway Administration Guide
230
Section A: Intercepting HTTPS Traffic
Intercepting HTTPS traffic (by decrypting SSL connections at the Advanced
Secure Gateway appliance) allows you to apply security measures like virus
scanning and URL filtering. See “Configuring STunnel” on page 248 to intercept
HTTPS using STunnel.
Configuration to intercept HTTPS traffic requires the following tasks:
❐ A Advanced Secure Gateway SSL license is required before you can make use
of the SSL proxy for interception. This can be verified in the maintenance tab >
licensing page.
❐ Determine whether you are using transparent or explicit mode. For
information on explicit versus transparent proxies, see Chapter 6: "Explicit
and Transparent Proxy" on page 111.
❐ Create an SSL service or HTTP/SOCKS services with protocol detection
enabled, depending on whether you are using transparent or explicit mode.
The Detect Protocol setting is disabled by default. For more information on
creating an SSL service, skip to "Configuring the SSL Proxy in Transparent
Proxy Mode" on page 232.
❐ Create or import an issuer keyring, which is used to sign emulated server
certificates to clients on the fly, allowing the SSL proxy to examine SSL
content. For more information on creating an issuer keyring, see "Specifying
an Issuer Keyring and CCL Lists for SSL Interception" on page 234.
❐ (Optional) Use the Notify User object or client consent certificates to notify users
that their requests are being intercepted and monitored. Whether this is
required depends on local privacy laws. The Advanced Secure Gateway
appliance has to decrypt the first request from the user to issue an HTML
notification page. If this is not desirable, use client consent certificates instead.
For more information on configuring the Notify User policy, refer to the Visual
Policy Manager Reference. For information on managing client consent
certificates, see "Using Client Consent Certificates" on page 234.
❐ Download CA certificates to desktops to avoid a security warning from the
client browsers when the Advanced Secure Gateway appliance is intercepting
HTTPS traffic. For information, see "Downloading an Issuer Certificate" on
page 235.
❐ Using policy (VPM or CPL), create rules to intercept SSL traffic and to control
validation of server certificates. By default, such traffic is tunneled and not
intercepted. You must create suitable policy before intercepting SSL traffic. For
more information on using policy to intercept SSL traffic, see Section B:
"Configuring SSL Rules through Policy" on page 240.
❐ Configure the Blue Coat AV or other third-party ICAP vendor, if you have not
already done this. For more information on ICAP-based virus scanning, see
Chapter 21: "Configuring Threat Protection" on page 453 (Blue Coat AV) and
Chapter 22: "Malicious Content Scanning Services" on page 465.
231
Advanced Secure Gateway Administration Guide
232
3. In the Name field, enter a meaningful name for this SSL proxy service.
4. From the Service Group drop-down list, select to which service this
configuration applies. By default, Other is selected.
5. Select SSL from the Proxy settings drop-down list.
6. TCP/IP Settings option: The Early Intercept option cannot be changed for the SSL
proxy service.
7. Create a new listener:
a. Click New; if you edit an existing listener, click Edit.
b. In the Source address area, the most common selection is All, which
means the service applies to requests from any client (IPv4 or IPv6).
You can, however, restrict this listener to a specific IPv4/IPv6 address
or user subnet/prefix length.
c. Select a Destination address from the options. The correct selection
might depend on network configuration. For overviews of the options,
see "About Proxy Services" on page 122.
d. In the Port Range field, enter a single port number or a port range on
which this application protocol broadcasts. For a port ranges, enter a
dash between the start and end ports. For example: 8080-8085
e. In the Action area, select the default action for the service: Bypass tells
the service to ignore any traffic matching this listener. Intercept
configures the service to intercept and proxy the associated traffic.
f. Click OK to close the dialog. The new listener displays in the Listeners
area.
8. Click OK to close the Edit Service dialog.
9. Click Apply.
Continue with "Specifying an Issuer Keyring and CCL Lists for SSL Interception"
on page 234.
233
Advanced Secure Gateway Administration Guide
Note: Only keyrings with both a certificate and a keypair can be used as issuer
keyrings.
You can also change the CA Certificate Lists (CCLs) that contain the CAs to be
trusted during client and server certificate validation. The defaults are adequate
for the majority of situations. For more information about CCLs, see Chapter 70:
"Authenticating an Advanced Secure Gateway Appliance" on page 1347.
2. Issuer Keyring: From the drop-down menu, select the keyring to use as the
issuer keyring. Any keyring with both a certificate and a keypair in the drop-
down menu can be used.
3. CCL for Client Certificates: Choose which CAs are trusted when the SSL proxy
validates client certificates. The default is <All CA Certificates>.
4. CCL for Server Certificates: Choose which CAs are trusted when the SSL proxy
validates server certificates. The CCL for server certificates is relevant even
when SSL proxy is tunneling SSL traffic. The default is browser-trusted.
5. Click Apply.
To configure policy, see "Configuring SSL Rules through Policy" on page 240.
234
With client consent certificates, each user is issued a pair of certificates with the
corresponding private keys. Both certificates have a meaningful user-readable
string in the common name field. One certificate has a string that indicates grant of
consent something like: “Yes, I agree to SSL interception”. The other certificate has
a common name indicating denial of consent, something like: “No, I do not agree
to SSL interception”.
Policy is installed on the Advanced Secure Gateway appliance to look for these
common names and to allow or deny actions. For example, when the string “Yes, I
agree to SSL interception” is seen in the client certificate common name, the
connection is allowed; otherwise, it is denied.
Note: You can e-mail the console URL corresponding to the issuer certificate to
end users so that the he or she can install the issuer certificate as a trusted CA.
235
Advanced Secure Gateway Administration Guide
5. Click Save. When the Save As dialog displays, click Save; the file downloads.
6. Click Open to view the Certificate properties; the Certificate window displays.
7. Click the Install Certificate button to launch the Certificate Import Wizard.
8. Ensure the Automatically select the certificate store based on the type of certificate
radio button is enabled before completing the wizard
9. Click Finish. the wizard announces when the certificate is imported.
10. (Optional) To view the installed certificate, go to Internet Explorer, Select Tools
> Internet Options > Contents > Certificates, and open either the Intermediate
Certification Authorities tab or the Trusted Root Certification Authorities tab,
depending on the certificate you downloaded.
Note: You can e-mail the console URL corresponding to the issuer certificate
to end users so that the end-user can install the issuer certificate as a trusted
CA.
236
3. Click Download an Advanced Secure Gateway Certificate as a CA Certificate; the list of
certificates on the system display.
4. Click a certificate (it need not be associated with a keyring); the Download
Certificate dialog displays.
5. Enable the options needed. View the certificate before trusting it for any
purpose.
6. Click OK; close the Advanced Statistics dialog.
237
Advanced Secure Gateway Administration Guide
Note: This only applies to SSL forward proxy transactions with HTTPS
interception enabled.
Task # Reference
3. From the Untrusted Issuer Keyring drop-down, select the desired keyring from
the list of eligible keyrings which will be used to sign untrusted server
certificates presented by the Advanced Secure Gateway appliance.
4. Click Apply.
238
Define Behavior in the Visual Policy Manager (VPM)
Override the Advanced Secure Gateway Management Console settings for
specific traffic, to specify whether the users should be prompted when a
certificate that has not been signed by a trusted Certificate Authority is
encountered.
In the SSL Intercept Layer, add one of the following Actions:
❐ Do not Preserve Untrusted Issuer
239
Advanced Secure Gateway Administration Guide
Note: For detailed instructions on using VPM, refer to the Visual Policy Manager
Reference.
240
d. Splash URL: The splash URL is added to the emulated certificate as a
certificate extension.
The STunnel options control various aspects of SSL interception.
a. Enable STunnel Interception: Establish a policy where configured STunnel
services (such as POP3S and SMTPS) are terminated and accelerated.
b. Enable SSL interception with automatic protocol detection: In addition to
STunnel interception as described above, discovered HTTPS is handed
off to the HTTPS proxy. Otherwise, SSL traffic continues in STunnel
mode.
5. Click OK to save the changes.
You can use the Disable SSL Intercept object to disable HTTPS Intercept.
5a
5b
5. Fill in the fields as described below. You can only select one field:
a. Hostname: This is the host name of the server whose traffic you want to
intercept. After entering the host name, use the drop-down menu to
specify Exact Match, Contains, At Beginning, At End, Domain, or Regex.
b. Subject: This is the subject field in the server's certificate. After you
enter the subject, use the drop-down menu to specify Exact Match,
Contains, At Beginning, At End, Domain, or Regex.
6. Click Add, then Close; click OK to add the object to the rule.
2. Click New and select the Server Certificate Category object. The Add Server
Certificate Category Object displays. You can change the name in the top field if
needed.
241
Advanced Secure Gateway Administration Guide
3. Select the categories. The categories you selected display in the right-hand
column.
4. Click OK.
Note: For detailed instructions on using VPM, refer to the Visual Policy Manager
Reference.
1. Select the Configuration > Policy > Visual Policy Manager tab and launch the VPM.
2. From the Policy drop-down menu, select Add SSL Access Layer.
3. In the Action column, right-click Set; the Set Action object displays.
4. Click New and select Set Server Certificate Validation object.
242
5. By default, server certificate validation is enabled; to disable it, select Disable
server certificate validation at the bottom of the dialog.
Notes
❐ If the Advanced Secure Gateway appliance and the origin content server
cannot agree on a common cipher suite for intercepted connections, the
connection is aborted.
243
Advanced Secure Gateway Administration Guide
244
Section C: Viewing SSL Statistics
The following sections discuss how to analyze various statistics generated by SSL
transactions.
Note: Some SSL statistics (SSL client connections and total bytes sent and
received over a period of time) can only be viewed through the Management
Console (see "Unintercepted SSL Data" on page 245 and "Unintercepted SSL
Clients" on page 246).
Status Description
Current unintercepted SSL The current number of unintercepted SSL client
connections connections.
Total unintercepted SSL connections The cumulative number of unintercepted SSL
client connections since the Advanced Secure
Gateway appliance was last rebooted.
Total bytes sent The total number of unintercepted bytes sent.
Total bytes received The total number of unintercepted bytes received.
245
Advanced Secure Gateway Administration Guide
3. Select a time period for the graph from the Duration: drop-down list. The
default is Last Hour.
4. (Optional) To set the graph scale to a different value, select a value from the
Graph scale should drop-down list.
246
3. Select the Duration: for the graph from the drop-down list. The default is Last
Hour.
4. (Optional) To set the graph scale to a different value, select a value from the
Graph scale should drop-down list.
247
Advanced Secure Gateway Administration Guide
Configuring STunnel
You can configure STunnel using the Visual Policy Manager (VPM) or the
Management Console.
248
• Enable SSL interception with automatic protocol detection:
In addition to
STunnel interception as described above, discovered HTTPS is handed off
to the HTTPS proxy. Otherwise, SSL traffic continues in STunnel mode.
Note: If an unsuccessful SSL interception occurs (the SSL handshake fails), the
traffic is tunneled.
249
Advanced Secure Gateway Administration Guide
2. On the branch peer, edit or create POP3S or SMTPS services (create a new
service at Configuration > Services > Proxy Services > New Service).
3. Click Apply on the Configuration tab.
For an SMTPS setup, follow the same configuration, except choose the
appropriate port and enter SMTPS as the Name.
Make sure your SSL policy is configured correctly for STunnel. See the next
section.
250
Traffic Mix
On the Traffic Mix > Service tab, view traffic distribution and bandwidth statistics
for SSL service traffic running through the Advanced Secure Gateway appliance.
Traffic History
STunnel sessions are listed under Traffic Mix and Traffic History:
1. Select the Statistics > Traffic Details> Traffic Mix/Traffic History.
2. On the Traffic Mix tab, select Proxy.
• The BW Usage and BW Gain tabs are available.
• The pie chart visually represents the bandwidth percentage for each proxy,
including STunnel.
• Scroll down in the table to view the STunnel (and HTTPS) information.
3. On the Traffic History tab, select Proxy.
• View STunnel on the BW Usage, BW Gain, Client Bytes and Server Bytes tabs.
251
Advanced Secure Gateway Administration Guide
Application Mix
The Advanced Secure Gateway appliance can classify SSL-tunneled traffic
without full HTTPS interception. The Statistics > Application Details > Application Mix
and Statistics > Application Details > Application History reports display the
applications detected in SSL-tunneled traffic. In the Proxy Type column in
Application Mix report, look for STunnel.
252
See "Active Sessions—Viewing Per-Connection Statistics" on page 759 for details
on using these windows.
Access Logging
View the SSL log to see the STunnel sessions; the cs-protocol value is set to stunnel.
253
Advanced Secure Gateway Administration Guide
b. On the Proxy Services tab, select Predefined Service Group >Standard >
HTTPS, and press Edit Service.
254
a. From the Management Console, on the Configuration tab, select Policy >
Visual Policy Manager > Launch. The Visual Policy Manager window pops
up.
b. On the VPM, from Policy, select Add SSL Access Layer, and provide a
name as required.
c. Highlight the added row, right click on Action, and choose Set.
d. On the Set Action Object window, click New..., and choose Enable
encrypted tap.
e. On the Add Encrypted Tap Object window, set the name, verify Enable
encrypted tap is selected, and choose the tap Interface to use from the
drop down.
f. Click Ok. The window closes.
g. Click Ok. The Set Action Object window closes.
5. Install the Encrypted Tap policy.
a. Click Install Policy. You will see a confirmation when the new policy has
been installed.
Note: Make sure the tapped interface is not the same as any client/server/
management interface in use, in order to avoid dumping tapped or decrypted
traffic onto real servers. Furthermore, to avoid dropping traffic at the L2
device (resultant of how L2 forwarding works), ensure there are no Layer 2
bridging devices between the Advanced Secure Gateway appliance and the
sniffer tools used on the tapped interface.
255
Advanced Secure Gateway Administration Guide
On another computer:
1. Connect the PC to the selected Ethernet interface.
2. Open the third-party application (such as Wireshark), and configure it to
monitor the network traffic on the selected Ethernet interface. The intercepted
HTTPS traffic should now be viewable by this application.
Troubleshooting
This section describes troubleshooting tips and solutions for Encrypted Tap.
❐ View access logs for Encrypted Tap. See ‘Viewing Access-Log Statistics.’
