SWG Admin 2303 b1 SG
SWG Admin 2303 b1 SG
Student Guide
PN: SWG-1126-SG1
Skyhigh Security is a registered trademark of Musarubra US LLC. Other names and
brands are the property of these companies or may be claimed as the property of
others. Copyright © 2022. March 2022
Table of Contents
i
ii
Secure Web Gateway Administration for On
Premise Appliances
Module 1: Welcome
1
Introductions
Introductions
Name
Responsibility
Product experience
Expectations
Welcome to the Secure Web Gateway Administration for On Premise Appliances course. This first
module provides an overview of course design, logistics, and helpful resources, as well as
provides the opportunity for the instructor to learn about you and your training expectations.
2
About the Course
Design, Document, and Implement Use Cases
Through lecture, hands-on labs, and class discussions, you will learn use case methodology
and create use cases to gain better visibility to your environment, protecting and limiting
exposure to threats and vulnerabilities.
Prerequisites:
Working knowledge of Windows and system administration, network technologies
Basic understanding of computer security, command line syntax, malware/anti-
malware, virus/anti-virus, and web technologies
Resources:
Student and Lab guides
Virtual lab environment
Course evaluation
Prerequisites:
Working knowledge of Windows and system administration, network technologies
Basic understanding of computer security, command line syntax, malware/anti-malware,
virus/anti-virus, and web technologies
• Resources:
• Student and Lab guides
• Virtual lab environment
• Course evaluation
3
Course Objectives
After completing this course, you will be able to:
Compare Secure Web Gateway for On Premise
Appliances concepts, identify Web Gateway appliances
and their features, and describe the Web Gateway
component architecture.
Recognize effective navigation of the Secure Web
Gateway for On Premise Appliances dashboard and
create custom data views.
Review how to make rules, rule sets, lists and related
components according to analysis, identify events for
immediate action, delayed action or no action, and
perform solution’s operation and performance analysis to
maximize the usefulness of Secure Web Gateway for On
Premise Appliances output.
4
Time and duration:
Course Agenda
Start time: 9:00 A.M.*
End time: 5:00 P.M.*
Day 1 Duration: 4 days
* May vary.
1 Welcome 80 minutes
3 Planning 45 minutes
4 Installation 80 minutes
5
Time and duration:
Course Agenda
Start time: 9:00 A.M.*
End time: 5:00 P.M.*
Day 2 Duration: 4 days
* May vary.
6
Time and duration:
Course Agenda
Start time: 9:00 A.M.*
End time: 5:00 P.M.*
Day 3 Duration: 4 days
* May vary.
15 Logging 60 minutes
7
Time and duration:
Course Agenda
Start time: 9:00 A.M.*
End time: 5:00 P.M.*
Day 4 Duration: 4 days
* May vary.
8
Acronyms and Terms in this Course
Secure Web Gateway for On Premise Appliances (SWG)
• APAC: Asia and Pacific ▪ MTA: Mail Transfer Agent
• CLI: Command Line Interface ▪ MTU: Maximum Transmission Unit
• DHCP: Dynamic Host Configuration Protocol ▪ MWG: McAfee Web Gateway
• DNS: Domain Name Server ▪ SWG: Secure Web Gateway
• EMEA: Europe, Middle East and Asia ▪ NTLM: New Technology LAN Manager
• Trellix ePO: Trellix ePolicy Orchestrator ▪ NTP: Network Time Protocol
• FTP: File Transfer Protocol ▪ Regex: Regular Expression
• HA: High Availability ▪ SMTP: Simple Mail Transfer Protocol
• HTML: Hypertext Markup Language ▪ SNMP: Small Network Management Protocol
• HTTP: Hypertext Transfer Protocol ▪ SSH: Secure Socket Shell
• HTTPS: Hypertext Transfer Protocol – Secure ▪ SSL: Secure Socket Layer
• ICAP: Internet Content Adaptation Protocol ▪ TCP: Transmission Control Protocol
• IP: Internet Protocol ▪ URL: Uniform Resource Locator
• LAN: Local Area Network ▪ VRRP: Virtual Router Redundancy Protocol
• LDAP: Lightweight Directory Access Protocol ▪ WCCP: Web Cache Communication Protocol
• TEG: Trellix Email Gateway ▪ Webwasher: Former name of Web Gateway
• MLOS: McAfee Linux Operating System ▪ WPAD: Web Proxy Autodiscovery Protocol
9
Service Portal
Single point of access to valuable
resources and tools
Knowledge Center: Search for
documentation, technical articles,
and other resources for your
products.
Patches and Downloads: Obtain
patches, hotfixes, and product
downloads as well as manage
product licenses.
Support Tools: Run Virtual Technician
or other diagnostic tools to help
solve problems.
Customer Community: Collaborate
and engage in ongoing
conversations with other product
users.
https://supportm.trellix.com
10
Skyhigh Security Cloud Hub
Online document repository for Skyhigh Security Cloud
The Skyhigh Security Cloud Hub menu is organized by functional area to assist with finding
information about performing procedures in specific parts of the Skyhigh Security Cloud
product.
11
Skyhigh Security SNS
The Skyhigh Security Support Notification Service (SNS) is a communication service.
It provides timely information by email to corporate customers, partners, and
employees who subscribe to the service. SNS communications help you maximize
the functionality and protection capabilities of your Skyhigh Security products.
To receive SNS communications, you must subscribe and select your products from
the SNS Subscription Preference page at:
https://www.trellix.com/en-us/contact-us/sns-preferences.html
The Skyhigh Security Support Notification Service (SNS) is a communication service. It provides
timely information by email to corporate customers, partners, and employees who subscribe to
the service. SNS communications help you maximize the functionality and protection
capabilities of your Skyhigh Security products.
To receive SNS communications, you must subscribe and select your products from the SNS
Subscription Preference page at:
https://www.trellix.com/en-us/contact-us/sns-preferences.html
To receive Alerts or Notifications about Secure Web Gateway, select Skyhigh Security Secure
Web Gateway under SNS Product option.
12
Lab Environment
Network 1
Network 2
WRK3
LAB
This course uses a virtual environment technology to provide the required resources for your lab.
The table highlights IP addressing, users, and passwords for your virtual machines (VMs). All labs
are to be performed on the virtual machines not the physical host systems. The lab instructions
highlight the required VM systems and lab files.
• WRK1: Use this machine to access the Web Gateway user interface and browse to websites to
test Web Gateway.
• WRK2: This Widows machine will be used in the ATD lab.
• EPO: This is the server that hosts the ePO software. You will use for reporting and to see how
Web Gateway and ePO interact. You will connect to the ePO interface using a browser from
the client machine and will not be required to connect to this machine directly.
• PDC: This machine hosts Domain Control, DNS, e-mail server, and some of the reporting
features. Students should not be required to connect to this machine directly.
• SWG1: This is a Web Gateway virtual appliance. This machine is a clean install of the Web
Gateway software right before initial configuration.
• SWG2: This is a Web Gateway virtual appliance.
• ATD: This is the server that hosts the ATD software. You will log on to the GUI during the ATD
integration lab.
13
Using the Lab Guide
The Lab Guide Provides
Classroom lab setup
User credentials
Lab exercises
Goals and durations
Scenario at the beginning of each lab
Detailed steps to complete the lab
Access to required systems and files
14
Lab Exercises
Lab 1: Access the Lab Environment
Goals:
Start your virtual machines and verify that your lab environment is
ready to use.
Duration:
15 minutes*
The labs for this course are included in a separate lab guide. Each lab lists the lab goals,
required systems, and any files needed to complete the lab; for example, text files or
executables. At the top of each lab, there is a scenario. The scenario often contains the
information needed to complete the lab. Beneath each scenario, there are detailed steps. The
steps are supplied as a resource, in the event you need additional information to complete the
lab.
Note: The steps will vary depending on if your lab environment is local- or cloud-based.
15
Skyhigh Security is a registered trademark of Musarubra US LLC. Other names and brands are the property
of these companies or may be claimed as the property of others. Copyright © 2022. March 2022
16
Module 2: Solution Overview
1
Module 2 Objectives
• Describe the Secure Web Gateway for On Premise Appliances solution and its key features
• Identify new features and enhancements for this release.
• Identify the components in a basic deployment architecture.
• Explain how Secure Web Gateway for On Premise Appliances works.
2
Challenges of Effective Web Security
Three Primary Challenges
When we look at the security landscape, we see three primary challenges our customers face
in the area of web security.
First, security teams simply can’t keep up with the growing quantity and sophistication of
malware that comes through everyday access to the internet. Traditional web security
defenses such as URL filtering and antivirus simply do not detect new threats, resulting in high
remediation costs for compromised endpoints, and often data loss that can be devastating for
an organization.
Second, web security deployments, along with most other security solutions in the past have
not shared information with each other or cannot learn from external sources. This results in an
inefficient security practice that often results in compromise – even when another security
solution may have had the information that could have stopped an attack.
Last, employees today access the internet from an array of devices and locations. Many of
them are accessing the internet from outside the corporate network and do so unprotected.
Extending security to every device and location has proven to be expensive, challenging, if not
impossible for many security teams.
3
Introducing Skyhigh Web Protection
Deployment
Security Controls Flexibility
Advanced protection from Security controls across on- Flexible deployment options
zero-day and known threats network and off-network web support every network -
Comprehensive signature- access. physical, virtual, and cloud.
based antivirus protection Rules-based engine for policy Available both as on-premise
with real-time lookups flexibility and control. hardware or virtual appliances
Leverages Global Threat Pre-built rules library with deployment as well as multi-
Intelligence (GTI) file common policy actions. tenant secure web gateway
reputation and web Cloud application controls to cloud service with global spread
categorization. manage or restrict access of data centers.
Patented approach to zero- using business criteria, such as Central Management for cluster
day malware prevention application risk or user profile. and high availability mode
through behavioral analysis. supported.
Skyhigh Client Proxy available
for end point traffic redirection
to appliances or the cloud
service.
Skyhigh Web Protection offers Security, Controls and Deployment Flexibility for enterprise
security.
Security
• Skyhigh Web Protection layers numerous threat detection technologies to provide
advanced protection from zero-day and known threats.
• Provides comprehensive signature-based antivirus protection with real-time
lookups.
• Leverages Global Threat Intelligence (GTI) file reputation and web categorization.
• Patented approach to zero-day malware prevention through behavioral analysis.
Controls
• Skyhigh Web Protection extends security controls across on-network and off-network
web access. Rules-based engine for policy flexibility and control.
• Pre-built rules library with common policy actions.
• Cloud application controls to manage or restrict access using business criteria, such
as application risk or user profile.
Deployment Flexibility
• Flexible deployment options support every network - physical, virtual, and cloud.
• Available both as on-premise hardware or virtual appliances deployment as well as
multi-tenant secure web gateway cloud service with global spread of data centers.
• Central Management to synchronize configuration (policy) between two or more
Secure Web Gateway for On Premise Appliances appliances and high availability
mode supported.
• Skyhigh Client Proxy available for end point traffic redirection to appliances or the
cloud service.
4
Skyhigh Web Protection Solution Features
Rule
eP
Identify all cloud applications Application SSL
Gain visibility into encrypted
including shadow IT, then control Visibility Scanning traffic and prevent hidden
both access and functionality and Control threats
Engine
Control regulated data with Data Anti- Stop both known and zero-day
Protection Malware
pre-built dictionaries and malware before it reaches its
encryption for cloud storage target
Outbound Traffic
Inbound Traffic
Skyhigh Web Protection is a robust web security solution built for the most demanding
enterprise environments. Let’s quickly walk through the key areas of the base solution to show
how it processes web traffic with multiple layers of security.
• First, for the inbound flow of traffic, it runs extensive content inspection, reputation analysis
and site categorization, plus a variety of file filtering techniques to block malicious or
undesired content.
• Next, with more websites and cloud apps using SSL encryption, it is more critical than ever to
have the capability to inspect that traffic. This allows identification of malware and
enforcement of application controls within encrypted traffic that otherwise the organization
would be completely blind to.
• Skyhigh Web Protection has full visibility into all traffic, including SSL, and runs both
signature-based and zero-day malware detection with very high detection rates.
• Skyhigh Web Protection complements your existing DLP practice with built-in dictionaries to
detect PII, PCI, PHI, and more data attempting to leave the organization via web traffic.
• Cloud applications add risk to the protection of corporate data. Skyhigh Web Protection
provides over 1,500 application controls to decide where data can be uploaded, what users
can do on social networks, and more.
• Lastly, web security cannot exist in a silo and is a critical element to a broader security
architecture. Through integration to Skyhigh Endpoint Security, malware sandboxing, SIEM,
and more, Skyhigh Web Protection can increase the efficacy with which threats can be
prevented and improve the efficiency of security operations.
5
New/Enhanced Features for this Release
Web Gateway 11.2.X
6
What's new in update 11.2.5
Enhancements have been introduced as follows in this release.
•Skyhigh Rebranding Changes
•Icons, and logos are rebranded from McAfee to Skyhigh Secure Web Gateway.
6
Skyhigh Web Protection Components
• Globally available, true • On premise hardware • End user transparent • ePO embedded
multi-tenant secure or virtual appliances and tamper resistant reporting solution for
web gateway cloud • Unmatched flexibility end point client that Internet usage
service for policy redirects traffic to trending and policy
• Ability to filter web configuration to adopt appliances or the enforcement reporting
traffic without enterprise business cloud service
deploying hardware goals and principle • Performs end user
on premise and model these into authentication and
• Allows to connect an Internet access allows fully enforced
branch office directly and security policy scanning of web
using IPsec • Ability to also manage traffic
• Can be managed Web Gateway Cloud • Available on Windows
from the appliances in Service in a hybrid Desktop, Server and
a hybrid deployment deployment scenario macOS
7
Integrations
Management, Monitoring, Reporting and Threat Information Sharing
SWG on Cloud
SWG on
Cloud
ePO Skyhigh Security Cloud
8
Trellix Global Threat Intelligence
Web Gateway leverages the Global Threat Intelligence (GTI) web reputation technology.
SWG offers expanded cloud-based reputation capabilities that now include geo-location,
enabling geographic visibility and policy management based on the web traffic’s
originating country.
Skyhigh Security Cloud
Web Gateway integrates with Skyhigh Security Cloud for the purposes of Shadow IT.
Trellix Security Information and Event Management
Enterprise Security Manager (ESM) is a high-performance, powerful security information
and event management solution combines event, threat, and risk data together to provide
strong security intelligence, rapid incident response, seamless log management, and
compliance reporting.
9
Management Interface
Organized by Pages
Policy: Configure and manage web security policies for your network.
The user interface allows you to work with rules, lists, settings, accounts, and other items for
administering Web Gateway. It provides information on key filtering and system parameters
and enables you to perform troubleshooting measures. The menu bar at the top of the page is
used to access the pages used for initial configuration and ongoing management.
• Dashboard: Shows key information on the appliance system and activities. This lets
you see the system operation, briefly.
• Policy: Used to configure and manage web security policies for your network. The
foundation of this is rules, which control web filtering and authentication. A variety of
rule types are available, which you can implement and modify to let them suit the
needs of your network.
10
Accounts: Used to add and manage internal administrative accounts and roles. You can
add administrator accounts to the account that is created by the appliance system at the
initial setup. The administrator role settings are used for configuring roles that can be
assigned to administrators. Optionally, you can let administrator accounts be managed on
external authentication servers and map externally stored user groups and individual users
to roles on an appliance.
Troubleshooting: Web Gateway provides troubleshooting tools and functions, which are
your first level of support. These include packet and rule tracing, the creation of core files to
record memory content after terminated operation, restart tool, the display of anti-malware
scanning threads, and backup and restore.
11
Knowledge Check
12
Check your learning
Multiple choice: Choose the correct answer.
A. True
B. False
13
Check your learning
Multiple choice: Choose the correct answer.
14
Review
Skyhigh Web Protection offers Security, Controls and Deployment Flexibility for
enterprise security.
Offers physical, virtual and cloud deployments.
Provides inbound and outbound security for web traffic.
Skyhigh Web Protection has full visibility into all traffic, including SSL, and runs both
signature-based and zero-day malware detection with very high detection rates.
Web Protection components include Web Gateway, Web Gateway Cloud Service,
Skyhigh Client Proxy and Content Security Reporter.
Optionally integrates with other Skyhigh products for unified management,
monitoring, reporting, and threat-information sharing.
• Skyhigh Web Protection offers Security, Controls and Deployment Flexibility for enterprise
security.
• Offers physical, virtual and cloud deployments.
• Provides inbound and outbound security for web traffic.
• Skyhigh Web Protection has full visibility into all traffic, including SSL, and runs both
signature-based and zero-day malware detection with very high detection rates.
• Web Protection components include Web Gateway, Web Gateway Cloud Service, Skyhigh
Client Proxy and Content Security Reporter.
• Optionally integrates with other Skyhigh products for unified management, monitoring,
reporting, and threat-information sharing.
15
Skyhigh Security is a registered trademark of Musarubra US LLC. Other names and brands are the property
of these companies or may be claimed as the property of others. Copyright © 2022. March 2022
16
Module 3: Planning
1
Module 3 Objectives
2
Planning Overview
Checklist
Business requirements
Deployment type
System requirements
Deployment plan
Other considerations
3
Business Requirements
Identify Required Policies and Related Features/Applications
• Deployment type
• File load
• Access control
• Data loss prevention Data loss
prevention
• Central Management
• Reporting
• Integration Reporting User roles and controls
First, identify your business requirements or objectives. This includes policies, controls, and
other features.
If advanced malware protection is desired, implement Trellix Advanced Threat Detection (ATD).
The ATD solution provides static and dynamic malware analysis.
4
Deployment Types
Flexible Deployment Options
SWG Deployments
AWS or Azure
Physical appliance Virtual appliance Blade Server
platforms
• In addition, you can install Web Gateway software on a Blade Server or on the Cloud using
Microsoft Azure or Amazon Web Services.
• The solution requirements will vary depending on the type and number of Web Gateway
appliances you plan to deploy.
5
System Requirements
Physical Appliance
Web Gateway runs on a customized Trellix Linux Operating System (TLOS) which is a
proprietary operating system hardened to support Skyhigh products.
The newer hardware models include:
• WBG-4500-D
• WBG-4500-E
• WBG-5000-D
• WBG-5500-D
• WBG-5000-E
• WBG-5500-E
The older models include:
• WBG-4500-C
• WBG-5500-C
• WBG-5500-C
6
System Requirements
Physical Appliance
D- series
specifications
https://www.trellix.com/enterprise/en-us/assets/technical-specifications/ts-web-gateway-d-
model-appliance-specifications.pdf
7
System Requirements
Physical Appliance
E- series
specifications
https://success.myshn.net/@api/deki/files/39191/Secure_Web_Gateway_Model_E_Appliance
s_Hardware_Specification_Sheet.pdf?revision=1
8
System Requirements
Model WBG-4500-D
Name assigned to
Position Interface port on interface
WBG-4500-D appliance model has six network interfaces, a serial interface, and an RMM
interface on its rear panel.
The network interfaces include two onboard interfaces and four interfaces on a built-in IO
module on the lower right of the panel.
9
System Requirements
Model WBG-5000-D and
WBG-5500-D
Name assigned to
Position Interface port on interface
The WBG-5000-D and WBG-5500-D models use the same hardware platform, which has six
network interfaces, a serial interface and an RMM interface on its rear panel.
10
System Requirements
Model WBG-4500-E
Name assigned to
Position Interface port on interface
1 RMM
For operating the Remote Management Module (RMM) with Baseboard
Management Controller (BMC)
2 Network interface 1 eth2
3 Network interface 2 eth0
4 Network interface 3 eth3
5 Network interface 4 eth1
6 Network interface 5 eth5
7 Network interface 6 eth4
This appliance model has six network interfaces and an RMM interface on its rear panel.
The network interfaces include four onboard interfaces and two on a network interface card
that is preinstalled in a card slot on the upper right.
11
System Requirements
Model WBG-5000-E and
WBG-5500-E
Name assigned to
Position Interface port on interface
WBG-5000-E and WBG-5500-E appliance models use the same hardware platform, which has
six network interfaces, a serial interface, and an RMM interface on its rear panel.
The network interfaces include two onboard interfaces, two interfaces on a built-in IO module
on the lower right, and two on a network interface card that is preinstalled in a card slot on the
upper right.
Four more network interfaces can be added on a network interface card that is installed in the
other card slot on the panel. This will increase the number of network interfaces to ten. You
must purchase this card on your own and install it.
12
System Requirements
Virtual Appliance
No = Not recommended
Yes = Recommended
Yes* = ESXi 6.7 update 1 is recommended for the MWG 8.0.1 controlled release and later 8.x.x releases.
With this deployment, Web Gateway software is installed on a virtual machine that is hosted by
a system.
For more information, see the Web Gateway installation guide or Technical Article KB85908
Recommended VMware versions for Web Gateway.
13
System Requirements
Amazon Web Services Environment
Prior to installation on AWS environment, you will need:
AMI ID
Region
AWS account number
AWS instance depends on what you plan to use the Web Gateway instance for, for example, testing or
production, account network performance and the number of NICs that you plan to run with the instance.
AWS instance depends on what you plan to use the Web Gateway instance for, for example,
testing or production, account network performance and the number of NICs that you plan to
run with the instance.
14
System Requirements
Azure Environment
Prior to installation on Azure
environment, you will need:
Azure account
Windows, Linux, or Mac system
with:
2 GB of free disk space
(minimum)
Most recent version of the
Azure command line
interface
AzCopy
Azure Web Gateway does not support
Proxy HA, Transparent Bridge and
Transparent Router modes of
deployment.
Azure Web Gateway does not support Proxy HA, Transparent Bridge and Transparent Router
modes of deployment.
15
System Requirements
Blade Server
A blade server is a modular server that is itself installed in a blade system
enclosure. A blade system enclosure that has blade servers installed is referred to
as a blade server system.
To run Web Gateway on a blade server, you must install the blade system enclosure with the
blade servers. A blade system enclosure that has blade servers installed is referred to as a
blade server system.
Hewlett-Packard provides blade servers for Web Gateway. For a detailed description of how to
install a blade server system, refer to the Hewlett-Packard documentation.
16
Deployment Port Requirements
Ports Required for Communication with External Services
https://success.myshn.net/Skyhigh_CASB/Skyhigh_CASB_Sanctioned_Apps/Skyhi
gh_CASB_for_Salesforce/Configure_Salesforce_Proxy/Deployment_and_Network
_Requirements
17
Open Port Requirements
Ports required for communication with External Services
Application
Port Direction Transport Protocol Destination Use Note
Protocol
22 Inbound TCP SSH Local Admin secure shell
161 Inbound TCP/UDP SNMP Local SNMP
1080 Inbound TCP SOCKS Local SOCKS proxy
1344 Inbound TCP ICAP Local ICAP
Passive FTP data From FTP client to
2000–20000 Inbound TCP FTP Local
connection SWG
2121 Inbound TCP FTP Local FTP control port
4005 Inbound TCP IFP Local IFP
4711 Inbound TCP HTTP Local Admin UI Also REST if enabled
4712 Inbound TCP HTTPS Local Admin UI Also REST if enabled
4713 Inbound TCP HTTP Local File server
4714 Inbound TCP HTTPS Local File server
5050 Inbound TCP Yahoo Local Yahoo proxy
5190 Inbound TCP ICQ Local ICQ proxy
5222 Inbound TCP XMPP Local XMPP (Jabber) proxy
9090 Inbound TCP HTTP Local HTTP(S) proxy
Intel Active System
9393 Inbound TCP HTTPS Local
Console
16000–17000 Inbound UDP Local SOCKS UDP relay
Active FTP data From FTP server to
20001–40000 Inbound TCP FTP Local
connection SWG
520 Bidirectional UDP RIP Your RIP routers IP routing
18
Open Port Requirements (Continued…)
Ports required for communication with External Services
Transport
Port Direction Application Protocol Destination Use Note
Protocol
SWG cluster
12346 Bidirectional TCP Proprietary Your SWG appliances
communication
WCCP and traffic
Your SWG appliances/WCCP
Bidirectional IP Protocol 47 GRE tunneling between
routers
SWG nodes
Bidirectional IP Protocol 89 OSPF Your OSPF routers IP routing
Bidirectional IP Protocol 112 VRRP Your SWG appliances VIP failover
21 Outbound TCP FTP Arbitrary FTP servers File transfer protocol Active and passive
25 Outbound TCP SMTP Your email server Email notifications
Domain name
53 Outbound TCP/UDP DNS Your DNS server
system
appliance1.webwasher.com,
80 Outbound TCP HTTP System update
appliance2.webwasher.com
Other ports
80, 443 Outbound TCP HTTP(S) Arbitrary HTTP(S) servers User HTTP(S) traffic depending on
configuration
19
Open Port Requirements (Continued…)
Ports required for communication with External Services
Transport Application
Port Direction Destination Use Note
Protocol Protocol
162 Outbound TCP/UDP SNMP Your SNMP trap sink SNMP traps
Directory service/Active
389 Outbound TCP LDAP Your directory servers
Directory
GTI Cloud lookups
tunnel.web.trustedsource.org (Reputation, Categories,
443 Outbound TCP HTTPS
(default; can be configured) Geo Location, File
Reputation)
tunnel.web.trustedsource.org GTI Telemetry (Malicious
443 Outbound TCP HTTPS
(default; can be configured) URL Feedback)
514 Outbound TCP/UDP Syslog Your Syslog servers Syslog
Secure directory/Active
636 Outbound TCP LDAP Your directory servers
Directory
1344 Outbound TCP ICAP Your ICAP servers ICAP
2020 Active FTP data From SWG to FTP
Outbound TCP FTP Local
(Source) connection client
Communication between
8883 Outbound TCP DXL Connection to the DXL broker SWG and DXL broker
installed on ePO
For user traffic and
various internal
Your proxy
Outbound TCP HTTP Your parent proxies HTTP proxy connections (AV
ports
update), configured
individually
20
Web Security Licenses
Determine Available Features and Functionality
Skyhigh Web Security, Gateway Edition license:
• Category-based filtering, reputation-based web filtering,
and Trellix Anti-Virus software
• SSL scanning, caching, content and authentication • Downloaded from
controls
https://contentsecurity.skyhi
Trellix Web Anti-Malware, Gateway Edition: gh.cloud
• Add-on license for signature-based, anti-virus engine for
known malware • Purchased and
evaluation licenses are
• Intent analysis for blended attacks and unknown traffic
available
with malicious content and deep content inspection
Other licensing arrangements
• See Technical Article
• reverse https proxy KB73701 for FAQ about
licensing
• ICAP
• Pure ATD deployments
Web Gateway protections are enabled through a choice of licensing options. The Skyhigh Web
Security, Gateway Edition license combines the accuracy and breadth of category-based
filtering with reputation-based web filtering and Trellix Anti-Virus software to provide
bidirectional web security. The Skyhigh Web Security license also includes SSL scanning,
caching, content and authentication controls.
The Skyhigh Web Anti-Malware, Gateway Edition add-on software license gives you an
additional signature-based anti-virus engine for known malware along with the in-depth intent
analysis of our proactive security filters to detect blended attacks and unknown traffic with
malicious content. Deep content inspection makes sure that malware is reliably detected even
if hidden deep in compressed or spoofed files.
After a purchased license expires, you cannot download updates for the filtering engines, but
you may continue to use the rule engine and filter traffic. In addition, Web Gateway will still
serve requests
After an evaluation license expires, you cannot download updates and filtering no longer works.
In addition, Web Gateway no longer serves requests.
21
Proxy Design
Considerations
• Explicit or transparent?
• High availability?
If allowed by the filtering rules, the appliance uses its proxy functions to intercept web traffic
and transmit it. Some design considerations include:
22
Proxy Overview: Explicit vs. Transparent
Methods to Deliver Web Content to Users
As a review, there are two main methods of delivering web content to users: through a
transparent proxy or an explicit proxy. Do you know the difference?
23
Explicit Proxy
Trust Relationship
Web Gateway
Website
With an explicit proxy, the client connects to its web proxy server depending on browser proxy
settings and delivers the HTTP GET request with the client’s configured headers.
The proxy server makes a separate connection to the destination web server and sends an
HTTP GET request; this request does not have to be identical to the clients GET request.
The web server sends the website back to the proxy where it is inspected. The proxy then sends
the website back to the client.
24
Proxy High Availability (HA)
Explicit Proxy with Failover Functions
• Recommended for smaller networks or
locations/offices within a larger
deployment (up to 1000 Web Gateway Secondary
users). Active Director/
Director/
Scanner Scanner (s)
• For larger networks, external load
balancing is recommended. Virtual IP
Websites
When higher priority director fails, secondary assumes virtual IP and continues passing
traffic.
State is not preserved, but Web Gateways can still synchronize authentication, quotas and
other runtime information.
Web Gateway offers a Proxy high availability (HA) network or explicit proxy mode. This mode
allows failover and load balancing without using external load balancers.
With this mode, traffic directed to the virtual IP is accepted by a main director and processed
normally. If the higher priority director fails, a secondary director assumes the virtual IP and
attempts to pass traffic. State is not preserved, but Web Gateways can still synchronize
authentication, quotas, and other runtime information.
This deployment is recommended for smaller networks of up to 1000 Web Gateway users. For
larger networks, external load balancing is recommended.
25
Transparent
No Trust Relationship
Website
Web Gateway
Routing Table
With a transparent or non-aware router, clients are unaware of the Web Gateway appliance.
26
Reverse HTTPS Proxy
Enable External Users to Upload Content to Internal Web Sites
Web Gateway can also be setup as a reverse https proxy to enable external users to upload
content to internal web sites.
With a reverse https proxy, an Internet user attempts to upload content to a web site.
A load balancer sends the content to a Web Gateway cluster which examines it.
If the content fails examination, Web Gateway returns a block page to the user. If the content
passes inspection, the load balancer forwards it to the web server for further processing.
