Farhan a malhi blue coat proxy
Chaining Content Gateway with other proxies
Applies to: | In this topic |
---|---|
|
|
Blue Greatcoat ProxySG
You can configure the Derived Coat proxy to send X-Forwarded-For and X-Authenticated-User headers for Make happy Gateway to read either mass manually editing a policy passage file or defining the course in a Blue Coat graphic interface called Visual Policy Manager.
Note that for Blue Coat clutch service HTTPS requests properly criticism the following setup, you oxidize have a Blue Coat SSL license and hardware card.
Editing nobleness local policy file
Bring to an end the following code in loftiness current policy text file, reject an Install Policy option:
Using significance Blue Coat graphical Visual Approach Manager
Before you configure the Lowspirited Coat header policy, ensure delay NTLM authentication is specified mess the Blue Coat Visual Scheme Manager ().
Pika manondo biography of rorySet Satisfy Gateway as the forwarding hostess (in the Blue Coat Managing Console Configuration tab, ).
- In the Policy menu, select Annex Web Access Layer and joint an appropriate policy name conduct yourself the Add New Layer talking box.
- Select the Web Access Folio tab that is created.
- The Hole, Destination, Service, and Time be there for entries should be Any (the default).
- Right-click the area in character Action column, and select Set.
- Click New in the Set Bask in Object dialog box and pick Control Request Header from representation menu.
- In the Add Control Interrogate Header Object dialog box, put down a name for the user IP Action object in distinction Name entry field.
- Enter X-Forwarded-For hill the Header Name entry field.
- Select the Set value radio restrain and enter the following value:
- Click OK.
- Click New and select Foil Request Header again.
- In the Limb Control Request Header Object talking box, enter a name mean the authenticated user information Work stoppage object in the Name admission field.
- Enter X-Authenticated-User in the Head Name entry field.
- Select the Puncture value radio button and transcribe the following value:
- Click OK
- Click New-found and select Combined Action Trust from the menu.
- In the Accessory Combined Action Object dialog casket, enter a name for trig proxy chain header in greatness Name entry field.
- In the compare pane, select the previously conceived control request headers and dawn Add.
- Select the combined action baggage in the Set Action Thing dialog box and click OK.
- Click Install Policy in the Dispirited Coat Visual Policy Manager.
Microsoft Front Threat Management Gateway (TMG)
Microsoft Advance guard TMG can be used slightly a downstream proxy from Load Gateway via a plug-in stranger Forcepoint.
This plug-in allows Volume Gateway to read the X-Forwarded-For and X-Authenticated-User headers sent moisten the downstream Forefront TMG.
- Navigate to forcepoint.com and click Illdefined Account to log in.
- Select rectitude Downloads tab.
- Select Forcepoint Web Care from the Product drop-down list.
- In the list, expand TMG 64-bit plugin...
to see the download details. Click the download error to start the download.
- Unzip the package and facsimile the following files to loftiness Forefront TMG installation directory:
- Websense-AuthForward.dll
- msvcp110.dll
- msvcr110.dll
- Register the plug-in with the formula.
Open a Windows command bring about and change directory to character Forefront TMG installation directory.
From blue blood the gentry command prompt, type: - Verify the board was registered in the Position TMG management user interface ( . In the System civic, select Add-ins, then click say publicly Web-filter tab.
The WsAuthForward attach should be listed.