❐ View the Encrypted Tap debug log and statistics.
❐ Perform a packet capture at the hardware interface on the Advanced Secure
Gateway appliance. Go to Maintenance > Service Information > Packet Captures to
access packet captures. The capture provides details on the data transmitted
by the Advanced Secure Gateway appliance; compare this to the received tap
data.
❐ Perform policy tracing; refer to the Blue Coat Knowledge Base for articles on
how to perform an SSL policy trace.
256
Section F: Working with an HSM Appliance
A Hardware Security Module (HSM) provides additional security for storing
cryptographic keys and certificates, which is required in some highly regulated
industries. The Advanced Secure Gateway appliance is able to use a network-
attached HSM appliance to store resigning CA keys, and to perform digital
signature operations. The Advanced Secure Gateway appliance exchanges
signing requests and responses with the attached HSM appliance, over mutually
authenticated HTTPS requests. The Advanced Secure Gateway appliance sends
certificate data to the HSM.
The Advanced Secure Gateway appliance can work with multiple HSM
appliances, and multiple appliances can work with the same HSM. In the event
that a policy rule using an HSM to sign cannot work due to lack of response from
the HSM, the attempt is logged, and the applicable policy action configured for
HSM failure (cut through, drop, reject) occurs. In addition to the resigning
certificates, a mutually authenticated connection (communication pipeline) must
be set up by verified certificates. Configure the Advanced Secure Gateway
appliance with CLI, CPL, or the VPM.
257
Advanced Secure Gateway Administration Guide
An HSM requires a linked Device Profile (go to SSL > Device Profiles). Click New,
and create a FIPS compliant or non-compliant profile as required, then enter the
HSM credentials into the Create SSL Device Profile window. For more information,
see "Specifying an Issuer Keyring and CCL Lists for SSL Interception" for more
information.
Add an HSM
HSM appears in the Configuration > SSL menu. The new page contains three tabs.
Click Create on the HSM tab to set up an HSM connection.
1. On the Configuration > SSL > HSM tab, select Create. The Create HSM window pops up.
2. Enter the HSM credentials. For the Device Profile, select the HSM profile created
earlier. Click OK to save the information and close the window.
3. Click Apply on the HSM window. The new HSM appears in the list. Referenced
will show “No” until you use the new HSM in policy.
1. On the Configuration > SSL > HSM Keyrings tab, select Create. The Create HSM
Keyring window pops up.
2. Enter the HSM credentials. Use the Paste From Clipboard button to enter the
Certificate PEM file; the Key Label is the name associated with the private key
created on the SafeNet Java HSM. Click OK to save the information and close
the window..
3. Click Apply on the HSM Keyrings window. The new HSM keyring appears in the
list. Referenced will show “No” until you use the new keyring in policy.
258
Note: A keyring which is referenced by policy can’t be deleted.
Once a keyring has been created, you can click View Certificate to see the certificate
details and PEM file data. Click Preview to see a list of actions which will occur
when the keyring is implemented.
Note: HSM keyrings also appear in the Proxy Settings > SSL Proxy list of Issuer
Keyrings.
2. Create the new group. Move keyrings from the Available HSM Keyrings list to the
Included HSM Keyrings list with the Add>> and Remove>> buttons, to have them
included in the new group.
3. Click OK. The window closes.
4. Click Apply on the HSM Keygroups window.
259
Advanced Secure Gateway Administration Guide
3. Rename the layer on the Add New Layer window if required, then click OK (not
shown in the graphic).
4. Highlight the new layer, and right click at Action; select Set. The Set Action
Object window displays.
5. On the Set Action Object window, select New. > Enable SSL Interception.
6. On the Add SSL Interception Object window, select the Issuer Keyring to use for
HSM signatures. Configured HSM keyrings and keygroups appear on the
drop down list.
7. Click OK. The window closes.
8. Click Install Policy. You will see a “Policy installation was successful” message
on completion.
9. Close the VPM and click Apply.
260
261
Advanced Secure Gateway Administration Guide
Installing OpenSSL
After OpenSSL is installed, you must edit the openssl.cnf file and ensure the
path names are correct. By default root certificates are located under ./PEM/DemoCA;
generated certificates are located under /certs.
262
openssl req -new -x509 -keyout
c:\resources\ssl\openssl\bin\PEM\demoCA\private\cakey.pem -out
c:\resources\ssl\openssl\bin\PEM\demoCA\private\CAcert.pem
Using configuration from C:\Resources\SSL\OpenSSL\bin\openssl.cnf
Loading 'screen' into random state - done
Generating a 1024 bit RSA private key
.....................................+++++
................................................+++++
writing new private key to
'c:\resources\ssl\openssl\bin\PEM\demoCA\private\cakey.pem'
Enter PEM pass phrase:
2. Type any string more than four characters for the PEM pass phrase.
3. Enter the certificate parameters, such as country name, common name that are
required for a Certificate Signing Request (CSR).
The private key and root CA are now located under the directory ./PEM/
DemoCA/private
4. Create a keyring.
a. From the Management Console, select Configuration > SSL > Keyrings.
b. Click Create; fill in the fields as appropriate.
c. Click OK.
5. Create a CSR on the Advanced Secure Gateway appliance.
a. From the Management Console, select Configuration > SSL > Keyrings.
b. Highlight the keyring you just created; click Edit/View.
c. In the Certificate Signing Request pane, click Create and fill in the fields
as appropriate.
6. Paste the contents of the CSR into a text file called new.pem located in the ./bin
directory.
263
Advanced Secure Gateway Administration Guide
b. Click Import; enter the certificate name in the CA Cert Name field.
c. Paste the certificate, being sure to include the -----BEGIN
CERTIFICATE---- and the ----END CERTIFICATE----- statements in
the ./bin/PEM/demoCA/private/CAcert file.
d. Click OK.
264
Testing the Configuration
Import the root CA into your browser and construct an SSL interception policy.
All certificate management is done through the browser using the following URL:
http://@ip_server/CertSrv
For information on the following tasks, see:
❐ "Install the root CA onto the browser:" on page 265
❐ "Create an appliance keyring and certificate signing request:" on page 265
❐ "Sign the appliance CSR:" on page 266
❐ "Import the subordinate CA certificate onto the appliance:" on page 266
❐ "Test the configuration:" on page 267
265
Advanced Secure Gateway Administration Guide
5. Click Close.
Note: Ensure this keyring is used as the issuer keyring for emulated
certificates. Use policy or the SSL intercept setting in the Management
Console or the CLI.
4. Click Import to paste the contents of the newcert.pem file. This imported the
appliance’s subordinate CA certificate into the keyring.
5. To ensure the appliance trusts the newly -added certificate, import the
contents of the newcert.pem file into the CA Certificates list.
a. From the Management Console, select Configuration > SSL > CA
Certificates.
b. Click Import; enter the certificate name in the CA Cert Name field.
c. Paste the certificate, being sure to include the -----BEGIN
CERTIFICATE---- and the ----END CERTIFICATE----- statements in
the ./bin/PEM/demoCA/private/CAcert file.
d. Click OK.
e. Click Apply.
266
Test the configuration:
Import the root CA into your browser and construct an SSL interception policy.
You should not be prompted for any certificate warning.
267
Advanced Secure Gateway Administration Guide
268
Chapter 10: Managing the WebEx Proxy
This chapter describes how to use the Advanced Secure Gateway appliance
WebEx proxy to control WebEx sessions.
IPv6 Support
The Webex proxy is able to communicate using either IPv4 or IPv6, either
explicitly or transparently.
269
Advanced Secure Gateway Administration Guide
270
Section 2 Enable HTTP Handoff
1. Go to Configuration > Proxy Settings > WebEx Proxy.
2. Verify Enable HTTP handoff has been checked; it is checked by default.
271
Advanced Secure Gateway Administration Guide
6. Name the WebEx Site Object, then enter the site name in the detail you select at
the drop down. For example, enter “company1“ for an Exact Match, then click
OK. The Add WebEx Site Object window closes. The Site Name may only contain
alphanumeric characters.
272
9. Install the policy.
273
Advanced Secure Gateway Administration Guide
7. Name the object (for example, “WebExApplication”), select WebEx from the
left side list, and click OK.
274
• If the Advanced Secure Gateway appliance is unable to connect to the
BCWF, you will see a “Problem connecting” message.
8. Click New on the Add Combined Destination Object window, and select the Request
URL Operation. The system displays the Add Request Web Operation Control
window.
a. Name the object (for example, “WebExOperation-UploadFiles”).
b. Select Upload Files from the left side list, and click OK.
Note: Other WebEx operations include Host Meeting, Join Meeting, and Login.
9. To set up policy where both objects are required for the action to occur, set up
an AND situation.
a. Highlight the first new object (“WebExApplication”), and click Add to
move it to the top right object field.
b. Highlight the second new object (“WebExOperation-UploadFiles”),
and click Add to move it to the lower object field.
c. Click OK. The window closes.
d. Click OK on the Set Destination Object window.
275
Advanced Secure Gateway Administration Guide
10. On the VPM window, right click Action on the current layer, and choose Allow or
Deny.
276
Section 5 Control Desktop Sharing with Policy
Use a combined object to deny local desktop sharing through WebEx. Desktop
sharing is controlled by the Share Application function; the process is otherwise
the same as "Control File Uploads with Policy" .
Before You Begin
❐ Make sure the BCWF is licensed and active.
❐ Make sure the WebEx HTTP Handoff has been enabled before enacting policy.
❐ Go to Configuration > Application Classification > General, and click Enable Blue Coat
Application Classification on this device. This works with the Blue Coat Web Filter
to identify applications.
7. Name the object (for example, “WebExApplication”), select WebEx from the
left side list, and click OK.
277
Advanced Secure Gateway Administration Guide
278
9. To set up policy where both objects are required for the action to occur, set up
an AND situation.
279
Advanced Secure Gateway Administration Guide
280
Section 6 WebEx Proxy Access Logging
WebEx actions are reported under the Collaboration proxy access log by default.
Actions include:
• a user joining a meeting
• a user leaving a meeting
• a user connection is dropped abruptly
• a file or application sharing session starting
• a file or application finishing
• a file or application being blocked
To verify Access Logging is enabled, go to Configuration > Access Logging > General,
and click Enable Access Logging on the Default Logging tab. Verify the Collaboration
log appears on the Configuration > Access Logging > Logs tab.
For information about access log customization, refer to the "Creating Custom
Access Log Formats" . To view the Collaboration log, go to Statistics > Access
Logging, and select collaboration in the Log field.
Each individual WebEx meeting has a designated nine digit Meeting ID. This
Meeting ID is recorded in the access logs. Follow the Show Log Collaboration link.
The following table provides the log decode.
c-ip Client IP
281
Advanced Secure Gateway Administration Guide
282
Section 7 Review WebEx Proxy Sessions
After WebEx traffic begins to flow through the Advanced Secure Gateway
appliance, you can review the statistics page and monitor results in various
WebEx categories. The presented statistics are representative of the client
perspective.
283
Advanced Secure Gateway Administration Guide
284
Chapter 11: Managing the File Transport Protocol (FTP) Proxy
This chapter discusses the Blue Coat implementation of proxy support for File
Transport Protocol (FTP).
How Do I...?
To use this chapter, identify the task and click the link:
Customize the welcome banner for the FTP "Configuring FTP Connection Welcome
proxy? Banners" on page 292
About FTP
The Advanced Secure Gateway appliance supports two FTP modes:
❐ Native FTP, where the client connects through the FTP proxy, either
explicitly or transparently; the Advanced Secure Gateway appliance then
connects upstream through FTP (if necessary).
285
Advanced Secure Gateway Administration Guide
❐ Web FTP, where the client uses an explicit HTTP connection. Web FTP is used
when a client connects in explicit mode using HTTP and accesses an ftp://
URL. The Advanced Secure Gateway appliance translates the HTTP request
into an FTP request for the origin content server (OCS), if the content is not
already cached, and then translates the FTP response with the file contents
into an HTTP response for the client.
Native FTP uses two parallel TCP connections to transfer a file, a control connection
and a data connection.
❐ Control connections: Used for sending commands and control information,
such as user identification and password, between two hosts.
❐ Data connections: Used to send the file contents between two hosts. By
default, the Advanced Secure Gateway appliance allows both active and
passive data connections.
• Active mode data connections: Data connections initiated by an FTP
server to an FTP client at the port and IP address requested by the FTP
client. This type of connection method is useful when the FTP server can
connect directly to the FTP client. The FTP command for active mode is
PORT (for IPv4) or EPRT (for IPv6). When an IPv4 FTP client is
communicating with an IPv6 FTP server, the Advanced Secure Gateway
appliance will perform the required conversion (PORT to EPRT); the
clients and servers will be unaware that this conversion has taken place.
• Passive mode data connections: Data connections initiated by an FTP
client to an FTP server at the port and IP address requested by the FTP
server. This type of connection is useful in situations where an FTP server
is unable to make a direct connection to an FTP client because the client is
located behind a firewall or other similar device where outbound
connections from the client are allowed, but inbound connections to the
client are blocked. The FTP command for passive mode is PASV (for IPv4)
or EPSV (for IPv6). When an IPv4 FTP client is communicating with an
IPv6 FTP server, the Advanced Secure Gateway appliance will perform
the required conversion (PASV to EPSV); the clients and servers will be
unaware that this conversion has taken place.
When using the FTP in active mode, the FTP data connection is formed from the
server (OCS) to the client, which is opposite from the direction of the FTP control
connection.
286
Configuring IP Addresses for FTP Control and Data Connections
The FTP client determines whether the client-side data connection is active or
passive from the client to the Advanced Secure Gateway appliance. The
Advanced Secure Gateway appliance determines the server-side connections.
By default, the Advanced Secure Gateway appliance allows both active and
passive data mode connections. FTP connections are divided into client-side
control and data connections and server-side control and data connections.
❐ Client-side control connection: The proxy always uses the client’s IP address
to respond to the client. No configuration is necessary here.
❐ Client-side data connection: The proxy's behavior depends on the
ftp.match_client_data_ip(yes | no) property that is set via policy using
CPL. If this property is enabled (the default), the proxy uses the same IP
address for the data connection as it uses for the client-side control
connection. If the property is disabled, the proxy uses its own IP address,
choosing the address associated with the interface used to connect back to the
client.