27
Secure Web Gateway for On Premise Appliances as ICAP Server
Web Gateway functions as ICAP server to perform full range of malware scanning
and analysis
1. User attempts to upload the file directly to
web server (ICAP client)
2. ICAP client transmits the file to Secure
Web Gateway (ICAP Server)
3. If the file does not pass inspection the
ICAP client takes an appropriate
corrective action based on the business
logic of the ICAP application
4. Clean content is forwarded to the Web
Server for processing
You can also utilize the Internet Content Adaptation Protocol (ICAP), to offload processing from
the web server to a Secure Web Gateway for On Premise Appliances.
Here, the users upload content to the web server (ICAP client).
The ICAP client intercepts and forwards content to a Web Gateway (ICAP server) for malware
analysis.
If the file passes inspection, Web Gateway notifies the web server to continue processing it. If
the file fails, Web Gateway takes the appropriate corrective action, such as deleting the file,
based on the business logic of the ICAP application.
28
Reverse Proxy vs. ICAP Server Configuration
Secure Web Gateway for On Premise The ICAP Client receives the content and
Appliances intercepts the content before forwards it to Secure Web Gateway for
it reaches the web server, processes it On Premise Appliances (ICAP Server) for
and then either blocks or forwards it further analysis before processing it. The
depending on the results of the analysis. web server gains the benefit of having
If the content is blocked it never reaches the ICAP server perform more in-depth
the web server analysis.
Does not require any additional software ICAP mode requires that an ICAP client
development. Only block pages need to be written and installed within the data
be designed to conform to the style of flow of the application
the site.
The major differences between a reverse https proxy and an ICAP server configuration are:
• In reverse https proxy mode, the Web Gateway intercepts the content before it
reaches the web server, processes it, and then either blocks or forwards it, depending
on the results of the analysis. If the content is blocked, it never reaches the web
server.
• In an ICAP configuration, the web server receives the content and forwards it to Web
Gateway for further analysis before processing it. The web server gains the benefit of
having the ICAP server perform in-depth analysis, freeing up resources on the web
server.
• Reverse https proxy mode does not require any additional software development
other than designing and creating block page responses that conform to the style of
the site. ICAP mode requires that an ICAP client be written and installed within the
data flow of the application.
• Reverse https proxy mode does not require any additional software development
other than designing and creating block page responses that conform to the style of
the site. ICAP mode requires that an ICAP client be written and installed within the
data flow of the application.
29
Deployment Plan
Workflow
Identify how to
monitor and Plan the Enterprise
Plan the pilot.
optimize solution rollout.
post-deployment.
If migrating from an earlier release, review the Web Gateway installation guide
for the hardware and software requirements.
After identifying your requirements, you are ready to move forward with the deployment plan.
An example deployment is:
30
Change Control
Recommended Phases
• Preparing for change: Initial planning and development of change management strategy.
• Managing change: Implementing plan and adding any detail identified.
• Reinforcing change: Data gathering and taking any corrective actions.
31
Knowledge Check
32
Check your Learning
Multiple choice: Choose the correct answer.
A. Explicit
B. Transparent
33
Check your Learning
True - False
True
False
34
Check your Learning
Multiple choice: Choose the correct answer.
Answer: A. Reverse HTTPS proxy. See Comparing ICAP and Reverse HTTPS Proxy.
35
Check your Learning
True - False
True
False
36
Review
37
Skyhigh Security is a registered trademark of Musarubra US LLC. Other names and brands are the property
of these companies or may be claimed as the property of others. Copyright © 2022. March 2022
38
Module 4: Installation
1
Module 4 Objectives
2
Installation Workflow
Steps to install a physical appliance
5 Log into the GUI and run through the setup wizard
to license and activate your appliance
See the Secure Web Gateway Product Guide for greater detail on all items.
Download the latest version of the Web Gateway software from the Content and Cloud
Security Portal. The software is available in an ISO format or a USB format.
If you are installing the Web Gateway as a physical appliance, you will need a monitor and
keyboard to access the appliance. If you are installing the Web Gateway as a virtual
appliance, you will need a system to host the virtual appliance.
The Web Gateway can also be installed over a serial console. Once the Web Gateway software
has been installed and configured, you will need an administrative system to access the user
interface. The requirements for this system are displayed in the table.
The final item you will need is a license file. You are required to active the license before you
are allowed access to the user interface.
3
Downloading Appliance Software
https://contentsecurity.skyhigh.cloud
• Log into Skyhigh Content & Cloud Security Portal. An account is required.
• Download software (typically ISO format).
• Copy software from system file store to installation media (CD/DVD or USB drive) for
installation on appliance.
If you require a different version of software, download the software from the Skyhigh Content
& Cloud Security Portal. The software is available in ISO or USB format.
Note: You typically select ISO. Optionally, select USB to make a bootable USB stick to install an
appliance.
4
Connect to the appliance
Client Machine
Component Specification
Monitor Standard VGA monitor and keyboard or Serial system
console
5
Installing Software on Physical Appliances
Workflow
Access
and work Software is
Insert Select the Select
Turn on with Boot installed
installation installatio installatio
appliance Manage on
media n device n mode
(Varies by appliance
model)
To install downloaded software on a physical appliance, connect the appliance, turn it on, and
work with the Boot Manager:
1. Insert the CD/DVD or the USB drive with the downloaded software and then turn on
the appliance. The installation begins.
2. During the initial phase, select the installation device and access the Boot Manager.
When working with the Boot Manager, the steps vary depending on model:
• Web Gateway new generation of appliances: (WBG) 4500D, 4500E,
5000D and 5500D, 5000E and 5500E.
• Older models include: (WBG) 4500C, 5000C, 5500C
• Model not specified
Work with the configuration wizard to implement the initial configuration settings.
6
Implementing Custom Settings
Workflow
DHCP = NO
Network Default Host Name
IP Address Mask Gateway
Start Mount
Software
DHCP?
Yes/No
Before beginning the Web Gateway installation, you must be prepared to answer questions
that will be asked in the configuration wizard. After mounting the software media and selecting
an installer option, first identify if DHCP is used.
If you choose No, you will have to manually enter IP Address, network mask, default gateway,
hostname as well as DNS configuration.
If DHCP server is setup, only hostname needs to be configured before you continue with the
rest of the workflow to confirm configuration changes, setup a root password, root SSH
connection and appliance volume configuration.
7
Installation Steps
Mount software and select Installer option
Installation Steps
8
Installation Steps (continued)
DHCP
Since the SWG appliance will be using a static IP address – select No at the prompt
for using DHCP.
Since the SWG appliance will be using a static IP address – select No at the prompt for using
DHCP.
9
Installation Steps (continued)
IP Address, Subnet Mask and Default Gateway
10
Installation Steps (continued)
Primary/Secondary DNS and summary confirmation
4. Primary DNS should be configured select
Yes.
5. Enter in a value for the primary DNS.
6. You can also add a secondary DNS but
that is not required.
7. After the DNS is entered you will be
presented with a summary of what is
configured at this point. If everything is
correct select Yes. If not select No to go
back and re-enter the correct
information.
11
Installation Steps (continued)
Enter and confirm a root password as well as allowing root via SSH
12
Installation Steps (continued)
Web Cache volume scheme
11. Select your volume scheme for web
cache, you select the default or use
an alternative scheme with limited
cache.
12. Using the default, the volume wizard
will allocate a certain amount of
space based on space available.
11. Select your volume scheme for web cache, you select the default or use an alternative
scheme with limited cache.
12. Using the default, the volume wizard will allocate a certain amount of space based on
space available.
Note: These values are from a lab environment and will be different in a production
environment on a physical appliance.
The appliance will initialize after this step, and you should be able to log into the UI.
13
SWG GUI Login
Three ways
Log on to the interface that is provided for Web Gateway to use the product for
configuring a web security policy. You can do this one of three ways:
The logon procedure differs depending on the method you choose. In each case,
the procedure begins with accessing the logon options window for Web Gateway
through a browser.
Log on to the interface that is provided for Web Gateway to use the product for configuring a
web security policy. You can do this one of three ways:
The logon procedure differs depending on the method you choose. In each case, the
procedure begins with accessing the logon options window for Web Gateway through a
browser.
14
Logging on to Secure Web Gateway for On Premise Appliances
Login options
Default credentials:
HTML application
in browser
Some browsers do not support logging on to and running the Web Gateway interface due to
their plug-in architecture. For example, current Google Chrome and Mozilla Firefox versions do
not allow for the use of Java. When working with one of these browsers, you will not be able to
logon to the default UI. Instead, you will need to use one of the other two options.
When Webstart is downloaded, the Web Gateway UI is stored locally, replacing the need for a
browser, and an icon can be added to the desktop for subsequent logins.
From the login screen, you also have the option to logon to the UI in an HTML browser, which
replaces the need to use Java.
15
Completing the Setup in the UI
Using the setup wizard to license the appliance
When you log into the user interface for the fist time, the setup wizard will walk you through
basic settings
• Accept the End User License Agreement
• Accept the Data Usage Statement
• Import a license
• Activate the product
16
Completing the Setup in the UI (Continued)
Use the setup wizard to set the time zone
Skyhigh recommends leaving this set to Etc/UTC if you plan on having gateways in different
timezones to maintain consistency.
Select the appropriate timezone for your setup.
17
Completing the Setup in the UI (Continued)
Use the setup wizard to change or configure additional network settings
You can change your current information
configured for eth0 as well as enable other
network interfaces and configure those as
well.
Enable or disable network interfaces and
configure them
Change the default gateway for IPv4
and/or IPv6
Configure advanced settings such as
speed and duplex as well as MTU size
Make changes to DNS adding a
secondary as well as a tertiary server
You can also configure VLANs and add IP
aliases
You can change your current information configured for eth0 as well as enable other network
interfaces and configure those as well.
• Enable or disable network interfaces and configure them
• Change the default gateway for IPv4 and/or IPv6
• Configure advanced settings such as speed and duplex as well as MTU size
• Make changes to DNS adding a secondary as well as a tertiary server
• You can also configure VLANs and add IP aliases
18
Completing the Setup in the UI (Continued)
Use the setup wizard to change the password
You can change the password for the main admin account.
The password needs to conform the password policy that includes:
• Minimum of 8 characters
• One upper case
• One lower case
• One non-alphanumeric character
19
Verifying User Interface is Accessible
Dashboard Landing Page
8
The Dashboard appears after a success log in to its interface. This interface is your launching
point for Web Gateway. It displays performance information and statistics about Web
Gateway operation. The Dashboard is discussed in more detail later in the course.
The menu bar, located at the top of the pages, is a primary navigational control. Each page is
represented by an icon. Click the icon for the page you want to access.
The interface also provides icons and other controls; for example, User Preferences, Logout,
Search, and Save Changes.
20
Navigating Web Gateway Interface
Become Familiar with Menu Bar and Page Controls
Take a moment to familiarize yourself with Web Gateway menu bar options and other page
controls.
Pay special attention to the Save Changes button. If it is red, it indicates your input or settings
have not been saved. The button changes to gray after the changes are saved.
21
Knowledge Check
22
Check your Learning
Multiple choice: Choose the correct answer.
A. eth0
B. eth1
C. net0
D. net1
23
Check your Learning
Multiple choice: Choose the correct answer.
A. Product activation
B. Product licensing
C. Modify default password
D. Proxy HA configuration
24
Check your Learning
Multiple choice: Choose the correct answer.
A. Minimum of 8 characters
B. One upper case
C. One lower case
D. One non-alphanumeric character
Answer: A, B, C, D
25
Review
• Verify solution requirements. Varies, depending on scope (new or upgrade) and appliance
type.
• Use configuration wizard for initial configuration. Remember, you can customize these, as
needed.
• At a minimum, you must define root password and remote root logon.
• Import the license and activate the product.
• The Dashboard page opens after a successful logon.
• Use the menu bar to navigate between pages.
26
Lab Exercises
Lab 4: Installation
Goals:
View appliance settings
View UI settings
Duration:
20 minutes*
The labs for this course are included in a separate lab guide. Each lab lists the lab goals,
required systems, and any files needed to complete the lab; for example, text files or
executables. At the top of each lab, there is a scenario. The scenario often contains the
information needed to complete the lab. Beneath each scenario, there are detailed steps. The
steps are supplied as a resource, in the event you need additional information to complete the
lab.
Note: The steps will vary depending on if your lab environment is local- or cloud-based.
27
Skyhigh Security is a registered trademark of Musarubra US LLC. Other names and brands are the property
of these companies or may be claimed as the property of others. Copyright © 2022. March 2022
28
Module 5: System Configuration
1
Module 5 Objectives
2
Configuration Overview
After the initial setup you can configure more system
settings and modify the initial settings from the
Configuration Page including license, network interfaces,
proxies and cluster nodes setup.
3
Configuration Page
Appliances and File Editor Tabs
Use the Appliances tab to manage and configure SWG. It has a toolbar, which you
use to add or delete appliances, update engines (modules), and expand or
collapse the tree in the left pane.
Use the File Editor tab to edit system files. This tab does not have a toolbar.
This is the SWGConfiguration page. You access it by clicking the Configuration icon on the
menu bar.
This page has two tabs: Appliances tab and File Editor.
Use the Appliances tab to manage and configure the Web Gateway. It has a toolbar, which you
use to add or delete appliances, update engines (modules), and expand or collapse the tree in
the left pane. Use the File Editor tab to edit system files. This tab does not have a toolbar.
4
Appliances Tab
Cluster and Appliances Lists
Cluster:
• Manage license
• Configure Mobile Cloud Security
• Configure hybrid settings for syncing policy (Web Hybrid) and Cloud hosted lists (UCE Hybrid).
In the left pane of the Appliances tab, the tree is divided by Cluster and Appliances.
Cluster options include License and Web Hybrid. Within Appliances, you see an icon for each
SWG.
5
Web Gateway License Administration
Appliances Tab > Cluster List > License
• Import License
• Status
• Creation
• Expiration
• License ID
• Customer
• Customer ID
• Seats
• Evaluation
• Features
• Data usage statement
Use the License Administration page to verify the license status is valid. Complete these steps
from the Configuration page, Appliances tab:
1. Within the Cluster list, select License.
2. In the right pane, verify the status of the license. If it is not valid, read and
accept the end user license agreement.
3. Browse to, select, and open the appropriate license file.
4. Verify the selected license displays in the License file box.
5. Click Save Changes.
After the license is installed, you can view information about it, such as:
• Creation: Shows the date when a license file was created.
• Expiration: Shows the date when a license file expires.
• License ID: Shows the ID of a license.
• Customer: Shows the name of the license owner.
• Customer ID: Shows the ID of the license owner.
• Seats: Shows the number of workplaces in the license owner's organization that the
license is valid for.
• Evaluation: Shows whether the license has been evaluated.
• Features: Lists the features of SWG that are covered by the license.
• I have read and understood the data usage statement: Provides a link to the Data
Usage Statement.
6
Obtaining Web Gateway Updates
Ensure Engines, Definitions, and Product Files Remain Current
Web Gateway requires access to several download servers to obtain the required files for
engine, definition, and product updates. The following data is retrieved from the download
servers:
• Gateway Antimalware and URL Filter
• Data Loss Prevention (DLP)
• Dynamic Content Classification
• Application Control
• Single Sign On and SSO Connector Catalog
• Cloud Encryption Service
• Third-party Avira Antivirus
If access is blocked by an outbound firewall, Web Gateway may not be able to retrieve all
necessary data, which can lead to failing updates or missing the latest available security
signatures. As a best practice, allow SWG to communicate to HTTPS services (TCP/443) for any
destination.
Alternatively, it is possible to use a next-hop proxy in your network, which allows SWG to
contact the download servers.
7
Configuring Automatic Updates
Appliances Tab > Appliances > [appliance] > Central Management
Optional
Automatic update requires an Internet
connection for SWG to access the
update servers.
To configure automatic updates of the database, complete these steps from the Configuration
page, Appliances tab, and Appliances list:
1. Within the list for your Web Gateway appliance, click Central Management.
2. Scroll down to Automatic Engine Updates and make sure these options are selected
(checked/ticked):
• Enable automatic updates.
• Allow to download updates from internet.
• Allow to download updates from other nodes. This applies to Central
Management configurations. When enabled, this allows you to
schedule updates for the modules (also known as engines) on the
nodes as part of configuring settings for this configuration.
3. Optionally change the default update intervals.
4. Optionally enable the use of update proxies.
5. If you modified the default settings, click Save Changes.
8
Using an Update Proxy for Automatic Updates
9
Triggering Automatic Updates Manually
Appliances Tab > Update Engines > Trigger Update
When there is an Internet connection and automatic update is configured, updates occur
regularly based on the intervals defined on the Central Management page. Optionally, you can
also trigger the update manually.
10
Downloading Update Package Manually
In an Air Gapped environment where a proxy connection is also not available
then engine & DAT updates can be performed manually.
Workflow – Step 1 of 4
• Navigate to
https://contentsecurity.skyhigh.cloud/
update
• Accept terms and conditions and click
Next Step.
11
Downloading Update Package Manually
Workflow – Step 2 of 4
• Select Skyhigh Secure Web Gateway from the product drop-down list.
• Click Next Step.
12
Downloading Update Package Manually
Workflow – Step 3 of 4
• Provide Secure Web Gateway version number and build number.
• Click Next Step.
13
Downloading Update Package Manually
Workflow – Step 4 of 4
• Select updates to include in the update package.
• Click Generate Update Package.
14
Downloading Update Package Manually
• Download the generated
package.
• On SWG UI, navigate to
Configuration > Appliances >
Update engines. Click Upload
update file.
To initiate a manual update, complete these steps from the Configuration page, Appliances
tab:
1. From the Update Engines drop-down list, select Upload Update File.
2. Browse to, select, and open the update package.
3. After selecting the package, click Update.
4. Wait while the upload is in progress.
5. After the update is complete, click Close.
15
Reviewing Update Information on Dashboard
Update Information Displays on Dashboard page, Alerts Tab
After the update is complete, you can review the update information on the Dashboard page,
Alerts tab.
16
Reviewing Update Logs
Troubleshooting > [appliance] > Log files > update
Optionally review the update logs from Troubleshooting page. The update logs are also
available located in /opt/mwg/log/update/update.log.
17
Network Settings Overview
Proxies
Network Interfaces
Domain Name Service
Network Protection
Static Routes
Port Forwarding
18
Viewing Proxy Configuration
Appliances Tab > Appliances > [appliance] > Proxies
• Default and recommended
configuration is Proxy (optional
WCCP). WCCP refers to Web Cache
Control Protocol redirection method.
You can configure the proxy functions of the appliance as is appropriate for your network. From
the Configuration page, Appliances tab, complete these steps:
Review the proxy settings. The following key settings are configured by default:
1. Within the Appliances list for the SWG you are administering, click Proxies.
2. In the right pane, review the current configuration. By default, the network mode is
Proxy (optional WCCP) and Enable HTTP proxy is selected (checked/ticked).
3. Optionally, change the proxy configuration; for example, select a different network
mode or configure other protocols.
4. Save any changes.
5. When prompted, log out of the interface and then log back into the interface.
19
Supported Network Modes: Review
Identifies How Traffic is Directed to Web Gateway
Name Description
Proxy (optional WCCP) • Explicit proxy mode (default).
• HTTP enabled by default.
• Web Cache Communication Protocol (WCCP)
supported for client redirects.
• Appliance is typically behind firewall.
Proxy HA • Explicit proxy mode with high availability
functions (No external load balancer).
Transparent Router • Clients are unaware of appliance.
• Appliance is placed as router behind firewall.
• Switch optionally connects appliances and
clients.
Transparent Bridge • Clients are unaware of appliance.
• Appliance is usually placed behind firewall and
router as invisible bridge.
Note: ICAP is independent of network mode but in the vast majority of cases the Network Mode chosen when SWG is
configured as an ICAP Server is Proxy (Optional WCCP) with the WCCP disabled.
The appliance uses its proxy functions to intercept web traffic and transmit it if this is allowed
by the filtering rules. You can configure these functions to meet the requirements of your
network.
20
Proxy (Optional WCCP)
Network
Websites
SWG
In explicit proxy mode, the clients directly send traffic to the web gateway. This is the default
configuration.
The browsers are configured to accept proxy web connections and establish a trust
relationship with the Web Gateway.
Typically, the SWG is placed behind a firewall and connected to its clients and the firewall by a
router.
Optionally, the web cache communication protocol i.e., WCCP services or Layer 2 transparent
can be configured to redirect the web traffic to the SWG
21
Proxy (optional WCCP) Configuration
Network Setup and Transparent Proxy
Network mode
• WCCP: HTTP client requests sent to web servers under IPv4 and IPv6 are intercepted and
redirected to the appliance using Web Cache Communication Protocol (WCCP). For more
information see Request for Comment (RFC) 3040 on www.ietf.org. This RFC discusses the
web replication and caching taxonomy for WCCP.
• Layer 2 Transparent: HTTP client requests sent to web servers under IPv4 and IPv6 are
intercepted and redirected using Layer 2.
Note: Neither of these transparent options are likely to be used with an ICAP server.
• Supported Client Redirection Methods - Web Gateway supports two methods for
intercepting web traffic and redirecting it to an appliance: Web Cache Communication
Protocol (WCCP) and Layer 2 transparent.
• Web Cache Communication Protocol - When WCCP is selected, HTTP client requests sent to
web servers under IPv4 and IPv6 are intercepted by an additional network device and
redirected to the appliance using the Web Cache Communication Protocol (WCCP). The
clients are not aware of the redirection, it remains transparent for them.
• Layer 2 Transparent - When selected, client requests sent to a web server under IPv4 and
IPv6 are intercepted by an additional network device and redirected to the appliance using
the Layer 2 method. Client requests are accepted on the appliance even if their destination
IP addresses are not addresses of the appliance. The redirection is transparent to the
clients.
22
Proxy HA
Network
Websites
SWG
Scanning Node P89
Active Director
(VIP)
Scanning Node P0
When Proxy HA network mode is selected, an explicit proxy mode with High Availability (HA)
functions is used.
The idea of this configuration is to introduce failover and load balancing without the need for
external load balancers.
23
Proxy HA Configuration
Scanner IP
Director priority
Virtual IPs
Note: HA features when using SWG as an ICAP server are usually provided by either the ICAP Client or a hardware load
balancer, but Proxy HA can be used if required.
• Director priority:
• Sets the priority (ranging from 0 to 99) that an appliance takes in directing data
packets.
• The highest value prevails. 0 means the appliance never directs data packets, but
only filters them.
• In a High Availability configuration, two appliances are typically configured as
director nodes with a priority higher than zero to direct data packets, providing fail-
over functions for each other.
• The remaining nodes are configured with zero priority (also known as scanning
nodes).
• The priority value is set on a slider scale.
• Directory priority must be set first to enable other Proxy HA configurations.
• Virtual IPs:
• Provides a list of virtual IP address. It is recommended that virtual IP is used to log in
to the user interface after configuring HA proxy mode.
• All members of the HA proxy setup must have the same Virtual IP.
• Scanners:
• Define Peer/Director or scanner IPs for HA setup.
• Typically, a director is configured a Scanner node itself and the backup node is
configured as a peer/director. The other scanning nodes are configured as scanners.
24
Transparent Router
Network SWG
Websites
The transparent router mode is one of the two transparent modes you can configure for the
proxy functions of a Web Gateway appliance.
In transparent router mode, the clients are unaware of the appliance and need not be
configured to direct their web traffic to it.
25
Transparent Router Configuration
Director priority
Port
Redirects Virtual IPs
IP Spoofing
Typical settings for a transparent router mode include port redirects, management IP for Web
Gateway, Virtual IP, Virtual Router ID and IP spoofing configuration.
26
Transparent Bridge
Network SWG
Websites
The transparent bridge mode is one of the other transparent modes you can configure for the
proxy functions of the gateway appliance.
With this mode, the clients are unaware of the appliance and need not be configured to direct
their web traffic to it.
The appliance is usually placed between a firewall and a router, where it serves as an invisible
bridge.
27
Transparent Bridge Configuration
Port
Redirects
Management IP
IP Spoofing
Typical settings for transparent bridge mode include port redirects, Management IP and IP
Spoofing configuration.
28
Supported Data Transfer Technologies
Determine How Data is Transferred
Name Description
HTTP Proxy Hypertext Transfer Protocol
(Default)
FTP Proxy File Transfer Protocol
ICAP Server Internet Content Adaption Protocol
IFP Proxy Internet Facsimile Protocol
TCP Proxy Transmission Control Protocol
SOCKS Proxy Sockets Protocol
In addition to network mode, you also configure the technologies used to transfer data. By
default, HTTP is enabled. You can configure other data transfer technologies as needed, as
shown in the figure.
29
ICAP Server Configuration
30
HTTP Proxy Settings
Ports, Anonymous Login for FTP, Add Via HTTP Header
As discussed, HTTP proxy is enabled by default. Other key settings here are:
• HTTP Port Definition list: Provides a list for entering the ports on an appliance that
listen to client requests.
• Anonymous login for FTP over HTTP: Specifies the username for logging on as an
anonymous user when requests are transmitted to an FTP server by an HTTP proxy on
an appliance.
• Password for anonymous login for FTP over HTTP: Sets a password for a username.
• Add Via HTTP header: When selected, a Via HTTP header is added to a request that is
processed on an appliance. This option is selected by default.
• Adjust content-type header for requests to archives (depending on the content
encoding): When selected, a content-type header in a request for access to an
archive file is adjusted if this header does not match the content encoding that was
detected for the archive.
• Host header has priority over original destination address (transparent proxy): When
selected, requests that are sent to the proxy on an appliance in transparent proxy
mode are recognized as traffic in explicit proxy mode and processed accordingly.
This option is only available if the explicit proxy mode is not already configured on an
appliance. If the option is available, it is selected by default.
31
Configuring Network Interfaces
IPv4 and IPv6
The Network Interfaces settings are used for configuring the network interfaces of an
appliance. This page is divided into three tabs: Appliance settings for IPv4, Appliance settings
for IPv6, and Advanced settings.
The options on the IPv4 tab are listed below. The IPv6 tab has similar options:
• Host name/Fully qualified domain name: Specifies the host name of an appliance.
The name must be specified as fully qualified domain name.
• Default gateway (IPv4): Specifies the default gateway for web traffic under IPv4.
• Default gateway (IPv6): Specifies the default gateway for web traffic under IPv6.
• IPv4 and IPv6: Provides options for configuring network interfaces under IPv4 and
IPv6. The options are provided on a separate tab.
• Add Alias: Opens the Input window for adding an alias.
• Add VLAN: Opens a window for adding a network interface for VLAN traffic. You can
use this option to run VLANs under IPv4 or IPv6. To add a network interface, you
specify a number as its ID and click OK. The interface name is composed of two
parts, separated by a dot.
32
Configuring Network Interfaces (Continued…)
Advanced Settings
33
Configuring Domain Name Service
DNS Server Settings and Conditional Forwarding
For ICAP Servers DNS is used more for internal SWG functions e.g. accessing
update servers, CRLs etc and for GTI lookups.
The Domain Name Service settings are used for configuring Domain Name Service (DNS)
servers, including the use of DNS servers according to particular domains, which is also known
as conditional DNS forwarding. Settings here include:
• Primary domain name server: Specifies the IP address of the first server.
• Secondary domain name server: Specifies the IP address of the second server.
• Tertiary domain name server: Specifies the IP address of the third server.
• Conditional DNS Forwarder: When selected, a DNS server from the Conditional
Forwarder List resolves domain information sent in a request to Web Gateway into an
IP address.
34
Configuring Domain Name Service (Continued)
Guidelines for Conditional Forwarding
Options Description
Default resolver(s) Specify up to five IP addresses of DNS server or servers
used for resolving domain information.
TTL (Time to Live) for Limit time (in seconds) that positive answers are cached
positive answer for conditional DNS forwarding to the specified value.
TTL for negative answer Limit time (in seconds) that negative answers are cached
for conditional DNS forwarding to the specified value.
Conditional Forwarder List Add entries for domains and IP addresses of DNS servers
involved in conditional forwarding.
Conditional Forwarder Add entries for domains and IP addresses of DNS servers
Reverse Lookup List involved when reverse lookup is performed.
This table lists other settings related to Conditional Forwarding. These options are available
only when Conditional Forwarding is enabled.
35
Configuring Network Protection
Appliance-specific Rules for Incoming Traffic
Define
exceptions
from default
policy
The Network Protection system settings are used for configuring protective rules for traffic
coming into an appliance from your network. Settings for configuring network protection rules
include:
• Enable network protection: When selected, the settings configured in the following for
network protection are enabled.
• Input policy: Lets you select the action taken on incoming traffic. Incoming traffic can
either be dropped or accepted.
• Allow Ping requests: When selected, the appliance accepts and answers Ping
requests.
• Exceptions from default policy: List network devices that send traffic to an appliance.
Traffic from these devices is not handled according to the rules that are currently
implemented. When these rules drop incoming traffic, traffic sent from the devices
listed here is accepted and vice versa.
36
Configuring Static Routes
Routes that Always Use Same Gateway and Interface
The Static Routes settings are used for configuring routes that always use the same gateway
and interface on this gateway when web traffic is routed from an appliance to a particular
host.
37
Configuring Port Forwarding
Forward Web Traffic to Another Port
The Port Forwarding settings are used for configuring rules that let an appliance forward traffic
sent from a port on a particular host to another port. Key settings include:
• Source host: Specifies the IP address of a host that is the source of web traffic in a
port forwarding rule.
• Bind IP: Specifies the bind IP address.
• Target port: Specifies the port that web traffic from the source host is forwarded to.
• Destination host: Specifies the IP address of the host that is the destination of web
traffic sent from the source host.
• Destination port: Specifies the port on the destination host used for listening to web
traffic coming in from the source host.
• Enable extended connection logging: When selected, all logs for port forwarding are
stored on the appliance system under /var/log/mwg_fwd.log.
• Customize extended logging fields: When selected, the input fields for configuring the
type of data that should be logged become accessible.
• Log on success: Lets you enter the type of data to be logged when web traffic is
successfully forwarded.
• Log on failure: Lets you enter the type of data to be logged when forwarding web
traffic failed.
38
Configuring Date and Time
Appliances Tab > Appliances List > [appliance] > Date and Time
Select timezone.
Use this page to modify time and date settings defined initially for a specific appliance. To
review the current date and time settings, complete these steps from the Configuration page,
Appliances tab:
1. Within the Appliances list, expand the list for the Web Gateway you want to manage
and then click Date and Time.
