The Proxy Menu
The Proxy Menu
Select Proxy from the menu bar at the top of the screen.
A proxy is a service on your Endian UTM Appliance that can act as a gatekeeper between
clients (e.g. a web browser) and network services (e.g. a web server on the internet).
Clients connect to the proxy which in turn can retrieve, cache, filter and potentially block
the information from the original server. A proxy is called transparent if all traffic goes
through it, of the client’s configuration. Non-transparent proxies hence rely on the
collaboration of the client (e.g. the proxy settings of your web browser).
Following is a list of proxies that are available on Endian Firewall. Each proxy can be
configured via the links that are in the submenu on the left side of the screen:
HTTP¶
Select Proxy from the menu bar at the top of the screen, then select HTTP from the
submenu on the left side of the screen.
Configuration¶
Click on the Enable HTTP Proxy toggle to enable the HTTP proxy (Endian UTM Appliance
uses the Squid caching proxy). Once the proxy is up and running, a number of controls
appear.
First of all, you can define the way users in each zone (GREEN and, if enabled also
ORANGE, BLUE) can access the proxy. Per zone choices are:
not transparent
the proxy server is available to anyone (no need to
log in) but you need to configure your browser
manually or tell the browser to search for a proxy
(WPAD or PAC)
transparent
the proxy server is available to anyone and no
browser configuration is needed (HTTP traffic is
intercepted and forwarded to the proxy server)
Note
Visible hostname
the proxy server will assume this as its hostname
(will also show at the bottom of error messages)
Log enabled
log all URLs being accessed through the proxy
(master switch)
Log
useragents
also log useragents, i.e. which web browsers access
the web
Log
contentfi
ltering
also log when content is filtered
Fire
wall
logg
ing
(tran
spar
ent
prox
ies
only
)
have the firewall log web accesses (transparent
proxies only)
B
y
p
a
s
s
t
r
a
n
s
p
a
r
e
n
t
p
r
o
x
y
B
y
p
a
s
s
t
r
a
n
s
p
a
r
e
n
t
p
r
o
x
y
f
r
o
m
S
U
B
N
E
T
/
I
P
/
M
A
C
specify sources that are not subject to transparent
proxying; give one SUBNET, IP address or MAC
address per line
By
pa
ss
tra
ns
par
ent
pro
xy
to
SU
BN
ET
/IP
specify destinations that are not subject to
transparent proxying; give one SUBNET or IP
address per line
Cache
manag
ement
Cache
size on
harddi
sk
(MB)
specify the amount of memory the proxy should
allocate for caching web sites on the harddisk (in
megabytes)
Cache size
within
memory
(MB)
specify the amount of memory the proxy should
allocate for caching web sites in the system memory
(in megabytes)
Maximum
object size
(MB)
specify the upper size limit of objects that should be
cached (in megabytes)
Minimum object
size (MB)
specify the lower size limit of objects that should be
cached (in megabytes)
Clear cache
if this button is clicked the cache of the proxy is
flushed.
Upstream proxy
Upstream proxy
use this option to make your Endian UTM
Appliance‘s proxy connect to another (upstream)
proxy; specify the upstream proxy as “host:port”
upstream usernam
if authentication for the upstream proxy is required
you can specify the credentials here
Username / client
forward the username / client IP address to the
upstream proxy
Authentication
Authentication rea
this text will be shown in the authentication dialog
and will be used as realm for kerberos/winbind when
joining an Active Directory Domain (use FQDN of
PDC when Windows Active Directory is used for
authentication).
Number of Authen
the maximum number of authentication processes
that can run simultaneously
Authentication cac
the time in minutes authentication data should be
cached
Number of differen
the maximum number of IP addresses from which a
user can connect to the proxy simultaneously
User / IP cache TT
the time in minutes an IP address will be associated
with the logged in user
manage users
When clicking on this button the user management
interface will be opened.
manage groups
When clicking on this button the user management
interface will be opened.
LDAP server
the IP address or fully qualified domain name of your
LDAP server
Bind DN settings
the base distinguished name, this is the start point of
your search
LDAP type
here you can choose whether you are using an
Active Directory server, a Novell eDirectory server,
an LDAP version 2 server or an LDAP version 3
server
Bind DN usernam
the fully distinguished name of a bind DN user, the
user must have permission to read user attributes
Bind DN password
the password of the user
user objectClass
the bind DN user must be part of this objectClass
group objectClass
the bind DN group must be part of this objectClass
Domainname of A
the active directory domain you want to join (use
FQDN)
Join Domain
click here to join the domain (first the authentication
settings needs to be saved and applied)
PDC hostname
the hostname of the primary domain controller
PDC IP address
the IP address of the primary domain controller
(needed to create the required DNS entries /
settings)
BDC hostname
the hostname of the backup domain controller
BDC IP address
the IP address of the backup domain controller
(needed to create the required DNS entries /
settings)
In order to be able
met: - The authen
The system clocks
name. - The PDC
RADIUS server
the address of the RADIUS server
Port
the port on which the RADIUS server is listening
Identifier
an additional identifier
Shared secret
the password to be used
Access policy¶
Source
Here you can choose the sources to which this rule
will be applied. This can be either <ANY>, a Zone, a
list of Network/IP or MAC addresses (one address
per line).