When an FTP client uses different protocols for control and data connections
(for example, IPv4 for control and IPv6 for data), the
ftp.match_client_data_ip property must be set to no so that the Advanced
Secure Gateway appliance’s address is used for the data connection. Because
each Advanced Secure Gateway interface is configured with an IPv4 and an
IPv6 address in a mixed Internet protocol environment, the Advanced Secure
Gateway appliance will use the appropriate IP address for the type of FTP
server. For example, for transferring data to an IPv6 FTP server, the appliance
will set up with the data connection using its IPv6 address.
When the client-side data and control connections are over IPv4 and the
server-side control and data connections are over IPv6, the
ftp.match_client_data_ip property can be set to yes.
❐ Server-side control connection: The proxy uses the IP address selected by the
reflect_ip(auto | no | client | vip | ip_address) property. By default, this
is the local proxy IP address associated with the interface used to connect to
the server.
Client IP reflection is set globally from the Configuration > Proxy Settings >
General tab. By default, the CPL reflect_ip( ) setting is auto, which uses this
global configuration value.
Client IP reflection will automatically be disabled when the client is IPv4 and
the server is IPv6.
Note: Setting client IP address reflection for FTP affects the source address
that is used when making the outgoing control connection to the origin
server. It might also affect which address is used by the proxy for data
connections.
287
Advanced Secure Gateway Administration Guide
For information on creating and modifying policy through VPM, refer to the
Visual Policy Manager Reference. For information on creating and modifying policy
through CPL, refer to the <Emphasis>Blue Coat Content Policy Language Guide.
The ftp.match_server_data_ip( ) and ftp.match_client_data_ip( )
properties can only be set through CPL.
Note: Some clients might display an error when passive mode is disabled on the
Advanced Secure Gateway appliance, requiring you to manually request active
mode using the PORT/EPRT FTP commands.
The FTP client software controls any messages displayed to the end user as a
result of this response from the Advanced Secure Gateway appliance.
288
The ftp.match_server_data_ip(no) property most likely will not work correctly
with these servers.
Notes
❐ Internet Explorer does not support proxy authentication for native FTP.
❐ The FTP proxy does not support customized exception text; that is, you can
use policy to deny requests, but you can't control the text sent in the error
message.
289
Advanced Secure Gateway Administration Guide
Note: Web FTP requires an HTTP service, not an FTP service. For information on
configuring an HTTP proxy service, see Chapter 8: "Intercepting and Optimizing
HTTP Traffic" on page 161.
2a
2b
290
Configuring the FTP Proxy
The FTP proxy has several configurable settings related to caching of FTP objects
and whether passive mode is allowed.
2a
2b
2c
2d
2e
where current_time is the time when the object was requested by the
client. So, if it’s been 10 days since the object was modified, and the setting
is 10%, the object will be cached for one day.
c. Enter an amount, in hours, that the object remains in the cache before
becoming eligible for deletion. This setting applies to objects for which
the last-modified date is unknown. The default is 24 hours.
d. Select Allow use of passive mode to clients. The default is enabled, allowing
data connections to be initiated by an FTP client to an FTP server at the
port and IP address requested by the FTP server. (Active mode
connections are always allowed, regardless of whether the passive
mode setting is enabled or disabled.)
e. (Optional) See "Configuring FTP Connection Welcome Banners" on
page 292.
3. Click Apply.
291
Advanced Secure Gateway Administration Guide
Note: Neither proxy authentication for transparent FTP nor proxy chaining are
supported with the Checkpoint syntax. When native FTP traffic from an FTP
client (such as WSFtp) is being authenticated by the Advanced Secure Gateway
appliance using the Raptor syntax, the recommended authentication mode is auto
or proxy.
Note: Configurable banners are only displayed when FTP is explicitly proxied
through the Advanced Secure Gateway appliance. In transparent deployments,
the banner is sent to the client when proxy authentication is required; otherwise,
the FTP server sends the banner.
292
2. In the Welcome Banner field, enter a line of text that is displayed on FTP clients
upon connection. If the message length spans multiple lines, the Advanced
Secure Gateway appliance automatically formats the string for multiline
capability.
3. Click Apply.
293
Advanced Secure Gateway Administration Guide
294
Chapter 12: Managing the Domain Name Service (DNS)
Proxy
This chapter discusses managing Domain Name Service (DNS) traffic through
the DNS proxy on the Advanced Secure Gateway appliance (to configure the
Advanced Secure Gateway connections to DNS servers, see "Adding DNS
Servers to the Primary or Alternate Group" on page 829).
IPv6 Support
The DNS proxy is able to communicate using IPv4 or IPv6, either explicitly or
transparently.
The resolving name list can contain entries for IPv4 and IPv6 addresses. An
entry can contain either IPv4 or IPv6 addresses, although you cannot combine
IPv4 and IPv6 addresses in a single entry.
295
Advanced Secure Gateway Administration Guide
2a
2b
296
<DNS-Proxy>
dns.request.name=www.example.com dns.respond.a(vip)
-or-
<DNS-Proxy>
dns.request.name=.example.com dns.respond.a(vip)
-or-
<DNS-Proxy>
dns.request.name=www.example.com dns.respond.a(10.1.2.3)
-or-
<DNS-Proxy>
dns.request.name=www.google.com dns.respond.aaaa(2001::1)
An entry can contain either IPv4 or IPv6 addresses, although you cannot combine
IPv4 and IPv6 addresses in a single entry. Use the dns.respond.a property for IPv4
hosts and dns.respond.aaaa for IPv6 hosts. If you specify vip instead of a specific
IP address, the response will contain the Advanced Secure Gateway IP address
(the IPv6 address for dns.respond.aaaa or the IPv4 address for dns.respond.a).
Note: You can also create a resolving name list using the Visual Policy Manager
(VPM). For more information about the DNS Access Layer in the VPM, refer to the
Visual Policy Manager Reference.
297
Advanced Secure Gateway Administration Guide
298
Chapter 13: Managing a SOCKS Proxy
IPv6 Support
The SOCKS proxy includes basic IPv6 support for CONNECT and BIND.
In addition, for any service that uses the SOCKS proxy, you can create listeners
that bypass or intercept connections for IPv6 sources or destinations.
299
Advanced Secure Gateway Administration Guide
2a
2b
3. Click Apply.
300
Section 1 Configuring the SOCKS Proxy
Complete the following steps to create a SOCKS proxy and to configure SOCKS-
proxy connection and timeout values. For more information, see "About SOCKS
Deployments" on page 299.
2. The displayed defaults should be sufficient for most purposes. The following
table discusses the options.
Table 13–1 SOCKS Proxy Options
301
Advanced Secure Gateway Administration Guide
<proxy> client.protocol=socks
ALLOW socks.version=5
DENY
❐ If browsers and FTP clients are configured to use SOCKS encapsulation and a
rule in policy is matched that denies a transaction, a page cannot be displayed
message displays instead of an exception page.
This is expected behavior, as a deny action abruptly closes the client's TCP
connection, yet the client is expecting a SOCKS-style closure of the connection.
You can avoid this, and return an exception page, by applying the following
policy:
• If using the VPM, go to a Web Access Layer, create two rules. For the first
rule, select Service > New > Client Protocol > SOCKS > TCP Tunneling over SOCKS;
for the second, select Service > New > Client Protocol > SOCKS > All SOCKS.
• If using CPL, enter the following:
<Proxy>
DENY socks=yes tunneled=yes
DENY socks=yes
302
Section 2 Viewing SOCKS History Statistics
The SOCKS History tabs (SOCKS Clients, SOCKS Connections, and SOCKS client
and server compression) display client data, Connect, Bind, and UPD Associate
requests, client and server UDP, TCP and compression requests.
Note: The SOCKS history statistics are available only through the Management
Console.
303
Advanced Secure Gateway Administration Guide
304
3. (Optional) To set the graph scale to a different value, select a value from the
Graph scale should drop-down list.
3. (Optional) To set the graph scale to a different value, select a value from the
Graph scale should drop-down list.
305
Advanced Secure Gateway Administration Guide
306
Chapter 14: Managing Shell Proxies
This chapter discusses how to configure the Telnet shell proxy. Shell proxies
provide shells which allow a client to connect to the Advanced Secure Gateway
appliance. In this version, only a Telnet shell proxy is supported.
Substitution Description
307
Advanced Secure Gateway Administration Guide
Substitution Description
client.protocol This is telnet.
client.address IP address of the client. IPv4 and IPv6 addresses
are accepted.
308
❐ Explicit termination with proxy authentication, where after obtaining the
destination host and port information from the user, the Advanced Secure
Gateway appliance challenges for proxy credentials. After the correct proxy
credentials are provided and authenticated, the appliance makes an upstream
connection and goes into tunnel mode. In this case, the appliance provides a
shell.
❐ Transparent termination without proxy authentication, where the Advanced
Secure Gateway appliance intercepts Telnet traffic through an L4 switch,
software bridge, or any other transparent redirection mechanism. From the
destination address of TCP socket, the Advanced Secure Gateway appliance
obtains OCS contact information and makes the appropriate upstream
connection, either directly or through any configured proxy. For more
information on configuring a transparent proxy, see Chapter 6: "Explicit and
Transparent Proxy" on page 111.
❐ Transparent termination with proxy authentication, where, after intercepting
the transparent connection, the Advanced Secure Gateway appliance
challenges for proxy credentials. After the correct proxy credentials are
provided and authenticated, the Advanced Secure Gateway appliance makes
an upstream connection and goes into tunnel mode.
After in the shell, the following commands are available:
❐ help: Displays available commands and their effects.
❐ telnet server[:port]: Makes an outgoing Telnet connection to the specified
server. The colon (:) between server and port can be replaced with a space, if
preferred. The server can be an IPv4 or an IPv6 host.
❐ exit: Terminates the shell session.
309
Advanced Secure Gateway Administration Guide
Bypass Recommended
service group (by default)
2. Scroll to the Bypass Recommended service group and click it to expand the list.
3. Select Telnet.
4. From the drop-down list, select Intercept.
5. Click Apply.
310
2
2. To set the maximum concurrent connections, select Limit Max Connections. Enter
the number of maximum concurrent connections allowed for this service.
Allowed values are between 1 and 65535.
3. (Optional) Change the default banner settings.
• Welcome banner—Users see this when they enter the shell. The default
string is: Blue Coat $(module_name) proxy.
• Realm banner—Users see this help message just before they see the
Username prompt for proxy authentication. The default string is:
Enter credentials for realm $(realm).
311
Advanced Secure Gateway Administration Guide
Note: The Shell history statistics are available only through the Management
Console.
2. Select a time- period for the graph from the Duration: drop-down list. The
default setting is last hour.
3. (Optional) To set the graph scale to a different value, select a value from the
Graph scale should drop-down list.
312
Chapter 15: Configuring and Managing an HTTPS Reverse
Proxy
This section describes how to use the Blue Coat HTTPS Reverse Proxy solution.
It includes the following topics:
❐ Section A: "About the HTTPS Reverse Proxy" on page 313
❐ Section B: "Configuring the HTTPS Reverse Proxy" on page 314
❐ Section C: "Configuring HTTP or HTTPS Origination to the Origin Content
Server" on page 321
313
Advanced Secure Gateway Administration Guide
Note: One common scenario in using HTTPS reverse proxy, which connects the
client to the Advanced Secure Gateway appliance, is in conjunction with HTTPS
origination, which is used to connect to the origin content server (OCS). For more
information on this option, see Section C: "Configuring HTTP or HTTPS
Origination to the Origin Content Server" on page 321.
Prerequisite Tasks
Before creating an HTTP reverse proxy service, you must:
❐ Create or import a keyring (Configuration > SSL > Keyrings > SSL Keyrings).
❐ (If necessary) Create a Certificate Signing Request (CSR) that can be sent to a
Certificate Signing Authority (CA). After the CSR has been signed and the
certificate has been created, import the certificate to the keyring you created or
imported in the previous step. (Select Configuration > SSL > Keyrings. Select the
keyring you created or imported, and then click Edit. In the Certificate Signing
Request section, click Import, paste the CSR, and click OK. Click Close > Apply).
-or-
❐ Create a certificate for internal use and associate it with the keyring.
❐ (Optional, if using server certificates from CAs) Import Certificate Revocation
Lists (CRLs) so the Advanced Secure Gateway appliance can verify that
certificates are still valid.
When these steps are complete, you can configure the HTTPS reverse proxy
service.
314
Creating an HTTPS Reverse Proxy Service
Unlike other services, the Advanced Secure Gateway appliance does not create an
HTTPS Reverse Proxy service by default. (The Advanced Secure Gateway
appliance has an HTTPS proxy service configured on port 443.) Therefore, you
must create a new service.
315
Advanced Secure Gateway Administration Guide
3
4
c. CA Cert List: Use the drop-down list to select any already created list
that is on the system.
d. SSL Versions: Select the version(s) to use for this service from the list.
The default is TLS v1, TLS v1.1, and TLS v1.2.
316
e. Verify Client: Select this option to enable mutual SSL authentication. See
"About Mutual SSL Authentication" on page 319 for information.
Selecting this option makes the Forward Client Certificate option available.
f. Forward Client Cert: (Available if Verify Client is selected)
Select this option
to put the extracted client certificate information into the Client-Cert
header that is included in the request when it is forwarded to the
origin content server. The header contains the certificate serial number,
subject, validity dates, and issuer (all as name=value pairs). The actual
certificate itself is not forwarded.
6. Create a listener for the IP address(es) and ports that this application protocol
uses. In the Listeners area, click New. The New Listener dialog displays.
8a
8b
8c
8d
317
Advanced Secure Gateway Administration Guide
318
About Mutual SSL Authentication
During an SSL handshake, the client and server negotiate the mode of operation,
the type of authentication required by both parties, the cryptographic and
hashing algorithms to use for providing confidentiality and integrity, and the
compression algorithm to use for the session.
SSL authentication can use the following modes of operation:
❐ Typical SSL authentication: This mode provides confidentiality and integrity
of the data sent between the client and the server, and requires the server to
authenticate to the client using an X.509 certificate.
❐ Mutual SSL authentication: In this mode, the server authenticates to the client
using an X.509 certificate and the client must authenticate to the server with a
separate X.509 certificate.