2. In the right pane, the options are:
• Enable time synchronization with NTP servers: When selected, the appliance
uses time servers under the NTP (Network Time Protocol) for time
synchronization.
• NTP server list: Provides a list for entering the servers that are used for time
synchronization under the NTP protocol. The list elements are as follows:
• String: Specifies the name of an NTP server.
• Comment: Provides a plain-text comment on an NTP server.
• Select time zone: Provides a list for selecting a time zone.
3. If you make changes, be sure to click Save Changes.
39
Log File Manager Overview
Rotation, Deletion, and Pushing of Log Files
• Log File Manager allows
configuration of settings for logs Auto Rotation
Settings for rotating log file automatically based on
maintained by modules of an size and time of day.
appliance. Settings for deleting log files automatically based on
Auto Deletion
size and last time of modification.
Settings for pushing rotated log files automatically to
• System logs are enabled by Auto Pushing
another location.
default.
Settings for
Specific settings for Error Logs.
error logs
• Auto-deletion is enabled by Settings for
Specific settings for Update Log.
default for more than 7 files for Update log
the same log and if a log file is Settings for
unchanged for more than 7 Audit log
Enable specific Audit Log settings.
days.
• Not to be confused with User- Advanced Settings for auto-deletion of core and feedback files.
Defined Logs which are
configured in policy.
The Log File Manager settings are used for configuring the rotation, deletion, and pushing of log
files that are maintained by modules of an appliance. Settings can be configured for log files in
general and for two important types of log files, which are stored in the Update Log and the
Audit Log.
40
Enabling and Configuring Audit Log Settings
Example
As an example, we have enabled specific log file settings. The default is disabled. When
enabled, you can configure the settings for file size before rotation, scheduling of log file
rotation, interval, and related settings. You may also choose to save the audit log to the syslog.
41
Knowledge Check
42
Check your Learning
Multiple choice: Choose the correct answer.
A. Proxy HA
B. Proxy (optional WCCP)
C. Transparent Router
D. Transparent bridge
43
Check your Learning
Multiple choice: Choose the correct answer.
A. 1 (one)
B. 2 (two)
C. 3 (three)
D. 4 (four)
44
Check your Learning
True - False
True
False
45
Review
System settings are configured for general functionality, network interfaces, DNS
servers, proxies, Central Management, and so on.
The Log File Manager lets you configure settings for various log file types.
Engine update ensures relevant information is made available to the filtering
functions of Web Gateway.
• System settings are configured for general functionality, network interfaces, DNS servers,
proxies, Central Management, and so on.
• The Log File Manager lets you configure settings for various log file types.
• Engine update ensures relevant information is made available to the filtering functions of
Web Gateway.
46
Lab Exercises
Lab 5: System Configuration
Goals:
Configure HTTP listener settings
Configure alias IP address
Configure DNS settings
Configure static route
Configure log settings
Duration:
30 minutes*
The labs for this course are included in a separate lab guide. Each lab lists the lab goals,
required systems, and any files needed to complete the lab; for example, text files or
executables. At the top of each lab, there is a scenario. The scenario often contains the
information needed to complete the lab. Beneath each scenario, there are detailed steps. The
steps are supplied as a resource, in the event you need additional information to complete the
lab.
Note: The steps will vary depending on if your lab environment is local- or cloud-based.
47
Skyhigh Security is a registered trademark of Musarubra US LLC. Other names and brands are the property
of these companies or may be claimed as the property of others. Copyright © 2022. March 2022
48
Module 6: Policy Overview
1
Module 6 Objectives
2
Review: Hypertext Transfer Protocol (HTTP)
Key Terms and Concepts
Request-Response Sequence
Request Header
Response Header
Encoding
Embedded Objects
When using ICAP it is still important to understand the underlying HTTP protocol
Before working with policies, you also should be familiar with some basic Hypertext Transfer
Protocol (HTTP) terms and concepts.
3
TCP 3-way Handshake
Establish TCP Connection
1 SYN is sent
SYN/ACK is returned 2
3 ACK is sent
Acknowledgement is
received and the TCP socket
connection is established.
Before HTTP communication can occur, a connection must be established between two
computers. This connection occurs through what is called a TCP 3-way handshake.
The 3-way handshake uses a sequence commonly called SYN – SNY/ACK – ACK to establish the
TCP connection.
4
HTTP Request-Response Sequence
Foundation for Internet Communications
Response
message
includes:
Server returns a • Response
response message headers
to the client. • Response status
code
2 • Response body
1
Client submits an
HTTP request
message to the
Request message server.
includes:
• Request method
• Request headers
• Request body
Once a TCP connection has been established, HTTP communication may occur. HTTP, which
stands for hypertext transfer protocol, is a protocol in the client–server model. HTTP is the
foundation for Internet communications.
Just like the 3-way handshake, HTTP also has a sequence. The HTTP sequence is called the
request – response sequence. The client, such as a web browser, submits a request to the web
server. The web server returns a response to the client.
5
How It Works: Web Gateway Explicit Proxy Mode
HTTP Request-Response Sequence
Web Gateway
(Proxy Mode)
1 Requests www.apple.com
4 Requests www.apple.com
Proxy Mode:
The client is
aware that the Provides www.apple.com 5
Web Gateway is
in the path Traffic is scanned and
6
filtered
We will now look at how the Web Gateway fits into the HTTP request-response sequence.
This example illustrates the request-response sequence when operating in proxy mode. Proxy
mode is when the client is aware that the Web Gateway is in the path to the web server. We will
cover proxy mode in detail in the configuration module.
6
How It Works: Web Gateway Transparent Mode
HTTP Request-Response Sequence
Web Gateway
(Transparent Mode)
1 Request
www.apple.com
4 Requests www.apple.com
Transparent
Mode: 5
Provides www.apple.com
The client is
unaware that the Traffic is scanned and
Web Gateway is in 6
filtered
the path
This example illustrates the request-response sequence when operating in transparent mode.
Transparent mode is when the client is unaware that the Web Gateway is in the path to the web
server. We will cover transparent mode in detail in the configuration module.
7
Example Request Header
GET Request and Additional Parameters
Request
Header
Notice that it contains the request method…a GET… and then provides additional parameters for
the communication between the client browser and the web server.
8
Table: Request Methods
The table lists requests methods. The request method identifies what the client is doing. You
can think of it as a command; for example, when the client would like to retrieve data from the
web server, it sends a GET in its request. If the client is submitting data to be processed by the
web server, it sends a POST in its request. Pause the course and Read the description for each
request method.
9
Table: Request Headers
Along with the request method, the client also send a request header to the web server. The
request header tells the web server what parameters should be used when it responds back to
the client.
For example, ACCEPT-LANGUAGE identifies the language supported by the client browser. The
request header may or may not contain the fields shown in the table. It all depends on the type
of request.
10
Table: Status Codes
Class Description
1xx Informational
2xx Success
3xx Redirection
4xx Client error
5xx Server error
The response header will include a status code. At a minimum, there are five classes of status
code response. 1XX, 2XX, 3XX, 4XX, and 5XX.
• 1XX is an information response. The request has been received and the process is being
continued.
• 2XX means success. The action requested by the client was received, understood, accepted,
and processed successfully.
• 3XX signifies redirection. The client must take additional action to complete the request.
• 4XX is a client error. This status code should include an explanation of the error situation and
if it is a permanent or temporary condition.
• 5XX is a server error. This status code should also include an explanation of the error situation
and if it is a permanent or temporary condition.
The second table lists some common response codes. Working in support, you will most often
encounter the 4XX class of response codes.
11
Example Response Header
Status Listed in First Line
Response Header
Here we have another example, this time we are looking at the response header. Notice that the
status of 200, which we know is success, is listed.
In the sequence we just viewed, the client sent a GET request and a request header identifying
the parameters of communication to the web server. The web server replied with a 200
response status saying OK, and additional parameters for the communication. And as we saw
in the previous example, this detail of information can be viewed using the browser’s developer
tools.
12
Table: Common Response Headers
Once the client browser has sent the request header to the web server, the web server will reply
with a response header. This table shows some common response headers.
13
HTTP Encoding
Process of Compressing Content Sent from Web Server to Client Browser
Request = GET
Accept-Encoding: gzip,
deflate
Response
Content-Encoding-gzip
HTTP encoding is simply the process of compressing content that is sent from a web server to a
client browser. We are all familiar with encoding, and we often zip files before saving them on a
local or network drive or sending them through email. It does no good for a web server to
compress content in a way that cannot be uncompressed by the client. So, within the request
header, there is a parameter called Accept-Encoding. This parameter identifies the
compression methods that the client can support.
In this illustration, the web browser uses the Accept-Encoding parameter to identify that it can
support the gzip and deflate compression methods. When the web server responds with
content for the client, it uses a parameter called Content-Encoding to identify the method it
used to compress the content. In this case of our example, the method used is gzip.
14
How Encoding Works
Request Header
Response Header
This page shows examples of how the encoding is identified in the request header and in the
response header. The request header identifies that the web browser can accept encoding
types of gzip and deflate. The response header identifies that the web server compressed the
content using gzip.
15
Embedded Objects
Risks
Embedded objects are objects that are created with one application and embedded into a
document created by another application. Embedding an object, rather than simply inserting it
or pasting it, ensures that the object retains its original properties.
Embedded objects can be the source of attempts to gather user information or compromise
the system. Risks with embedded objects include XSS attacks, tracking bugs, attack scripts,
worms, and Trojans.
Ajax represents a broad group of web technologies that are used to implement web
applications that communicate with a server in the background. These technologies power and
increase the dynamic information displayed on a web page.
The use of Ajax technologies increases the risk of malicious code and scripts being downloaded
by a browser.
The Web Gateway monitors and filters web content for risks associated with embedded objects
and the use of new technologies.
16
Policy Overview
Key Terms and Concepts
• Rules define filtering activities.
• Similar rule types are grouped logically into rule sets Rules
for management.
Rule Sets
Before working with SWG, there are some important terms and concepts with which you should
be familiar. They are Rules, Rule Sets, and Lists.
Rules define filtering activities. Similar rule types are grouped into rule sets for common
management. Rules typically reference lists, which let you define common values once for re-
use in multiple rules.
Rules, rule sets, lists, and related components are configured on the Policy page.
On the following pages, we will take a closer look at rules, rule sets, and lists, including what they
are and how they work. In the next module, you will learn how to configure and manage rules,
rule sets, and lists.
17
Policy Page Overview
Tree, Tabs, and Toolbars
The Policy page is where you configure settings used to manage the traffic that passes through
the SWG. It is organized by these tabs: Rule Sets tab, Lists tab, Settings tab, and Templates tab.
Each of the tabs has its own toolbar. Default and configured objects display in a tree, which you
can expand and collapse. Other navigation controls include the toolbars.
• Rule Sets Tab
• Use the Rule Sets tab to work with rules and rule sets.
• Lists Tab
• Use the Lists tab to work with list.
• Settings Tab
• Use the Settings tab to configure module (engine), action, and system settings for
rules.
• Templates Tab
• Use the Templates tab to work with templates for messages to SWG users. You can
access this tab from the Policy top-level menu. The content of the tab also appears
within the Template Editor. This editor opens when you select an action setting from
the settings tree and click Edit for a template or template collection under Language
and Template Settings.
18
Policy Page Overview: Rule Sets Tab Views
Four Tab Views for Managing Different Types of Rules and Rule Sets
The Rules Set tab has four-tab views: Rule Sets. Log Handler, Error Handler, and User Defined
Properties.
19
Policy Page Overview: Lists Tab
Define Commonly Used Values for Re-use in Multiple Rules
On the Lists tab, you see there are three list types: Custom, Subscribed, and Systems.
• Custom Lists
• You can modify these lists. They are displayed on the upper branch of the lists tree on
the Lists tab, for example, the list of URLs that are exempted from filtering. Custom lists
can have entries in string, number, category, and other formats.
• Subscribed Lists
• You set up these lists with a name on Web Gateway. They are initially empty and
retrieve content from a subscribed data source. Subscribed lists display in the lists
tree at the end of custom lists.
• There are two subtypes of subscribed lists: Skyhigh-maintained lists and customer-
maintained . The content for Skyhigh-maintained lists is retrieved from a Skyhigh
server. Several lists are available on the Skyhigh server; for example, lists of IP address
ranges or media types. The content for customer-maintained lists is retrieved from a
data source that you specify. Sources that you can specify are files on web servers
running under HTTP, HTTPS, or FTP.
• Systems Lists
• You cannot modify these lists. They include category, media type, and application
name lists, as well as lists of connectors used for cloud single sign-on. They are
updated when an upgrade to a new version of Web Gateway is performed.
20
Policy Page Overview: Settings Tab
Configure Modules (Engines), Rule Actions, and System Settings
Implemented with
initial configuration
but support
customization.
Settings are used within SWG for configuring modules (engines), rule actions, and system
functions.
Settings names appear in different places on the user interface, for example, in the criteria,
action, and events of rules or on the Settings and Appliances tabs.
After clicking a settings name, you can access and configure the parameters and values of the
settings.
At the initial setup of the appliance, module and action settings are implemented together with
the rule set system, as well as settings for the appliance system. Additional module and action
settings are implemented when you import a rule set from the rule set library.
You can review and modify the initially implemented or imported settings. You can also
completely delete module and action settings and create module and action settings of your
own.
21
Policy Page Overview: Templates Tab
Configure Messages Sent to Users when Rule is Triggered
• Implemented with initial configuration but supports customization
• Contain standard text with variables
The Templates tab is used to configure messages for users. Message types include:
• Authenticate message: Informs a user that authentication is required to access a URL.
• Block message: Informs a user that a request was blocked for various reasons, for
example, because a virus was detected in the requested object.
• Redirect message: Informs a user that redirecting to another URL is needed for
accessing the requested object.
Default settings apply for user messages and their templates after the initial setup of the
appliance, which you can review and modify as needed.
Message templates contain standard text with variables. The variables are filled with values as
needed in a given situation.
All variables used in message templates are also properties used by rules. For example, URL is a
variable in a message text and a property when used in a rule to exempt URLs from filtering.
22
How Rules and Rule Sets Work
A Closer Look
3. Response
Now that you are familiar with some key terms and concepts, here is closer look at how these
components work to enforce your security requirements.
As review, the purpose of SWG is to filter traffic. It filters traffic by passing each cycle, request,
response, and embedded object through a list of configured rule sets and rules.
A rule set is a container for one or multiple rules. A rule defines how to treat the traffic.
23
Inside a Rule Set
Basic Parts of a Rule
Let’s look in inside a rule. At the top-level, there are rule sets, which contain one or more rules.
Rules define filtering activities; for example, virus and malware filtering, URL filtering,
authentication, and so on.
Each rule consists of three basic elements: criteria, action, and (optionally) event.
24
Rule Elements: Criteria
Property, Operator, and Operand
Property (Category)
Operator (Filter)
Operand (Value)
As discussed, each rule has three main elements. The first is criteria. This defines the conditions
that trigger the rule. The criteria consist of Property, Operator, and Operand.
The Property defines the criteria type or category, such as User Group criteria, Web Filtering
criteria, Media Type criteria, and so on.
The Operator and Operand work together to define the expression to apply. The Operator acts
as a filter and links an operand to the property. Some example Operators are All, Contains, Does
not contain, Equals, and Matches.
The Operand represents a specific value. Some examples are Application name, Boolean,
Category, IP, IP range, String, and Wildcard.
25
Operators
Properties are Directly Affected by the Operators Used
Operator Properties
The properties you can choose are directly affected by the type of operator you use. Most have
the mirrored pair (greater than, less than) so make sure you choose the correct operator for
what you are trying to build with your policy.
Take special care with the at least one in list, all in list, and is in list operators.
One is in list means that one of the properties (usually URL Categories) is in the list you choose
in the properties.
If a site has three categories, only one needs to match the properties for that Rule to be fired. All
in list would mean all three of the Website Categories must matched for the rule be applied.
Is in list is for properties that can be matched exactly (IP address, string) and looks for the exact
match in the list.
26
Rule Elements: Actions
Response or Behavior
Continue
Block
Remove
Action? Redirect
Stop Cycle
Authenticate
The Action defines the response or behavior to execute when a rule is triggered; for example,
Continue, Block, Redirect, Authenticate, Stop Rule Set, Stop Cycle, and Remove.
27
Rule Elements: Event
Optional. These can typically set areas like headers, user defined properties
logging entries and counters
Events (Optional)
Additional activities that
can be performed if the Statistics. Counter. Increment – Name of the event
rule criteria is met.
“BlockedByURLFilter, 1” – Parameters of the event
Finally, the last rule element is an Event. Events are optional. Events are additional activities that
can be added to a rule. Event activities will be performed if the criteria is met.
28
Rule Cycles
Choose Cycles Best Suited for Activities
Filter network user requests:
If request or response has an Allow/Block list
embedded object: Anti-malware scanning
Anti-malware scanning Authentication
Inspection of request or Client-sent header
response body DLP filtering
Media type filtering Media type uploads
URL filtering
URL category filtering
The filtering process on the appliance has three cycles. A rule set can have one or a
combination of cycles
• The request cycle is performed for filtering user requests sent to the web.
• The response cycle is for responses to the user requests.
• The embedded objects cycle is an additional cycle of processing when requests or
responses embedded objects.
Choose cycles best suited for the rule activities. Some guidelines are:
• Request cycle:
• Anti-malware scanning
• Authentication
• Blacklist/whitelist, client-sent header, and URL filtering
• Response cycle:
• Anti-malware scanning
• Media type, server-sent header, and whitelist filtering
• Embedded objects cycle:
• Anti-malware scanning
• Inspection of request or response body
• Media type filtering
29
Rule Processing
Top-down Hierarchy
The rule sets themselves are processed in the order of the rule set system, which is shown on
the Rule Sets tab of the user interface.
In each of the three cycles, the implemented rule sets are looked up one after another to see
which must be processed in this cycle. When a rule is processed and found to apply, it triggers
an action. Processing also stops after all implemented rules have been processed.
30
Nested Rule Sets
Rule Sets with Other Rule Sets within Them
• Each nested rule set has its own criteria.
• Allows you to configure a nested rule to address one cycle and another rule for a
different cycle.
Rule sets can have other rule sets nested within them. A nested rule set has its own criteria.
Regarding cycles, it can only be processed in the cycles of the nesting rule set but need not be
processed in all of them. This way you can configure one nested rule set to address a particular
cycle and configure another nested rule set to address a different cycle.
As an example, a media type filtering rule set might apply to all cycles but include nested rule
sets that are not processed in all of them.
• Top-level rule set: Media Type Filtering for requests, responses, and embedded
objects
• Nested Rule Set: Media Type Upload for requests
• Nested rule set: Media Type Download for responses and embedded objects
31
How Lists and Rules Interwork
Retrieve Information about Web Objects and Users
• Define common values once and then re-use
them in multiple rules
• For example, rather than embed list of domains
in the rule. Reference a list of domains
• When changes are required, update the list
instead of individual rules
Web security rules on Web Gateway use several types of lists for retrieving information about
web objects and users. The main list types are:
• Custom lists: Can have entries in string, number, category, and other formats.
• System lists (read-only): Display on the lower branch of the lists tree on the Lists tab
and include category, media type, and application name lists, as well as lists of
connectors used for cloud single sign-on. They are updated when an upgrade to a
new version of Web Gateway is performed.
• Inline lists: Editable but they do not appear on the Lists tab. They appear inline as part
of the settings for a configuration item; for example, a list of HTTP ports as part of the
proxy settings.
• Subscribed lists: Define content retrieved from a subscribed data source. Subscribed
lists display in the lists tree at the end of the custom lists. There are two subtypes of
subscribed lists: Skyhigh-maintained and Customer-maintained.
• External lists: Reside on external sources under their own names. They have their
content transferred to Web Gateway, where they provide the value of a property in a
rule.
• Map type lists: Store pairs of keys and values that are mapped to each other. You can
create map type lists and include list entries on Web Gateway or retrieve entries as
subscribed or external lists from other sources.
• Common Catalog lists: Pushed from a Trellix ePO server to Web Gateway. Type of
entries are IP address, domain name, string, and wildcard expression format. They are
maintained on the Trellix ePO server.
32
Rule Set Permissions
Select the permissions tab
Read-only permission
No permission
As the administrator, you can grant or restrict access to rules, rule sets, and lists. Your options
are Read and write permission, Read-only permission, and No permission.
33
Best Practices
Grouping, Naming Convention, and Search
Group rule sets by functionality. This allows you to define exceptions that can be set for each of
the types of filtering.
Use a consistent naming schedule. A best practice is to name the rule set using its filtering type;
for example: Media Type filtering Antimalware filtering, URL filtering, and so on.
In addition, ensure rules reference the list and include a comment for search purposes.
Finally, use the import and export features to simplify management. Import allows you to an
item import from the library. Export allows to save an item for reuse, as well as serve as a
backup.
34
Best Practices (Continued)
Use Expensive Properties at End of Filtering Process
Expensive properties are those that require a huge processing effort. Use expensive properties
at the end of the filtering process. Some guidelines are:
• Low:
• Client.IP, Proxy.IP, or Proxy.Port properties
• Properties to check HTTP header information
• System.Hostname property
• URL, URL.Categories, or URL.Host properties
• Medium:
• Media.EnsuredTypes property
• Properties used for authentication
• Properties that use the composite opener
• URL.Destination.IP property
• High:
• Antimalware.Infected property
• Properties used in Data Loss Prevention (DLP) filtering
• Properties that use the HTML Opener
35
Knowledge Check
36
Check your Learning
Multiple choice: Choose the correct answer.
A. Allow
B. Block
C. Continue
D. Stop Rule Set
37
Check your Learning
Multiple choice: Choose the correct answer.
Rules are processed in the order they are listed in the rule set
list.
A. True
B. False
38
Review
Rules are processed in the order they are listed. Processing continues until there is a
match or until all implemented rules have been processed.
Group rule sets by functionality.
Access control (limiting administrator privileges) is applied to rule sets not
individual rules.
Rule sets can have nested rule sets for more granular control.
Perform filtering activities in best suited cycles.
Use expensive properties at the end of the filtering process.
Use lists for commonly used values to improve the efficiency of rule creation and
management.
• Rules are processed in the order they are listed. Processing continues until there is a match
or until all implemented rules have been processed.
• Group rule sets by functionality.
• Access control (limiting administrator privileges) is applied to rule sets not individual rules.
• Rule sets can have nested rule sets for more granular control.
• Perform filtering activities in best suited cycles.
• Use expensive properties at the end of the filtering process.
• Use lists for commonly used values to improve the efficiency of rule creation and
management.
39
Skyhigh Security is a registered trademark of Musarubra US LLC. Other names and brands are the property
of these companies or may be claimed as the property of others. Copyright © 2022. March 2022
40
Module 7: Rule, Rule Set, and List
Configuration
1
Module 8 Objectives
Create a rule.
Create a rule set.
Import a rule set.
Create a list.
Add list entries.
Configure rules and rule sets.
• Create a rule.
• Create a rule set.
• Import a rule set.
• Create a list.
• Add list entries.
• Configure rules and rule sets.
2
Review: Filtering Traffic
SWG
Request Response
As a review, the purpose of the web gateway is to filter web traffic. This includes requests sent
from the client to the web server, responses sent from the web server to the client, and any
embedded objects that were included in the client request or the web server response.
3
Review: Transactions (Request-Response)
SWG
Request
Transaction – All of the
cycles that are needed Embedded
Object
to complete a client’s (optional)
request.
Response
Cycles
Embedded
Object
(optional)
Log
When a client makes a request, the request enters the web gateway and becomes a
transaction. The definition of a transaction is all the cycles that are needed to complete a
client’s request.
Cycle types include the client’s request, any embedded objects sent with the request, the
server’s response, any embedded objects sent with the response, and a final log cycle.
4
Review: Cycles
Cycle Includes
Cycles
Request HTTP, HTTPS, FTP, IM
Request Response HTTP, HTTPS, FTP
Embedded Embedded Java and Visual Basic scripts,
Object
(optional) Objects (if sent ActiveX controls, graphics and
Response with request or compressed files
response)
Embedded
Object
Log Automatically occurs after each
(optional) transaction
Log
A request cycle includes HTTP, HTTPS, FTP, and instant messaging requests from a client.
• A response cycle includes HTTP, HTTPS, and FTP responses from a server.
• An embedded object cycle includes Java and Visual Basic scripts, ActiveX controls,
graphics, and compressed files that are sent as part of a client request or part of a server
response.
• The last cycle is a log cycle. A log cycle occurs automatically after each transaction.
5
Review: How Rules Work
1 Request
No Does this rule apply
response
to the cycle type?
embedded
Yes object
Skip the rules. Go to 2
Always apply this
the next rule set in the
rule set? Yes
list. Go to the rules. Use
No the rules in the rule
3 set to filter the web
Has the predefined object.
criteria been met? Yes
No
When traffic enters the SWG and passes through the rule sets, three configuration options
within a rule set determine if the traffic is filtered by the rule set’s rules or if the rule set is
skipped. These configuration options are shown in this flowchart.
The first configuration option is cycle type. The traffic is first analyzed to determine if its type;
request, response, or embedded object, is enabled in the rule set. If the cycle type is not
enabled, the rule set will be skipped. If the cycle type is enabled, the second configuration
option will be considered.
The second configuration option is to always apply this rule set. If this is enabled, the traffic will
be filtered by the rule set rules without any further analysis. If this option is not enabled, the
third configuration option will be considered.
The third configuration option is predefined criteria. If the traffic meets the predefined criteria,
the traffic will be filtered by the rule set rules. If the traffic does not meet the predefined
criteria, the rule set will be skipped.
6
Default Rule Sets with Preconfigured Rules
Modify Defaults or Create Your Own
Web Gateway includes default rule sets with preconfigured rules. By default, the rule set rules
are displayed in a simplified view. The simplified view can be changed to a full view by clicking
Unlock View. A warning alerts warning alert you there is no undo if you unlock the rule.
7
Enabling and Disabling Rule Sets
You can enable or disable these rule sets for on-premise and for cloud use, move,
copy, and delete them, modify their rules, import rule sets from a built-in or an
online library, and create rule sets of your own.
You can enable or disable these rule sets for on-premise and for cloud use, move, copy, and
delete them, modify their rules, import rule sets from a built-in or an online library, and create
rule sets of your own.
By enabling or disabling a rule set, you enable or disable all rules inside it.
8
Rule Design Overview
Define Relationships to Visualize Policy Requirements
Blocked IP
Blocked Range:
Client IP 10.10.10.170- Block
Range 10.10.10.175
Allowed IP
Allowed Range:
IP
Client IP 10.10.10.50- Stop Rule Set
Restrictions
Range 10.10.10.220
Block All
All Block
(Catch all)
When designing rules, your first step is to define the relationships between rule sets, rules, and
criteria. This helps you visualize your requirements.
Understand that the order of rules is vital. In this example, we configure Web Gateway to
restrict clients by IP address range.
Blocked IP Range:
10.10.10.170 - 10.10.10.175
Allowed IP Range:
10.10.10.50 – 10.10.10.220
9
Example Rule Construction
Custom Rule Set and Rule
• Build custom rule set and rules.
• Use meaningful naming conventions to identify purpose and facilitate future
searches.
• Use lists to save configuration and management time.
This example shows one way to build a new rule set. For training purposes, we will first delete
all rules so that all traffic is allowed. You can always re-import the default rules from the rule
set library.
Within this rule set, we will add three rules, one named Blocked Client IP Range, one named
Allowed Client IP Range, and a catch-all group named Block All. These names are for training
purposes. Use a naming scheme that is meaningful to you.
After saving the rules, we will configure the lists next. Remember, lists allow you to define
commonly used parameters once for reuse in multiple rules. This saves configuration and
management time.
10
Deleting Default Policies
All Traffic Now Allowed
For training purposes, we will first delete all rules so that all traffic is allowed. You can import
the default rules from the rule set library.
From the Web Gateway interface, click the Policy icon on the menu bar to open the Policy
page. In the left page, select (highlight) all items in the tree. Right-click and select Delete.
When prompted, click Yes.
Our next step is to add a rule set.
11
Adding Top Level Rule Set
IP Restrictions Rule Set
1. At the top of the left pane, click Add and select Top Level Rule Set.
2. In the Name box, type IP Restrictions. Make sure Enable is selected (checked/ticked)
and that Enable in Cloud is de-selected (no check/tick).
3. In the Applies to section, make sure Requests (and IM) is selected. Disable (remove
check/tick) by the other options. Restricting the number of cycles, you apply to the
rule set, helps speed up the processing time.
4. In the Apply this rule set section, select Always. This ensures the rule set is applied
to all traffic.
5. Click OK and then click Save Changes.
12
Adding Blocked Client IP Range Rule: Name and Rule Criteria
Example
13
Adding Blocked Client IP Range Rule: Add Criteria
Selected Property, Selected Operator, and Compare with
Property Operand
14
Adding Blocked Client IP Range Rule: Add List
8. In the Name box of the Add List window, type Blocked Client IP Range. Make sure the Type is
set to IPRange and then click OK.
9. Select the list and click Edit.
10. Define IP Range as 10.10.10.170-10.10.10.175.
15
Adding Blocked Client IP Range Rule: Action
Block
11. Next, define the action you want performed when there is a match. In this example, we
want to block IP addresses. Remember, we are defining the list entries later.
You can also modify the Settings to send any number custom block pages to the user. In this
case we could have a custom block page just for the IP range user explaining why they cannot
access the web.
12. We do not need to define any events, so the configuration is complete. Click Finish.
13. Verify the rule displays on the page and then click Save Changes.
16
Adding Allowed Client IP Range Rule: Name and Rule Criteria
Example
Within the IP Restrictions rule set, we will now add a rule named Allowed Client IP Range.
1. In the left pane, right-click on the IP Restrictions rule set and then select Add > Rule. In the
Name box, type Allowed Client IP Range. Make sure Enable rule is selected and then click
Next.
2. At the top of the Add Rule window, make sure If the following criteria is matched is
selected. Click Add, select User/Group criteria, and then Next.
