VMware Cloud Web Security - Web Proxy Configuration Guide
VMware Cloud Web Security - Web Proxy Configuration Guide
November 2022
Table of Contents
Overview ............................................................................................................................... 2
Perquisites............................................................................................................................. 2
SSL Termination Certificate ............................................................................................................2
SAML Provider ...............................................................................................................................5
Enabling SSO ..................................................................................................................................6
Enable Web Proxy.................................................................................................................. 8
PAC Files.............................................................................................................................. 11
Default PAC File ........................................................................................................................... 11
Custom PAC Files ......................................................................................................................... 12
1 PAC File Details ................................................................................................................................................ 13
2 Proxy and Roaming Configuration ................................................................................................................... 13
3 Default Proxy Bypass ....................................................................................................................................... 15
4 Bypass Office 365............................................................................................................................................. 17
5 Custom Proxy Bypass ....................................................................................................................................... 17
The Web Proxy Service is hosted by the VMware SASE PoP and enabled using the VMware
Orchestrator. When a user enables the Web Proxy functionality in CWS, several things happen:
Perquisites
When a user first connects to the Web Proxy, they are typically going to open their browser and
navigate to some Website. And it is highly likely that user will navigate to an HTTPS site. The
Web Proxy will need to perform an SSL intercept of this traffic and return a redirect to the
authentication service. While it is possible to instruct the user to accept the security warning it is
better to have the VMware Root Certificate installed on the endpoint. The steps required to
retrieve the root certificate and install it on a host is shown below.
2. From the top navigation bar go to Enterprise Applications > Cloud Web Security.
3. Click on the Configure tab and select Certificates > SSL Termination.
Figure: SSL Termination Certificate
4. Click on Download Certificate and save the file to the host machine.
5. (Optional) Use a utility, such as OpenSSL, to verify the downloaded root certificate has
not been tampered with during transmission. This is done by computing the certificate
fingerprint and comparing against what is shown in Orchestrator. For testing purposes,
this step can be optional, but in production environments this should not be skipped.
Installation on Host(s)
The following external links provide instructions on how to install a private root certificate on
common endpoint devices:
• Microsoft Windows
• Apple OS X
• Apple iOS
• Android
Alternatively, a root certificate can be installed at the browser level. This is useful for testing
purposes, but not recommended for production use. The following external links provide
instructions on how to install a private root certificate on popular Web browsers:
• Google Chrome
• Mozilla Firefox
SAML Provider
A SAML provider is necessary to authenticate users to the Cloud Web Security Proxy service.
This requirement ensures only authenticated users are connected to Cloud Web Security and
provides operational insight into the activity of those using the Web proxy.
Okta Example
The following example is based on using Okta as the identity provider (IdP) for Cloud Web
Security. The first screenshot highlights three key pieces of information that are used, after
creating a custom application in Okta for Cloud Web Security, to enable the integration.
• Location – This is the single sign on (SSO) URL provided by the IdP for the defined
SAML application. In this case, that application is Cloud Web Security.
• EntityID – The EntityID or “Issuer” is part of the verification process for validating the
IdP.
• Certificate – This is the x.509 certificate the IdP is used to authenticate and authorize the
SAML service.
Enabling SSO
Integrating the IdP requires you to input the information about into CWS. To do this, navigate to
Cloud Web Security > Certificates > Authentication. There you must accomplish several
tasks:
After you have set these attributes be sure to Save Changes. The Save Changes button will
appear on the bottom right of the screen.
To finish the configuration, you must provide Cloud Web Security with the IdP certificate.
• Edit Certificate – Copy & paste the Certificate information from the IdP here
o When you click this button, a modal will pop-up
o Click the Show Certificate drop box to reveal where you will paste in the
certificate
o When done click Save
Figure: Insert IdP Certificate in Cloud Web Security
After you have set these attributes be sure to Save Changes. The Save Changes button will
appear on the bottom right of the screen.