When a Common Access Card (CAC) is used, the certificate identifies the user
who owns the CAC. For information on CAC authentication, refer to the
Common Access Card Solutions Guide.
In mutual SSL authentication, an SSL connection between a client and a server is
established only if the client and server validate each other’s identity during the
SSL handshake. Both the server and the client must have their own valid
certificate and the associated private key in order to authenticate.
Note: TLS is supported based on the server and client in use. For brevity, this
section refers only to SSL; however, SSL can be used interchangeably with TLS.
In this scenario, the user logs in to the Advanced Secure Gateway appliance
(server) using a browser (client). During this process, the client (browser)
validates the server (Advanced Secure Gateway appliance) certificate. This
includes the following checks:
❐ The certificate subject must match the server’s hostname.
319
Advanced Secure Gateway Administration Guide
In this scenario, the user logs in to the Advanced Secure Gateway appliance using
mutual SSL authentication. During this process:
1. The client (browser) validates the server (Advanced Secure Gateway
appliance) certificate. This includes the following checks:
• The certificate subject must match the server’s hostname.
• The certificate must be issued by a CA listed in the browser’s Trusted Root
Certificate store.
• The client confirms that the server has the certificate's private key by
challenging the server to sign random data. The client validates the
signature using the server's certificate.
2. The server (Advanced Secure Gateway appliance) validates the client
certificate that the browser presents. This includes the following checks:
• The certificate must be issued by a CA in the CCL for the Advanced Secure
Gateway appliance service that is performing the validation.
• The server confirms that the client has the certificate's private key by
challenging the client to sign random data. The server validates the
signature using the client's certificate.
• The certificate must be valid; it must have a valid signature and not be
expired.
• (If using a CRL) The certificate must not have been revoked.
320
Section C: Configuring HTTP or HTTPS Origination to the Origin
Content Server
In previous procedures, you configured HTTPS Reverse Proxy to the Advanced
Secure Gateway appliance. In two common termination scenarios, you must also
configure HTTPS origination to the Origin Content Server (OCS).
The first two scenarios are used to provide a secure connection between the proxy
and server, if, for example, the proxy is in a branch office and is not co-located
with the server.
Table 15–1 Scenario 1: HTTPS Reverse Proxy with HTTPS Origination
Steps Steps
• Configure a keyring. • (Optional) Add a forwarding host.
• Configure the SSL client. • (Optional) Set an HTTPS port.
• Configure the HTTPS service. • (Optional) Enable server certificate
Table 15–2 Scenario 2: HTTP Termination with HTTPS Origination
Steps Steps
• Client is explicitly proxied. • Server URL rewrite.
-or-
• Add a forwarding host
• Set an HTTPS port.
• (Optional) Enable server certificate
verification
Using server URL rewrite is the preferred method. For information on rewriting
the server URL, refer to the <Emphasis>Blue Coat Content Policy Language Guide.
321
Advanced Secure Gateway Administration Guide
The next scenario is useful when the Advanced Secure Gateway appliance is
deployed as a reverse proxy. This scenario is used when it is not necessary for a
secure connection between the proxy and server. For information on using the
Advanced Secure Gateway appliance as a reverse proxy, see Section D: "Selecting
an HTTP Proxy Acceleration Profile" on page 182.
Table 15–4 Scenario 2: HTTP Reverse Proxy with HTTPS Origination
Steps Steps
• Configure a keyring • Server URL rewrite
• Configure the SSL client -or-
• Configure the HTTPS service • Add a forwarding host
• Set an HTTP port
Using server URL rewrite is the preferred method. For information on rewriting
the server URL, refer to the Content Policy Language Reference.
322
Table 15–5 HTTP Origination Commands (Continued)
323
Advanced Secure Gateway Administration Guide
324
Chapter 16: Using the Advanced Secure Gateway Appliance
in an IPv6 Environment
325
Advanced Secure Gateway Administration Guide
326
Section 1 Using the Advanced Secure Gateway Appliance in an ISATAP
Network
One way to transition a network from IPv4 to IPv6 is with the Intra-Site
Automatic Tunnel Addressing Protocol (ISATAP). ISATAP uses a tunneling
approach to transport IPv6 traffic across an existing IPv4 infrastructure by
encapsulating IPv6 packets with an IPv4 header. ISATAP-based connectivity can
immediately be used to deliver IPv6 services while the IPv4-only infrastructure is
gradually migrated to integrate native IPv6 capabilities. The tunneling of IPv6
traffic through the use of IPv4 encapsulation is called 6-in-4.
In this example of an ISATAP topology, remote IPv6 clients need to access IPv6
servers over the enterprise IPv4 network. To accomplish this, IPv6 traffic from the
client is encapsulated by the ISATAP router before traversing the IPv4 network.
For example, IPv6 packets destined for IPv6 Server 1 in the data center are
encapsulated with the IPv4 tunnel address of ISATAP Tunnel 1. IPv6 packets
destined for the Internet are encapsulated with the IPv4 tunnel address of ISATAP
Tunnel 2.
327
Advanced Secure Gateway Administration Guide
byte caching and compression over an ADN tunnel (assuming a peer is found).
The following flow diagram describes how the Advanced Secure Gateway
processes ISATAP traffic.
Notes:
❐ If the requested object is in cache or if the security policy determines that the
request should not be allowed, the response is sent back to the client
immediately over the encapsulated client-side connection.
❐ ISATAP is disabled by default.
❐ Reflect Client IP settings do not apply to the outer encapsulation header (the
IPv4 address). Reflect Client IP settings are honored only for inner IPv6 source
addresses for connections intercepted by application proxies, not the ISATAP
proxy.
Feature Requirements
❐ The routers must support ISATAP.
❐ The Advanced Secure Gateway appliances must be inline between the
ISATAP-capable routers.
❐ ISATAP must be enabled. See "Optimizing ISATAP Traffic" on page 341.
Feature Limitations
❐ Features that modify the destination address, such as URL rewrites and
advanced forwarding, can cause issues with ISATAP processing because the
IP encapsulation information must be preserved. If the destination address
gets modified, users will see TCP connection errors because the server cannot
be found.
328
❐ Only explicit ADN deployments are supported for ISATAP encapsulated
traffic. The Advanced Secure Gateway uses the destination address in the
encapsulation header to perform the route lookup for establishing the explicit
ADN tunnel.
❐ In a virtually inline (WCCP) deployment, the appliance is able to handle the
ISATAP traffic and optimize the services for which application proxies are
available, but the ISATAP proxy is not able to optimize the remaining ISATAP
traffic, as it can in an inline deployment. This limitation occurs because the
remaining traffic will likely not be redirected to the applianceAdvanced
Secure Gateway.
329
Advanced Secure Gateway Administration Guide
IPv6 Proxies
The following proxies have underlying protocols that support IPv6 and can
communicate using either IPv4 or IPv6:
Table 16–1
TCP Tunnel
ISATAP Proxy
When the Advanced Secure Gateway encounters Intra-Site Automatic Tunnel
Addressing Protocol (ISATAP) traffic, it decides whether to process the 6-in-4
packets with the ISATAP proxy or one of the traditional application proxies
(HTTP, FTP, CIFS, etc.). To make the decision on which proxy to use, the
Advanced Secure Gateway identifies the service inside the encapsulated packet. If
the Advanced Secure Gateway is intercepting this service, the traffic is processed
by one of the traditional application proxies. If the service is not intercepted, the
Advanced Secure Gateway uses the ISATAP proxy to optimize the IPv6 packet
330
and payload over an ADN tunnel, assuming an ADN peer is found. Note that this
proxy processes all ISATAP traffic that is not handled by application proxies,
including ICMP, UDP, TCP, and routing protocols. If an ADN peer is not found,
the packet cannot be optimized; it is simply sent to its destination.
The ISATAP proxy uses the following techniques to optimize the IPv6 packets:
❐ Byte caching
❐ Compression
The ISATAP proxy works differently than the application proxies: it processes
individual packets instead of entire streams. It does not inspect the contents of the
payload; it optimizes the entire packet.
Traffic that is processed by the ISATAP proxy appears in Active Sessions as the
ISATAP_tunnel service and the ISATAP proxy type. The Active Sessions report
lists the IPv4 tunnel address (not the IPv6 destination) as the server address since
the ISATAP proxy has no insight into the payload of the packet.
The ISATAP proxy is not enabled by default. Until you enable ISATAP, 6-in-4
packets will be bypassed. See "Optimizing ISATAP Traffic" on page 341.
331
Advanced Secure Gateway Administration Guide
Use the Configuration > Services > Management Services option to view or modify the
listeners for each management service.
332
Features that Support IPv6
The SGOS software accommodates the entry of either IPv4 or IPv6 IP addresses in
applicable features. Table 16–2 lists the features that can be configured with either
IPv4 or IPv6 addresses.
Table 16–2
DNS servers "Adding DNS Servers to the #(config dns forwarding)edit primary
Primary or Alternate Group" #(config dns fowarding primary)add server
on page 829 2001:db8:85a3::8a2e:370:7334
Forwarding hosts "Creating Forwarding Hosts" #(config forwarding) create host ipv6-
on page 890 proxy 2001:db8::1 http proxy
"IPv6 Forwarding" on page
335
333
Advanced Secure Gateway Administration Guide
Table 16–2
Upload access "Editing Upload Clients" on #(config log log_name) ftp-client primary
logs to an IPv6 page 646 host 2001:418:9804:111::200
server
The IP address or hostname fields for these features accommodate the entry of
IPv4 or IPv6 addresses and, when applicable, include a field for entering the
prefix length (for IPv6 addresses) or subnet mask (for IPv4 addresses). For
example:
334
IPv6 Forwarding
To minimize WAN traffic, you can create forwarding hosts — the Advanced
Secure Gateway configured as a proxy to which certain traffic is redirected for the
purpose of leveraging object caching. (See "About the Forwarding System" on
page 881.) It is possible to create IPv4-to-IPv6 forwarding, IPv6-to-IPv4
forwarding, and IPv6-to-IPv6 forwarding.
For example, to create a policy that forwards an IPv4 destination to an IPv6
forwarding host:
1. Create an IPv4 virtual IP (VIP) address for the Advanced Secure Gateway.
2. Create a forwarding host entry using an explicit IPv6 address or a hostname
that resolves into an IPv6 address.
3. Launch the Visual Policy Manager (VPM)—Configuration > Policy > Visual Policy
Manager.
335
Advanced Secure Gateway Administration Guide
IPv6 Limitations
IPv6 support on the Advanced Secure Gateway has the limitations described
below.
❐ The following proxies do not currently have IPv6 support:
• MMS streaming
• CIFS
• MAPI
❐ The Advanced Secure Gateway does not intercept link-local addresses in
transparent mode since this deployment isn’t practical; transparent link-local
addresses will be bypassed.
336
❐ IPv6 is not supported in a WCCP deployment.
337
Advanced Secure Gateway Administration Guide
3b
3a
3. Assign addresses:
a. Click Add IP. The Add IP Address dialog displays.
b. Enter the IPv6 address and prefix length.
c. Click OK twice to close each dialog.
d. Click Apply.
4. Add a DNS server for IPv6. Select the Configuration > Network > DNS > Groups tab.
5. You can place both network servers types (IPv4 and IPv6) in the same DNS
group, or separate them into different groups.
a. Click Edit or New and add a DNS server for IPv6.
b. Click Apply.
6. IPv6 requires its own gateway. Select the Configuration > Network > Routing >
Gateways tab.
338
7. Define two default gateways: one for IPv4 and one for IPv6:
a. Click New. The Add List Item dialog displays.
b. Create a gateway to be used for IPv6.
c. Click OK to close the dialog.
d. Click Apply.
e. Repeat Steps a - d to create an IPv4 gateway (if you haven’t done so
already).
8. (Optional) Create policy for IPv6 servers. See "IPv6 Policies" on page 342.
339
Advanced Secure Gateway Administration Guide
340
Section 4 Optimizing ISATAP Traffic
The Advanced Secure Gateway can see inside a 6-in-4 encapsulated packet so that
it can identify the service and use the appropriate proxy to optimize the traffic.
For example, the Flash proxy optimizes Flash streaming traffic with object
caching, TCP optimization, and protocol optimization (assuming an ADN peer is
found). For services that are not intercepted (such as ICMPv6 and UDP), the
Advanced Secure Gateway uses the ISATAP proxy; this proxy optimizes the IPv6
packet and payload using byte caching and compression over an ADN tunnel
(assuming a peer is found).
1. Make sure your Advanced Secure Gateway appliances are inline between
ISATAP-capable routers.
2. Enable both ISATAP options in the CLI.
a. Access the Advanced Secure Gateway CLI, with enable (write) access.
b. Type conf t to go into configuration mode.
c. At the #(config) prompt, type the following CLI commands:
isatap adn-tunnel enable
isatap allow-intercept enable
3. Use the Active Sessions report to verify ISATAP traffic is being processed and
optimized by the appropriate proxy: ISATAP or the applicable application
proxy.
341
Advanced Secure Gateway Administration Guide
2a
2b
See Also
❐ "IPv6 Support on the Advanced Secure Gateway" on page 330
❐ "Configuring the Advanced Secure Gatewayto Work in an IPv6 Environment"
on page 337
❐ "Configuring an ADN for an IPv6 Environment" on page 340
❐ "IPv6 Policies" on page 342
IPv6 Policies
With the global policy for DNS lookups, the Advanced Secure Gateway appliance
first uses the configured IPv4 DNS servers for processing DNS requests. If this
lookup fails, the Advanced Secure Gateway appliance looks up the host on the
configured IPv6 DNS servers. This processing of DNS requests happens
automatically. To change the global setting for IP connection type preference, use
the following policy:
server_url.dns_lookup(dns_lookup_value)
where
dns_lookup_value = ipv4-only|ipv6-only|prefer-ipv4|prefer-ipv6
342
If you have a known list of servers that are on IPv6 networks, you can avoid
timeouts and unnecessary queries by creating policy to look up host names on
IPv6 DNS servers only. For example:
<Proxy>
url.domain=etrade.com server_url.dns_lookup(ipv6-only)
url.domain=google.com server_url.dns_lookup(ipv6-only)
This policy overrides the global policy and look up the specified hosts
(etrade.com and google.com) on the IPv6 DNS servers only.