17
Adding Allowed Client IP Range Rule: Add Criteria
Selected Property, Selected Operator, and Compare with
4. In the Name box of the Add List window, type Allowed Client IP Range. Make sure the Type is
set to IPRange and then click OK.
5. The list we added now appears in the far-right pane. Click OK and then Save Changes.
18
Adding Allowed Client IP Range Rule: Action
Stop Rule Set
• Stop Rule Set (Continue to other rule sets, if configured)
• Settings (optional)
• No events
6. Finally, define the action. For this rule, we want Stop Rule Set. This tells Web Gateway to
ignore any further rules in this rule set and continue to any other configured rule sets.
Because Events are not required, click Finish.
7. Verify the rule displays on the page and then click Save Changes.
19
Adding Block All Rule: Name and Rule Criteria
Example
• Enable rule
• Always
1. In the left pane, right-click on the IP Restrictions rule set and then select Add > Rule. In the
Name box, type Block All. Make sure Enable rule is selected and then click Next.
2. An important difference from our previous rules is the action. At the top of the Add Rule
window, this time select Always.
20
Adding Block All Rule: Action
Block
• Block
• Authorized only
• No Events
Like the other rules, you must define the action. For this rule, we want Block and Authorized only
which defines the block page used. The allowed IP addresses will never use this rule because
Web Gateway stops the rule set and bypasses this rule. Events are not required.
3. Verify the rule displays on the page and then click Save Changes.
As a reminder, rules are executed in the order they are listed. To change the order, use the
Move up or Move down options.
21
Review: Lists
Define Commonly Used Values for Re-use in Multiple Rules
• Custom Lists
• Subscribed Lists
• System Lists
Note: Reuse lists in multiple rules with caution. Editing a list for one rule may have an
unintended impact on another rule.
Here is the Lists tab. Lists are referenced by both rule sets and rules. List categories include
Custom Lists, Subscribed Lists, Hybrid Lists, and System Lists. Custom lists are the only lists you
can modify.
22
Example: List Management
Blacklist and Whitelist
Blocked Client IP Range
• IP range: 10.10.10.170-10.10.10.175
Allowed Client IP Range
• IP Range: 10.10.10.50-10.10.10.200
Edit Allowed Client IP Range and Blocked Client IP Range rules to add list
entries. Be sure to save the changes.
We will now define the lists to be used in the rules we just created. We can manage lists from
within the rules or from the Lists tab.
From the Lists tab, you can also identify its policy use.
It is important to remember that you cannot delete a list referenced in a rule or rule set.
23
Editing Blocked Client IP Range List
Add IP Address Range
The list is currently empty. Click the link to open the window for editing. Click + (plus sign), type
the IP address range in the dialog and then click OK. Review the list content and then click OK
again.
24
Editing Allowed Client IP Range List
Add IP Address Range
The list is currently empty. Click the link to open the window for editing. Click + (plus sign), type
the IP address range in the dialog and then click OK. Review the list content and then click OK
again.
25
Importing Rule Set from Rule Set Library
Web Gateway’s Rule Set library has many rule sets available which can be
imported and modified.
The built-in and online libraries provide rule sets for importing into your rule set system.
You can import a rule set, for example, to add a function that is missing in your system or
when the default rule sets do not suit your network.
The built-in rule set library also contains the rule sets that are part of the default rule set
system.
More rule sets are available from an online rule set library. A link to this library is provided in
the window of the standard rule set library.
In the built-in rule set library, rule sets are grouped in categories, for example, authentication
or URL filtering.
26
Knowledge Check
27
Check your Learning
Multiple choice: Choose the correct answer.
A. Custom Lists
B. Subscribed Lists
C. Skyhigh Maintained Lists
28
Check your Learning
Multiple choice: Choose the correct answer.
A. Action
B. Criteria
C. Events
29
Review
You can manage lists from within the rule or on the Lists tab.
By enabling or disabling a rule set, you enable or disable all rules inside it.
You can import rule sets from the Rule Set Library at any time.
Optionally restrict access to rule sets, lists, or settings.
There are multiple ways to create the same rule. Web Gateway supports flexibility to
meet your unique needs.
• You can manage lists from within the rule or on the Lists tab.
• By enabling or disabling a rule set, you enable or disable all rules inside it.
• You can import rule sets from the Rule Set Library at any time.
• Optionally restrict access to rule sets, lists, or settings.
• There are multiple ways to create the same rule. Web Gateway supports flexibility to meet
your unique needs.
30
Lab Exercises
Lab 7: Rules and Rule Set Configuration
Goals:
Configure proxy settings
Configure a basic rule set
Duration:
35 minutes*
The labs for this course are included in a separate lab guide. Each lab lists the lab goals,
required systems, and any files needed to complete the lab; for example, text files or
executables. At the top of each lab, there is a scenario. The scenario often contains the
information needed to complete the lab. Beneath each scenario, there are detailed steps. The
steps are supplied as a resource, in the event you need additional information to complete
the lab.
Note: The steps will vary depending on if your lab environment is local- or cloud-based.
31
Skyhigh Security is a registered trademark of Musarubra US LLC. Other names and brands are the property
of these companies or may be claimed as the property of others. Copyright © 2022. March 2022
32
Module 8: Global Threat Intelligence and URL
Filtering
1
Module 8 Objectives
• Describe the functionality that Global Threat Intelligence gives to Web Gateway.
• Identify the URL categories that Web Gateway uses.
• Create a custom URL category list using wildcards.
• Configure a web policy using URL categories, geolocation, and wildcard lists
2
URL Filtering Overview
Key Components
• Global Threat Intelligence (GTI)
• Gateway Anti-Malware Engine
• URL Filter Engine
• Rule Construction
• Dynamic Content Classifier
3
GTI Overview
Real-Time Categorization, Location, and Reputation Services
• Cloud-based database with
information correlated to
produce threat intelligence
• Bidirectional communication
between GTI and participating
Trellix/Skyhigh products
• Trellix/Skyhigh products
integrated with GTI
• At the top in the cloud there is the threat data correlated to produce threat
intelligence. The data comes from multiple sources, primarily queries from the millions
of Trellix products acting as sensors that are deployed in real-world settings around
the globe. With each query, the cloud system learns something new about the subject
of the query. This information is combined with data from other threat vectors to
better understand cyber-threats from all angles and to identify threat relationships,
such as malware used in network intrusions, websites embedded in malware code,
websites hosting malware, botnet associations, and more.
• The middle tier represents the bidirectional communications that occurs between
various Trellix & Skyhigh products and GTI. Products query the cloud, and our cloud
renders the latest reputation or categorization intelligence to the products so that
they can act.
4
GTI Overview (Continued)
Review: Telemetry (Feedback) Settings
The Telemetry settings are used for configuring the collection of feedback data about web
objects that are potentially malicious, as well as about policy configuration. To access the
Telemetry page:
1. Click the Configuration icon on the menu bar to open the Configuration page.
2. At the top of the left pane, make sure the Appliances tab is selected.
3. In the left pane, expand Appliances and click Telemetry. The Telemetry page opens in
the right pane.
5
Some Ways SWG Uses GTI
Categorization, or category-based URL filtering based on URL
Categorization mapping to defined URL categories, such as Pornography,
Auction, Business, Shopping or Sports
• Categorization
• Categorization, or category-based URL filtering, is a primary way to prevent user
access of dangerous sites. Categorization consist of a few basic components: a
database of URLs, a category scheme for classifying content, and a rules engine for
applying corporate policy to control who can view certain content on the Internet.
• Reputation
• GTI File and Web Reputation provides you with always-on, real-time protection that
safeguards and secures you from emerging threats. GTI File and Web Reputation
technologies provides access to an online cloud database containing classification
details to determine the content is malicious.
• Heuristic Scanning
• The Anti-Malware engine employs behavioral heuristics by combining rule-based and
weight-based methodologies. This enables the engine to estimate a program’s
behavior or functionality at runtime.
• Geolocation
• Geolocation refers to the physical location of hosted web sites. This feature provides
geographic visibility and policy management based on the web traffic’s origination.
• Application Mapping
• Leverage Web Gateway to extend your security policy to web applications. With point-
and-click control for nearly 1,000 web applications and granular function control
within those applications.
6
GTI Categorisation
• You can lookup the category and
reputation of any url at
https://sitelookup.mcafee.com/
• At this site you can also report
possible errors for review
• You can overwrite any category for
your policy in the url filter engine
used at Policy>Settings>URL
Filter><urlfilterused>>Extended List
7
Access to GTI
GTI is a Cloud Based Databased storing Intelligence
Only a proportion of this database is synchronised to the on prem SWG
appliance
You should configure your engines to use the local copy and query the cloud if
local finds no result.
In an environment where you have no direct internet access then you can
configure a proxy to reach the cloud GTI
In a pure air gapped environment then you should switch off cloud GTI look ups
as you will experience performance problems otherwise.
8
Access to GTI
Access to GTI is important in SWG
particularly for Gateway Anti
Malware and URL Filters.
If the SWG does not have direct
internet access then a proxy for GTI
access can be configured in the URL
filter engine
A default rule Set URL Filter Settings
to be Used by Other Filters should
be placed at or near the top of your
policy.
This rule sets GTI setting in particular
for Gateway Antimalware.
If air-gapped and NO proxy is used
then you should disable GTI access
to prevent performance problems.
9
GTI uses in Gateway Anti-
Malware
10
Gateway Anti-Malware Engine Overview
Proactive Detection
• Antivirus prescan
• Light-pass on common web files, low risk
files and trustworthy sites
• Global Threat Intelligence (GTI) file
reputation
• Heuristic scanning
• Gateway Antimalware's ability to defend
against zero-day advanced malware is
greatly enhanced with the availability of
online GTI queries.
The Gateway Anti-Malware engine is configured from the Policy page (Policy > Settings >
Engines > Anti-Malware > Gateway Anti-Malware). To ensure a higher level of web security, it
uses proactive methods to detect new viruses and malware, including antivirus prescan, light-
pass on common web files, low risk files and trustworthy sites, GTI file reputation queries and
heuristic scanning.
11
Configuring Gateway Anti-Malware Engine
Default Settings
Policy > Settings > Engines > Anti-Malware > Gateway Anti-Malware
Web Gateway is preconfigured for GTI; however, you can adjust the configuration, as necessary.
To view these settings, complete these steps from the Web Gateway interface:
1. Click the Policy icon on the toolbar to open the Policy page.
2. At the top of the left pane, click the Settings tab.
3. In the left pane, expand Engines and Anti-Malware and then click Gateway Anti-
Malware.
4. Scroll to the Advanced Settings section. Two important GTI settings here are listed
below. Both are enabled by default.
• Provide GTI web and file reputation queries to Gateway Anti-malware: Online
GTI web reputation and categorization services need to be enabled for the AV
filter by using rule Common Rules > Set URL Filter Internal Settings > Set URL
Filter Settings to be used by other Filters using a URL filter settings object
where GTI lookups are not disabled. Otherwise, this option will have no effect.
• Enable heuristic scanning: Enabled by default. When enabled, Web Gateway
applies heuristic scanning methods to web objects.
12
URL Filtering
13
URL Filter Engine Overview
Default and Special Settings for GTI Categorization and Reputation
• Search and rating of embedded URLs
• Forward DNS lookup to rate URLs
• Backward DNS lookup for unrated IP-based URLs
• Settings for default server used for GTI services
• Dynamic Content Classifier
• Advanced settings, such as cloud errors and
invalid URLs
The URL Filter module is also known as the URL Filter engine. It retrieves information on URL
categories and reputation scores from the GTI service. Based on this information, blocking rules
block access to URLs.
Various technologies, such as link crawlers, security forensics, honeypot networks, sophisticated
auto-rating tools, and customer logs are used to gather this information. An international, multi-
lingual team of analysts evaluate the information and enters URLs under particular categories
into a database.
To gather information on the reputation of a URL, its behavior on a worldwide real-time basis is
analyzed, for example, where a URL shows up in the web, its domain behavior, and other details.
You can configure settings for this module, for example, to let it include category information
retrieved from an extended list that you provide or to perform a DNS lookup for URLs and include
the corresponding IP address in the search for category information.
14
Configuring Default URL Filter Engine
Other important GTI settings are addressed in the URL Filter section. From the Policy page,
Settings tab:
1. In the left pane within the Engines section, expand URL Filter and then click Default.
2. In the right pane, scroll to the Ratings Settings section. Important GTI settings here
are listed below:
• Disable local GTI database: Enabled or disable. This is disabled by
default.
• Use online GTI web reputation and categorization services if local rating
yields no result: Enabled or disable. It is disabled by default. When
enabled, information on URL categories and reputation scores is
retrieved from GTI only if the search in the internal database yielded no
results.
• Use default server for online GTI web reputation and categorization
services: by default. When enabled, you can define a different server.
Another important feature that works with GTI is the Dynamic Content Classifier, which is
discussed later in this module. This feature applies only when the database and online GTI web
categorization lookups yield no result.
15
Configuring Dynamic Content Classifier (DCC)
When GTI Web Categorization Yields No Result
Pornography category
selected by default.
Dynamic classification is used when other methods do not return results for a website.
Pornography is blocked by default. Optionally, you can enable other supported categories.
16
GTI Properties Used for Rule Construction in URL Filters
URL.Categories
URL.IsHighRisk
URL.IsMediumRisk
URL.IsMinimalRisk
URL.IsUnverified
URL.Geolocation
17
Other Properties Used for Rule Construction in URL filters
URL/Host Criteria (Destination) URL.Parameters
URL.Destination.IP
URL.File.Extension
URL.Host
URL.Host.BelongsToDomains(List
of String)
URL.HostIsIP
URL.Parameters
URL.Path
URL.Port
URL.Protocol
URL/Host Criteria options are for the host destination. They include:
• URL.Parameters
• URL.Destination.IP
• URL.File.Extension
• URL.FilerName
• URL.Geolocation
• URL.Host
• URL.Host.Belongs
ToDomains(List of String)
• URL.HostIsIP
• URL.Parameters
• URL.Path
• URL.Port
• URL.Protocol
18
Default URL Filter Rule Sets and Rules
Available in Rule Set Library
• Bypass (disabled)
Geolocation • Geolocation – Lookup Country Codes
• Geolocation – Blocked Countries
Note URL Filters tend to be very deployment specific. Default rulesets can be used as a starting
point to build custom solutions.
Now that we have reviewed some basics, let’s take a closer look at the basic types of URL
filtering rules. Remember, if you deleted these rule sets, you can always import them from the
Rule Set Library.
19
Default URL Filtering by Category Rule Set
Whitelist/Blocklist and Category-based Filtering
20
Default Web Category Filtering Rules
Predefined Categories with Block Everything Else Catch-All
The Web Category Filtering group includes rules mapped to predefined categories. Access is
allowed or blocked by category; for example: Allow URLS Whose Category is in List Social
Networks, Instant Messaging Categories, General Use Categories, Personal Use Categories, and
so on. At the end, there is a catch-all Block Everything Else rule.
21
Default Geolocation Rule Set
ISO 3166 2 Alphanumeric Country Codes
See www.iso.org/iso/english_country_names_and_code_elements
22
Default Dynamic Content Classification (DCC) Rules
Based on DCC Analysis
Remember, the Dynamic Content Classifier detects URL categories when other methods of
detection yield no results.
23
Use Cases
Block access to sites categorized as having Pornography/Nudity and
Mature/Violent content
Deny all users except those in specific IP range (IT machines) from sites
categorized as Risk/Fraud/Crime
Deny access to specific sites and subdomains: npr.org, cnn.com, or
foxnews.com
As we bring it all together, let us look at some use cases. How would you implement these
policies? Remember, there are different ways to implement the same policy.
24
Use Case 1
Block access to sites categorized as having Pornography/Nudity and
Mature/Violent content.
• Add a rule to block the listed URL categories.
In the first use case, we block access to sites categorized with pornography or violent content.
25
Use Case 2
Deny all users except those in
specific IP range (IT machines)
from sites categorized as
Risk/Fraud/Crime
• Add a rule to block access to
listed URL Categories and if
Client IP is not in the range of
allowed IPs.
In the second use case, we want to deny all users except for a specific IP range, to be allows to
access risk/fraud/crime related sites.
26
Use Case 3
Deny access to specific sites and subdomains: npr.org, cnn.com, or foxnews.com.
• Add a rule to block the URLs listed.
In the third use case, we can deny access to specific sites and subdomains.
27
Knowledge Check
28
Check your Learning
Multiple choice: Choose the correct answer.
A. Categorization Service
B. Dynamic Content Classifier
C. Geolocation Lookup
D. Reputation Matching
29
Check your Learning
Multiple choice: Choose the correct answer.
Set.
Answer: B. Processing stops and access is blocked. See Default URL Filtering by Category Rule
30
Review
The GTI Gateway Engine and URL Filter Engine are preconfigured by default;
however, you can modify the defaults, as necessary.
GTI relies on online queries. A proxy can be configured in the URL Filter Engine.
Dynamic classification is used when other methods do not return results for a
website. Pornography is blocked by default. Optionally, you can enable other
supported categories.
Some ways Web Gateway uses GTI are Categorization, Reputation, Application
Mapping, Heuristic Scanning, and Geolocation.
Web Gateway provides default rule sets and rules that you can use as a starting
point; however, you can also create your own.
The GTI Gateway Engine and URL Filter Engine are preconfigured by default; however, you can
modify the defaults, as necessary.
Dynamic classification is used when other methods do not return results for a website.
Pornography is blocked by default. Optionally, you can enable other supported categories.
Some ways Web Gateway uses GTI are Categorization, Reputation, Application Mapping,
Heuristic Scanning, and Geolocation.
Web Gateway provides default rule sets and rules that you can use as a starting point; however,
you can also create your own.
31
Lab Exercises
Lab 8: GTI and URL Filtering
Goals:
Filter by URL
Filter by subscribe list
Duration:
30 minutes*
The labs for this course are included in a separate lab guide. Each lab lists the lab goals,
required systems, and any files needed to complete the lab; for example, text files or
executables. At the top of each lab, there is a scenario. The scenario often contains the
information needed to complete the lab. Beneath each scenario, there are detailed steps. The
steps are supplied as a resource, in the event you need additional information to complete the
lab.
Note: The steps will vary depending on if your lab environment is local- or cloud-based.
32
Skyhigh Security is a registered trademark of Musarubra US LLC. Other names and brands are the property
of these companies or may be claimed as the property of others. Copyright © 2022. March 2022
33
Module 9: Media Type Filtering and Data Loss
Prevention
1
Module 9 Objectives
2
Media Type Filtering
3
Media Type Filtering Overview
Block Upload/ Download Based on Media Type
• Specific Types
• Undetected
• Unsupported
• Multimedia
• Streaming
This slide highlights one of the key topics discussed in this module.
4
Media Type Filtering Overview (Continued)
Example Media Types
• Organized logically such as Documents
• Further divided by subtypes
The figures shows some types of media files for Documents. Notice there are subtypes within
the list. You can also use media types to prevent users from uploading content to websites; for
example: archived or encrypted files, corporate documents, or Other sensitive document types
5
Some Ways Web Gateway Controls Media Access
Upload media Blocks upload of media based on defined media type criteria.
type rule Processed in request cycle.
Download media Blocks download of media based on defined media type criteria.
type rule Processed in response cycle.
Media type and Included in rules for matching. Includes Custom Lists, String or
other lists Wildcards, and System Lists.
The media type filtering process includes several elements, which contribute to it in different
ways.
• Upload media type rule: This nested rule set blocks the upload of media belonging to
particular media types. It is processed in request cycles when users request to upload media
to the web, as well as in embedded object cycles when objects are embedded in media.
• Download media type rule: This nested rule set blocks the download of media belonging to
particular media types. It is processed in response cycles when web servers send media in
response to user requests for downloading them, as well as in embedded object cycles when
objects are embedded in media.
• List types: Rules use different list types for matching. These include System lists, String or
Wildcard Lists, and System lists.
• Enable Opener rule: When enabled it inspects web content for data that can be opened. If
data is found it extracts the data and run a separate embedded cycle for the data. Without
this event, no archived or embedded data will ever be examined. This rule type is included in
the Common Rules set. It is enabled by default.
6
Rule Construction
Key Elements
Media Type Criteria:
• Ensured
• Not ensured
• Composite
Media Type Lists:
• Custom Lists (editable)
• String or Wildcards
• System Lists (read-only)
Basic key elements for rules are Media Types properties and blocking lists. A blocking list is used
by a rule to block access to media that belong to particular types. Commonly used blocking list
types includes:
7
Rule Construction: Media Type Criteria
Policy > Rule Sets > Rule Set Tab View (New Media Type Rule Set/Rule)
• MediaType.EnsuredTypes: Media with a high probability of detection (greater than 50%). This
level of probability is assumed if a media type signature from an internal list on the appliance
can be found in the object code of the media.
• MediaType.Is.CompositeObject: Property of media type that is archive or Microsoft Office file.
• MediaType.NotEnsuredTypes: Media with a low probability of detection (less than 50%).
• MediaType.FromFileExtension: Property of media for which types are assumed based on the
extensions of the media type file names. Extensions and the media types associated with
them are looked up in an internal catalog on the appliance. There are, however, extensions
that are used by more than one media type.
• MediaType.FromHeader: Property of media for which types are assumed according to the
content type field of the headers sent with the media. Headers are read and evaluated in a
standardized format. To filter headers in their original formats, you can use the Header.Get
property.
• List.OfMediaType.IsEmpty: Property of media with types that are not on an internal list.
• User Defined Property: Custom property and list content.
8
Rule Construction: Media Type Lists
Custom, Wildcard Expression, and System
System Lists
The figure shows the types of lists used in rules. Remember, Custom Lists are editable, but
System Lists are read-only. You manage lists from the Lists tab on the Policy page or by clicking
a links in the rule.
9
Default Enable Opener Rule
Opens Jobs for Examination
Import
Import rulerule
set
set
from from
library.
library
The Enable Opener rule set is the default rule set for handling file opening on Web Gateway.
The key elements of the Enable Opener rule set include settings for file opening and several
block options.
10
Default Media Type Filtering Rule Set
Block Upload Rules
Media type filtering ensures that the users of your network can only access media belonging to
types that are allowed under your web security policy. For example, access to streaming media
might not be allowed because it consumes too many resources.
The default Media Type Filtering rule set includes upload and download rules.
11
Default Media Type Filtering Rule Set
Block Download Rules
There can be a blocking list for media that should not be uploaded from within your network to
the web, as well as one for media that should not be downloaded from the web to your network.
12
Data Loss Prevention
13
Data Loss Prevention (DLP) Overview
Engines Included with Web Gateway
• Data loss prevention rules control the process.
DLP ensures that sensitive content is not allowed to leave your network. The prevention process
detects this content and blocks traffic going out to the web accordingly.
You can also use data loss prevention rules to keep inappropriate content from entering your
network; however, this can have an impact on performance.
The data loss prevention process can be applied to text contained in the body that is sent with a
request or response or to any other text that is contained in requests or responses, for example,
URL parameters or headers.
When you are running the appliance together with a DLP solution that uses an ICAP server for
the filtering process, you can implement a rule set to ensure the smooth flow of data between
the appliance and the ICAP server.
Note: Basic Data Loss Prevention (DLP) functionality is included with the base Web Gateway
license.
14
Adding DLP Classifications
Policy > Settings > Engines > Data Loss Prevention (Classifications)
• Tracking Policy: Controls if the DLP filter will keep looking through the file after the first
match. Minimum means the DLP will stop inspecting the document after the first
match. Maximum will continue searching through the file. Maximum WILL cause a
performance hit but will give you an accurate count of total DLP matches.
• DLP Classifications: Allows you to select the classifications you wish to look for from the
pre-generated groups. You can select individual classification (like HIPAA Compliance
– Credit Cards) or a larger group (HIPAA).
• Reported Context Width: How much data around the matched term is included in the
logging. By default, the matched term is surrounded by brackets [ ]. The default is 30
characters.
• Context List Size: Maximum number of entries that are stored in the *.MatchedTerms
properties for use in logging or other reporting.
15
Adding DLP Dictionary Entries
Policy > Settings > Engines > Data Loss Prevention (Dictionaries)
Dictionary entries are a created list of text or wildcard expressions. It is recommended that you
use regular expression (regex) statements when using wildcards for quicker processing. It is
quicker and more efficient to perform a regular expression search than a wildcard match.
16
Default DLP Rule Sets and Rules
Available in Rule Set Library
• Imported from
Rule Set Library
• Full view
Import the Data Loss Prevention rule set from the library. Review its rules and modify them as
needed; for example:
Make sure the Composite Opener is enabled so the body text sent with requests and responses
is inspected. In the default rule set system, this rule is contained in the Enable Opener rule set,
which is nested in the Common Rules rule set.
If you want to run data loss prevention with the Internet Content Adaptation Protocol (ICAP), you
can import another rule set from the library and modify its rules as needed.
17
Use Cases
As we bring it all together, let us look at some use cases. How would you implement these
policies? Remember, there are different ways to implement the same policy.
18
Use Case 1
Block download of executables (.exe) from all sites except mcafee.com.
In this first use case, we are looking to block the download of executables from all sites except
certain ones.
19
Use Case 2
Block upload of files with payment card industry (PCI) information.
The second use case involves blocking the upload of files with PCI information.
20
Use Case 3
Block upload of files with Sarbanes-Oxley (SOX) information.
Our third use case blocks uploading files that contain SOX information.
21
Knowledge Check
22
Check your Learning
True - False
A. True
B. False
23
Check your Learning
Multiple choice: Choose the correct answer.
A. MediaType.EnsuredTypes
B. MediaType.FromFileExtension
C. MediaType.NotEnsuredTypes
24
Check Your Learning
Multiple choice: Choose the correct answer.
Answer: A. data loss prevention modules. See Data Loss Prevention in the Product Guide.
25
Review
Media Type filtering rules block upload/download of content based on media type.
Blocked lists types are Custom Lists, String or Wildcards, and System Lists (read-
only).
Make sure the composite opener is enabled and placed before media type or
malware filtering rules.
Enforce on appropriate cycles; for example: Upload = Requests/Embedded Objects,
Downloads = Responses/Embedded Objects.
SWG – DLP; Data loss prevention (DLP) ensures that sensitive content is not allowed
to leave your network.
• Media Type filtering rules block upload/download of content based on media type.
• Blocked lists types are Custom Lists, String or Wildcards, and System Lists (read-only).
• Make sure the composite opener is enabled and placed before media type or malware
filtering rules.
• Enforce on appropriate cycles; for example: Upload = Requests/Embedded Objects,
Downloads = Responses/Embedded Objects.
• SWG – DLP; Data loss prevention (DLP) ensures that sensitive content is not allowed to leave
your network.
26
Lab Exercises
Lab 9: Media Type Filtering
Goals:
Filter download by media type
Duration:
30 minutes*
The labs for this course are included in a separate lab guide. Each lab lists the lab goals,
required systems, and any files needed to complete the lab; for example, text files or
executables. At the top of each lab, there is a scenario. The scenario often contains the
information needed to complete the lab. Beneath each scenario, there are detailed steps. The
steps are supplied as a resource, in the event you need additional information to complete the
lab.
Note: The steps will vary depending on if your lab environment is local- or cloud-based.
27
Skyhigh Security is a registered trademark of Musarubra US LLC. Other names and brands are the property
of these companies or may be claimed as the property of others. Copyright © 2022. March 2022
28
Module 10: Malware Scanning
1
Module 10 Objectives
2
Malware Filtering Overview
Block Infected/Malicious Sites
Engine Settings
Rule Construction
Anti-malware Queue
3
Anti-Malware Scanning Engines and Behavior
Policy > Settings > Engines > Anti-Malware > Gateway Anti-Malware
Full
coverage
Advanced
Threat Layered
Defense coverage
only
Scanning
Engines
Duplicate
Avira only
coverage
4
Configuring Mobile Code Behavior
Policy > Settings > Engines > Anti Malware > Gateway Anti-Malware
The Mobile Code Behavior settings define the risk level in classifying mobile code. The risk level
can take values from 60 to 100.
A low value means the risk in proactively scanning the behavior of mobile code and not
detecting that it is malware is low because the scanning methods are applied very strictly.
Mobile code will then be classified as malware even if only a few criteria of being potentially
malicious have been detected. This can lead to classifying mobile code as malware that is not
malicious (false positives). While more proactive security is achieved with a stricter setting,
accuracy in determining which mobile code is malicious will suffer. Consequently, the appliance
might block web objects that you want to get through to your users.
A high value means the risk in not detecting malicious mobile code is high (more false
negatives), but more accuracy is achieved in classifying mobile code correctly as malicious or
not (fewer false positives).
5
Configuring Advanced Settings
Policy > Settings > Engines > Anti Malware > Gateway Anti-Malware
6
Configuring Gateway Anti-Malware Settings
Policy > Settings > Engines > Anti Malware > Gateway Anti-Malware
Advanced Settings for Gateway Anti-Malware options are shown in the figure.
• Enable detection for potentially unwanted programs. When selected, web objects are
also scanned for potentially unwanted programs.
• Enable mobile code scanning. When selected, mobile code is scanned in general.
Individual settings can be configured under Scan the following mobile code types.
• Enable removal of disinfected content detected in HTML documents by mobile code
filter.
7
Configuring Advanced Settings for Avira
Policy > Settings > Engines > Anti Malware > Gateway Anti-Malware
The Advanced Settings for Avira section is used to limits the size (in MB) of a member in an
archive that the Avira engine scans for infections. If an archive member exceeds this size, it is
not scanned, and the archive is blocked. The default size limit is 1024 MB.
8
Configuring Custom Anti-Malware Engine
Specific Traffic Types, Authentication, and GTI Lookups
Optionally, you can create a custom new Anti-Malware engine with different settings, such as
layered coverage and a lower classification threshold. This gives you the flexibility to use a
different engine for specific traffic type, as well as for authentication and Global Threat
Intelligence (GTI) Lookups.
9
Rule Construction Overview
Key Elements
Scanning Options:
• Remove partial content for HTTP requests (scan complete HTTP/HTTPs files)
• Block partial content for FTP requests
• Use the Media Stream Scanner
Quarantine Settings:
• Enable to quarantine virus into file based on IP ranges
• IP ranges to include
10
Gateway Anti-Malware Scanning
Enable Anti-Malware scanning: When selected, a rule is enabled that calls the Anti-
Malware Module, which scans web objects for infections by viruses and other malware.