From the Web Proxy Configuration page, you must first enable the web proxy service. This is
done by clicking the toggle button beside Enable Web Proxy. This will change the setting from
Inactive to Active. Finally, click Save.
Figure: Web Proxy Inactive
Once the service has been activated you will receive a notification and see several fields change
on the Web Proxy Configuration page.
• Proxy URL – This is an autogenerated URL that compromises a unique user identifier
(UUID) followed by cwsproxy.gsm.vmware-test.net and the port number 3129. For
manual proxy configuration on a host, this will be the URL and port you will need to
supply to the system.
• Proxy Mode – There is only one available proxy mode for Cloud Web Security. This
mode requires the use of SSL and SSO to connect to the proxy service.
• Select Cloud Web Security Policy – Upon activation of the Web Proxy service no
security policy is set. Although the Web Proxy is useable in this state it does not offer any
security. If you have not defined a Cloud Web Security Policy do so. It will be selectable
from the drop-down menu and applied to all Web Proxy users.
After your Cloud Web Security Policy is associated you will be prompted to Save the
configuration.
Figure: Saving a Complete Web Proxy Configuration
At this point you are now ready to begin securing remote users with the Cloud Web Security
Web Proxy
PAC Files
CWS provides a default PAC file when the Web Proxy Configuration is enabled. You are also
able to create custom PAC file(s) based on your organization’s exact needs and desired behavior
when connecting to the service. You can find the PAC Files settings by navigating to Cloud
Web Security > Access Method > Web Proxy > PAC Files.
Simply click the Check Box by the line of the Default PAC File and select PREVIEW to see its
contents in Orchestrator.
While you do not need to concern yourself with creating the exact syntax, as the built-in wizard
will guide you through PAC file configuration, it is useful to understand the directives in the file.
For example, if a matching block instructs the client to send the traffic DIRECT that means any
traffic to those destinations will not go through the proxy. This is useful for several reasons. And
traffic that is meant to go to the proxy will have the PROXY directive in its return statement. It
could also have both PROXY followed by DIRECT. This means that if the proxy is
unavailable, that traffic would still be permitted to go to the Internet.
To launch the PAC file creation wizard simply click + NEW PAC on the PAC Files
configuration page and follow the steps in the wizard.
Figure: Launch New PAC File Wizard
Fill in the details and click NEXT to proceed to the next step.
Options include determining if clients should or should not be allowed to the Internet if the proxy
is inaccessible. Or, if the client is behind a corporate network should it use the corporate
network’s Internet access or be redirected to an on-premises proxy server.
This section contains smart defaults to enable easy bypasses of domains and subnet/IPs that
should not be sent to the Web proxy. However, your organization may desire to send Netflix
traffic to the Web proxy as part of your security posture. You can simply toggle on or off the
domains that should be allowed or bypassed from proxy. The subnet/IP entries in this section are
fixed since these are all non-routable IPs that will otherwise fail to reach a destination when sent
to the Internet.
Figure: Toggle Allowed/Disallowed Domains
Microsoft Connectivity Principles recommend bypassing their endpoints from Web Proxy or
SSL Inspection services. Microsoft encourages their customers to access their services direct
over the Internet. This section allows for easy bypass of Microsoft 365 domains. Additionally,
you can include your organization’s specific tenants in this configuration pane.
• Bypass Office 365: Allowed simply means these domains will be added to the PAC file
to be bypassed.
• Tenants: Gives you the option to specific your company specific subdomains provided
by Microsoft.
At this point you are given full flexibility to dictate which domain(s) and subnet/IP(s) will be
exempted from being sent to the Web proxy.
• DOMAIN
o + ADD RULE: This will create a rule entry in the table for you. Here you can
enter a valid domain. Click ‘+ ADD RULE’ each time you need to add a new
entry.
o DELETE: This provides the mechanism to remove a domain that was entered
incorrectly or no longer to be bypassed when updating the configuration.