343
Advanced Secure Gateway Administration Guide
344
Chapter 17: Geolocation
To comply with local regulations, assist with traffic analysis, or reduce the risk
of fraud and other security issues, you may need to know the origin of traffic in
your network, or restrict outbound connections to specific countries. SGOS
supports geolocation in both reverse proxy and forward proxy modes:
❐ Client geolocation in reverse proxy mode: You can use client geolocation to
identify the source of traffic through the Advanced Secure Gateway
appliance based on IP address (and when applicable, the effective client IP
address; refer to the Visual Policy Manager Reference for information on
effective client IP address).
❐ Geolocation in forward proxy mode: You can use geolocation to restrict by
country the outbound connections that your users make.
To use geolocation, you must download a geolocation database. This database
maps IP addresses to the countries with which they are associated and provides
the supported names and ISO codes for countries, such as “United States [US]”.
You can add conditions based on the country associated with a given IP
address; the conditions then determine policy actions, such as denying traffic to
or from a specific country.
345
Advanced Secure Gateway Administration Guide
346
Section 2 Overview: Setting up, Using, and Removing Geolocation
Perform the following steps to set up, use, and remove Geolocation.
Task Reference
Look up the IP addresses and countries for a URL. "DNS Lookup" on page 349
Perform this step to determine the originating
countries and IP addresses for a given URL.
347
Advanced Secure Gateway Administration Guide
Note: Refer to the Command Line Interface Reference for the related CLI command
for enabling geolocation.
See Also
❐ "Identifying a Country by IP Address" on page 352
❐ "Troubleshooting Geolocation" on page 354
348
Section 4 DNS Lookup
You can determine the IP addresses to which a specified domain resolves, as well
as the geographical location of each IP address.
Note: You must have configured DNS servers for the appliance for the DNS
lookup to work. In the Management Console, select Configuration > Network > DNS to
configure primary and alternate DNS servers.
349
Advanced Secure Gateway Administration Guide
350
Section 5 Downloading the Geolocation Database
To download the geolocation database:
1. In the Management Console, select Configuration > Geolocation > General.
2. On the Download tab, in the Download Options section, click Download Now.
When the download starts, the section displays a “Download is in progress”
message.
If you receive a download error, check your network configuration and make
sure that the appliance can connect to the Internet.
If the download is successful, the License and Download Status section
displays statistics.
You can now write policy using country name or country code as defined in
the geolocation database. You will also be able to see the supported country
names and codes:
❐ In the Management Console (Configuration > Geolocation > General > General tab).
❐ In output for the #show geolocation countries and #(config geolocation)
view countries CLI commands.
❐ When you add geolocation objects in the Visual Policy Manager (VPM).
Note: Refer to the Command Line Interface Reference for the related CLI command
for downloading the geolocation database.
351
Advanced Secure Gateway Administration Guide
To write policy about a specific country, use the country code specified in
square brackets beside the country name. For example, the country code for
Italy is “IT”.
If the IP address you enter is not valid, an error appears. See "Troubleshooting
Geolocation" on page 354 for more information.
4. (Optional) To view the list of countries in the geolocation database, click Show
list of countries in Geolocation database. The list opens in a separate browser
window.
352
Section 7 Writing Geolocation Policy
You can add geolocation policy through the VPM or by composing Content Policy
Language (CPL).
353
Advanced Secure Gateway Administration Guide
354
Section 9 Access Log Errors
The following access log errors may appear in the access log if there is a problem
with your subscription.
❐ The Geolocation subscription file is out of date
❐ Failed trying to get the subscription settings from the Geolocation
subscription file
❐ Failed trying to download the Geolocation subscription file
❐ Failed trying to extract and activate the Geolocation payload file
Note: If you receive other errors while setting up or using geolocation, refer to
the Blue Coat Knowledge Base.
355
Advanced Secure Gateway Administration Guide
Additional locations:
Countries defined by geolocation database:
Warning: The geolocation database is not installed
Removing Policy
To remove geolocation policy:
1. In the Management Console, select Configuration > Policy > Visual Policy Manager.
2. Click Launch to launch the VPM.
3. Remove any geolocation objects or rules. Refer to the Visual Policy Manager
Reference for instructions.
4. Click Install Policy.
356
Chapter 18: Filtering Web Content
Content Filtering allows you to categorize and analyze Web content. With
policy controls, content filtering can support your organization’s Web access
rules by managing or restricting access to Web content and blocking downloads
from suspicious and unrated Web sites, thereby helping protect your network
from undesirable or malicious Web content.
The Advanced Secure Gateway appliance supports Blue Coat WebFilter and
Intelligence Services as well as other third-party databases. This chapter
describes how to configure the appliance to process client Web requests and to
control and filter the type of content retrieved.
For information on integrating your local appliance content filtering policy
with Blue Coat Cloud Service policy, please see Universal Policy: Applying Global
Policy to Local and Remote Users.
357
Advanced Secure Gateway Administration Guide
358
If your subscription with the database vendor expires or if the available database
is not current, the category unlicensed is assigned to all URLs and no lookups
occur on the database. To ensure that the latest database version is available to
you, by default, the Advanced Secure Gateway appliance checks for database
updates once in every five minutes.
359
Advanced Secure Gateway Administration Guide
Legend
A: A client connected to the Advanced Secure Gateway appliance.
B: Advanced Secure Gateway appliance content filtering solution (content filter vendor
+ Blue Coat policy).
C: Web Content.
Process Flow
1: (Blue arrow) The client requests a Web page.
2: The Advanced Secure Gateway appliance checks the requested URL against the on-
box content filtering database to determine the categorization.
3: After the URL is categorized, the policy engine determines if the URL is allowable
or not.
4: (Blue arrow) The URL is allowed and the request continues to its destination.
5. (Red arrow) The policy denies the request and returns a message concerning
corporate Web compliance.
360
Supported Content Filter Providers
The Advanced Secure Gateway appliance supports several content filter
providers.
❐ Blue Coat WebFilter. Blue Coat WebFilter provides both an on-box content
filtering database and the WebPulse service, a cloud-based threat-protection
feature.
❐ Intelligence Services. This is a framework for the delivery of data feeds to Blue
Coat platforms. Multiple data feeds are entitled by subscription to an
Intelligence Services solution bundle. These data feeds are delivered and
made available to the Advanced Secure Gateway appliance through the
Intelligence Services framework. You can obtain a license for one or more
bundles, and also enable or disable data feeds in your solution bundle as your
requirements change.
❐ Local database. Create and upload your custom content filtering database to
the Advanced Secure Gateway appliance. This database must be in a text file
format.
❐ The Internet Watch Foundation (IWF) database. For information about the
IWF, visit their web site at: http://www.iwf.org.uk/
❐ A supported third-party content filtering vendor database— Proventia or
Optenet. You cannot use two third-party content filtering vendors at the same
time.
❐ YouTube. The appliance obtains video categories from the YouTube Data API
v3.0. After you enable Blue Coat categories for YouTube, you can reference
these categories in policy to control YouTube traffic.
Note: This feature is provided on an "as-is" basis. Blue Coat has no control of,
and is not responsible for, information and content provided (or not) by
YouTube. Customer is required to apply and use its own API key in order to
activate this feature, and therefore obligated to comply with all terms of use
regarding the foregoing (for example, see https://developers.google.com/
youtube/terms), including quotas, restrictions and limits on use that may be
imposed by YouTube. Blue Coat shall not be liable for any change,
discontinuance, availability or functionality of the features described herein.
361
Advanced Secure Gateway Administration Guide
WebPulse is a cloud service that allows inputs from multiple enterprise gateways
and clients and creates a computing grid. This grid consists of Blue Coat
WebFilter, K9, and ProxyClient customers, who provide a large sample of Web
content requests for popular and unrated sites. Based on the analysis of this large
volume of requests, the computing grid continuously updates the master
Blue Coat WebFilter database, and the Advanced Secure Gateway expediently
updates its on-box copy of the Blue Coat WebFilter database. About 95% of the
Web requests made by a typical enterprise user (for the English language) are
present in the on-box Blue Coat WebFilter database, thereby minimizing
bandwidth usage and maintaining quick response times.
By default, the WebPulse service is enabled and configured to dynamically
categorize unrated and new Web content for immediate enforcement of policy.
Typically, the response time from the dynamic categorization service is about
500 milliseconds and is subject to the response/performance of the site in
question. However, if this service is causing significant delays to your enterprise
web communications, you can run it in Background mode.
If dynamic categorization is disabled, proactive threat detection, content and
reputation ratings are also disabled.
The appliance contacts the WebPulse service using mutual endpoint
authentication over TLS. For best security, the connection is always encrypted.
If you opt to use a non-secure connection, all data is sent over the connection as
plain text. For information, see "Configuring WebPulse Services" on page 382.
362
human analysis. These ratings are then used to update the master Blue Coat
WebFilter database, and the automatic database update feature then refreshes the
local Blue Coat WebFilter database on the Advanced Secure Gateway appliance.
When dynamic categorization is performed in Background mode, the Advanced
Secure Gateway appliance continues to service the URL request without waiting
for a response from the WebPulse dynamic categorization service. The system
category pending is assigned to the request, indicating that the policy was
evaluated with potentially incomplete category information. When WebPulse
returns a category rating, the rating is stored in a dynamic categorization cache so
that the next time the URL is accessed, WebPulse will not be required to
determine its category.
Note: The dynamic service is consulted only when the installed Blue Coat
WebFilter database does not contain authoritative category information for a
requested URL. If the category returned by the WebPulse service is blocked by
policy, the offending material does not re-enter the network.
The URL is first looked up in the local Blue Coat Web Filter (BCWF) database. The
expected results are shown in the following table.
363
Advanced Secure Gateway Administration Guide
364
Found in Found in Rating Process Mode Result / Description
Local BCWF Cache
Database
See Also:
❐ "About the Dynamic Categorization Process" on page 365
❐ "Dynamic Categorization States" on page 366
❐ "Considerations Before Configuring WebPulse Services" on page 367
❐ "About Private Information Sent to WebPulse" on page 368
365
Advanced Secure Gateway Administration Guide
The following diagram illustrates Blue Coat WebFilter’s content filtering flow
when dynamic categorization is employed.
Legend
A: A client connected into the Advanced Secure Gateway appliance.
B: Advanced Secure Gateway appliance with Blue Coat WebFilter and Dynamic
Categorization enabled.
C: WebPulse cloud server.
D: Web content.
Process Flow
1: (Blue arrow) Client 1 requests a Web page.
2: The Advanced Secure Gateway appliance checks the requested URL against the Blue
Coat WebFilter database for categorization. No match is found.
3: The WebPulse Service returns the categorization of the URL if it has already been
determined. If not, WebPulse accesses and analyzes the requested site and returns a
real-time categorization if the confidence rating is high enough. If a category cannot be
determined automatically with high confidence, the service returns a category unknown
status, but records the site for future categorization.
4: After the URL is categorized, the policy engine determines if the URL is allowable or
not. Steps 5 and 6 describe what happens if the URL is allowable. Step 7 describes
what happens if the URL is not allowable.
5: (Blue arrow) The URL is allowed and the request continues to its destination for full
retrieval.
6: (Blue arrow) The allowed content is served back to the client.
7: (Red arrow) The policy denies the request and returns a message concerning
366
❐ Suspended: Categorization from the database continues, but the service is no
longer employed. This occurs when the installed database is over 30 days old
due to the expiration of BCWF download credentials or network problems.
After credentials are renewed or network problems are resolved, the service
returns to Enabled.
367
Advanced Secure Gateway Administration Guide
SOCKS Gateways
If you use proxy chaining for load balancing or for forwarding the dynamic
categorization request through an upstream SOCKS gateway, you must configure
the SOCKS gateway before configuring the WebPulse service.
Important: Before configuring the SOCKS gateway target for WebPulse, verify
that the SOCKS gateway is operating correctly.
When both SOCKS and forwarding are configured, the Advanced Secure
Gateway connects to the SOCKS gateway first, then to the forwarding host, and
then to the WebPulse service.
368
private domains within your network, you can use dynamic categorization to
ensure accuracy of content filter ratings, while preserving the security of sensitive
information relating to your private networks.
Before a request is sent for content rating to the WebPulse cloud service, the
following conditions are verified on the Advanced Secure Gateway appliance:
• Is WebPulse service and dynamic categorization enabled?
• Is dynamic categorization permitted by policy?
• Is the host specified in the private domain or private subnet list?
Any request that is determined to be part of your configured private
network is not sent to WebPulse.
The Advanced Secure Gateway appliance might send information from HTTP
and HTTPS requests to the WebPulse service if they are not directed to hosts that
are part of the configured private network.
369
Advanced Secure Gateway Administration Guide
You can further control whether to include the URL path and query string, and
individually control whether the Referer or User-Agent headers are sent for
specific requests. Restrictions are accomplished through the use of policies that
can be defined from the Advanced Secure Gateway appliance management
console or CLI.
Table 18–1 on page 370 lists the type of information that is sent to the WebPulse
service based on default settings for all SGOS versions supporting WebPulse.
Table 18–1 Information Sent to the WebPulse Service Based on Default SGOS Settings
370
See Also
❐ "Configuring WebPulse Services" on page 382
❐ "Viewing Dynamic Categorization Status (CLI only)" on page 385
❐ Section K: "Applying Policy" on page 410
❐ Content Policy Language Reference
Note: Blue Coat respects your security needs. If the request URL or the Referer
header for a malware threat pertains to a private URL, no malware notification is
issued.
See Also
❐ "Configuring WebPulse Services" on page 382
❐ "Viewing Dynamic Categorization Status (CLI only)" on page 385
371
Advanced Secure Gateway Administration Guide
372
Section 2 Enabling a Content Filter Provider
This is the first step in setting up a web content filter on the Advanced Secure
Gateway. This procedure assumes you have a valid account with your preferred
vendor.
Prerequisite: "Web Content Filtering Task Overview" on page 372
2. Select the option for your preferred provider. You can opt to enable the local
database, Internet Watch Foundation, BCWF, a third-party vendor (select your
preferred vendor from the Third-party database drop-down list), and YouTube.