Quarantine Settings
Enable to quarantine virus into file based on IP ranges.
IP ranges to include.
11
Rule Construction (Continued)
Anti-Malware Criteria
User Defined
Scanning traffic for malware is expensive in terms of processor and memory usage. It is
recommended to try to minimize the amount of traffic the Antimalware.Infected property
checks.
There is a special Virus Found block page that contains the name of the virus, where the virus
was found, and the filename was that contained the file. This, like all block pages is editable and
can have different administrative contact information.
12
Advanced Threat Defense (ATD) options are:
• Antimalware.MATD.GETReport
• Antimalware.MATD.InitBackgroundScan(Number)
• Antimalware.MATD.IsBackgroundScan
• Antimalware.MATD.Hash
• Antimalware.MATD.Probability
• Antimalware.MATD.Report
• Antimalware.MATD.Server
• Antimalware.MATD.TaskID
• Antimalware.MATD.VersionString
13
Rule Construction (Continued)
Operators and Comparison Values
14
Default URL Filter Rule Sets and Rules
Gateway Anti-Malware • Allow if User Agent Matches User
Agent Whitelist
• Allow URL Host that Match Anti-
Malware Whitelist
• Remove Partial Content for HTTP(s)
Requests
• Block Partial Content for FTP
Gateway Anti-Malware Requests
Now that we have reviewed some basics, let’s take a closer look at the malware filtering rules.
Remember, if you deleted these rule sets, you could always import them from the Rule Set
Library. The first rule set type is Gateway Anti-Malware, which is available with the standard Web
Gateway license.
15
Default URL Filter Rule Sets and Rules (Continued)
Advanced Threat Defense (ATD)
Other rule sets include MATD – Handle Offline Scan, MATD – Initial Offline Scan, and Advanced
Threat Defense. Although these rule sets are present in the Rule Set Library, they do not work
without ATD. ATD is purchased and deployed separately. In addition, the add-on license for Web
Gateway is required.
16
Default Gateway Anti-Malware Rules
Allow/Block and Scan to Detect Viruses and Other Malware
• Allow if User Agent Matches User Agent Whitelist: Uses Header.Request.Get property.
• Allow URL Hosts That Matches in List Anti-Malware URL Host Whitelist: Uses URL.Host
property.
• Remove Partial Content for HTTP(s) Requests: Uses Cycle.Top.Name and
Connection.Protocol properties.
• Block Partial Content for FTP Requests: Uses Cycle.Top.Name and Connection.Protocol
properties.
• Start Media Stream Scanner on Streaming Media and Skip Anti-Malware Scanning:
Uses Cycle.Name and StreamDetector.IsMedia properties.
• Bypass Based on Size (200MB): Uses StringToNumber, Cycle.Name, and Body.Size
properties.
• Anti-Malware: Quarantine IPRange: Uses Client.IP and Antimalware.Infected properties.
• Block if Virus was Found: Uses Antimalware.Infected property.
17
Use Cases
1. Use custom Anti-Malware Engine:
• Name: Antimalware-80 w/Avira
• Coverage: Layered
• Classification threshold: 80
2. Bypass scanning for youtube.com, hulu.com. and netflix.com.
3. Bypass scanning for media in Anti-Malware Category Whitelist including
Streaming Media, Internet Radio, Web Phone and General news or 10.10.10.0/24
subnet.
As we bring it all together, let us look at some use cases. How would you implement these
policies? Remember, there are different ways to implement the same policy.
18
Use Case 1
Use custom Anti-Malware Engine
• Name: Antimalware-80 w/Avira
• Coverage: Layered
• Classification threshold: 80
In the first use case, we will create our own instance of the settings for the Anti-Malware module
and use them in anti-malware filtering rules.
19
Use Case 2
Bypass scanning for youtube.com, hulu.com and Netflix.com
In the second use case, we will create a whitelist to exclude web objects from further anti-
malware filtering.
When administering the anti-malware filtering process, we can create URL lists of hosts and use
this list to exclude requests with particular URLs from further anti-malware filtering.
Note: The list is empty by default and will need to be filled in with your chosen entries.
20
Use Case 3
Bypass scanning for media in Anti-Malware Category Whitelist including
Streaming Media, Internet Radio, Web Phone and General news or 10.10.10.0/24
subnet.
In the third use case, we will create a whitelist to bypass scanning for Internet Radio / TV,
Streaming Media, General News and Web Phones.
You can maintain lists of media types, which are used by the rules in the rule set for allowing
and blocking access to particular media types.
21
Knowledge Check
22
Check your Learning
Multiple choice: Choose the correct answer.
A. Full coverage
B. Layered coverage (Full coverage plus specific Avira
features)
C. Duplicate coverage Full coverage plus all Avira engine)
D. Avira only
23
Check your Learning
True - False
A. True
B. False
24
Check your Learning
Multiple choice: Choose the correct answer.
A. URL.Infected
B. Website.Bad
C. Antimalware.Infected
D. Antimalware.Check
25
Review
26
Lab Exercises
Lab 10: Malware Scanning
Goals:
Block the downloading of material that contains malware
Duration:
30 minutes*
The labs for this course are included in a separate lab guide. Each lab lists the lab goals,
required systems, and any files needed to complete the lab; for example, text files or
executables. At the top of each lab, there is a scenario. The scenario often contains the
information needed to complete the lab. Beneath each scenario, there are detailed steps. The
steps are supplied as a resource, in the event you need additional information to complete the
lab.
Note: The steps will vary depending on if your lab environment is local- or cloud-based.
27
Skyhigh Security is a registered trademark of Musarubra US LLC. Other names and brands are the property
of these companies or may be claimed as the property of others. Copyright © 2022. March 2022
28
Module 11: Authentication and Account
Management
1
Module 11 Objectives
2
Authentication Overview
Authentication
Deny Failure
Authenticated=No
Client Request Deny connection
Browser
Authentication
Success
Authenticated=Yes
Allow Connection
Web Gateway
Request
Authentication
Rule Set | Rules
Engines | Methods Web
Server
The Web Gateway can be configured to authenticate requests before users are allowed to
access specific web sites.
If the authentication fails, the user is denied access to the site. If the authentication passes, the
user is allowed access to the site.
3
Configuration Overview
Workflow
Step Description
Configure Authentication engine. (Method Web
1 Gateway authenticates a session)
• Policy > Settings > Engines
Configure authentication rule set
2 • Apply to Requests (and IM)
• Configure criteria
Here are the high-level steps to configure the Web Gateway for authentication.
1. The first step is to configure the method that will be used to authenticate the user.
Authentication methods are configured from the Settings tab of the Policy page
under Engines.
2. Next, create a rule set that applies only to requests. Configure the rule set with the
criteria that has been recommended for authentication.
3. Finally, create rules for authentication. Authentication methods are selected when
configuring the rule criteria.
4
Authentication Engine Overview
Policy > Settings > Engines >Authentication
Authentication methods are configured from the Settings tab of the Policy page, under the
Authentication engine.
After an installation, User database is the only authentication method that is configured by
default under the Authentication engine.
The additional authentication methods that can be configured include NTLM, NTLM-Agent, LDAP,
Novell eDirectory, Radius, Kerberos, SSL Client Certificate, Authentication server, One Time
Password, and SWPS. See the next page for an explanation of each method.
Note: You can use multiple authentication methods; for example, use different methods based
on properties (client IP, hostname, URLs).
5
Authentication Engine Overview
Methods
The table explains the authentication methods available from the authentication drop-down
menu.
Note: There is only one User Database list on the Web Gateway. You cannot add any additional
Local User Lists. The list contains usernames, passwords and group memberships.
6
Authentication Engine Overview (Continued)
Some authentication methods require configuration of settings for the appliance system;
Additional Methods for example, NTLM and Kerberos.
For some authentication methods, you must configure settings that are not settings of the
Authentication module, but of the appliance system.
This applies when you are implementing NTLM as the authentication method. In this case, you
need to join the appliance to a Windows domain and configure the Windows Domain
Membership settings, which are system settings. It applies also for the Kerberos authentication
method, which is implemented using the Kerberos Administration system settings.
7
Configuring Authentication Method
Address Common and Specific Settings
There is more than one way to add a new authentication method. You can either click Add from
the Settings tab, or as shown on this page, right-click on Authentication and select Add.
Type a name and select an authentication method from the drop-down menu. After selecting a
method, configuration settings for your selection appear. Modify the default settings, as
necessary. Click OK and Save Changes.
8
Configuring Kerberos
9
Kerberos Configuration Workflow - I
Setup on Active Directory
1. Create Kerberos user with the following properties:
• The user cannot change the password
• The password never expires
• On the user account, you will want to enable the options for support of AES128 or AES256
for Kerberos Authentication
You can perform all of these steps using the Three Headed Dog tool.
You can perform all of these steps using the Three Headed Dog tool.
10
Kerberos Setup Tool
Three Headed Dog
• Setting up Kerberos can be tough from an
organizational standpoint as well as a
technical standpoint.
• The Three Headed Dog (THD) is here to simplify
the process by taking the guess work out of the
syntax.
• THD will use smart defaults and validate the
inputs to make sure you're on the right track.
A Kerberos setup tool has been created to make the setup process much easier -- it will provide
you with the commands to give to your Active Directory team.
11
Kerberos Configuration Workflow – II
Setup on SWG GUI
1. Integrate SWG to Windows Domain.
• (Configuration > Appliances > [Appliance] > Windows Domain
Membership)
12
Kerberos Configuration Workflow – III
SID to Group Name Mapping
• Groups Export is a feature intended for deployments where the Web Gateway does not have
a connection to directory resources.
• With Kerberos, the ticket presented by the workstation includes the Group IDs (not Group
Names), so a directory connection is required to map or lookup the actual Group Names.
• With the Groups Export feature in THD, it can export a "Map" list of Group IDs to Group Names.
• This Map list can be used in the Web Gateway to substitute for a directory connection.
13
Joining Appliance to Windows Domain
NT LAN Manager (NTLM) Authentication
• Required for NTLM authentication method.
• An appliance can be a member of multiple
domains.
When using the NTLM authentication method, you need to join an appliance to a Windows
domain to let the authentication module retrieve user information stored on the domain server.
An appliance can be joined to more than one domain.
Select Configuration > Appliances. On the appliances tree, select the appliance you want to join
and click Windows Domain Membership. A list of domains appears on the settings pane. It is
initially empty.
Note: You may need to use FQDN for the domain controllers since it's more likely to properly
resolve (forward DNS > Hostname to IP) than the IP address (Reverse DNS -> IP to hostname) of
the Active Directory servers.
14
Rule Construction: Rule Set
Framework for Authentication Rules
Here we look at the framework to create an authentication rule set. This rule set will be the
container for the authentication rules.
15
Rule Construction: Criteria
Properties, Operators, and Operands
The rule criteria includes settings for the Authentication engine, which specify use of the
authentication method. This means information for authenticating users is retrieved from an
internal database on the appliance.
The Operator list varies, depending on selected property; for example, the
Authenticate.UserName property has more operator options than the Authenticate.Authenticate
property.
16
Rule Construction: Multiple Authenticators
Authenticate with Kerberos with NTLM Fallback
Note: The HTTPS URL can be blocked in HTTP-CONNECT method itself considering no Stop
Cycle for the HTTP-Connect request.
17
Authentication Process
1st Unauthenticated Request
3 headers are present in this example telling the client which authentication methods are
supported on this SWG.
• Negotiate (Kerberos)
• NTLM
• Basic (login / password sent in base64)
18
Authentication Overview
Kerberos Authentication
Client
Kerberos Authentication
1. Prior to accessing the proxy, the user logs into Windows and contacts the Authentication
Service (AS) for a Ticket Generating Ticket (TGT).
2. The AS sends back a TGT hashed with the client's secret key.
3. The user attempts to access a URL that requires authentication.
4. Client receives the HTTP response code 407 (proxy authentication) from the Web Gateway .
5. Client contacts the Ticket Generating Service (TGS) with his TGT and requests service ticket
for Web Gateway service.
6. The TGS verifies ticket is valid and issues a new Service Ticket with the client information
encrypted with the Web Gateway’s key.
7. The Client sends the Service Ticket to the Web Gateway for authentication. The Web
Gateway can decrypt it, verify the ticket, and see client identity. Request is sent to server.
8. Server sends response to client through proxy.
19
Authentication Overview
NTLM Authentication
Client
AD Web Server
SWG
SMB HTTP/S
HTTP
Traffic Traffic
Browser Traffic
NTLM Authentication
1. Prior to accessing the proxy, the user logs into the local domain.
2. The user attempts to access a URL that requires authentication.
3. The proxy sends a 407-challenging user for authentication.
4. The user sends a NTLM_NEGOTIATE message containing its Windows domain and username.
Proxy forwards information to AD.
5. The DC sends NTLM Challenge data to client through proxy.
6. The client sends NTLM response to AD through proxy.
7. AD confirms successful authentication to proxy, we now have a verified authenticated proxy
session.
8. Proxy sends requests to server.
9. Server sends response to client through proxy
20
Transparent Authentication with Cookies
21
Web Gateway Account Management
22
Account Management Overview
Accounts Page
Add/modify internal administrator accounts and roles.
Enable/configure external management of administrator accounts.
Default administrator account settings:
• Name: admin
• Password: webgateway
• Role: Super Administrator
Accounts Roles
The accounts page is used to add or modify internal administrator accounts and roles and
enable and configure external management of administrator accounts. Internal administrator
accounts are used to authorize access to the user interface. Multiple administrators can be
logged on to the Web Gateway simultaneously, provided each administrator is using a unique
account.
This page shows the internal administrator accounts and roles that are created by default
during installation.
23
Default Administrator Roles
Assign Permissions to Internal Administrators
Roles are used to assign permissions to internal administrators. Roles allow or deny access to
the top-level pages Dashboard, Policy, Configuration, Accounts, and Troubleshooting. The
figures show the settings of the default roles.
24
Adding a Role
Internal Administrator Accounts Pane or Roles Pane
You may add a role from the internal administrator accounts pane or the roles pane. After
saving your changes you may be prompted to log out and then log back in again.
25
Adding a Role (Continued)
Configuring Access
Enable
specific
policy
permissions
Enable REST
interface
Here we will see how roles allow or deny an administrator account access the top-level pages
of the user interface.
Access to the Dashboard, Configuration, Accounts, and Troubleshooting pages is either allowed
or denied by checking or not checking the box next to the page name.
Access to Policy page is more granular. An administrator account can be allowed or denied
access to the rules, lists, and settings. Additionally, the administrator account can be allowed or
denied the ability to create and move rules, create lists, and create settings.
26
Adding an Administrator Account
Accounts Page
To add an administrator account, complete these steps from the Accounts page:
1. Click Add. An Add Administrator window opens.
2. Type the username.
3. Type and confirm the password.
4. Use the drop-down to select an existing role. Optionally, edit or add a role here.
5. Optionally, type a name.
6. Click OK.
7. Click Save Changes.
Once you have added an internal administrator account, you may test using the Test with
current settings pane on the right side of the page. Type in the administrator credentials;
username and password and then click the Test button. The results appear in the
authentication test results window.
27
Configuring External Account Management
Authentication by External Server
To configure this feature, first enable administrator accounts are managed externally (LDAP,
NTLM, or Radius) or via SSL client certificates. Then configure the authentication server details.
To configure the authentication server details, first select the authentication method from the
drop-down list. The area will then populate with parameters specific to the authentication
method.
You may use role mapping to assign Web Gateway roles to groups or users authenticated by an
external server.
28
Use Cases
1. Create a Log file Reviewer role.
As we bring it all together, let us look at some use cases. How would you implement these
policies? Remember, there are different ways to implement the same policy.
29
Use Case 1
Create a Log file Reviewer role
In the first user case, we create a log file reviewer role. This is typically enabled to allow access
to the Troubleshooting tab to carry out troubleshooting measures.
30
Use Case 2
Create a role to execute policy creation/retrieval requests to SWG over the REST
interface
In the second use case, we create a role that allows access to the REST Interface. This is
typically applied to roles that use of the REST interface for completing administration activities
on an appliance.
31
Use Case 3
Create a User Role
In the third use case, creating a Manager role is often used when needing to allow access to
the Dashboard tab on the user interface.
32
Knowledge Check
33
Check your Learning
Multiple choice: Choose the correct answer.
A. User Database
B. NTLM
C. Kerberos
D. SSL Client Certificate
34
Check your Learning
Multiple choice: Choose the correct answer.
A. Super Administrator
B. ePO Common Catalog Administrator
C. Help Desk
35
Review
36
Lab Exercises
Lab 11: Authentication and Account Mangement
Goals:
Enable Windows Domain Authentication (NTLM)
Use windows domain groups to determine which sites users can
access
Authenticate users using Kerberos
Create a new administrator role
Duration:
45 minutes*
The labs for this course are included in a separate lab guide. Each lab lists the lab goals,
required systems, and any files needed to complete the lab; for example, text files or
executables. At the top of each lab, there is a scenario. The scenario often contains the
information needed to complete the lab. Beneath each scenario, there are detailed steps. The
steps are supplied as a resource, in the event you need additional information to complete the
lab.
Note: The steps will vary depending on if your lab environment is local- or cloud-based.
37
Skyhigh Security is a registered trademark of Musarubra US LLC. Other names and brands are the property
of these companies or may be claimed as the property of others. Copyright © 2022. March 2022
38
Module 12: HTTPS Scanning
1
Module 12 Objectives
2
HTTPS Overview
Key Components
• HTTPS Scanning Engines
• Certificate Authority (CA)
• HTTPS Scanning Rules
• Whitelist and Other Lists
3
HTTPS Scanning Overview: How It Works
Client
You can configure the Web Gateway to present its own certificate when clients request a HTTPS
connection. This allows the Web Gateway to decrypt client traffic sent to itself, inspect it for
malware, keywords, Media Types and any other normal policy restriction and then re-encrypt
the traffic before sending it to the destination server. For this you need:
This is technically a type of Man-in-the-middle attack where the Web Gateway is decrypting
the SSL stream, inspecting the traffic, then re-encrypting on the far side for the server. This
requires the client to trust the Web Gateway as a root CA, as it will be signing certificates for all
SSL connections it will be decrypting.
Note: You can bypass scanning of any type of traffic you want to remain encrypted; for example:
SSL VPN tunnels, connections to banking/financial sites, connections to partners and resellers.
4
HTTPS Overview
HTTPS Through a Proxy
To better understand the HTTPS Scanner rule set, let’s look at what happens when internal client
makes HTTPS request to external web server.
In this example, no filters are in place and SWG will only be facilitating the connection.
5
HTTPS Overview
SSL Inspection (Traffic allowed by policy)
1. The client sends encrypted traffic. The gateway intercepts the encrypted traffic and
decrypts it. It inspects the content based on its rule policy (Antivirus, Web Filtering, etc.)
2. If the gateway rule policy determines the traffic is allowed, it encrypts the content and
sends it to this destination.
3. The destination receives the encrypted content, decrypts it, encrypts a response and
sends it to the gateway.
4. The gateway receives the content, and the process starts all over throughout the
interaction between the client and the web server.
6
HTTPS Scanning Engines
Rules Call Engines for HTTPS Scanning Processes
HTTPS scanning rules call the following engines to perform HTTPS scanning process:
• SSL Client Context with CA: The SSL Client Context with CA (certificate authority) engine
settings defines how Web Gateway sends certificate information to clients. By default, a root
certificate authority included with Web Gateway; however, it is recommended that you
generate and use your own CA.
• SSL Scanner: This engine has two sub-engines: Default Certification Verification and Enable
Content Inspection. On the Default Certificate Verification page, Certificate verification is
enabled and configured by default. On the Enable Content Inspection page, SSL inspection is
enabled and configured by default.
• SSL Client Certificate Handling: Used to add a list of known client certificates that Web
Gateway can send web servers in SSL-secured communication.
• SSL Client Context without CA: The SSL Client Context without CA settings are used to
configure settings to send certificates with no information about the CA to the clients of a
Web Gateway appliance.
7
Viewing Default Certificate Authority
Provided with Web Gateway
Manage CA
Default
Policy > Settings > SSL Client Context with CA > Default CA
The Default CA page (Policy > Settings > SSL Client Context with CA > Default CA) displays
information about the current CA and is used to manage the CA, as well as enable or disable
the Send Certificate option, which is enabled by default.
It is recommended to replace the default root CA for signing certificates that the appliance
sends to its clients with your own. You can create a CA yourself and import from your file system.
Web Gateway provides a default root CA. This CA signs incoming HTTPS connections from
clients if the SSL scanner is enabled. Clients should not recognize this as a valid root certificate
authority by default and will present warning pages about the site being untrusted. To remove
these messages, it is recommended to create a new root certificate on the Web Gateway and
import it. Then clients will trust the Web Gateway as a certificate authority and no longer display
popup untrusted messages when making HTTPS connections.
You can push and add the Web Gateway as a trusted CA using Microsoft Group Policy.
You CANNOT purchase a server certificate from a certificate authority that allows the Web
Gateway to sign certificates as if it was a CA.
8
Generating Certificate
Policy > Settings > SSL Client Context with CA > Default CA
Replace default
text.
To generate a new CA, complete these steps from the Policy page > Settings tab:
1. In the left pane, expand Engines and SSL Client Context with CA and then select
Default CA. The default CA opens in the right pane.
2. By Certificate Authority, click Generate. The Generate Certificate Authority window
opens.
3. Replace the default text with valued appropriate for environment and click OK.
4. Verify the new settings display on the Default CA page.
5. Click Save Changes.
Your next step is to export the CA into clients, so Web Gateway is authorized to sign HTTPS
connections. See the next page for details.
9
Exporting Certificate
Policy > Settings > SSL Client Context with CA > Default CA
Your next step is to export the certificate and copy it to location accessible to client.
Import the CA into clients so Web Gateway is authorized to sign HTTS connections. See the next
page for details.
10
Importing Certificate: Internet Options
Follow Certificate Import Wizard Instructions and Prompts
Your final step is to import the certification into the browsers you use. For training purposes, we
will begin with Internet Explorer.
1. Open Internet Options. Internet Options > Content and then click Certificates. A
Certificates page opens.
2. Select Trusted Root Certification Authorities and then click Import. This launches
Certificate Import Wizard.
3. Follow the instructions and prompts to complete the import process.
11
Importing Certificate: Firefox
Use Certificate Manager
12
HTTPS Scanner Rule Set Overview
Description
This is the HTTPS Scanner rule set that can be
imported from the library. It is recommended
to place it as high in the rule policy as
possible.
HTTPS scanning ensures that SSL-secured web traffic can be processed and made available to
other filtering functions. This scanning mode is also known as SSL scanning.
The HTTPS or SSL scanning process includes several elements, which contribute to this it in
different ways.
After the initial setup, the following configuration items are available on Web Gateway for
running and controlling an HTTPS scanning process:
HTTPS Scanning rule set — Default rule set for HTTPS scanning.
• This rule set is part of the default rule set system, but it is not enabled by default. You can
enable this rule set and also modify it to meet the requirements of network.
• You can also extend the HTTPS scanning process or create your own process.
13
HTTPS Scanning Rule Set Overview
HTTPS Scanning
Non-HTTP traffic encrypted in SSL tunnel can’t be inspected. It will cause connection
failures.
Examples:
• Webex
• Citrix
• VPNSSL
Here you see the default configuration for the HTTPS Scanning Rule Set. Notice this applies only
to Requests (and IM).
14
HTTPS Scanner Rule Set Overview
Handle CONNECT Call
Handle CONNECT Call rule set enables the SWG to
facilitate a connection between client and external SSL
server.
This nested rule set is within the HTTPS rule set. It contains the following rules:
1. Set Client Context: Enable the use of a server certificate that is sent to a client. The
event settings specify the Web Gateway root certificate authority (CA), which is
implemented on the appliance after the initial setup, as the default issuer of this
certificate. The Continue action lets processing continue with the next rule.
2. Tunneled Hosts: Use the URL.Host property to match hosts with a URL that is on the
specified whitelist skip SSL scanning.
3. Tunneled Pinned Certificate Hosts for IPSec Mobiles: Use the URL.Host property to
match hosts with sites using pinned certificates when filtering IPSec traffic from
mobile devices.
4. Enable Certificate Verification: Enables certificate verification. Its rule criteria is set to
Always.
15
SSL Client Context with CA Engine
Within rule, 1st event is Set Client Context with CA on SWG.
SSL Client Context with CA: The SSL Client Context with CA (certificate authority) engine settings
defines how Web Gateway sends certificate information to clients. By default, a root certificate
authority included with Web Gateway; however, it is recommended that you generate and use
your own CA.
16
SSL Client Context with CA Engine
HTTPS URL Blocked
If the client makes an HTTPS request for a site the Web Gateway’s policy determines should be
blocked, the Web Gateway will issue a block page.
For that block page to be presented to the client, the Web Gateway must interact with that SSL
Connection to be able to present the block page inside an SSL tunnel.
To do so, the Web Gateway issues a web server certificate (with common name matching the
request from the browser and signed by a certificate authority loaded on the box). It uses this
web server certificate to establish the SSL connection with the client, in order to present the
block page.
17
SSL Scanner Engine
Certificate Verification
The final rule in the Handle CONNECT Call
ruleset is Enable Certificate Verification, this
enables the Certificate Verification Engine in
an event which is required for the Certificate
Verification ruleset that follows.
The SSL Scanner Engine has two sub-engines: Default Certification Verification and Enable
Content Inspection. On the Default Certificate Verification page, Certificate verification is
enabled and configured by default. On the Enable Content Inspection page, SSL inspection is
enabled and configured by default.
18
SSL Scanner Engine
Certificate Verification
Enable Certificate Verification event allows certificate verification with the “Certificate, Server
Hello Done” packet. It also :
• Controls the SSL/TLS versions used on the server side
• Proposes acceptable Cipher suites to Web Server
This is done in the “Client Hello” packet between Web Gateway and HTTPS Web Server.
19
Configuring certificate verification rule set
Scan traffic without verifying certification
20
HTTPS Scanner Rule Set Overview
Verify Signature Algorithms
The default SSL Scanner policy has a Verify Signature Algorithms rule set with two rules:
• Verify Safe Signature Algorithms
• Block unsafe Signature Algorithms
21
HTTPS Scanner Rule Set Overview
Verify Common Name (Proxy Setup)
This rule set blocks access to site if the Host entered in the browser does not match Common
Name or Alternative CN of the certificate.
This rule set is for Explicit Proxy mode.
22
HTTPS Scanner Rule Set Overview
Content Inspection
Content Inspection rule set gives SWG ability to inspect and filter all traffic through
within HTTPS connection.
Rule that must apply for decryption of HTTPS traffic through proxy is “Enable Content Inspection”
rule.
Event “Enable SSL Scanner<Enable Content Inspection>” triggers full man-in-the-middle
transaction where SWG establishes two separate SSL tunnels on either side.
Decrypted HTTP content inside HTTPS tunnel is then passed through rule engine and is visible to
policy as normal HTTP traffic.
Notice this rule set applied on the CERTVERIFY command.
23
HTTPS Scanner Engine
SSL Inspection
Event “Enable SSL Scanner<Enable Content
Inspection>” enables content inspection. It also:
• Controls which SSL/TLS version is used on the
server side
• Proposes acceptable cipher suites to the Web
Server
This is done in the “Client Hello” between Web Gateway and HTTPS Web Server only if Event
“Enable SSL Scanner<Certificate Verification>” is not triggered.
24
HTTPS Scanner Rule Set Overview
Verify Common Name (Transparent Setup)
This rule set block access to site if the Host entered in the URL bar does not match Common
Name of the certificate or Alternative CN.
This rule set is for Transparent Setup.
Any idea why two similar rule sets are available for proxy and transparent setup (hint
Command.Name)?
25
Use Cases
1. Can I enable the Handle CONNECT Call step, but not do Certificate Verification?
2. Can I enable Certificate Verification, but NOT Content inspection?
3. Can I enable Content Inspection without Certificate Verification?
26
Use Case 1
Can I enable the Handle CONNECT Call step, but not do Certificate Verification?
• Under Handle CONNECT Call rule set, disable Enable Certification Verification rule.
USE CASE 1: Can I enable the Handle CONNECT Call step, but not do Certificate Verification or
Content Inspection?
Yes, under Certification Verification rule set, disable Enable Certification Verification rule.
27
Use Case 2
Can I enable Certificate Verification, but NOT Content inspection?
• Under HTTPS Scanning, disable Content Inspection ruleset.
USE CASE 2: Can I enable Certificate Verification, but NOT Content Inspection? Yes.
28
Use Case 3
Can I enable Content Inspection without Certificate Verification?
• Yes, but not recommended. Under HTTPS Scanning, you can disable Certificate
Verification rule set.
USE CASE 3: Can I enable Content Inspection without Certificate Verification? Yes, but not
recommended.
29
Hardware Security Module
The following solutions can be implemented to provide the functions of a Hardware
Security Module on Web Gateway:
Using a Hardware Security Module
Key handling with a Hardware Security Module
Work with a Hardware Security Module
Using private keys from an Azure Key Vault
Use of a Hardware Security Module (HSM) enhances security when dealing with private keys for
the certificates that are exchanged between clients and servers in SSL-secured
communication.
Keys for SSL-certificates can be public or private. If you are using private keys and do not want
to expose them, you can store them on a Hardware Security Module.
When a key is required for enabling the use of a certificate, the key is referenced by its ID (also
known as key name) while remaining protected on the module.
This method of key handling provides greater security than storing private keys in a file within
your file system.
This file might be read or copied after unauthorized access to a Web Gateway appliance. The
private keys on the Hardware Security Module, however, would remain protected.
30
Using a Hardware Security Module
Several components are involved when a Hardware Security Module is used on
Web Gateway. These include the HSM Agent and other components that differ
depending on the particular solution that is implemented.
HSM Agent
Module card
Appliance
Remote server
Emulation
Client-server model for multiple appliances
Web Gateway as client of a remote server (Thales)
HSM Agent - The HSM Agent runs as a daemon within the Web Gateway appliance system. This
agent enables the handling of the Hardware Security Module. Depending on the solution that is
implemented, the agent addresses the component that provides the module functions, for
example, a module card or a remote server.