Figure: Add Domain(s) to Custom Proxy Bypass Option
• SUBNET/IP
o + ADD RULE: Like domain, this provides an entry row for the IP information.
Here you will need to provide either the network address (subnet) or the IP
address (host) and the appropriate subnet mask value.
o DELETE: Like domain, this is used to remove erroneous entries or update
existing configuration files.
When done click FINISH to create your PAC file and begin using it.
Host Configuration
A host can be configured with manual or automatic proxy settings. The distribution of these
configurations will most likely be performed with Microsoft Group Policy Objects (GPO) or
Mobile Device Management (MDM) platforms like Workspace ONE. However, it is necessary
to understand provisioning methodologies to ensure the correct configuration is added on all
devices.
A host can be configured manually or automatically. The manual configuration requires the
administrator to specify the proxy URL and port that Web browser traffic should be redirected
towards. Additionally, manual entry of domains and endpoints pass might be required to ensure
correct operations. The automatic method relies on the availability of a PAC file the system can
reference to download its proxy settings.
Ubuntu
The following is a simple example highlighting the manual and configuration on an Ubuntu
Desktop host. The general concepts shown here apply to Windows, macOS, Android, and iOS
devices. Links to product specific documentation are provided in those sections.
Click on the Show Applications button and select Settings.
Figure: Navigating to Ubuntu Desktop Settings
Once in the Settings pane click on Network if not already there. Here you can click the Cog
Wheel to turn proxy settings on manually, automatically, or off.
For manual configuration, you will need to retrieve the URL + Port information from Cloud Web
Security. Return to Cloud Web Security > Configure > Access Methods > Web Proxy > Web
Proxy Configuration and highlight and copy the URL.
Figure: Copy Proxy URL
Then paste the URL into the HTTP Proxy and HTTPS Proxy field. Next, set the port to 3129
for both rows. You can copy and paste this from Cloud Web Security or type it in manually.
Please be aware that for SSO to work you will need to bypass the domains associated with
your identity provider. The example below shows three domains related to Okta. Additional IdP
domains are provided below. If you do not see your IdP please consult their product
documentation to determine which domains will need to be exempted from the proxy.
• Okta
o *okta.com, *oktapreview.com, *oktacdn.com
• Workspace ONE Access
o *vidmpreview.com
• Azure Active Directory
o login.microsoftonline.com
o sts.windows.net
o microsoftonline-p.com
o msauth.net
o msftauth.net
When finished click the X icon in the upper right-hand corner to apply the settings.
Figure: Paste Proxy URL and Enter 3129 Port Number
At this point you should be able to launch your Web browser and see the Cloud Web Security
login page. Please note that if you see a warning page stating that “Your connection is not
private” it is likely you have not installed the SSL Termination Certificate. You can either
follow the steps to install the certificate or accept the warning and proceed to the Cloud Web
Security login page.
Figure: Cloud Web Security Proxy Login Page
Once you are satisfied with the manual proxy configuration, convert the host to use the Web
Proxy Auto-discovery (WPAD) file. The WPAD file is a more robust set of instructions that are
downloaded and automatically set on the host.
You will need to return to Cloud Web Security > Configure > Access Methods > Web Proxy
> PAC Files. From here, you can use the Copy button beside any PAC file that is present in the
system.
Now, return to the host and change the proxy settings to Automatic and paste the copied URL
into the field. Click X to close the dialog box and apply the settings.
Windows
Consult the product documentation to see how to configure these settings on a Windows system
here.
macOS
Consult the product documentation to see how to configure these settings on a macOS system
here.
Android
Consult the product documentation to see how to configure these settings on an Android system
here. The included reference is for a Google Pixel phone. You may need to search for your
specific model if the options are not the same.
iOS
Consult this how to guide to see how to configure these settings on an iOS system here.
Troubleshooting
As stated in the pre-requisite checklist, SSO must be enabled before you are able to setup the
Web Proxy. If you see the message bar stating, you need to “Enable SSO” please refer to the
perquisites in this document.