Note: Before you can enable YouTube, you require a server key from
Google. See "Setting the YouTube Server Key" on page 406 for information.
If you try enabling YouTube without a server key, you receive an error
message.
3. Select the Lookup Mode option. For a web request, the look up mode determines
the databases that the Advanced Secure Gateway appliance searches for a
category match. To perform a lookup, the database must be enabled. The look
up sequence executed is policy, local database, IWF, Blue Coat WebFilter and
finally a selected third-party database.
Note: For YouTube, the Lookup mode option is hard-coded to Always. This
means that the database is always consulted for category information.
373
Advanced Secure Gateway Administration Guide
The built in exception page can be customized, for customizing the exception
page, refer to the “Advanced Policy Tasks” chapter in the Visual Policy
Manager Reference.
5. Click Apply.
2. Click the WebFilter link. The Blue Coat tab opens (Configuration > Content Filtering
> Blue Coat).
3. In the Data Source menu, select WebFilter or Intelligence Services. Then, click
Apply.
Note: If a Blue Coat WebFilter (BCWF) username and password are configured
on the appliance, but you save a configuration archive (or Management Center
backs up the configuration) while the data source is set to Intelligence Services,
the archive does not save the BCWF username/password. To archive the BCWF
username and password, switch the data source back to Webfilter and save a
separate configuration file.
374
Section 3 Downloading the Content Filter Database
The dynamic nature of the Internet makes it impossible to categorize web content
in a static database. With the constant flow of new URLs, URLs of lesser-known
sites, and updated Web content, maintaining a current database presents a
challenge. To counter this challenge, the Advanced Secure Gateway appliance
supports frequent content filter database downloads.
For more information, see one of the following topics:
❐ "About Database Updates"
❐ "Downloading a Content Filter Database" on page 376
For more information about the Blue Coat WebFilter database, see "About Blue
Coat WebFilter and the WebPulse Service" on page 361.
Note: By default, the Advanced Secure Gateway appliance checks for database
updates once in every five minutes. While you can schedule the time interval for
an automatic database update, the frequency of checks is not configurable.
375
Advanced Secure Gateway Administration Guide
For information about content filter updates, or if you are setting up the content
filter provider for the first time, see "About Database Updates" on page 375.
2. Download the database. Except for IWF, you must enter valid subscription
credentials to download the database. If the database has previously been
downloaded on a local Web server that requires authentication, you must
configure the Advanced Secure Gateway to use credentials that allow access
to the Web server, which hosts the content filter database.
a. Enter your username and password (required for BCWF, Proventia,
and Optenet).
b. (Optional) Click Change Password. The Change Password dialog
displays. Enter your password and click OK.
376
c. The default database download location is displayed in the URL or
Server field. If you have been instructed to use a different URL, enter it
here.
d. (Optional) If you changed the URL for downloading the database, to
reset to the default location, click Set to default. The default download
location overwrites your modification.
e. Click Apply to save all your changes.
f. Click Download Now. The Download Status dialog displays.
g. Click Close to close the Download status dialog.
It may take several minutes for the database download to complete. When
the database has been downloaded, proceed to "Viewing the Status of a
Database Download".
377
Advanced Secure Gateway Administration Guide
Note: The maximum number of categories for any single URL is 16. If more than
16 categories are specified, the Advanced Secure Gateway appliance arbitrarily
matches against 16 out of the total number specified.
378
3. Click Test. A new web page displays with the category, application, and
operation that BCWF has assigned to the URL. For example, the URL
facebook.com/video/upload_giver.php is categorized as follows:
Social Networking; Audio/Video Clips
Facebook
Upload Videos
The test results in this example indicate that the URL has two categories (Social
Networking and Audio/Video Clips), is the Facebook application, and is the
Upload Videos operation.
Note that not all URLs have applications and operations associated with them.
For URLs that BCWF has not assigned an application or operation, the test results
indicate none.
If you have a license, you can also test applications and operations using
Application Classification. See Section E: "Using Intelligence Services to Classify
Applications" on page 391 for information.
Content filtering databases can be very large and require significant resources to
process. It might be necessary to adjust the amount of memory allocated to the
database in the following situations:
❐ If you are not using ADN and have a high transaction rate for content filtering,
you can increase the memory allocation setting to High. This helps content
filtering run more efficiently.
❐ If you are using both ADN and content filtering but the transaction rate for
content filtering is not very high, you can reduce the memory allocation
setting to Low. This makes more resources available for ADN, allowing it to
support a larger number of concurrent connections.
3. Click Apply.
379
Advanced Secure Gateway Administration Guide
See Also
❐ "Supported Content Filter Providers" on page 361
❐ "About Private Information Sent to WebPulse" on page 368
❐ "Specifying a Blue Coat Data Source" on page 374
380
2. Click the Real-time analysis link. The console displays the Configuration > Threat
Protection > WebPulse tab.
381
Advanced Secure Gateway Administration Guide
382
To configure WebPulse services:
1. Select the Configuration > Threat Protection > WebPulse tab.
383
Advanced Secure Gateway Administration Guide
384
Configuring Dynamic Categorization Requests for HTTP/HTTPS (CLI
only)
You can configure dynamic categorization requests for HTTP and HTTPS
transactions sent to WebPulse in the CLI.
To enable or disable sending HTTP header information to WebPulse, use the
following command:
SGOS#(config bluecoat) service send-request-info {enable | disable}
The setting is enabled by default. When enabled, WebPulse receives HTTP
headers with Referer, User-Agent, Content-Type, and Content-Length
information. When the setting is disabled, the Advanced Secure Gateway
appliance does not send any HTTP header information to WebPulse.
To specify the mode and amount of information sent to WebPulse for HTTPS
transactions, use the following command:
SGOS#(config bluecoat) service send-https-url {full | path | disable}
The following are parameters for the command:
• full — Send entire URL (domain, path, and query string).
• path — Send only the domain and path.
• disable — Do not send a rating request for HTTPS transactions.
385
Advanced Secure Gateway Administration Guide
See Also
❐ "Applying Policy to Categorized URLs"
❐ "More Policy Examples"
❐ "Defining Custom Categories in Policy"
Note: You can switch to the BCWF database; see "Specifying a Blue Coat Data
Source" on page 374. To configure BCWF, refer to "About Blue Coat WebFilter and
the WebPulse Service" on page 361.
386
Verify Subscribed Bundles
After you verify requirements, make sure your subscribed bundles appear in the
appliance Management Console as expected. Verify that your Intelligence
Services bundles are correct and valid.
1. In the Management Console, select Maintenance > Licensing > View.
2. In the Intelligence Services Bundles section, look for the names of your
subscribed bundles and their expiration dates.
Any feeds that are part of multiple subscribed bundles are listed under each
bundle.
Description Reference
Monitor the Content Filter health status. "Monitor Content Filter Health Status"
on page 388
Dynamic Categorization
By default, when you set Intelligence Services as the data source and download
the database, dynamic categorization in real time is enabled on the appliance.
To disable dynamic categorization, select Configuration > Content Filtering > Blue Coat
and click the Enabled link beside Real-time analysis. The console displays the
Configuration > Threat Protection > WebPulse tab. Then, clear the Perform Dynamic
Categorization option.
For information on the other settings on this tab, refer to"Configuring WebPulse
Services" on page 382.
387
Advanced Secure Gateway Administration Guide
Note: You can set a notification method, or disable notification, for all subscribed
services at once; select Maintenance > Health Monitoring > Subscription.
388
2. In the License column, select Content Filter Expiration. Then, click Edit. The
console displays an Edit Health Monitor Settings dialog.
3. In the dialog, specify the Critical Threshold and the Warning Threshold.
4. Specify the Notification method(s): Log, Trap, or Email.
Note: If you have selected BCWF as the data source, the Health Monitoring >
Subscription tab displays a BlueCoat WebFilter Communication Status metric even
if you do not use BCWF as a content filter. In this case, the metric represents the
Application Classification health only, not BCWF as a content filter provider. See
Section E: "Using Intelligence Services to Classify Applications" on page 391 for
information on Application Classification.
389
Advanced Secure Gateway Administration Guide
390
Section E: Using Intelligence Services to Classify Applications
The Application Classification service uses the Intelligence Services database.
Before you can use the feature:
❐ Make sure that Intelligence Services is set as the data source. See "Specifying a
Blue Coat Data Source" on page 374.
❐ Ensure that your license is valid. See "View the License Status" on page 388.
After enabling the feature, you can review applications and operations for web
pages. As of , you can review the attributes associated with a web application. In
addition, you can download new database versions when required, and also
check the feature’s health status. See the following sections for information.
Description Reference
Note: You have the option of using either BCWF or the Intelligence Services
categorization data feed for content filtering. When content filtering is enabled
(Content Filtering > General > Blue Coat), the appliance uses whatever data source is
selected as the non-third-party on-box content filtering database for Application
Classification.
391
Advanced Secure Gateway Administration Guide
2. On the General tab, select Enable Blue Coat Application Classification on this device.
3. Click Apply. The appliance attempts to download the database for the first
time.
The service will automatically check for and download updates if:
• the service is enabled
• an Internet connection exists
Note: To disable this service, make sure that Application Attributes (introduced
in version 6.6.4) is disabled. For details, see "Enable Application Attributes" on
page 395.
Note: A Critical error occurs if the initial download attempt fails. After the
database downloads successfully, the service periodically checks for a newer
version of the database. If several update checks fail to connect to Blue Coat, a
Warning error occurs in Health Monitoring until the failure is corrected.
392
Look up the Application and Operation for a URL
Determine which application and operation exist for a specific web page.
1. In the Management Console, select Configuration > Application Classification >
General > General.
2. On the General tab, in the Classification Lookup section, enter a URL in the URL
field and click Lookup.
The console displays the lookup results. Refer to Table 18–2, "Classification
Lookup Results" to determine what the messages mean.
393
Advanced Secure Gateway Administration Guide
Note: You can also use BCWF to review the applications and operations for a
URL. See "Testing the Application and Operation for a URL" on page 378.
394
Enable Application Attributes
Before enabling Application Attributes, verify that Application Classification is
enabled. For details, see "Enable Application Classification" on page 391.
1. In the Management Console, select Configuration > Application Classification >
Attributes > Attributes.
2. On the Attributes tab, select Enable Blue Coat Application Attributes on this device.
3. Click Apply. The appliance attempts to download the database for the first
time.
The service will automatically check for and download updates if:
• the service is enabled
• an Internet connection exists
2. On the Attributes tab, in the Attribute Lookup section, select an application from
the Application menu.
3. From the Attribute menu, select an attribute. The attributes that are available
depend on the application you selected in the previous step.
4. Click Lookup.
395
Advanced Secure Gateway Administration Guide
The console displays the lookup results. Look for details beside Value.
Note: The attribute Overall Risk Level is not related to the Web Application
Firewall risk score policy or Threat Risk Levels (an Intelligence Services feed). For
details on risk score policy, refer to the Content Policy Language Reference. For
details on Threat Risk Levels, see "Analyzing the Threat Risk of a URL" on page
439.
396
• Overall Risk Level: 5
• Strong Authentication: 0
Based on the attribute details, you can write policy to intercept, control, and
log requests to weibo.com as needed.
Note: You must replace all spaces and punctuation in attribute names with
underscores in CPL, but use no more than one underscore in a row. For example,
specify the Admin Audit attribute as Admin_Audit, and specify the Valid & Trusted
Server Certificates attribute as Valid_Trusted_Server_Certificates.
You can verify how to specify an attribute by selecting it in the Application Attributes
VPM object and viewing the generated CPL. For details on this VPM object, refer
to the Visual Policy Manager Reference.
2. Click Download Now. The database download starts in the background; when it
is complete, the tab displays the status of the download.
You can also click Refresh to view the status of the download.
397
Advanced Secure Gateway Administration Guide
If there are no errors with the license, the Value displays the number of days
left and the State is OK.
If there are no errors with the server, the Value is No update errors and the State is
OK.
Note: You can set a notification method, or disable notification, for all subscribed
services at once in the CLI using the #(config) alert notification subscription
communication-status command.
398
Section F: Configuring a Local Database
The following sections describe how to select and refer to a local database and
how to schedule the database update schedule:
❐ "About the Local Database"
❐ "Creating a Local Database"
❐ "Selecting and Downloading the Local Database"
Note: Blue Coat recommends locating your local database on the same server as
any policy files you are using.
399
Advanced Secure Gateway Administration Guide
Policy Example
This example uses the same syntax as the local database example.
<proxy>
ALLOW
400
Creating a Local Database
The local database is a text file that must be located on a web server that is
accessible by the Advanced Secure Gateway appliance on which you want it
configured. You cannot upload the local database from a local file.
The local database file allows define category statements only.
2. Upload the text file to a Web server that the Advanced Secure Gateway
appliance can access.
3. Continue with "Selecting and Downloading the Local Database".
401
Advanced Secure Gateway Administration Guide
402
b. Click Download Now. The Management Console displays the Download
Status dialog.
8. Click Apply.
Note: Incremental updates are not available for the local database.
See Also
❐ "Applying Policy"
❐ "Applying Policy to Categorized URLs"
❐ "More Policy Examples"
❐ "Defining Custom Categories in Policy"
403
Advanced Secure Gateway Administration Guide
See Also
❐ "Applying Policy"
❐ "Applying Policy to Categorized URLs"
❐ "More Policy Examples"
❐ "Defining Custom Categories in Policy"
See Also
❐ "Applying Policy"
❐ "Applying Policy to Categorized URLs"
❐ "Defining Custom Categories in Policy"
404
Section I: About Blue Coat Categories for YouTube
The appliance recognizes three types of YouTube URLs. The effectiveness of
policy and coaching pages differs amongst the different URL types. Refer to the
following table.
URL Type Example(s) of User Action Deny Coaching
policy page
works works
Embedded in User plays a video that has been Yes. The Yes. The
an <iframe> embedded in a blog post. deny page coaching
The URL could start with: is confined page is
within the confined
http://www.youtube.com/embed/
<iframe>. within the
<iframe>.
Note: This feature is provided on an "as-is" basis. Blue Coat has no control of,
and is not responsible for, information and content provided (or not) by YouTube.