Destination
Here you can choose the destinations to which this
rule will be applied. This can be either <ANY>, a
Zone, a list of Network/IP addresses (one address
per line) or a list of domains (one domain per line).
Authentication
Here you can choose to which authenticated users
this rule should be applied. This can choose whether
you want to create a group based or a user based
rule. One or more users / groups, to which the policy
will be applied, can then be selected
Time restriction
Specify whether the rule has effect on specific days
and/or a time period.
Useragents
From this list you can choose allowed clients and
browsers.
Mimetypes
If mimetypes of incoming files should be blocked add
them to this list (one per line). Mimetypes can only
be blocked and not allowed (whitelisted), therefore
this option is only available in Deny access policies.
This allows you to block files not corresponding to
the company policy (for example multimedia files).
Access policy
Specify whether you want the rule to allow web
access or to deny it.
Filter profile
Choose antivirus scan only to create a rule which
only scans for viruses, choose content filter only to
create a rule which analyzes the content of web
pages and filters it according to the settings of the
chosen Content filter profile. If you choose
unrestricted no checks will be performed.
Policy status
Specify if the rule is enabled or disabled. Disabled
rules will not be applied.
Position
Specify where to place the new rule. Smaller
numbers have higher priority.
Content filter¶
To be able to use
which can be defin
The first is called
an advanced phra
requested URLs a
Activate antivirus
Enable both the content filter (Dansguardian) and
the antivirus proxy (HAVP).
Enable logging
Log blocked requests.
Content Filter
This section allows filter configuration based on
phrase analysis. You can block or allow a category
of sites by clicking on the icon beside it.
Subcategories are shown when clicking on the +
icon.
URL Blacklist
This section allows configuration of filtering based on
URL comparison. You can block or allow a category
of sites by clicking on the icon beside the category
name. Subcategories are shown by clicking on +
icon.
When whitelisting
google.com i
maps.google
maps.google
you will have t
Click on Save to s
Antivirus¶
Click on Save to s
AD join¶
POP3¶
Global settings
On this page you
emails. If you wan
Spam filter¶
Required hits
This option defines how many hits are required for a
message to consider it spam. The default value is 5.
Enable message d
If you want to detect spam using message digests
you can enable this option. Note that this might slow
down your POP3 proxy.
White list
Here you can whitelist sender email-addresses (one
address per line). It is also possible to whitelist whole
domains by using wildcards, e.g. *@example.com.
Black list
Here you can blacklist sender email-addresses (one
address per line). It is also possible to blacklist whole
domains by using wildcards, e.g. *@example.com.
FTP¶
Note
Only connections
be used if you have your own mail server running on your LAN (GREEN interface) or your DMZ (ORANGE
ffic (incoming and outgoing mail) can be scanned for viruses, spam and other threats. Mail will be blocked if
he need of port forwards.
Choose between:
Choose between:
il.
Choose between:
s.
whitelist a domain/IPs:
example.com
192.168.100.0/24
d in one of the blacklists, emails from it will be refused without further notice. This saves more bandwith than
at mail will be refused without the possibility to recover it. You also have no direct influence on the RBLs.
You can whitelist email-addresses or whole domains
in this textarea, e.g. test@|endian.com| or the
domain endian.com (one entry per line).
NGE zone - you need to declare the domains which will be accepted by the SMTP proxy and to which of your
asily possible to use Endian UTM Appliance as a backup MX.
isting entries can be edited and deleted by clicking on the respective icon (as described in the legend at the
d recipient address or are sent from the specified sender address.
might get problems sending mails to other mail servers. More and more mail servers check whether your IP
use a smarthost for sending emails.
s to accept your emails and relays them for you. Normally you may use your provider’s SMTP server as
hentication when sending emails. Most of all this is important for SMTP connections that are opened from the
options are:
menu bar at the top of the screen, then select DNS from the submenu on the left side of the screen.
change the settings for the DNS proxy. It is divided into three subpages.
enable the transparent DNS proxy for the GREEN, ORANGE and BLUE zones (if they are active). You can
source addresses the proxy will be bypassed in the lower left textarea. These sources can be IP addresses,
and MAC addresses (one per line). In the lower right textarea you can enter destinations for which the proxy
xtarea IP addresses and addresses of subnets can be entered. To save the settings you must click on the
add custom nameservers for specific domains. You can add a new custom nameserver by clicking on the
e server for a domain link. To change an existing entry you have to click on the pencil icon in its row. Clicking
l delete the custom nameserver in that row. The following details can be saved for custom nameservers:
The domain for which you want to use the custom
nameserver.
re¶
ge you can configure how your Endian UTM Appliance should react if a domain name has to be resolved
wn to be used by spyware. The options that can be set are:
hitelist domains
Domain names that are entered here are not treated
as spyware targets regardless of the list’s content.
Blacklist domains
Domain names that are entered here are always
treated as spyware targets regardless of the list’s
content
The settings are saved and applied by clicking on the Save button.