The agent provides a command line interface for performing activities on the module, such as
generating,
storing, or unlocking keys.
Module Card - A module card can be installed as a hardware component on a Web Gateway
appliance to provide the functions of a Hardware Security Module. The module card that is
available for use with Web Gateway is the nShield Solo HSM card. It is provided by a Trellix
partner (Entrust). When the module card is installed, you can access it by logging on to the
appliance from a system console.
Appliance - The functions of a Hardware Security Module can be provided on a Web Gateway
appliance using an additional appliance. The appliance that is used within this solution is the
nShield Connect appliance. It is provided by a Trellix partner (Entrust).
Remote server - The functions of a Hardware Security Module can be provided on a Web
Gateway appliance using a remote server. The remote server that is used within this solution is
the Luna Network HSM server. It is provided by a Trellix partner (Thales).
When the remote server has been set up and connected to the appliance, you can access the
module by logging on to the appliance from a system console.
31
Emulation - An emulation can be run on Web Gateway, which provides the functions of a
Hardware Security Module using OpenSSL.
As this solution does not include a module card, additional appliance, or remote server for
storing private keys, you must store these keys manually in a directory of the Web Gateway
appliance system.
This solution is not considered as secure as the module card solution. When implemented on
a standalone Web Gateway appliance, however, it compares to the remote server solution
with regard to security. An emulation is preferably used for demos, tests, and training.
Client-server model for multiple appliances - When multiple Web Gateway appliances are
part of an HSM solution, they can be configured to follow the client-server model.
This means, for example, that you need not install a module card on every Web Gateway
appliance in your network to use the functions of a Hardware Security Module. Appliances
that have no HSM solution of their own implemented can connect to an appliance with this
solution to use its functions.
The appliance that has an HSM solution implemented then takes the server role towards the
other appliances, which connect to it as clients.
Web Gateway as client of a remote server (Thales) - When the HSM solution on a Web
Gateway appliance uses the remote server that is provided by a Trellix partner (Thales), the
client-server model also applies. The Web Gateway appliance then connects as client to the
remote server.
When a Web Gateway appliance has the HSM solution implemented that uses a remote
server (Thales) and other appliances connect to it to use the functions of this solution, this
Web Gateway appliance takes both the roles of a client and a server.
The appliance then acts as a client towards the remote server (Thales) and as a server
towards the other
appliances.
32
Knowledge Check
33
Check your Learning
True - False
A. True
B. False
34
Check your Learning
Multiple choice: Choose the correct answer.
Answer: C. SSL Host Tunnel list. See Configuring Content Inspection Rule Set.
35
Check your Learning
True - False
A. True
B. False
Answer: A. True. See SSL Scanning Engines and Viewing Default Certificate Authority.
36
Check your Learning
True - False
A. True
B. False
Answer: B. False. See SSL Scanning Engines and Viewing Default Certificate Authority.
37
Review
HTTPS scanning rules call the following engines to perform SSL scanning process:
SSL Client Context with CA
SSL Scanner
SSL Client Certificate Handling
SSL Client Context without CA
A default root CA is included but it is recommended to generate your own.
Default HTTPS Scanner rule sets include:
HTTPS Scanner
Handle CONNECT Call (nested)
Certificate Verification
Content Inspection (nested)
Verify Common Name (Transparent Setup)
Whitelists let web objects bypass parts of the process.
• HTTPS scanning rules call the following engines to perform SSL scanning process:
• SSL Client Context with CA
• SSL Scanner
• SSL Client Certificate Handling
• SSL Client Context without CA
• A default root CA is included but it is recommended to generate your own.
• Default HTTPS Scanner rule sets include:
• HTTPS Scanner
• Handle CONNECT Call (nested)
• Certificate Verification
• Content Inspection (nested)
• Verify Common Name (Transparent Setup)
• Whitelists let web objects bypass parts of the process.
38
Lab Exercises
Lab 12: HTTPS Scanning
Goals:
Implement HTTPS Scanning
Duration:
30 minutes*
The labs for this course are included in a separate lab guide. Each lab lists the lab goals,
required systems, and any files needed to complete the lab; for example, text files or
executables. At the top of each lab, there is a scenario. The scenario often contains the
information needed to complete the lab. Beneath each scenario, there are detailed steps. The
steps are supplied as a resource, in the event you need additional information to complete the
lab.
Note: The steps will vary depending on if your lab environment is local- or cloud-based.
39
Skyhigh Security is a registered trademark of Musarubra US LLC. Other names and brands are the property
of these companies or may be claimed as the property of others. Copyright © 2022. March 2022
40
Module 13: Quota Management and
Coaching
1
Module 13 Objectives
2
Quota Management Overview
Imposing Quotas and Restrictions on Web Usage
Coaching
• Educate users on Time Quotas Volume Quotas
usage. • Limit download
• Limit usage time.
• Warn, allow volume (GB/MB).
access, and • Based on by URL
categories, IP • Based on URL
blocks after categories, IP
defined duration. addresses, or
usernames. addresses, media
type, or
usernames.
The basic elements for quota management are: Coaching Quotas, Time Quotas, and Volume
Quotas. Web Gateway provides default rules but supports custom ones.
Coaching
By configuring coaching quotas, you can limit the time that users of your network are allowed to
spend for web usage but allow them to continue if they choose to do so.
Time Quotas
By configuring time quotas, you can limit the time that users of your network are allowed to
spend for web usage. Time quotas can be related to different parameters:
• URL categories
• IP addresses
• Usernames
Users are identified by the usernames they submitted for authentication. If no username is sent
with a request, web usage is recorded and blocked or allowed for the IP address of the client
system that the request was sent from.
3
Volume Quotas
By configuring volume quotas, you can limit the volume of web objects (measured in GB and
MB) that the users of your network are allowed to download from the web. Volume quotas can
be related to several parameters:
• URL categories
• IP addresses
• Media types
Information on the volume that users download from the web is stored on the appliance. When
the configured volume quota has been exceeded for a user, a request that this user sends is
blocked. A message is displayed to the user stating why the request was blocked.
4
Coaching Overview
Configure coaching
session with a particular
length of time.
Coaching allows users to access sites that may be considered work-inappropriate. The Web
Gateway calls up a modified block page when a user attempts to browse to a coached site. This
page warns the user that they are attempting to access a site and what the category of site is.
Coaching can be enabled by:
• URL the user attempts to visit
• Client IP address
• Authenticated Username
Coaching goes off a timer, once a user is prompted for coaching, they will not be coached
again for two minutes by default.
5
Coaching Overview (Continued)
Basic Order of Coached Connection
6
Configuring Quota System Settings
Configuration > Appliances > Coaching
General settings
for time intervals.
Quota system settings are configured within the Appliances section off the Configuration page
> Appliances tab.
Quota system settings are general settings for time intervals related to quota management. If
an appliance is a node in a Central Management configuration, you can configure time
intervals for data synchronization with other nodes.
7
Configuring Coaching Engine Settings
Policy > Settings > Engines > Coaching
Coaching engine settings are configured within the Engines section off the Policy page >
Settings tab.
8
Configuring Time Quota Engine Settings
Policy > Settings > Engines > Time Quota
Time Quota engine settings are configured within the Engines section off the Policy page >
Settings tab.
9
Configuring Volume Quota Engine Settings
Policy > Settings > Engines > Volume Quota
Volume engine settings are configured within the Engines section off Policy page > Settings tab.
10
Configuring Authorized Override Engine Settings
Policy > Settings > Engines > Authorized Override
Authorized Override engine settings are configured within the Engines section off the Policy
page > Settings tab.
11
Configuring Blocking Session Engine Settings
Policy > Settings > Engines > Block Session
Block Session engine settings are configured within the Engines section off the Policy page >
Settings tab.
12
Rule Construction
Key Elements
Blocking Sessions:
Quota:
• Session Time
• URL Categories
• Category List for Blocking Session
• Quota per Day and Session Time
• URL Category Blocklists • Welcome:
• URL Categories
Authorized Overrides:
• Session Time
• Maximum Adjustable Session Time
• URL Category Blocklist
13
Importing Coaching Rule Sets
Rule Sets Library
Like other rule sets, you can import coaching and quota rule sets from the Rule Set Library.
Tip: To save time, click Auto-Solve Conflicts and then Solve by referring to existing objects.
14
Default Coaching/Quota Rule Sets
Web Gateway provides the following coaching/quota rule sets. Commonly use rule sets
enabled by default.
• Coaching:
• Coaching with URL Configuration (enabled)
• Coaching with IP Configuration
• Coaching with Authenticated User Configuration
• Coaching with IFP (Internet Facsimile Protocol)
• Time:
• Time Quota with IP Configuration
• Time Quota with Authenticated User Configuration
• Time Quota with IFP (Internet Facsimile Protocol)
• Volume:
• Volume Quota with URL Configuration (enabled)
• Volume Quota with IP Configuration
• Volume Quota with Authenticated User Configuration
• Volume Quota with IFP (Internet Facsimile Protocol)
15
Other Default Rule Sets
•Authorized Override
•Authorized Override with IFP
Authorized •Authorized Override with OTP (One Time Password)
Override
•Authorized Override with OTP and Pledge
•Authorized Override with SSL (Secure Socket Layer)
•Welcome Page
Welcome Page
•Welcome Page with IFP
• Authorized Override:
• Authorized Override (enabled)
• Authorized Override with IFP
• Authorized Override with OTP (One Time Password)
• Authorized Override with OTP and Pledge
• Authorized Override with SSL (Secure Socket Layer)
• Welcome Page:
• Welcome Page
• Welcome Page with IFP
16
Configuring Coaching Rule Set
Redirect and Blocking Rules
• URL.Categories (default)
This nested coaching rule set is used to impose restrictions on web usage while allowing users
to pass by if they choose to do so. It is enabled by default and applies only to the Requests (and
IM). It includes these rules:
17
Configuring Coaching Rule Set (Continued)
Edit URL Category Blocklist for Coaching List
Because the blocklist is empty, your first step is to edit the list to add entries.
1. From the rule set, click the URL Category Blocklist for Coaching link.
2. Click the pencil icon.
3. Select one or more categories or subcategories and then click OK.
4. Click Save Changes.
18
Configuring Coaching Rule Set (Continued)
Edit Settings
• User session time
• Days, Hours, and
Minutes
19
Defining Coaching Criteria: Redirection
Redirecting After Starting New Coaching Session Rule
Property Equals
True
The figure shows the criteria for the Redirecting After Starting New Coaching Session. As
discussed earlier, this rule uses the Quota.Coaching.IsActivatationRequest property.
20
Defining Coaching Criteria: Block
Check If Coaching Session Has Been Exceeded
URL Category
Configuration
The figure shows the criteria for the Redirecting After Starting New Coaching Session. As
discussed earlier, this rule uses the Quota.Coaching.SessionExceeded property.
21
Adding URLs to Coaching Rule Set
Restrict and Coach Specific Websites
As needed, you can add specific URLs to coach to the coaching rule set. By default, coaching
rules use rule set criteria for this; for example, a client IP or a wildcard. In the example, a wildcard
is configured for any URL host matching *.hulu.com.
Pay special attention to the Boolean criteria combination. Make sure if it matches the URL
Category list OR the new criteria.
22
Configuring Time Quota Rule Set
Similar Configuration as Coaching
The figures show the default Time Quota rule set. This rule set has a similar configuration as the
Coaching rule set; however, it includes a Time Quota blocking list. It includes the following rules:
1. Redirecting After Starting New Time Session: Redirects a request to let a user again access a
web object after session time has been exceeded and the user has chosen to continue with
a new session. The action settings specify a message to the requesting user.
2. Check If Time Session Has Been Exceeded: Uses the Quota.Time.SessionExceeded property to
check whether the configured session time has been exceeded for a user. If it has, the user’s
request for web access is blocked. The URL Category Configuration settings, which are
specified with the property, are the settings of the module that handles time quotas. The
action settings specify a message to the requesting user.
3. Check If Time Quota Has Been Exceeded: Uses the Quota.Time.Exceeded property to check
whether the configured time quota has been exceeded for a user. If it has, the user’s request
for web access is blocked. The URL Category Configuration settings, which are specified with
the property, are the settings of the module that handles time quotas. The action settings
specify a message to the requesting user.
23
Configuring Volume Quota Rule Set
Similar Configuration as Coaching
• Redirect action rule redirects connections back to the original URL if the user has a
valid session.
• First block rule blocks connection to any website in URL Category list and session
time is exceeded (default 2 minutes - same as coaching).
• Second block rule denies connections if user has downloaded defined quota in the
<URL Category Configuration> setting (default 5 GB per day).
The figures show the default Time Quota rule set. This rule set has a similar configuration as the
Coaching rule set; however, it includes a Volume Quota blocking list. It includes the following
rules:
• Redirecting After Starting New Volume Session: Redirects a request to let a user again access
a web object after session time has been exceeded and the user has chosen to continue with
a new session. The URL Category Configuration settings, which are specified with the
property, are the settings of the module that handles volume quotas. The action settings
specify a message to the requesting user.
• Check If Volume Quota Has Been Exceeded: Uses the Quota.Volume.Exceeded property to
check whether the configured time quota has been exceeded for a user. If it has, the user’s
request for web access is blocked. The URL Category Configuration settings, which are
specified with the property, are the settings of the module that handles time quotas. The
action settings specify a message to the requesting user.
24
Other Rule Set Types
Authorized Override and Blocking Sessions
We will now look at other types of rule sets: Authorized Override, Blocking Sessions, and Welcome
Page.
25
Authorized Override Rule Set
Authorized Override Rule With URL Configuration
• URL.Categories (default)
The nested Authorized Override Rule With URL Configuration rule set is used to configure
authorized overriding to restrict the web usage of your users but allow the configured time limit
to be passed by through the action of an authorized user. It contains these rules:
• Redirect After Authenticating For Authorized Override: Redirects a request to let a user again
access a web object after session time has been exceeded and the credentials the user
submitted to continue with a new session have been validated. The action settings specify a
message to the requesting user.
26
Blocking Sessions Rule Set
Block Web Sessions When Access is Not Allowed
• Blocking configuration
The nested Blocking Sessions rule set is used to blocking web sessions after an attempt to
access a web object that is not allowed. It is enabled by default and applies to all three cycles. It
contains these rules:
• Block User If Blocking Session Is Active: Uses the BlockingSession.IsBlocked property to check
whether a blocking session has been activated for a user who sends a request. If it has, the
request is blocked. The action settings specify a message to the requesting user.
• Activate blocking session if user is in list Category List for Blocking Sessions: Uses the
URL.Categories property to check whether a URL that a user requests access to falls into a
category on the blocking list maintained especially for blocking sessions. If it falls into a
category on the list, a blocking session is activated for the user. The BlockingSession.Activate
event is used to activate the blocking session. The event settings are specified with the event.
27
Welcome Page Rule Sets
URL.Categories (default)
It is enabled by default and applies only to Requests (and IM). It contains these default rules:
28
Use Cases
1. Allow access to cloud lab environment for duration of the class. Deny access at
course conclusion.
As we bring it all together, let us look at some use cases. How would you implement these
policies? Remember, there are different ways to implement the same policy.
29
Use Case 1
Allow access to cloud lab environment for duration of the class. Deny access at
course conclusion.
In the first use case, we created a Time Quota for class at 8 hours per day, 50 per week and 200
monthly.
30
Use Case 2
Allow access to potentially undesirable sites for legitimate work purposes.
31
Use Case 3
Allow access to safe entertainment sites after work hours.
In the third use case, we create a Time Quota allowing access to certain sites for after work
hours (09:00:00 – 17:00:00).
32
Knowledge Check
33
Check your Learning
Multiple choice: Choose the correct answer.
A. True
B. False
34
Check your Learning
True - False
A. True
B. False
35
Check your Learning
Multiple choice: Choose the correct answer.
A. 1 (one)
B. 2 (two)
C. 3 (three)
36
Check your Learning
True - False
A. True
B. False
37
Review
Coaching and quota rules allow you to restrict how often and how much
information users can retrieve through the Web Gateway.
By default, these rules do not affect your policy because the blocking lists are
empty.
Volume Quota rules are like coaching quota rules; however, in addition to having a
session timeout, Web Gateway also tracks how much information is sent and
received to sites in the Quota configuration.
Authorized overrides rules restrict the web usage of your users but allow the
configured time limit to be passed by through the action of an authorized user; for
example, in a classroom setting.
Blocking Sessions rules block web sessions after an attempt to access a web object
that is not allowed.
• Coaching and quota rules allow you to restrict how often and how much information users
can retrieve through the Web Gateway.
• By default, these rules do not affect your policy because the blocking lists are empty.
• Volume Quota rules are like coaching quota rules; however, in addition to having a session
timeout, Web Gateway also tracks how much information is sent and received to sites in the
Quota configuration.
• Authorized overrides rules restrict the web usage of your users but allow the configured time
limit to be passed by through the action of an authorized user; for example, in a classroom
setting.
• Blocking Sessions rules block web sessions after an attempt to access a web object that is
not allowed.
38
Lab Exercises
Lab 13: Coaching and Quotas
Goals:
Implement coaching by category
Implement volume coaching
Duration:
30 minutes*
The labs for this course are included in a separate lab guide. Each lab lists the lab goals,
required systems, and any files needed to complete the lab; for example, text files or
executables. At the top of each lab, there is a scenario. The scenario often contains the
information needed to complete the lab. Beneath each scenario, there are detailed steps. The
steps are supplied as a resource, in the event you need additional information to complete the
lab.
Note: The steps will vary depending on if your lab environment is local- or cloud-based.
39
Skyhigh Security is a registered trademark of Musarubra US LLC. Other names and brands are the property
of these companies or may be claimed as the property of others. Copyright © 2022. March 2022
40
Module 14: Web Caching, Next Hop Proxies,
Progress Pages, and Block Pages
1
Module 14 Objectives
2
Web Caching
3
Web Caching Overview
Before
1. Client 1 requests www.nasa.gov
Client 1
2. Web Gateway checks cache.
3. Site not cached, so Web Gateway
retrieves site data.
Site Not
Cached 4. Web Gateway saves copy and
forwards data to Client 1.
www.nasa.gov
This figure shows how web caching works. Because the site is not cached, Web Gateway
accesses the site and saves a copy of the data.
4
Web Caching Overview (Continued)
After
1. Client 2 requests www.nasa.gov
Site
Cached
www.nasa.gov
Because the site is now cached for future requests, Web Gateway accommodates the request
with the cached copy.
5
Enabling Cache Option
Configuration > Appliances > [Appliance] > Proxies > Web Cache
Web Cache is enabled on the appliance on the Configuration page (Configuration > Appliances
> [Appliance] > Proxies >Web Cache).
In addition to enabling the web cache, you must implement a rule set to control reading from
and writing to the cache.
6
Enabling Cache Option
Policy > Lists | Policy > Rule Sets
The slide highlights key elements for this rule type. The bypass list is empty by default. Add
entries using a wildcard expression. Default Web Cache rule sets are in the Common Rules
section of the Rule Set Library. There are two nested rule sets: Read from Cache and Write to
Cache.
7
Configuring Read from Cache Rule Set
Policy > Rule Sets
The default Read from Cache rule set is enabled by default and applies only to the Requests
cycle. It includes these rules:
1. Skip Caching URLs That Are in Web Cache URL Bypass List: Uses URL property to match
Web Cache URL Bypass List.
2. Enable Web Cache: Last rule in the list. It has a Continue action. It is enabled by an
Event and is applied automatically (always) if the other rules do not apply.
8
Default Write to Cache Rule Set
8MB
1. This rule skips caching if URL matches Web Cache URL Bypass List
2. This rule allows to skip caching of objects are greater than a default of 8 MB
3. This rule skips caching is media type matches Web Cache Media Type Bypass
List
4. This rule enables web cache if no other rule above applied.
The default Write to Cache rule set is enabled by default and applies only to the Responses
cycle. It includes these rules:
• Skip Caching URLs That Are in Web Cache URL Bypass List: Uses URL property to match
Web Cache URL Bypass List.
• Skip Caching Objects That Are Larger Than X Bytes: Uses String.ToNumber(String) and
greater than operator to match a number value. The default is 8388608
(approximately 8MB). You can modify this setting for larger or smaller objects,
depending on cache performance
• Skip Caching Objects That Are in Web Cache Media Type Bypass List: Uses
MediaType.FromHeader property to match Web Cache Media Type Bypass List. By
default, the list is empty.
• Enable Web Cache: Last rule in the list. It is enabled by an Event. It has a Continue
action and is applied automatically (Always) if the other rules do not apply.
9
Next Hop Proxies
10
Next Hop Proxies Overview
Additional Means of Forwarding Web Requests to Destinations
Client 2 Upstream
requests Forwards proxy server
www.nasa.gov request (port 9090)
Next hop proxies provide additional means of forwarding requests received from the clients of
an appliance to their destinations.
When next hop proxies are implemented, a rule in a corresponding rule set uses a module (also
known as engine) to call next hop proxies that have been entered into a list for forwarding
requests.
For example, you can forward requests that have internal destinations using internal next hop
proxies. IP addresses of destinations that are internal are then entered into a list, which the
forwarding rule relies on. In addition to this, there is a list of internal next hop proxies for use by
the rule.
A rule set with a rule for using next hop proxies is not implemented on the appliance after the
initial setup. You can import a rule set from the library and modify it according to your needs or
create a rule set of your own.
When you import the next hop proxy rule set, a list of servers that can be used as next hop
proxies is also imported. The list is initially empty and must be filled by you. You can also create
more than one list and use these lists for routing in different situations.
Settings for the next hop proxy module are imported with the library rule set. You can configure
these settings to let the module use a particular next hop proxy list and to determine the mode
of calling the next hop proxies (round-robin or failover).
11
Next Hop Proxy
Rule Construction
The slide highlights key elements for a Next Hop Proxy rule.
When multiple servers are available as next hop proxies for routing requests, the next hop proxy
module can use several modes to call them: Round-robin, failover, and stickiness.
When routing a request in round-robin mode, the next hop proxy module calls the next-hop
proxy that is next on the list to the one that was called last time. For the next request, this is
handled in the same way, so all servers on the list are eventually used as next hop proxies.
12
Default Next Hop Proxy Rule Set
Rule Set Library
• Next Hop Proxy IP Range List
• Next Hop Proxy IP List
• Settings for internal next hop proxy
The Next Hop Proxy Rule Set contains a single rule. It only applies to the Request cycle.
The first hop matches the type of traffic you want to forward to the next hop proxy. This usually is
a set of Destination IPs but supports other applicable Criteria, such as usernames, URLs, or
media types.
The next hop matches the Enable Next Hop Proxy event. This allows you to choose the group of
proxy servers where you are directing traffic. Traffic sent round robin (one request/server) or in
failover mode. With failover mode, traffic is sent to the first server. When the first server is
unavailable, traffic is sent to server 2, and so on.
13
Progress Pages
14
Progress Indication Overview
Customizable Progress Message Configured within Rules
When the Antimalware feature is enabled, Web Gateway must download the complete file to
scan it successfully. You can configure the Web Gateway to display a progress page to show
the user the status. These templates are combined with download and upload rules.
15
Default Progress Indication Rule Sets
Policy > Rule Sets > Common Rules
Two nested rule sets:
Web Gateway provides the following nested Progress Indication rule sets in the Rules Set Library:
• Downloads:
• Enable Progress Page: Enables an event that lets a page be shown to indicate the
progress made when a web object is downloaded to a client.
• Enable Data Trickling: Enables data trickling for all browsers that are not Mozilla. The
event settings specify the chunk and block sizes used for the trickling.
• FTP Uploads:
• FTP Upload Timeout Prevention: Enables the FTP Upload Progress Indication function if
a file has been sent from a client for uploading to the web under the FTP protocol.
Messages indicating upload progress are then sent to the client during the upload to
prevent a timeout that could occur on the client if the upload takes more time. This
could be due, for example, to scanning the file that is to be uploaded for infections by
viruses and other malware.
16
Default Enable Progress Page Rule
Language, Schema, Template Names, Timeouts
Click the Enable Progress Page <Default> link to define these parameters for Templates:
17
Default Enable Data Trickling Rule
Size and Forwarding Rate
Click the Enable Data Trickling <Default> link to define these parameters:
18
Review
Web Caching
• Web Caching allows the Web Gateway to save web content for distribution to
clients.
• If clients are always requesting the same URLs, Web Caching can drastically
increase performance and reduce resource impact.
Next Hop Proxy
• The Next Hop Proxy feature allows Web Gateway to forward outgoing client requests
to upstream proxy server.
Progress Pages
• When Antimalware is enabled, the Web Gateway must download the complete file
to scan it successfully.
• You can configure the Web Gateway to display a progress page to show the user
the status.
• Web Caching
• Web Caching allows the Web Gateway to save web content for distribution to clients.
• If clients are always requesting the same URLs, Web Caching can drastically increase
performance and reduce resource impact.
• Next Hop Proxy
• The Next Hop Proxy feature allows Web Gateway to forward outgoing client requests to
upstream proxy server.
• Progress Pages
• When Antimalware is enabled, the Web Gateway must download the complete file to
scan it successfully.
• You can configure the Web Gateway to display a progress page to show the user the
status.
19
Block Pages
20
Block Pages Overview
Default and Customizable Block Pages
• 80-plus block pages
Web Gateway includes configured block pages for almost every filter available. Unlike Progress
message, block pages have no associated rules. Instead, they consist of template collections
and templates.
21
Basic Components
Template Settings
• Schema (common structure) • Foundation/base for block pages
• Block page-specific templates • Language, schema and template
• File System (files, images, style sheets) used, and reason for reports
Schema
Page-specific Groups of
templates templates
File System
Collections are the main pages that define the foundation and baseline for a block page. All
logos, information, disclaimers, and so on belong to a collection main page. To configure
collections, go to the Policy page, Settings, and expand the Block group.
The second component are the templates. Templates complement collections. They contain
schema and file system contents. The File System section shows the existing templates, as well
as image and other files that are related to templates, in a tree structure. To configure
collections, go to Policy page, Templates tab.
22
Basic Components (Continued)
Schema and Template
Schema
Template
Schema
Update the Acceptable Use Policy to include contact information for the
administrator.
It is best practice to update the Acceptable Use Policy to include contact information for the
administrator.
The Template contains information that explains why the page was blocked. You can add other
text, as necessary; for example, troubleshooting information.
A best practice would be to hide the web gateway information somewhere on the block page
(seen here in the lower right-hand corner of the page). You could hide the text by making it the
same color as the background. Customers won’t know it’s there until you ask them to highlight
it and tell you what it says.
23
Creating a Custom Block Page
Policy > Templates
Policy > Templates > [template] > Add Clone
(Recommended)
There are two ways to create a custom template. From the Policy page, Templates tab:
• Right-click on Default Schema and select Add Template. You can specify a specific name or
allow the Web Gateway to automatically generate one. After creating the template, add new
content.
• Right-click on a message template (for example URL Blocked) and select Clone. Again,
specify a specific name or allow automatic assignment. After cloning the template, modify
the existing content to meet your needs.
It is not recommended to edit the default block pages. A best practice is to clone an existing
one and keep the default page as a reference.
24
Modifying Custom Block Page
HTML Editor
Add properties
and variables.
Preview your
block page.
Using the HTML Editor, modify the custom template to meet your needs; for example, links,
images, text, and variables. Click Preview to view your page. After you are satisfied with the
changes, click Save Changes.
Note: Use properties that are relevant for the user and troubleshooting.
25
Modifying Custom Block Page (Continued)
Add Custom Properties
At the top of the HTML Editor page, select Add and then Property. Some common properties used
in block pages:
Important: You must reference variables as criteria or use variables included in another rule for
proper display.
26
Creating Block Action
Policy > Settings > Actions > Block
To create a new block action, complete these steps from the Policy page, Settings tab:
1. Right-click on Block and select Add. An Add Settings page opens in the right pane.
2. Type a name and customize the other settings, as necessary. See the following
pages for additional information about each setting.
3. After completing the configuration, click Save Changes.
27
Block Action: Language
Auto (Browser)
Value of ‘Message.Language’
property – value set by user
Each Block Page Template can be written in as many languages as needed and the Web
Gateway can automatically forward the appropriate language page to each client based on
several different factors. The options here are:
• Auto (Browser): When selected, the message is in the language of the browser from
which the blocked request was sent.
• Force to: When selected, the message is in the language chosen from the list that is
provided here.
• Value of Message.Language property: When selected, the message is in the language
that is the value of the Message.Language property. You can use this property to
create a rule.
28
Block Action: Schema (Structure)
Default Schema
The Default Schema is selected. Other options are SAML (Security Assertion Markup Language),
or Single Sign On Schema.
The Default Schema provides user message templates that you can customize. The SAML
Request Schema provides templates for customizing the application Launchpad and logon
pages. The Single Sign On Schema provides templates for SAML authentication requests
(SAMLRequest.html) and responses (SAMLRedirectToAuth.html) sent to and received from an
external Identity provider, respectively.
29
Block Action: Template Name
Custom Template
On the Template Name drop-down list, select the custom template you created.
30
Block Action: Reason
Block Reason ID 2/ Default Error Template Reason Example Block Reason IDs
• 0 – Allowed
• 1 - Error
• 15 - Blocked by Real-Time
See Web Gateway Product Guide for complete Classifier
list of reason IDs.
These sections apply to the Web Reporter or Content Reporting System applications.
The Web Reporter Block Reason ID field is a numerical value that identifies a block reason; for
example:
• 0 - Allowed,
• 1 - Internal error,
• 2 - Default message template being used for an action,
• 3 - Internal URL filter error,
• 10 - Blocked due to an entry in the URL filter database,
• 14 - Blocked according to URL filtering by expression.
See the Web Gateway Product Guide for the complete list of reason IDs.
31
Block Action: Reason (Continued)
CSR Report with Mapped Reason Data
Translates reason to
meaningful content in
Protection area.
The CSR parses the reason ID code from block pages and translates it to a meaningful block
motive in reports called the Protection area, as shown in the figure. The CSR is discussed in more
detail later in the module.