Customer is required to apply and use its own API key in order to activate this
feature, and therefore obligated to comply with all terms of use regarding the
foregoing (for example, see https://developers.google.com/youtube/terms),
including quotas, restrictions and limits on use that may be imposed by YouTube.
Blue Coat shall not be liable for any change, discontinuance, availability or
functionality of the features described herein.
405
Advanced Secure Gateway Administration Guide
The list of categories is static. In the Visual Policy Manager, you can view the
categories in the category list (Configuration > Edit Categories) and in the Request
URL Category object, but you cannot add, rename, edit, or remove them.
406
Section J: Using Quotas to Limit Internet Access
You can limit user access to the Internet by creating policy for:
❐ Time quotas: Limit the amount of time that users can spend on the Internet or
Internet resource during a specific period of time
❐ Volume quotas: Limit users’ Internet or Internet resource usage during a
specific period of time
To create time and volume quotas, use the Time Quota and Volume Quota objects in
the VPM instead of writing policy in Content Policy Language (CPL). For detailed
information on the quota objects, refer to the Visual Policy Manager Reference.
Note: Before you can install quota policy, you must enable the quota library in
the CLI. Issue the following command:
#(config)policy quota
407
Advanced Secure Gateway Administration Guide
408
The Volume Quota page (https://<IP_address:port>/quota/volume/view)
displays the following details:
Current quota consumption for user '<username_or_IP_address>':
x bytes.
Note: Be sure to enter the correct quota name and username/IP address. The
appliance does not validate your entries, and if you enter names/addresses that
do not exist, the page displays a quota consumption of 0 minutes/bytes.
Note: Be sure to enter the correct quota name and username/IP address.
The appliance does not validate your entries.
6. To reset the usage for all time/volume quotas, click the Reset all time/volume
quotas link. The page displays one of the following confirmation messages:
All time quota consumption has been reset to 0 minute.
All volume quota consumption has been reset to 0 byte.
409
Advanced Secure Gateway Administration Guide
Creating a Blacklist
If your default proxy policy is set to allow and you would like to block users
access to certain categories, you must create policy to block all requests for the
categories that you wish to restrict access in your network.
410
In this example, Sports/Recreation, Gambling, and Shopping categories are blocked
with a single rule and a predefined exception page content_filter_denied is
served to the user. This exception page informs the user that the request was
denied because the requested content belongs to a category that is blocked.
411
Advanced Secure Gateway Administration Guide
3. Access the VPM (Configuration > Policy > Visual Policy Manager).
.
4a
4c
4b
b. In the Set Destination Object dialog, click New > Request URL Category. The
Add Request URL Category Object dialog displays.
c. Expand the list of categories for your content filter database in the
Categories list.
412
5. Select the categories to block and click OK. This example blocks Shopping,
Gambling and Sports/Recreation categories.
6. Set the action for blocking the categories In the Action column, right click and
select Deny or Deny Content Filter.
• Deny—Denies the user request without providing an denial explanation.
• Deny Content Filter—Denies the user access to the requested content and
describes that the request was denied because it belongs to a category
blocked by organizational policy.
Note: While the following example blocks most downloads, it will not prevent all
web downloads. For example, compressed and encrypted files, server side scripts
and webmail attachments are not detected.
413
Advanced Secure Gateway Administration Guide
a. In the Action column, right click and select Set. The VPM displays the
Set Action Object dialog.
b. In the Set Action Object dialog, click New > Authenticate. The VPM
displays the Add Authenticate Object dialog. Select the authentication
mode and realm.
c. Click OK to save your changes and exit.
2. Add a rule in a Web Access Layer to restrict access to downloads by file
extension and by Apparent Data Type of the content:
a. In the Destination column, right click and select Set. The VPM displays
the Set Destination Object dialog.
414
b. In the Set Destination Object dialog, click New > File Extensions. The VPM
displays the Add File Extension Object dialog.
2c
c. In the Known Extensions field, Find and Add .exe files. Click OK.
415
Advanced Secure Gateway Administration Guide
d. Remaining in the Set Destination Object dialog, select New > Apparent
Data Type. Select the apparent data types that includes Windows
executables and Windows Cabinet files. Click OK.
e. Combine the two rules using a combined object. In the Set Destination
Object dialog, select New > Combined Destination Object and add the file
extensions and the apparent data type rule created above. Click OK
416
Creating a Whitelist
If the default policy on the Advanced Secure Gateway appliance is set to deny,
you must create a whitelist to permit web access to users. Whitelists require
constant maintenance to be effective. Unless your enterprise web access policy is
very restrictive, Blue Coat recommends setting the default policy to allow. The
default policy of allow keeps the help desk activity less hectic when managing
web access policies.
417
Advanced Secure Gateway Administration Guide
c. Expand the list of categories for your content filter database in the
Categories list.
4. Select the categories to allow and click OK. This example allows Business/
Economy and the Computers/Information Security categories. Click OK to close
each dialog.
5. Set the action for blocking the categories In the Action column, right-click and
select Allow.
418
Creating Policy to Log Access to Specific Content
To monitor web content requests from users in the network, you can record
information in the Advanced Secure Gateway appliance event log. For example,
you can create policy to allow or deny access to a category and record users who
attempt to access the specified category. The following example, illustrates how to
use policy to track users who access the Adult/Mature Content category.
419
Advanced Secure Gateway Administration Guide
d. Select the categories to monitor and click OK. This example tracks
access of Adult/Mature Content.
b. Select from the list of Substitution Variables to log specific details about
the URL or the USER and click OK. For information on substitution
variables, refer to the Visual Policy Manager Reference.
420
The following example illustrates how to block access (this is a mode of operation
called fail-closed) to the requested content when category information is
unavailable.
The System category unavailable includes the unavailable and unlicensed
conditions. The unlicensed condition helps you identify that the category was not
identified because the content filter license has expired.
421
Advanced Secure Gateway Administration Guide
422
Pre-requisites for Controlling Web Applications
• Proxy Edition license
• Blue Coat WebFilter license.
• The Blue Coat WebFilter feature must be enabled. (Configuration > Content
Filtering > General).
Note: To filter through the list of supported applications, you can enter the
name of the application in the Filter applications by: pick list. Based on your
input, the on-screen display narrows the list of applications. You must then
select the application(s) for which you want to create rules.
423
Advanced Secure Gateway Administration Guide
d. On the Action column, right click and select Deny. Your rules should
look similar to the following (third row).
4. To properly block access to all games, including those on Facebook, you must
create another Web Access Layer that defines the rule as follows.
a. Select Policy > Add Web Access Layer.
b. On the Destination column, right-click and select Request URL Category.
c. Select the Games category from the list that displays and click OK.
5. Click Install Policy. You have now installed policy that blocks all games in your
network, and permits access to the Facebook and LinkedIn applications in the
social networking category.
424
Use Case: Allow limited access on Facebook but deny access all other sites in the
social networking category. In this example, you restrict users from uploading
attachments, videos or pictures on Facebook, but allow all other operations that
the application supports.
1. Launch the Advanced Secure Gateway Proxy Management Console.
2. Launch the Visual Policy Manager (VPM).
Select Configuration > Policy > Visual Policy Manager, and click Launch.
3. Select Policy > Add Web Access Layer.
4. Create a rule that allows access to Facebook but restricts uploads.
a. On the Destination column, right click and select Set > New > Combined
Destination Object.
b. Select New > Request URL Application and select Facebook from the list of
applications.
c. Select New > Request URL Operation.
d. Select Upload Attachment, Upload Videos and Upload Pictures from the list of
operations and click OK.
e. Create the rule that checks for the application and the associated
operation.
• Select the application object you created for Facebook in Step 4b and
Add it to At least one of these objects.
425
Advanced Secure Gateway Administration Guide
• Select the Negate option in the bottom list. The display text changes
from AND At least one of these objects to AND None of these objects. Then
select the operation object you created for the uploading actions in
Step 4d and click Add. Your policy should look similar to the following.
You have now created a rule that matches on the application Facebook but
prevents the action of uploading attachments, pictures or video. When a
user attempts to upload these items on Facebook, the action will be
blocked.
5. Restrict access to all other social networking sites.
a. Select Edit > Add Rule to add a new rule in the same Web Access Layer.
b. On the Destination column, right-click and select Request URL Category.
c. Select the Social Networking category from the list that displays and click
OK.
See Also
❐ Content Policy Language Reference
❐ Command Line Interface Reference
426
Verify the Application Filtering Policy is Working Properly
After you have installed your application filtering policy, verify that the policy
works as intended. From a client workstation on the network:
❐ Verify that you cannot access websites of blocked categories.
❐ Confirm that you can access websites of allowed categories.
❐ For each application that is unitarily blocked, verify that you cannot access
any component of the application.
❐ For each operation that is blocked for an application, verify that you cannot
perform that operation for that application. In addition, verify that you can
perform operations that are not denied.
If your policy is not working properly, verify that you have spelled the
application and operation names exactly as listed in the view applications and
view operations command output. Also make sure that the operation is
supported by the application. Correct any errors, install the revised policy, and
run through the above verification steps again.
Additional Information
The following two access log variables are available in the Blue Coat Reporter
access log format (bcreportermain_v1):
x-bluecoat-application-name
x-bluecoat-application-operation
Limitations
The policy compiler will not display a warning if you create policy that defines
unsupported combinations of application names and operations. For example,
Twitter does not support uploading of pictures but the compiler does not warn
you that the following policy is invalid.
url.application.name=Twitter url.application.operation=”Upload
Pictures” deny
427
Advanced Secure Gateway Administration Guide
Use Case: Student access to Health sites is limited to a specified time of day, when
the Health 100 class is held.
This time the policy contains no exceptions:
❐ Rule 1: Health sites can be accessed Monday, Wednesday, and Friday from 10-
11am.
❐ Rule 2: Health sites can not be accessed at other times.
define condition Health_class time
weekday=(1, 3, 5) time=1000..1100
end
<proxy>
; 1) Allow access to health while class in session
ALLOW category=health condition=health_class_time
; 2) at all other times, deny access to health
DENY category=health
428
To add URLs to a category, you only need to specify a partial URL:
Note: The local database produces only the most specific URL match and returns
a single category.
The same policy syntax will produce a different match. If more that one category
is provided, policy processing may match more than one category and hence will
return more than one category. See "Local Database Matching Example" on page
400 for more information.
❐ Hosts and subdomains within the domain you specify will automatically be
included
❐ If you specify a path, all paths with that prefix are included (if you specify no
path, the whole site is included). For example, if you add
www2.nature.nps.gov/air/webcams/parks/grcacam/nps.gov/grca
only the pages in the /grca directory of nps.gov is included in the category,
but if you just add www2.nature.nps.gov/ all pages in the entire directory are
included in the category.
Example:
define category Grand_Canyon
kaibab.org
www2.nature.nps.gov/air/webcams/parks/grcacam
nps.gov/grca
grandcanyon.org
end
Any URL at kaibab.org is now put into the Grand_Canyon category (in addition to
any category it might be assigned by a provider). Only those pages in the /grca
directory of nps.gov are put in this category.
429
Advanced Secure Gateway Administration Guide
Example:
<proxy>
category=Webcams DENY
category=National_Parks ALLOW
category=Travel time =0800..1800 DENY
Click the Test button on the Management Console or the test-url command in
CLI to validate the categories assigned to any URL. This can help you to ensure
that your policy rules have the expected effect (refer to Configuring Policy Tracing
in the Content Policy Language Reference).
If you are using policy-defined categories and a content-filter provider at the
same time, be sure that your custom category names do not coincide with the
ones supplied by your provider. You can also use the same names—this adds your
URLs to the existing categories, and extends those categories with your own
definitions. For example, if the webcam mentioned above was not actually
categorized as travel by your provider, you could do the following to add it to the
Travel category (for the purpose of policy):
430
define category Travel ; extending a vendor category
www2.nature.nps.gov/air/webcams/parks/grcacam/ ; add the GC webcam
end
Note: The policy definitions described in this section can also be used as
definitions in a local database. See "Configuring a Local Database" on
page 399 for information about local databases.
Section L: Troubleshooting
This section describes troubleshooting tips and solutions for content filtering
issues. It discusses the following topics:
❐ "Unable to Communicate with the WebPulse Service" on page 431
❐ "Event Log Message: Invalid WebPulse Service Name, Health Check Failed"
on page 431
❐ "Error Determining Category for Requested URL" on page 431
❐ "Error Downloading a Content Filtering Database" on page 432
Note: The Advanced Secure Gateway appliance resolves the domain name
sp.cwfservice.net once a day and maintains the list of returned IP addresses.
The Advanced Secure Gateway appliance then uses the IP address that
provides the fastest service. If an IP address that is in use fails to respond, the
Advanced Secure Gateway appliance fails over to an alternate IP address.
Health checks are automatically conducted on all the IP addresses to make
this failover as smooth as possible and to restore service to the geographically
closest IP address as soon as it is available.
2. Check the firewall logs for messages about denied or blocked traffic
attempting to reach IP addresses or in response from IP addresses. A firewall
rule denying or blocking in either direction impedes WebPulse.
431
Advanced Secure Gateway Administration Guide
Event Log Message: Invalid WebPulse Service Name, Health Check Failed
The following event log message is displayed:
Invalid WebPulse service name - Health check failed - Receive failed.
These messages are common in event logs and, for the most part, should not affect
your service. A server may fail an L4 health check for various reasons, but unless
all servers (services) are unavailable for extended periods of time, you should not
experience interruptions in WebPulse services and can regard this as expected
behavior.
When the proxy makes a request for the WebPulse service name, several IP
addresses for our servers are returned. The Advanced Secure Gateway appliance
periodically performs a quick Layer-4 health check (opening and closing a TCP
socket with no data transfer) to each of those servers. In the event that the
Advanced Secure Gateway appliance cannot contact the server or does not receive
a response quickly enough, it logs similar event log messages.
Your WebPulse service is interrupted unless all of the servers are unable to be
contacted for more than a few seconds. When one of these error messages
appears, the services health status changes back to healthy within 2 to 10 seconds.
432
Possible Causes Check the Following
A communication error occurred contacting Check the event log entries for
the WebPulse service. WebPulse messages.
The Advanced Secure Gateway If you are using a trial or demo license,
appliance license has expired. instead of a perpetual license, the
Advanced Secure Gateway appliance
license might have expired. Verify the
status of your license on the
Maintenance > Licensing > View tab. To
purchase a license, contact Blue Coat
Technical Support or your Blue Coat
sales representative.