32
Configure Action in Rule
Policy > Rule Set > [Rule Set] > [Rule]
The final step is to select your custom block action in a rule, as shown in the figure.
33
Block Page Example
Additional fields added to a custom URL Blocked Page include:
• Media type
• Rule Name
• Client IP
• Username
• User Method
Additional tokens (fields) can be used in the block page to reflect information about the web
requests that trigger the blocking action and the block message.
34
Exporting Templates to Archive
Policy > Templates > Export
Export all or
selected templates.
Archive is saved in
zip format.
To export all or selected templates, complete these steps from the Policy page, Templates tab:
1. Right-click on Export.
2. Select the files to export.
3. Click Browse, select the destination, and then click Save.
4. Click Export to complete the process.
5. Click OK to close the success message popup.
Note: When exporting a rule set, the block page is not exported.
35
Importing Template Archive
Policy > Templates
To import a previously exported archive, complete these steps from the Policy page, Templates
tab:
1. Right-click on Import.
2. Click Browse, select the archive, and then click Open.
3. Click Import to complete the process.
4. Follow the onscreen instructions to complete the process.
36
WebSocket
37
What is WebSocket ?
• Client Request
• Server Response
Proxy vs WebSocket
Solution:
• SWG supports WebSocket connections and a rule set is contained in the library.
This support allows specific destinations to allow or establish
a WebSocket connection.
44
Check your Learning
Multiple choice: Choose the correct answer.
Overview.
Answer: B. Proxy server to which Web Gateway forwards web requests. See Next-hop Proxies
45
Check your Learning
True - False
A. True
B. False
46
Check your Learning
Multiple choice: Choose the correct answer.
A. CLI (Schema)
B. HTML Editor
C. Notepad
D. Wordpad
47
Check your Learning
True - False
A. True
B. False
48
Review
Do not edit the default block pages. A best practice is to clone an existing one and
keep the default page as a reference.
Take advantage of block page by requesting a print screen of the page when the
blocked user needs to open a support ticket. This alerts you to which rule is likely
blocking the request. Have the gateway information hidden in the lower right corner
on your block page and ask them to highlight it before taking the screen shot.
Use properties relevant for the user and troubleshooting.
Avoid loading image files. Images increase the block page’s load time.
When exporting a rule set, the block page is not exported.
Do not remove the sw.js from the Collection. Web Gateway uses it to display specific
block pages, such as used for quota management.
Simplify block pages. Their primary objective is to inform a user about a blocked
web request. Complex web elements, such as menus and javascripts are not
required.
• Do not edit the default block pages. A best practice is to clone an existing one and keep the
default page as a reference.
• Take advantage of block page by requesting a print screen of the page when the blocked
user needs to open a support ticket. This alerts you to which rule is likely blocking the request.
Have the gateway information hidden in the lower right corner on your block page and ask
them to highlight it before taking the screen shot.
• Use properties relevant for the user and troubleshooting.
• Avoid loading image files. Images increase the block page’s load time.
• When exporting a rule set, the block page is not exported.
• Do not remove the sw.js from the Collection. Web Gateway uses it to display specific block
pages, such as used for quota management.
• Simplify block pages. Their primary objective is to inform a user about a blocked web request.
Complex web elements, such as menus and javascripts are not required.
49
Lab Exercises
Lab 14: Web Caching, Next Hop Proxies, Progress Pages, and Block Pages
Goals:
Create a block page
Duration:
20 minutes*
The labs for this course are included in a separate lab guide. Each lab lists the lab goals,
required systems, and any files needed to complete the lab; for example, text files or
executables. At the top of each lab, there is a scenario. The scenario often contains the
information needed to complete the lab. Beneath each scenario, there are detailed steps. The
steps are supplied as a resource, in the event you need additional information to complete the
lab.
Note: The steps will vary depending on if your lab environment is local- or cloud-based.
50
Skyhigh Security is a registered trademark of Musarubra US LLC. Other names and brands are the property
of these companies or may be claimed as the property of others. Copyright © 2022. March 2022
51
Module 15: Logging
1
Module 15 Objectives
2
Logging Overview
• System Log Files
• User-defined Log Files
• Log File Settings
• Rule-based logging
• File Editor
3
System Log Files
Troubleshooting > [appliance] > Files
• Maintained by Web
Gateway
• Fixed
Web Gateway maintains the following fixed (non-editable) logs, which are useful for
troubleshooting :changes.
• Debug: Contains debugging information.
• Migration: Contains migration activities.
• Mobile-device-certificates: Contains certificates for remote devices.
• MWG-errors: Contains module errors.
• Scheduled-jobs: Contains scheduled jobs information.
• System: Contains operating system activity.
• Update: Contains information on module and file updates.
Important: Do not push system log files are not pushed to a reporting application, such as the
Skyhigh Content Reporting System (CSR). Because these applications do not parse system logs,
the log information is not reportable, and the information is discarded.
4
Viewing System Log Files
Troubleshooting > [appliance] > Files
View now or download for future analysis.
To view system log files from the Web Gateway interface, complete these steps from the
Troubleshooting page of a selected appliance.
Note: You can view log files from the command line. This is discussed in the Basic
Troubleshooting module
5
User-defined Log Files
Troubleshooting > [appliance] > Files
User-defined log files are generated by logging rules and are customizable; however, do not
modify the access.log. This prevents the proper recording of access data and results in a loss of
data, which is not recoverable.
6
Log File Settings
Two key configuration components for logging are the Log file System and File System Logging.
Use the Log File Manager to configure settings for module-maintained log files. Go to
Configuration > Appliances > [appliance] > Log File Manager.
Use File System Logging to configure settings for rule-maintained log files. Go to Policy > Settings
> Engines> File System Logging.
7
Log File Manager Settings: System Log Files
General and Log-specific Settings
Option Description
Controls general settings for rotation, deletion, and push.
Global Log Settings Many settings are enabled and preconfigured by default.
Important: By default, log files are deleted after 7 days.
Enable and configure specific rotation, deletion, and push
Settings for Error Logs settings for error logs. Disabled by default. When disabled,
global log settings will apply.
Enable and configure specific rotation, deletion, and push
Settings for the Update
settings for the update log. Disabled by default. When
Log
disabled, global log settings will apply.
Enable and configure specific rotation, deletion, and push
Settings for the Audit
settings for the update log. Disabled by default. When
Log
disabled, global log settings will apply.
Controls settings for core files, feedback files, and
Advanced eventBody.ToFile. Many settings are enabled and
preconfigured by default.
The table highlights the settings for the Log File Manager. The page is divided into general and
log-specific settings.
8
File System Logging Settings: User-defined Log Files
General and Log-specific Settings
Option Description
Name of the log Specifies the name of a log.
When selected, the log is buffered. The buffer interval is 30
Enable log buffering
seconds.
When selected, you are able to define a header for all log files
Enable header writing
which may be used by a reporting tool or SIEM.
Log header Provides box to type header for all log files.
Encrypt the log file When selected, log files are stored encrypted.
First password, Repeat
Sets a password for access to encrypted log files.
password
[Optional] Second
password, Repeat Sets a second password for access to encrypted log files.
password
The table highlights the settings for File System Logging. Some options are already enabled and
preconfigured by default.
9
Rule-based Logging Overview
Client
Browser Makes Provides
request a
response
Web
Transaction
Server
Request
Embedded
Object
(optional)
Response
Embedded
Object
(optional)
As we discussed earlier, the log cycle is the last cycle of every transaction. The log cycle is run
after the request, response, and embedded object cycles are complete.
10
Rule Construction
Key Elements
Key element for logging rules are logging a logging rule set, one or more logging rules, user-
defined properties, and the file system logging engine.
11
Logging Rule Sets
Define Criteria to Enable Rules
Access
Denied Log
rule set
Found
Viruses Log
rule set
Like other rule set types, a logging rule set includes one or more rules. As an example, the Found
Viruses Log rule set has one rule, while the IM Log rule set has three rules. They also define the
criteria to enable the rules.
12
Logging Rule Sets (Continued)
Policy > Rule Sets > Log Handler > Default
To add a logging rule set, complete these steps from the Policy > Rule Sets tab:
13
Logging Rule
Name: Write access.log
Policy > Rule Sets > Log Handler > Default > Access Log
Your next step is to configure a logging rule. For training purposes, we are working with the
Access Log rule set. It has one rule named Write access.log.
14
Logging Rule
Rule Criteria: Always
It is applied Always.
15
Logging Rule
Action: Continue
16
Elements of Logging Rule: Events
What to Write and Which Log to Write
What to
write in log
Which log
to write
Finally, the rule has configured Events. The Set parameter defines what to write to the log. The last
parameter defines which log to file.
17
Configuring File System Logging Settings
Policy > Settings > Engines > [Setting]
Add setting.
You can create a log that can be used by a logging rule to write entries into its log files. When you
create a log, you do not create it separately, but as a part of creating new settings for the File
System Settings module. Complete these steps:
18
Adding Custom Log Handler (Optional)
Policy > Rule Sets > Log Handler
Required
When you create new logging rules, you can insert them into existing logging rule sets or create
new rule sets for them. These must be nested themselves in top-level rule sets known as log
handlers. You can also use the Default log handler for inserting new logging rule sets.
Complete these steps from the Policy > Rule Sets tab:
1. Click Log Handler.
2. At the top of the log handler tree, click Add and from the drop-down list, select Log
Handler. The Add New Log Handler window opens.
3. Configure the window, as follows and then click OK and Save Changes:
• In the Name field, type a name for the log handler.
• Make sure Enable is selected.
• Optionally in the Comment field, type a plain-text comment on the log handler.
• Optionally, click the Permissions tab and configure who is allowed to access the
log handler.
19
Defining User Defined Properties
Policy > Rule Sets > User Defined Properties
Another helpful tool for creating logging rules use the User Defined Property features. It allows
you to store a user or group attribute in a separate User Defined Property for logging and other
purposes.
20
Syslog Configuration
Configuration > File Editor>rsyslog.conf
Sometimes it is necessary to modify system files. When this is necessary, use the File Editor
(Configuration > File Editor). As shown in the figure, you can use the File Editor to change a
specific line in the file.
21
Use Cases
1. Log all requests sent from a particular client that are invalid or blocked.
3. Add log file entry for destination IP address of client request received on Web
Gateway.
As we bring it all together, let us look at some use cases. How would you implement these
policies? Remember, there are different ways to implement the same policy.
22
Use Case 1
Log all requests sent from a particular client that are invalid or blocked.
In the first use case, we will log all requests sent from a particular client with invalid or blocked
responses.
23
Use Case 2
In the second use case, we will apply a logging rule when a requested web object is scanned
and determined to be infected.
24
Use Case 3
Add log file entry for destination IP address of client request received on Web
Gateway.
In the third use case, we will log the file entry for destination IP addresses of client requests
received on the Web Gateway.
25
Knowledge Check
26
Check your Learning
Multiple choice: Choose the correct answer.
A. audit.log
B. access_denied.log
C. foundViruses.log
D. licenceIncident.log
27
Check your Learning
True - False
A. True
B. False
28
Check your Learning
Multiple choice: Choose the correct answer.
A. 7 (seven) days
B. 10 (ten) days
C. 30 (thirty) days
D. 60 (sixty) days
Answer: A. 7 (seven) days. See Log File Manager Settings: System Log Files.
29
Review
Web Gateway maintains system Log files. They are useful for troubleshooting.
You can view system log files using Web Gateway interface or command line.
System log files are not pushed to a reporting application because these
applications do not parse system logs. The log information is discarded.
User-defined log files are defined by logging rules.
• Web Gateway maintains system Log files. They are useful for troubleshooting.
• You can view system log files using Web Gateway interface or command line.
• System log files are not pushed to a reporting application because these applications do not
parse system logs. The log information is discarded.
• User-defined log files are defined by logging rules.
30
Lab Exercises
Lab 15: Logging
Goals:
Create custom log file
Create a rule that separates log information from specific user
Export logs via syslog
Duration:
45 minutes*
The labs for this course are included in a separate lab guide. Each lab lists the lab goals, required
systems, and any files needed to complete the lab; for example, text files or executables. At the
top of each lab, there is a scenario. The scenario often contains the information needed to
complete the lab. Beneath each scenario, there are detailed steps. The steps are supplied as a
resource, in the event you need additional information to complete the lab.
Note: The steps will vary depending on if your lab environment is local- or cloud-based.
31
Skyhigh Security is a registered trademark of Musarubra US LLC. Other names and brands are the property
of these companies or may be claimed as the property of others. Copyright © 2022. March 2022
32
Module 16: Dashboards and Reports
1
Module 16 Objectives
2
Web Gateway Dashboard: Overview – Standalone
Monitor Web Gateway Operation and Performance in brief
Standalone Configuration:
Status and alerts for a single system
When you log into Web Gateway, the first page you see is the Dashboard. This page lets you
monitor Web Gateway traffic and operations, briefly. If the appliance part of a Central
Management configuration, you also see information for the other appliances (nodes).
3
Web Gateway Dashboard: Overview – Central Management
Monitor Web Gateway Operation and Performance in brief
When you log into Web Gateway, the first page you see is the Dashboard. This page lets you
monitor Web Gateway traffic and operations, briefly. If the appliance part of a Central
Management configuration, you also see information for the other appliances (nodes).
4
Alerts Tab: Appliance Status
Standalone Configuration
Appliance Name
Performance Metrics
Anti-Malware Versions
URL Filter
The Dashboard is divided into two tabs. We will first look at the Alerts tab. At the top of this tab,
you see a horizontal bar called Appliance Status, which has columns.
The first column is Appliance Name. The Web Gateway shown has a standalone configuration,
so only one appliance are listed.
The next column is Performance. This shows alert peaks from the last seven days and the
requests per second.
Next is Trellix Anti-Malware Versions. Update and version information for engines and DATs is
displayed.
5
Alerts Tab: Alerts
Filtering Options for Alerts
Appliance Filter
Date Filter
Message Filter (Error, Warning, Information)
Keyword Search
The next horizontal bar is called Alerts. There are many filtering options for alerts.
Use the Reset Filters button to reset all settings back to their default values.
6
Alerts Tab: Alerts (Continued)
Filtering by Appliance
The first filter on the left is called Appliance Filter. Clicking the drop-down allows the
administrator to filter by appliance.
Use the Reset Filters button to reset all settings back to their default values.
7
Alerts Tab: Alerts (Continued)
Filtering by Date
The next filter is called Date Filter. Clicking the drop-down allows the administrator to filter by a
date; all, today, yesterday, last week, or custom. The time can also be entered for more granular
filtering.
Use the Reset Filters button to reset all settings back to their default values.
8
Alerts Tab: Alerts (Continued)
Filtering by Message Type
Next are the Message Filters. The first set allow filtering by message type; Error, Warning, and
Information. The next one allows filtering by a term that is typed into the “Type to filter alerts”
field.
Use the Reset Filters button to reset all settings back to their default values.
9
Alerts Tab: Alerts (Continued)
Filtering by Search Terms
You can use the Search field to filter the alerts shown on the
Dashboard.
You can type any term and the Dashboard will filter the view.
There is a Reset Filters button to clear out any filtering previously
used.
You can use the Search field to filter the alerts shown on the Dashboard, you can type any term
and the Dashboard will filter the view.
Use the Reset Filters button to reset all settings back to their default values.
10
Charts and Tables Tab: Default Reports
20+ Different Reports
Use the Charts and Tables tab to view reports for multiple Web Gateway items.
11
Charts and Tables Tab: Executive Summary Report
URL Executive Summary - Shows how numbers of requests evolved during the selected interval
and sorts them into allowed (“good”) requests and requests blocked by filtering rules for viruses
and other malware, URLs, and media types.
Categories by Hits - Shows the URL categories that were requested most often within the
interval selected for the summary.
Malwares by Hits - Shows the virus and malware types that were requested most often within
the interval selected for the summary.
12
Charts and Tables Tab: System Summary Report
Network Utilization - Shows how numbers of requests sent and received evolved during the
selected interval.
System Utilization - Shows how usage of hard disk, CPU, physical memory of the appliance
system, and the physical memories of the core and coordinator modules evolved during the
selected interval.
13
Charts and Tables Tab: System Summary Report (Continued)
Update Status - Shows the versions of several modules and filter information files that are
implemented on the appliances, for example, of the Gateway Antimalware engine or of the anti-
malware signature files.
Last Update - Shows when several modules of the appliance were last updated, for example,
the URL Filter module.
Open Ports - Lists the ports on the appliance that are currently listening to requests.
WCCP Services - Shows status of WCCP services used to redirect traffic to the appliance.
Note: System Summary > Number of Active Proxy Connections shows Active Client/Proxy
Connections.
14
Charts and Tables Tab: Traffic Volume Report
Top-Level Domains by Bytes Transferred - Lists the domains that were requested most
according to the amount of bytes transferred from them.
Top-Level Domains by Number of Requests - Lists the domains that were requested most
according to the number of requests for them.
Destinations by Bytes Transferred - Lists the destinations that were requested most according
to the number of bytes transferred from them.
Destinations by Number of Requests - Lists the domains that were requested most according to
the number of requests for them.
15
Charts and Tables Tab: Malware Statistics Report
Malware URLs by Hits - Lists the URLs infected by viruses and other malware that were most
requested.
Malware by Hits - Lists the malware types that most requests were made for.
16
Charts and Tables Tab: URL Filtering Statistics Report
Category - Shows how numbers of requested URL categories evolved during the selected
interval.
Reputation - Shows how numbers of requests evolved during the selected interval and sorts
them according to the reputation of the requested URLs.
17
Charts and Tables Tab: URL Filtering Statistics Report
(Continued)
Categories by Hits - Lists the URL categories that were most requested.
Sites not categorized by Hits - Lists among the sites that are not categorized those that were
most requested.
Malicious Sites by Hits - Lists among the sites that were found to be infected those that were
most requested.
Top Blocked URLs – List the top sites that were blocked by URL filtering.
18
Charts and Tables Tab: System Details Report
Network Utilization - Shows how numbers of requests sent and received evolved during the
selected interval.
CPU Utilization - Shows how CPU usage evolved during the selected interval.
Memory Usage - Shows how usage of memory evolved during the selected interval.
Swap Space (Virtual Memory) Usage - Shows how usage of virtual memory evolved during the
selected interval.
File System Utilization - Shows how usage of the file system evolved during the selected interval.
File System Utilization - Shows usage of the file system per partition.
Open TCP Ports - Shows how numbers of open TCP ports evolved during the selected interval.
19
Charts and Tables Tab: Performance Information Report
You can view performance information about several appliance functions on the dashboard.
20
Charts and Tables Tab: Custom Reports
Unique Options Based on Report Type
Each individual report on the charts and tables tab will have customization options unique to
that report.
The options to customize this report include the reporting time period format and the view.
Additionally, each section allows an administrator to enable or disable the performance items
that are reported up.
For general performance, these are DNS lookup, connect to server, and used by rule engine.
Detailed HTTP performance also has items that can be enabled or disabled.
While not a customization option, it is important to know that every report and report section
has a refresh button.
21
Knowledge Check
22
Check your Learning
True - False
What are the four main ways of filter Alerts on the Dashboard?
(Choose all that apply)
A. Date
B. Appliance
C. Message Type
D. Keywords
E. All of the above
23
Check your Learning
Multiple choice: Choose the correct answer.
A. True
B. False
24
Review
25
Skyhigh Security is a registered trademark of Musarubra US LLC. Other names and brands are the property
of these companies or may be claimed as the property of others. Copyright © 2022. March 2022
26
Module 17: Content Security Reporter
1
Module 17 Objectives
2
Content Security Reporter Overview
Identify and Analyze Network Activity
Bandwidth
CSR
Security
Liability
Productivity
CSR identifies and analyzes network activity. It collects and manages the data from your
integrated alert, authentication, email, and web devices. This data helps you identify these
potential issues:
Once identified, you can use this information to modify your policies and effectively enhance
network protection.
3
Content Security Reporter Overview
How it works
Database
Query Filter
Central data Reports
storage Retrieves Limits the data set
data from the Combines queries, filters,
component to specific and other elements into
database usernames,
and defines PDF documents to provide
websites, and detailed information for
how it is reputations
displayed analysis
On managed systems, an alert or event occurs. Depending on your configuration, the alert or
event is logged to the Content Security Reporter database.
The Content Security Reporter database saves the alert, authentication, email, and web data.
Web Gateway captures and logs the web event. It sends the logs to the Content Security
Reporter database.
Advanced Threat Defense captures and logs the event. It sends the logs to the Content Security
Reporter database.
A Content Security Reporter query retrieves data from its database and defines how it is
displayed.
A Content Security Reporter filter limits the data to specific users, websites, and threat
reputations. The data is displayed in the Trellix ePO.
Dashboard — Organizes your data in a customized view to provide detailed information for
analysis.
Report — Combines queries, filters, and other elements into a PDF to provide detailed
information for analysis.
4
Planning
Platform, Database and ePO Server requirements
Client Customer
Requirements Hardware Requirements
Platform Category
• Hardware: x86_64 Intel/AMD 64-bit Small • Processor: 2.30 GHz (4 Core)
• Supported Microsoft Windows operating • Memory (RAM): 8 GB
system: •
Medium Processor: 2.30 GHz (8 Core)
64-bit – Windows Server 2019 • Memory (RAM): 24 GB
– Windows Server 2016 •
Large Processor: 2.30 GHz (16 Core)
– Windows Server 2012 • Memory (RAM): 32 GB
– Windows Server 2012 R2
Supported Supported
Database Requirements ePO Version
Databases ePO Servers
Microsoft SQL Server 2017
Microsoft SQL Server 2019
Trellix 5.10.x
MySQL 5.5
MySQL 5.6
MySQL 5.7
Prior to deployment, verify a supported Microsoft Windows operating system is installed on the
client you plan to use to generate reports.
For more information, see Technical Article KB83557 - Supported Platforms, Environments, and
Operating Systems for Content Security Reporter 2.x.
Another consideration is a supported version of Microsoft SQL Server software. It provides the
database to store the data for your environment.
The minimum supported ePO version(s) are listed on the table.
Go to: https://www.mcafee.com/enterprise/en-us/support/product-eol.html, to verify EOL of
Trellix products.
5
Deployment Overview
Workflow
This shows the high-level workflow for deploying Content Security Reporter (CSR).
6
Before You Begin
Installation Considerations
There is no limitation to install CSR and ePO on the same server; however, it is
only recommended if the ePO server is dedicated to CSR.
7
Downloading CSR Software
Download Software for Your Supported Operating System
The CSR product is free to all Web Gateway customers with a valid grant number and is
available for download from the Downloads page. Be sure to download the software
appropriate for your supported operating system.
8
Installing CSR Software
Launch and Follow Setup Wizard
• Log on to the operating system as an administrator.
• Run the installation executable file you downloaded, then follow the on-screen
prompts.
After downloading the appropriate executable, launch the setup wizard. Proceed as instructed
on the screen to advance through the installation.
9
Installing CSR Extension in ePO
Menu Page > Software > Extensions
Once the CSR software installation is complete, install the Content Security Reporter extension
.zip file so it is available in ePO. The extension is available on the Product Download site.
1. From the ePO console, select the Menu page > Software > Extensions.
2. Click Install Extension.
3. Browse and select the extension and then click Open.
4. In the Install Extension window, verify the correct extension name displays in the box
and then click OK.
5. Wait while the extension is uploaded to the ePO server.
6. Verify the extension details and then click OK. Wait while the extension is installed.
7. After the installation is complete, you are returned to the Software Extensions page.
Review the details for the extension.
10
Registering Report Server in ePO
Menu Page > Configuration > Registered Servers
New Server
Server Type = Report Server
Name
Notes (optional)
Server Name or IP Address (CSR
host)
Server Port (CSR host)
Passkey
After installing the extension, register the Report Server with ePO. To register the reporting server
with at ePO:
1. From the ePO console, select the Menu page > Configuration > Registered Servers.
2. Click New Server.
3. Type a name and click Next.
4. From the Server type drop-down list, select Report Server.
5. In the Name box, type a meaningful name. Optionally type a comment in the Notes
box. Click Next to continue.
6. In the Server Name or IP Address box, type the name or IP address of the machine on
which the Content Security Reporter software is installed.
7. In the Server Port box, type the port number of the machine on which the Content
Security Reporter software is installed.
8. In the Passkey box, type the passkey defined previously.
9. Click Test Settings. A Test login successful message appears.
10. Click Save. The report and database servers are added to the list of registered
servers.
Note: There is only one registered report server per CSR deployment. After the registration, the
database server is added to the Registered Servers page automatically. Do not change its
default settings.
11
Adding Log Source in ePO
Menu > Configuration > Report Server Settings Page > Log Sources
Configure Web Gateway as a log sources for data used in dashboards and reports.
1. From the ePO console, select the Menu page > Configuration > Report Server Settings.
2. From the Setting Categories menu, select Log Sources.
3. From the Actions menu, select New. A New Log Source page opens.
4. Make sure Enable log source is selected (checked/ticked).
5. In the Name box, type a meaningful name and then type and confirm the password.
The credentials must match the Web Gateway push settings.
6. Optionally, change the defaults for Modes and Log format.
7. On the Sources tab below, create a logon account to accept log files from the
network device.
8. Click OK.
• Accept incoming log files: CSR accepts log data from network filtering devices.
• Collect log files from: CSR collects log data from network filtering devices or log data
storage devices.
Log Formats
Log formats determine how CSR processes (also called parsing) data from log files, and how
the data is stored in the database. CSR recognizes the structure of auto-discover and fixed-field
log formats.
12
Configuring Log Settings in Web Gateway
Policy > Settings > Engines > File System Logging > Logging: Access Log
Enable specific
settings for user
defined log
After configuring the log source, your next step is to collect log information. You will do this from
the Web Gateway Interface.
1. Select Policy > Settings > Engines > File System Logging and click Access Log
Configuration.
2. The Name of the log and Log header values are prepopulated. Do not change them.
3. Make sure Enable log buffering and Enable header writing are selected
(checked/ticked).
4. Expand Settings for Rotation, Pushing and Deletion.
5. Click (check/tick) Enable specific settings for user defined log. Additional fields are
now visible.
13
Configuring Log Settings in Web Gateway (Continued)
Policy > Settings > Engines > File System Logging > Logging: Access Log
6. Scroll down to the Auto Pushing section and click (check/tick) Enable auto pushing.
7. Type the Destination using the appropriate format.
8. For Username, type something meaningful. Use “%h” as a best practice when using
pushing to more than one appliance (Central Management).
9. By Password, click Set. This opens a New Password dialog.
10. For the Password, enter a password (lower-case) and click OK.
11. Beneath the Password box, click (check/tick) Enable pushing log files directly after
rotation.
12. Click Save Changes.
14
Rotating and Pushing Log in Web Gateway
Configuration > Appliances > [appliance]
After completing the Access Log Configuration, manually push the log data. From the Web
Gateway Interface:
1. Select Configuration > Appliances > [appliance]; for example, mwg76.
2. At the top of the right pane, click Rotate and push logs.
3. After the rotate and push is complete, click OK.
15
Verifying Log Push in ePO
Menu > Configuration > Report Server Settings > Log Sources
View jobs
Delete jobs
Customize view with Preset
menu
Search with Quick Find
As a final step, verify the data pushed successfully to ePO. From the ePO console:
1. Select the Menu page > Configuration > Report Server Settings.
2. In the left pane, expand Log Sources and then click Job Queue.
3. Note the successful jobs by the Web Gateway log source.
16
Post Installation Activities
Performed in ePO
• CSR Dashboards
• CSR Queries & Reports
• CSR Permission Sets
• CSR Maintenance
17
Working with CSR Dashboards in ePO
Menu > Reporting > Dashboards
Default CSR
Dashboards
Dashboards allow you to watch and monitor the data collected within
your organization.
Use the default CSR dashboards and monitors or create custom ones.
After deployment, default CSR dashboards are available in ePO; however, you can create
custom ones:
18
Example Dashboard
Custom Dashboard with Specific Monitors
The figure shows a custom dashboard. This dashboard was created to show specific monitors.
19
Working with CSR Queries & Reports in ePO
Menu > Queries & Reports
CSR allows you to create and run queries and reports that provide Internet and email usage,
and IPS alert data in the form of charts and tables. The data for these queries and reports is
pulled from log data and is stored in the registered internal or external database. Use any of the
default queries and reports, or duplicate and modify existing queries and reports to create your
own for a customized view of your organization's data.
After deployment, these queries are available in ePO; however, you can create custom ones.
20
Example Queries & Reports
Create Custom Queries and Run Reports Now or on Scheduled Basis
Bar Chart
Pie Chart
The figure shows two types of queries. The figure on the left shows a bar chart. The figure on the
right shows data in pie slices.
After creating queries, you can run reports immediately or schedule them to run automatically.
21
Managing CSR Permission Sets
Menu Page > User Management > Permission Sets > [permission set]
No permissions by default
To configure permission sets for CSR, go to the Permission Sets page and edit an existing one or
create and configure a new one (Menu > User Management > Permission Sets > [permission
set]).
22
Maintaining CSR
Menu Page > Configuration > Report Server Settings
Use the Report Server Settings to manage and configure the options that define the log data
used in reports and how Content Security Reporter performs. The options are:
23
Knowledge Check
24
Check your Learning
True - False
A. True
B. False
25
Check your Learning
Multiple choice: Choose the correct answer.
A. 1
B. 2
C. 3
D. 4
26
Check your Learning
True - False
A. True
B. False
27
Review
CSR deployment is not the same as Web Gateway and ePO integration.
CSR uses ePO interface as a front-end to generate reports. The CSR database is
independent of ePO database.
Reports are generated from CSR and sent to the ePO server.
Database maintenance, backup and other administrative tasks are managed
separately.
You can only register one report server per ePO server.
• CSR deployment is not the same as Web Gateway and ePO integration.
• CSR uses ePO interface as a front-end to generate reports. The CSR database is independent
of ePO database.
• Reports are generated from CSR and sent to the ePO server.
• Database maintenance, backup and other administrative tasks are managed separately.
• You can only register one report server per ePO server.