(Possible, but not likely) There are issues Check event log entries for disk or
with memory or a disk error. memory messages.
❐ For the ERROR: HTTP 401 - Unauthorized, verify that you have entered your
username and password correctly. For example, the following error message
was generated when an incorrect username was entered to download a BCWF
database:
Download log:
Blue Coat download at: Thu, 21 June 2015 18:03:08
Checking incremental update
Checking download parameters
Fetching:http://example.com/
Warning: HTTP 401 - Unauthorized
Downloading full control file
Blue Coat download at: Thu, 21 June 2015 18:03:17
Downloading from http://example.com/
Fetching:http://example.com/
ERROR: HTTP 401 - Unauthorized
Download failed
Download failed
Previous download:
...
433
Advanced Secure Gateway Administration Guide
If you have an upstream proxy and all internet traffic must be forwarded to
this upstream proxy, you must enable download-via-forwarding on this
Advanced Secure Gateway using the following CLI command:
> enable
# config t
#(config)forwarding
#(config forwarding) download-via-forwarding enable
❐ For the Socket Connection Error, check for network connectivity and Internet
access in your network.
Only after completing network troubleshooting, perform the following
procedure if the socket connection error persists.
Because the content filter database is downloaded using SSL, if the SSL client
on the Advanced Secure Gateway appliance gets corrupt, a connection error
occurs.
1. Verify that you have a valid SSL client on the Advanced Secure Gateway
appliance.
a. Access the Command Line Interface (CLI) of the Advanced Secure
Gateway appliance.
b. In configuration mode, view the SSL client configuration.
Blue Coat SG210 Series>en
Enable Password:XXXXX
Blue Coat SG210 Series#conf t
Blue Coat SG210 Series#(config)ssl
Blue Coat SG210 Series#(config ssl)view ssl-client
SSL-Client Name Keyring CCL Protocol
default <None> browser-trusted TLSv1.2vTLSv1.1
2. If you have an SSL client configured but the issue still persists, delete, and
recreate the SSL client.
a. In the Configuration mode:
Blue Coat SG210 Series#(config ssl)delete ssl-client
ok
Blue Coat SG210 Series#(config ssl)create ssl-client default
defaulting protocol to TLSv1.2vTLSv1.1 and CCL to browser-trusted
ok
434
Chapter 19: Web Application Protection
You can protect web applications from web attacks using Application
Protection, which is a component of Web Application Protections, a
subscription-based offering that supplements the services available in Web
Application Reverse Proxy. This feature downloads a SQL injection fingerprints
database, which defines how the appliance detects attacks.
435
Section A: Using Application Protection
Application Protection allows the appliance to detect SQL injection attacks
without the need to write and maintain SQL injection policy. When you enable the
feature, it downloads a database containing the latest SQL injection fingerprints,
culled from real-world attacks. This allows the appliance to detect numerous SQL
injection attacks against different SQL databases that web applications use.
To keep the database up-to-date, you can configure settings to be notified
whenever an update is available, or you can allow the service to automatically
download new versions.
436
Note: The Critical error appears if the initial download attempt fails. After the
database downloads successfully, the service periodically checks for a newer
version of the database. If several update checks fail to connect to Blue Coat, a
Warning error appears in Health Monitoring until the failure is corrected.
See Also
❐ "Using Application Protection" on page 436
❐ "Verifying the Database Download" on page 437
Enable Notification
To enable notification:
1. In the Management Console, select Configuration > Threat Protection > Application
Protection.
2. (If feature is not already enabled) On the Application Protection tab, select
Enable.
3. Select the Do not auto download, but notify when a new version becomes available
check box.
4. Click Apply.
When a new database is available, a notification is sent to the administrator e-
mail account and also recorded in the event log.
See Also
❐ "Verifying the Database Download" on page 437
437
438
Chapter 20: Analyzing the Threat Risk of a URL
The Threat Risk Levels service analyzes a requested URL's potential risk and
summarizes it in the form of a numeric value (see "Threat Risk Levels
Descriptions" ). You can reference these values in policy to protect your
network and your users from potentially malicious web content.
Threat Risk Levels are calculated based on numerous factors that measure
current site behavior, site history, and potential of future malicious activities.
This service is part of Intelligence Services. For information on Intelligence
Services, refer to the "Using Intelligence Services to Classify Applications" on
page 391.
Note: Threat Risk Levels are not related to risk score policy. For details on risk
score policy, refer to the Content Policy Language Reference.
439
Advanced Secure Gateway Administration Guide
The service returns a system-defined value in the rare instance when a threat
risk level does not apply. See Table 20–2 for an overview of the values. Note
that the report color for all system values is gray.
none Threat Risk Level not available The URL does not have a threat
risk level assigned to it and the
request is not forwarded to
WebPulse (or it has been
forwarded and there is still no
data).
pending Threat Risk Level data pending No risk level is assigned to the
background WebPulse analysis URL on the Advanced Secure
Gateway appliance, but the
appliance performed a
WebPulse request in the
background. Subsequent
requests for the URL could
match a result from the
WebPulse cache.
440
Table 20–2 System-defined values for Threat Risk Levels
3 Write threat risk level policy through "Write Threat Risk Policy" on
the VPM or using CPL. page 443
Note: After verifying that you have a license, you can make sure that you
have the Threat Risk Levels service. See "Verify Subscribed Bundles" on page
387
441
Advanced Secure Gateway Administration Guide
2. On the General tab, select Enable Threat Risk lookups on this device.
Note: A Critical error appears if the initial download attempt fails. After the
database downloads successfully, the service periodically checks for a newer
version of the database. If several update checks fail to connect to Blue Coat, a
Warning error appears in Health Monitoring until the failure is corrected.
442
Write Threat Risk Policy
CPL and VPM policy objects have been added and updated to support the
feature.
443
Advanced Secure Gateway Administration Guide
444
<DNS-proxy>
dns.request.threat_risk.level=7 trace.request(yes)
Trigger an action based on the threat risk of the hostname extracted from
the X.509 certificate
server.certificate.hostname.threat_risk=<numeric_or_system_value>
Note: The hostname is extracted from the X.509 certificate returned by the
server while establishing an SSL connection. If it is not an SSL connection, the
value is null.
Example
The appliance blocks the connection when it detects the hostname from the
X.509 certificate has a threat risk level of 8.
<proxy>
deny server.certificate.hostname.threat_risk.level=8
Trigger an action based on the threat risk of the URL that the appliance
sends for user request
server_url.threat_risk.level=<numeric_or_system_value>
Note: If the URL was rewritten, the condition matches the risk levels of the
rewritten URL instead of the requested URL.
Example
The appliance blocks the connection when it detects the URL sent for user
request has a threat risk level of 10.
<proxy>
deny server_url.threat_risk.level=10
445
Advanced Secure Gateway Administration Guide
Look up the threat risks associated with a "Monitor Threat Risk Statistics" on
specific URL. page 447
2. On the General tab, in the Threat Risk Lookup section, enter a URL in the
URL field and click Lookup. The console displays the threat risk level
associated with the URL, as described in "Threat Risk Levels Descriptions"
on page 439.
3. (Optional) Click the View Threat Risk Levels link to display the list of threat
risk levels in a new browser window.
446
2. On the Download tab, click Download Now..
The database download starts in the background; when it is complete, the
tab displays the status of the download.
You can also click Refresh or Refresh Status to view the status of the
download.
Note: Before you can view threat risk statistics, you must enable the feature
(Configuration > Threat Protection > Threat Risk Levels > General) and download the
database. If the Threat Risk Levels service is disabled or the database is not
downloaded, the report screen displays no data.
In addition, report data does not persist if you disable and then re-enable the
Threat Risk Levels service. The report data is accurate from when you last
enabled the feature.
447
Advanced Secure Gateway Administration Guide
To change the time range for the report, select an option beside Duration:
❐ Last Hour: This is the default selection. The report displays data from the last
60 minutes. It may take a minute or more for the report to start displaying
activity.
❐ Last Day: The report displays data from the last 24 hours.
❐ Last Week: The report displays data from the last seven days.
❐ Last Month:
The report displays data for one month, for example, from
November 19 to December 19.
❐ Last Year:The report displays data for one year, for example, from January
2015 to January 2016.
448
If there are no errors with the license, the Value displays the number of days
left and the State is OK.
Note: You can set a notification method, or disable notification, for all
subscribed services at once in the CLI using the #(config) alert notification
subscription communication-status command.
449
Advanced Secure Gateway Administration Guide
450
451
Advanced Secure Gateway Administration Guide
452
Chapter 21: Configuring Threat Protection
The Advanced Secure Gateway supports threat protection scanning with the
use of either external appliance services such as ProxyAV or Content Analysis,
or the internal Content Analysis service. When configured, these services
analyze incoming web content and protect users from malware and malicious
content. Malware is defined as software that infiltrates or damages a computer
system without the owner’s informed consent. The common types of malware
include adware, spyware, viruses, downloaders and Trojan horses.
Blue Coat’s threat protection solution protects user productivity, blocks
malware downloads and web threats, and enables compliance to network
security policies.
The following sections describe how to configure threat protection with the
internal Content Analysis service:
❐ "About Threat Protection"
❐ "Enabling Malware Scanning"
❐ "Updating the Malware Scanning Policy"
❐ "Fine Tuning the Malware Scanning Policy using VPM"
❐ "Disable Malware Scanning"
❐ "Edit an ICAP Content Analysis Service"
❐ "Delete an ICAP service From the List of ICAP services"
453
Advanced Secure Gateway Administration Guide
454
Task Task Description
2. Select whether to transfer The Advanced Secure Gateway appliance and the
data between the Advanced ProxyAV appliance or Content Analysis appliances
Secure Gateway and the communicate with each other using plain ICAP,
ProxyAV or Content secure ICAP, or both methods.
Analysis service using plain To use secure communication mode between
ICAP or secure ICAP. appliances, either use the built-in SSL device profile or
create a new SSL device profile to authorize ProxyAV
or Content Analysis on the Advanced Secure Gateway
appliance. For information about SSL device profile,
see "About SSL Device Profiles" on page 1349.
If you create an SSL device profile, verify that the CA
certificate is imported in the Advanced Secure
Gateway appliance at Configuration > SSL > External
Certificates. Otherwise, when the Verify Peer option is
enabled in Configuration > SSL > Device Profiles, the
Advanced Secure Gateway appliance fails to verify
ProxyAV or Content Analysis as trusted.
For information on enabling secure connection on
ProxyAV appliance or Content Analysis, or creating a
new certificate, refer to the ProxyAV Configuration and
Management Guide or the Content Analysis System
WebGuide.
455
Advanced Secure Gateway Administration Guide
2. Select New. The Management Console displays the Add New CAS/ProxyAV
ICAP Server dialog.
3. In the Server host name or IP address field, enter the host name or IP address of
the ICAP server. Only an IPv4 address is accepted.
4. Select the connection mode(s) and ports. The default is plain ICAP only.
If you select secure ICAP, you must add an SSL device profile. An SSL device
profile contains the information required for device authentication, including
the name of the keyring with the private key and certificate this requires to be
authenticated. For information on SSL device profiles, see "About SSL Device
Profiles" on page 1349.
5. Click OK to save your changes and exit the open dialog.
You now have proxyavx service that is automatically created to perform
response modification. Response modification means that the ICAP service
only acts on requested content that is redirected to it by the Advanced Secure
Gateway appliance after the content is served by the origin web server.
456
6. Click Perform health check to verify that the ICAP server is accessible. The
health check result is displayed immediately. For information on health
checks, see "Managing ICAP Health Checks" on page 485.
7. Continue with "Enabling Malware Scanning".
Note: The threat protection policy cannot be edited. If you would like to
supplement or override the configuration in this policy, see "Fine Tuning the
Malware Scanning Policy using VPM" on page 462.
457
Advanced Secure Gateway Administration Guide
458
To select a connection security mode:
1. Select Configuration> Threat Protection > Malware Scanning.
459
Advanced Secure Gateway Administration Guide
See Also
❐ "Updating the Malware Scanning Policy"
❐ "Fine Tuning the Malware Scanning Policy using VPM"
460
2. Click Update malware scanning policy. The Management Console displays the
Install Malware Scanning Policy dialog.
Note: If you change the default URL, you cannot revert to the default
value. You must manually re-enter the URL.
4. Click Install.
5. (Optional) Click View to view the contents of the updated threat protection
policy file.
461
Advanced Secure Gateway Administration Guide
2. Launch the VPM and create policy to scan all traffic from an internal host
using the high performance mode. This example uses the 10.0.0.0/8 subnet.
a. Select Configuration > Policy > Visual Policy Manager.
b. Click Launch.
c. In the VPM, select Policy > Add Web Content Layer.
d. In the Action column, right-click and select Set. The VPM displays the
Set Action Object dialog.
e. Click New > Set Malware Scanning. The VPM displays the Add Malware
Scanning Object dialog.
f. Select Perform high performance malware scan.
g. Click OK to save your changes and exit all open dialogs.
h. In the Destination column, right click and select Set. The VPM displays
the Set Destination Object dialog.
462
i. Select Destination IP Address/Subnet. The VPM displays the Set
Destination IP/Subnet Object dialog.
j. Add the IP address and subnet for the internal host and click Close.
k. Click OK to save your changes and exit all open dialogs.
l. Click Apply to install the policy. After this policy is installed, all traffic
from the internal subnet 10.0.0.0/8 will be scanned using the high
performance mode.
3. The completed rule is similar to the following.
463
Advanced Secure Gateway Administration Guide
Note: If you have enabled malware scanning and have added only one Content
Analysis or ProxyAV appliance for content scanning, you must disable malware
scanning before you can delete that service from the CAS/ProxyAV ICAP Servers list.
Malware scanning must be disabled so that the ICAP service to be deleted is no
longer referenced in the threat protection policy.
464
Chapter 22: Malicious Content Scanning Services
465
Advanced Secure Gateway Administration Guide
Note: Advanced Secure Gateway appliance does not support secure ICAP for
the internal Content Analysis service.
466
❐ Response modification (RESPMOD)—Allows modification of inbound client
requests. These requests are sent from