28
Lab Exercises
Lab 17: Content Security Reporter
Goals:
Configure Content Security Reporter
Experiment with reporting options
Duration:
25 minutes*
The labs for this course are included in a separate lab guide. Each lab lists the lab goals,
required systems, and any files needed to complete the lab; for example, text files or
executables. At the top of each lab, there is a scenario. The scenario often contains the
information needed to complete the lab. Beneath each scenario, there are detailed steps. The
steps are supplied as a resource, in the event you need additional information to complete the
lab.
Note: The steps will vary depending on if your lab environment is local- or cloud-based.
29
Skyhigh Security is a registered trademark of Musarubra US LLC. Other names and brands are the property
of these companies or may be claimed as the property of others. Copyright © 2022. March 2022
30
Module 18: Reverse Proxy and Internet
Content Adaptation Protocol (ICAP)
1
Module 18 Objectives
2
Reverse Proxy Configuration
3
Reverse Proxy
Many organizations also have internal websites, which they make available to
internal (employees) or external users (contractors, partners, clients, and others)
who need to upload content to the site. These sites need to be protected against
attempts to upload infected content.
For this use case, administrators deploy Secure Web Gateway in reverse proxy
mode to scan and analyze content before allowing it to be uploaded to the target
site.
A reverse HTTPS proxy configuration can prevent clients from uploading unwanted data, such as
malware or particular media types, to web servers under the HTTPS protocol.
In this configuration, HTTPS traffic is redirected to an appliance that a proxy is run on. It is
inspected and eventually forwarded or blocked, according to the rules implemented on the
appliance.
Note: While it is technically feasible, it is not advised to run Forward & Reverse proxies on the
same appliance on a production environment.
4
Reverse HTTPS Proxy
Enable External Users to Upload Content to Internal Web Sites
Web Gateway can also be setup as a reverse https proxy to enable external users to upload
content to internal web sites.
With a reverse https proxy, an Internet user attempts to upload content to a web site.
A load balancer sends the content to a Web Gateway cluster which examines it. If the content
fails examination, Web Gateway returns a block page to the user. If the content passes
inspection, the load balancer forwards it to the web server for further processing.
Reverse https proxy mode does not require any additional software development other than
designing and creating block page responses that conform to the style of the site.
ICAP mode requires that an ICAP client be written and installed within the data flow of the
application.
5
Setting up Reverse Proxy
Enable the Web Gateway to listen to incoming HTTP/HTTPS requests in order to intercept
web traffic.
Create a server certificate to encrypt all traffic between the proxy and the client.
Reverse Proxy rule set should have a top-level criteria, so it applies to only the reverse
proxy traffic.
For example, criteria based on reverse proxy ports or URL.Host property matching the
backend web server hostname.
Reverse Proxy rule set may contain the following rules:
Traffic redirection to HTTPS to secure Web Gateway – Client communication.
Set client context and content inspection rule set for SSL traffic.
Common rules and filters to inspect traffic like Anti-malware, media type filtering,
caching, progress indication etc.
Rule set to restrict open access to the reverse proxy for example, by using a criteria such
as URL.Host.Belongs.To.Domain.
Rule set to redirect traffic to the actual backend web server.
Finally, re-write the HTML response to contain external server names.
6
Setting up Reverse Proxy
Web Gateway HTTP/HTTPS Listen Ports
Enable the Web Gateway to listen to incoming HTTP/HTTPS requests in order to
intercept web traffic.
The first step is to enable the Web Gateway to listen to incoming HTTP/HTTPS requests in order to
intercept web traffic, typically port 80 and 443. It is important that an asterisk be entered for
'Ports treated as SSL' for the port 443 configuration as we want all traffic that comes in on port
443 to be treated as SSL encrypted traffic. You can configure this setting from Configuration >
Appliances > mwg1 > Proxies (HTTP(S), FTP, SOCKS, ICAP…).
7
Setting up Reverse Proxy
Server Certificate
Next, you need to create a server certificate to encrypt all traffic between the proxy and the
client. The certificate can be created under Policy > Settings > SSL Client Context without CA.
Ensure you enable the option "SSL-Scanner functionality applies only to client connection“.
Enabling this setting allows the Web Gateway to immediately perform the ssl handshake with
the client.
You can import the certificate from a trusted CA as well. Often is the case that most companies
will be using a Public certificate so that it is trusted by clients. Our method shown in this slide is
the exception, not the rule.
8
Setting up Reverse Proxy
Top-Level Criteria
Configure top-level criteria
for the Reverse Proxy rule set.
Only traffic matching the
criteria will be inspected
through the reverse proxy
rules.
The Reverse Proxy rule set should ideally have a top-level criteria so that the rule set applies to
only the reverse proxy traffic. For example, the criteria are based on a Reverse Proxy Ports list
with 80, 443 ports defined in it and on the URL.Host matching to the web server hostname.
9
Setting up Reverse Proxy
Rule Sets
Traffic redirection to HTTPS to secure Web Gateway – Client communication.
A Redirect HTTP to HTTPS rule set that allows the client to always talk securely with the Web
Gateway using an SSL tunnel so the traffic cannot be intercepted.
10
Setting up Reverse Proxy
Rule Sets
Set client context and content inspection rule set for SSL traffic.
A Set SSL Client Context rule set is available to allow the Web Gateway to terminate the SSL
Connection and issue the web server's certificate to the client.
11
Setting up Reverse Proxy
Rule Sets
Common rules and filters to inspect traffic like Anti-malware, media type filtering,
caching, progress indication etc.
Common Rules and Filters are some sample rule sets you can configure to inspect traffic,
similar to what you would have for forward proxy, such as Malware scanning, media type
filtering, caching, progress indication and many more. These settings are customizable to your
requirements.
12
Setting up Reverse Proxy
Rule Sets
Rule set to restrict open access to the reverse proxy for example.
It is very important to restrict access to your reverse proxy to prevent any internet user from
using it as an open forward proxy. We can do this with a simple rule that checks to see if the
request is for a resource that needs to be reverse proxied and if not then block that request. In
this example the property URL.Host.BelongsToDomain has been used.
13
Setting up Reverse Proxy
Rule Sets
Rule set to redirect traffic to the actual backend web server.
The next rule set will redirect the requests received from the client to the backend web server.
There are many ways to do this. It can be HTTP or HTTPS communication with the backend
server. If the internal server is used to host more than one domain or site, the host header can
also be re-written at this rule set.
You can also configure Next Hop proxy considering the client cannot be redirected to an internal
server not accessible publicly. Configure Next hop proxy allows the reverse proxy to retrieve
resources from a destination that was not the original destination send over by the client and
sent it back to the client as if it was. Using the next hop proxy method also adds the benefit of
load balancing and failover for the web servers if you add more than one next hop proxy
definition HTTPS.
14
Setting up Reverse Proxy
Rule Sets
Re-write the HTML response to contain external server names.
Finally, the last rule set, allows re-writing the HTML response so the response would contain the
external server information instead of the internal web server.
15
Internet Content Adaptation Protocol (ICAP) Server
Configuration
16
Internet Content Adaptation Protocol (ICAP)
ICAP provides a standard lightweight mechanism for a web server (the ICAP client)
to send content to an ICAP server for some further, specialized action.
Web Gateway, acting as an ICAP server, can perform a full range of malware
analysis and scanning. Files infected with malware can be prevented from
contaminating the web server, while files free of malware can be processed.
You can let Web Gateway appliances take the roles of servers and clients with web traffic going
on between them under ICAP.
Under this protocol, an ICAP server modifies requests and responses when communicating with
ICAP clients. Traffic can, therefore, go on in what is known as the REQMOD and the RESPMOD
mode.
17
Web Gateway as ICAP Server
Web Gateway functions as ICAP server to perform full range of malware scanning
and analysis
1. User attempts to upload the file directly
to web server (ICAP client).
2. ICAP client transmits the file to Web
Gateway (ICAP Server).
3. If the file does not pass inspection the
ICAP client takes an appropriate
corrective action based on the business
logic of the ICAP application.
4. Clean content is forwarded to the Web
Server for processing.
You can also utilize the Internet Content Adaptation Protocol (ICAP), to offload processing from
the web server to a Web Gateway.
Here, the users upload content to the web server (ICAP client). The ICAP client intercepts and
forwards content to a Web Gateway (ICAP server) for malware analysis. If the file passes
inspection, Web Gateway notifies the web server to continue processing it. If the file fails, Web
Gateway takes the appropriate corrective action, such as deleting the file, based on the
business logic of the ICAP application.
18
Setting up ICAP Server
Create an ICAP top level rule set with a criteria to inspect only ICAP traffic.
Create rules to inspect ICAP traffic with appropriate responses configured under
events for ICAP client:
On a Web Gateway appliance that you want to act as an ICAP client, implement the ICAP
Client rule set.
19
ICAP Server Setup
Web Gateway Configuration
Enable ICAP server configuration for Web Gateway.
Enable Web Gateway as an ICAP server under Configuration > Appliances > mwg1 > Proxies
(HTTP(s), FTP, SOCKS, ICAP…) > ICAP Server. The default listen address is 0.0.0.0:1344 but can be
modified as per requirement.
20
ICAP Server Setup
Top-level Criteria
Create a top-level rule set for ICAP rules and configure a criteria to only inspect ICAP traffic
through the ICAP rules. To do this you can create a criteria such as Connection.Protocol equals
“ICAP”.
21
ICAP Server Setup
Rule Set
Create rules to inspect ICAP traffic such as content type filtering, malware filtering
etc.
Create ICAP rules as per your requirement. In the current example, media type filtering and anti-
malware filtering has been configured.
22
ICAP Server Setup
Rule Set – Events
Configure events to send appropriate responses to the ICAP client.
Add
Antimalware.VirusNa
mes to the ICAP
response.
You must configure rule events to return appropriate responses to the ICAP client. You can
configure to return Block.Reason, Block.ID, Antimalware.VirusNames etc. as a part of the ICAP
response header.
23
Reverse Proxy vs. ICAP Server Configuration (Review)
Web Gateway intercepts the content before it The Web server receives the content and
reaches the web server, processes it and then forwards it to Web Gateway for further
either blocks or forwards it depending on the analysis before processing it. The web server
results of the analysis. If the content is gains the benefit of having the ICAP server
blocked it never reaches the web server. perform more in-depth analysis, freeing up
resources on the web server.
Does not require any additional software ICAP mode requires that an ICAP client be
development. Only block pages need to be written and installed within the data flow of
designed to conform to the style of the site. the application.
The major differences between a reverse https proxy and an ICAP server configuration are:
• In reverse https proxy mode, the Web Gateway intercepts the content before it
reaches the web server, processes it, and then either blocks or forwards it, depending
on the results of the analysis. If the content is blocked, it never reaches the web server.
• In an ICAP configuration, the web server receives the content and forwards it to Web
Gateway for further analysis before processing it. The web server gains the benefit of
having the ICAP server perform in-depth analysis, freeing up resources on the web
server.
24
Advantages of Reverse Proxy/ICAP Deployment Modes
• Enhances network security by isolating internal sites from direct contact by
external users.
• Protects internal websites against malware infection by contaminated content.
• Other security measures, such as data loss prevention (DLP) scanning or strong
authentication, can be applied in reverse proxy mode.
• Provides administrators with multiple deployment options, giving them the
flexibility to choose the most appropriate configuration.
The slide lists the key benefits of Reverse proxy/ICAP deployment modes.
25
Knowledge Check
26
Check your Learning
Multiple choice: Choose the correct answer.
more details.
Answer: A. Reverse Proxy mode. See Reverse Proxy vs. ICAP Server Configuration (Review) for
27
Review
• A secure web gateway configured in reverse proxy mode applies malware detection rules to
content being uploaded to, rather than downloaded from, a website.
• Internet Content Adaptation Protocol (ICAP) enables administrators to off-load malware
scanning to a dedicated server to improve security and overall performance.
28
Skyhigh Security is a registered trademark of Musarubra US LLC. Other names and brands are the property
of these companies or may be claimed as the property of others. Copyright © 2022. March 2022
29
Module 19: Advanced Management
1
Module 19 Objectives
• Explain the purpose of the Central Management feature and how it works.
• Explain the purpose of the Proxy HA.
• Explain the purpose of the REST interface and how it works.
2
Central Management
3
Central Management
What is it?
Synchronizes policy between two or more Web
Gateway appliances.
Everything under the Policy tab, along with the
admin accounts, is synced automatically.
Each time a change is made, and “Save
Changes” is invoked, the change is propagated
to all cluster members automatically.
This ensures filtering policy is same on all
appliances of the cluster.
Settings under the Configuration tab are
unique for each cluster node, hence separate
networking configurations can be assigned on
each appliance.
Central Management is used to synchronize the configuration (policy) between two or more
Secure Web Gateway appliances. This is useful as it solves the problem of making duplicate
changes on each appliance. Everything under the “policy” tab, along with the admin accounts,
is synced automatically when creating the cluster. Each time a change is made, and “Save
Changes” is invoked the change will be propagated to all cluster members automatically. This
allows the administrator to ensure that filtering policy is the same no matter which appliance is
handling a given request.
Settings under the Configuration tab are unique for each cluster node. This allows the
administrator to assign separate networking configuration (IPs, routes, etc.) on each appliance.
Central management will also automatically sync a full configuration from every node to every
other node in the cluster. This means that it is only necessary to take a backup on one
appliance as that backup file will contain the full configuration for every cluster member.
4
Central Management Overview
Key Components
• Node groups: Logical grouping of nodes. Control how data is shared between
nodes.
Central Management allows you to administer multiple appliances that you have set up within
your network as nodes in a common configuration. When administering a Central Management
configuration, you are dealing mainly with:
• Nodes: An appliance can be set up as a node that is connected to other nodes and
can send and receive data to and from them to perform updates, backups,
downloads and other activities.
• Node groups: Nodes are assigned to different types of node groups that allow data
transfer in different ways.
• Scheduled jobs: Data is transferred based on defined schedules.
5
How It Works
Central Management
Cluster
Each node is connected to the client systems in the network that direct their web traffic to
it for filtering purposes.
Nodes are assigned to node groups for common administrative activities for cluster
members.
Central Management allows you to administer multiple appliances that you have set up within
your network as nodes in a common configuration. With this configuration, only one machine in
cluster accepts Web Gateway user interface connections.
6
Using Different Node Groups
Network group
Member nodes of a network group exchange all Central Management communication (policy configuration and
“Save Changes” invocations) immediately with each other.
One node from each network group of the cluster can then be made part of a common “Transit” network group.
All nodes in one location communicate through the Transit node with the rest of the cluster.
Runtime group
Member nodes in a runtime group share runtime data including coaching, quota, authorized override and
pdstorage values.
Recommended to have one Runtime group for each physical location considering users browse though multiple
proxies.
Update group
Member nodes share engine updates (URL Filter, AV DATs and more).
Recommended to have one Update group for each geographical location so only nodes of the same location with
fast connections and LAN links access engine updates. Different locations typically have slower connections, WAN
links and you do not want to utilize bandwidth on the large update files.
A node can belong to multiple Network groups but only one Runtime or Update group.
There are three different groups that are used to control the central management cluster:
You can assign nodes to multiple Network groups but only one Runtime or Update group.
It is important to limit the amount of data being sent between nodes, especially in situation
involving international communications, load balancers, and high availability configurations.
7
Node Groups Configuration Examples
Small-scale deployment
8
Node Groups Configuration Examples
Large-scale deployment
5 6
7 8
2 4
Toknet2 Nynet2
Node Set 1: Node Set 2: Node Set 3: Node Set 4: Nodes 5,6,7,8:
Runtime Group: Tokyo Runtime Group: Tokyo Runtime Group: New York Runtime Group: New York Network Group:
Update Group: Tokyo Update Group: Tokyo Update Group: New York Update Group: New York Transit
Network Group: Network Group: Network Group: Nynet1 Network Group: Nynet4
Toknet1 Toknet2
As a best practice, we recommend only putting up to 10 nodes behind a single transit node. If
you have more than 10 nodes in a location, you should have more than one transit node and
create smaller network groups that are tied to the transit node.
Here’s an example with a larger cluster with nodes in Tokyo and New York. For the smaller
locations with one transit node, the Runtime and network groups use the same name.
9
Configuring Central Management
Workflow
Generate Cluster CA
10
Central Management Settings
IP Address, Port, and Timeout (Seconds)
Must match
appliance
Synchronization
settings
The IP address for central management communication must match the IP of the appliance. If
you change the IP address of the appliance after initial installation this may be incorrect
You can change the port, but it must be same across all appliances in the cluster.
Timeout and attempt settings determine how often the node will attempt to push changes to
other devices in the cluster. The default timeout for connection is 120 seconds.
• Node priority: This determines which node’s policy takes precedence if there are conflicting
policies. As a rule, the lower the number, the higher the priority.
• Allow a GUI server to attach to this node is enabled: If disabled, you will be unable to connect
directly to this appliance with a web browser to attempt to manage the cluster. If you only
want management to be performed on one Web Gateway, disable this setting on all other
appliances
• Allow to attach a GUI server from non-local host: Do not activate without consulting
Customer Support. This feature is used for troubleshooting only.
11
Generating a Cluster CA
Configuration > Appliances
The first to step to create a Central Management cluster is to generate a cluster CA and its
private key to ensure secure communication between Web Gateway appliance nodes.
1. On the UI of a Web Gateway appliance, navigate to Configuration > Appliances.
2. Click Cluster CA.
3. Click Generate CA.
4. Generate new CA by providing Common Name and Private key password.
5. Import CA for cluster certificates and private key to all Web Gateway nodes of the cluster.
12
Adding Appliance
Configuration > Appliances
You can add an appliance as a node to a Central Management configuration and assign it to a
network group. Complete these steps from the Configuration page, Appliances tab:
1. On the Appliances toolbar, click Add. The Add/Join Appliance window opens.
2. In the Host name or IP field, type the host name or the IP address of another
appliance within your network.
3. From the Network group list, select a network group for the appliance.
4. Click OK. The window closes.
13
Adding Appliance (Continued)
After the node is added, it appears on the appliances tree. Its policies are overwritten by the
Web Gateway it is joining. After the initial join, all policies remain the same.
14
Working with Policies
Synchronizes Entire Policy – No Exclusions!
If local policies are required, use rule set.
Because all policies are synchronized between nodes, you must specify criteria to create local
rules specific to a Web Gateway. The easiest way is to use the Proxy.IP criteria. In the case
presented in the figure, the Rule Set US Proxy Rules is only be triggered if the Proxy.IP is in the list
US Proxy Servers. That list contains the IP address of all the US Web Gateway appliances. You
can also use the specific System.HostName or System.UUID.
If you only have minor differences in the regional policies (for example just different servers for
authentication), it is easy enough to keep one global policy and make the changes in just the
important rules
15
Configuring Updates
Options
Central Update Server:
Downloads updates from Internet.
Distributes updates to other nodes.
Distributed Node:
Does not contact Internet for updates.
Waits for updates from the node
downloading updates.
16
Proxy High Availability
17
Proxy High Availability Overview
Explicit Proxy with High Availability (HA) Functions
• Key settings are Proxy HA, Director priority, and Virtual IPs.
The idea of a Proxy High Availability (HA) configuration is to introduce failover and load
balancing without the need for external load balancers. This setup is recommended for smaller
deployments or locations/offices within a larger deployment where an external load balancer is
not feasible.
18
Configuring Proxy HA
Workflow
Verify configuration.
The figure shows the high-level workflow for configuring Web Gateway for high availability.
19
Configuring Proxy HA: Guidelines
Field Description
Network Setup Proxy HA
Numerical value for priority in taking director role.
Director node: Highest priority (example 99).
Director priority
Backup node: Lower priority than director (example 89).
Scanning node only: 0 (zero).
Director node itself configured as Scanner.
Scanners Table Peer director node configured as Peer/Director
Scanning only nodes configured as Scanner.
Shared IP address for HA cluster. Owned by active director and must be the same on all nodes.
Virtual IPs
Users select this address in their browsers.
For the director node, configure a TCP port as relay port. This is a port that the scanning nodes in
Relay port
the cluster will use to forward web traffic to external destinations
For the director node, set this interval as the time (in milliseconds) to elapse before the director
Probe Interval node sends the next probe packet to this node. Probe packets are sent to verify that a scanning
node is still alive. If you specify 0, no probe packets are sent.
Virtual router ID Used for the VRRP health checks. Default 51.
VRRP interface Interface used by VRRP for health checks. Default eth0.
Director nodes bind to their own IP address and port 9090 (default).
HTTP Listener address
Scanning only nodes listen unbound i.e., 0.0.0.0:9090
Configure the appliances in this cluster one after another. Configure one of them as the director
node and the others as backup nodes or as scanning nodes only. Select different values for the
various settings options depending on the particular role.
20
Example Proxy HA Configuration
Active Director Node
Proxy HA
network setup
Scanners Table
Director priority
Virtual IPs
The figure shows key settings for the appliance to function as an active director node. The
network setup is set to Proxy HA mode.
• The director priority needs to be set first to enable other settings.
• The director priority for an active director is set to the highest say 99.
• The scanners table should be populated with the node itself as a scanner and the remaining
backup director nodes as peer/directors. Any scanning only nodes must be configured as
scanners. In the example on the screen:
• 10.10.10.41 is an active director, configured as a scanner node itself.
• 10.10.10.42 is a backup or secondary director node.
• 10.10.10.43 is a scanning only node.
• Virtual IP is set the same for all participating cluster members.
21
Example Proxy HA Configuration
Secondary Director Node
Proxy HA
network setup
Scanners Table
Director priority
(lower than
active director)
Virtual IPs
The figure shows key settings for the appliance to function as a secondary director node.
The director priority is set to anything higher than 0, but less than the active director’s priority.
The scanners table should be populated with the node itself as a scanner and the remaining
backup director nodes as peer/directors. Any scanning only nodes must be configured as
scanners. In the example on the screen:
• 10.10.10.42 is a secondary director, configured as a scanner node itself.
• 10.10.10.41 is a peer director node.
• 10.10.10.43 is a scanning only node.
22
Example Proxy HA Configuration
Scanning Nodes
Proxy HA
network setup
Director priority
set to 0
The figure shows key settings for the appliance to function as a scanning node.
• The network setup is set to Proxy HA mode.
• The director priority is set to 0 for a scanning node.
• No other configuration is available for a scanning node.
23
Resolving Issues with a Proxy HA Configuration
The following measures can be taken when trying to resolve issues with a Proxy HA
configuration:
• Look up VRRP health check messages
• Find out which node blocked a request
• Test a node
• Identify the active director
• Turn a director node into a scanning node
• Inspect failure to distribute web traffic
Messages about the VRRP health checks are logged on an appliance system under:
/var/log/messages. These messages also inform you about whether an appliance is in director
or backup node status.
To find out which of the nodes in a High Availability cluster blocked a request, edit the user
message template for Block actions. Insert the System.HostName property.
To test the behavior of a particular node, enter only its IP address in the table of scanning nodes,
leaving out all other addresses, before operating the High Availability cluster.
To identify the active director node that owns the virtual IP address of the High Availability
cluster, set up an SSH session with each node. Then run the ip addr show command on each of
them.
When an issue occurred with a director node, you can change its role and turn it into a scanning
node that performs no other functions besides scanning. First, set the director priority for this
node to 0. Be sure to save what you configured here. Then, change the settings that you
configured on this node for the HTTP and FTP proxies with ports that listen to requests coming in
from the clients. These settings include the network interface IP address. Set this address to
0.0.0.0.
If all web traffic is processed on the director node or another single node instead of being
distributed to other nodes, it could have these reasons:
• The director node does not know about any other nodes because no IP addresses of other
scanning nodes have been entered in the scanner table.
• All traffic is coming from the same source IP address because there is a downstream proxy or
a NAT device in place. Then the usual behavior for load balancing is to direct this traffic to the
same node again and again.
24
REST Interface
25
REST API Interface Overview # !bin/bash
# Set URL variable for access to REST
Representational State Transfer Interface interface
The REST interface on the Web Gateway allows a script to perform common Web Gateway
operations without logging into the Web Gateway user interface. This is useful for automated
routines and interaction with third party devices.
Important: A script file contains a list of commands to execute. Writing scripts requires
knowledge and experience in using a supported scripting syntax. For more information, see
www.gnu.org/software/bash and https://curl.haxx.se.
26
Types of Scripts
Commonly Used Scripts are Reviewed in Lab
The slide highlights some actions you can perform with scripts. You will explore sample scripts
during the lab.
27
Preparing Use of REST API over the Interface
Workflow
The figure shows a high-level workflow for preparing the use of the REST interface.
28
Enabling Use of REST Interface
Configuration > Appliances > [appliance] > User Interface
• Enable REST-Interface
over HTTP
• Enable REST-Interface
over HTTPS
Before any REST interface connections can be initiated, the listening port must be enabled to
accept REST commands. This can be done for HTTP or HTTPS and uses the same port as the
standard User Interface. By default, no REST connections are allowed to the Web Gateway.
29
Adding Custom Role for REST Access
Accounts > Administrator Accounts > Roles
You must add permission to access the REST interface to an administrator role for those users
who work with the interface. Instead of adding access permission to an existing role, consider
creating a new role with this permission and name it, for example, REST Admin.
30
Adding Custom Account for REST Access
Accounts > Administrator Accounts > Internal Administrator Accounts
You must add permission to access the REST interface to an administrator role for those users
who work with the interface. Instead of adding access permission to an existing role, consider
creating a new role with this permission and name it, for example, REST Admin.
31
Knowledge Check
32
Check your Learning
Multiple choice: Choose the correct answer.
A. One
B. Two
C. Three
D. Four
33
Check your Learning
True - False
A. True
B. False
34
Check your Learning
True - False
A. True
B. False
35
Review
Central Management allows you to administer multiple appliances that you have
set up within your network as nodes in a common configuration.
The Proxy HA configuration provides failover and load balancing without external
load balancers. It is recommended for smaller deployments or locations/offices
within larger deployment where external load balancer is not feasible.
The REST interface lets you make changes to Web Gateway using scripts without
logging into the Web Gateway interface. It is useful for automated routines and
interaction with third party devices.
• Central Management allows you to administer multiple appliances that you have set up
within your network as nodes in a common configuration.
• The Proxy HA configuration provides failover and load balancing without external load
balancers. It is recommended for smaller deployments or locations/offices within larger
deployment where external load balancer is not feasible.
• The REST interface lets you make changes to Web Gateway using scripts without logging into
the Web Gateway interface. It is useful for automated routines and interaction with third party
devices.
36
Lab Exercises
Lab 19: Advanced Management
Goals:
Configure Web Gateways for Central Management.
Configure a High availability cluster.
Configure REST interface.
Duration:
45 minutes*
The labs for this course are included in a separate lab guide. Each lab lists the lab goals,
required systems, and any files needed to complete the lab; for example, text files or
executables. At the top of each lab, there is a scenario. The scenario often contains the
information needed to complete the lab. Beneath each scenario, there are detailed steps. The
steps are supplied as a resource, in the event you need additional information to complete the
lab.
Note: The steps will vary depending on if your lab environment is local- or cloud-based.
37
Skyhigh Security is a registered trademark of Musarubra US LLC. Other names and brands are the property
of these companies or may be claimed as the property of others. Copyright © 2022. March 2022
38
Module 20: Basic Troubleshooting
1
Module 20 Objectives
2
Connection Errors
3
Common Connection Issues
As an administrator responsible for managing the Web Gateway, you will learn that the most
common problem areas are network issues and rule set/rule issues.
As a rule, if you have connection issues or a timeout when trying to connect to websites, this is a
network problem.
If you experience a blocking issue, which should be allowed, examine your rules.
Both network problems and rule set/rule issues can cause delays when connecting to a
website. For these types of issues, it will be very important for you to gather relevant information
so you can determine a troubleshooting strategy.
4
Connection Errors – Understanding HTTP 502's
The 502 message is used by the Secure Web Gateway to alert a client that a
connection to the destination could not be established or that the destination
provided an invalid response
[08/Mar/2021:18:25:57 -0600] "" 10.10.67.4 502 "GET http://example.local/
HTTP/1.1" "" "-" "" 3126 "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.2;
Trident/4.0; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET
CLR 3.5.30729; .NET4.0C; .NET4.0E)" "" "0"
This will usually result in the client getting a block page from the Web Gateway and
this document will focus on three of the more common block messages that are
seen:
Host Not Resolvable
Bad Response
Cannot Connect
The HyperText Transfer Protocol (HTTP) 502 Bad Gateway server error response code indicates
that the server, while acting as a gateway or proxy, received an invalid response from the
upstream server.
5
Connection Errors – Host Not Resolvable
This message will be displayed if Web Gateway is unable to contact the DNS server
or if the DNS server returns a “No Such Name” response as seen in the example
below.
This message will be displayed if Web Gateway is unable to contact the DNS server or if the DNS
server returns a “No Such Name” response
To fix this issue the DNS would need to be configured with an “A” record for the reported URL. A
workaround could also be put in place on the Web Gateway’s hosts file.
6
Connection Errors – Bad Response
This message is displayed in two common scenarios; If the Web Gateway receives
a response from the destination but the response is not a valid HTTP response or if
it does not receive a response at all within the default two-minute timeout.
Bad response error is generally displayed in scenarios; If the Web Gateway receives a response
from the destination but the response is not a valid HTTP response or if it does not receive a
response at all within the default two minute timeout or connection to destination is failed.
7
Connection Errors – Cannot Connect
Each connection the Web Gateway makes to a destination begins with a TCP
three-way handshake. This handshake must occur before the Gateway can send
the HTTP request and if it fails then it will result in the “Cannot Connect” message.
The 502 message is used by the Secure Web Gateway to alert a client that a connection to the
destination could not be established or that the destination provided an invalid response. This
will usually result in the client getting a block page from the Web Gateway.
Each connection the Web Gateway makes to a destination begins with a TCP three-way
handshake. This handshake must occur before the Gateway can send the HTTP request and if it
fails then it will result in the “Cannot Connect” message.
The most common cause for the messages is presence of a firewall between the Web Gateway
and destination that is either configured to actively deny connections from Web Gateway to the
destination or to simply drop the packets. The destination could also be configured to actively
block or passively ignore these connections.
8
Connection Errors – Next Hop Proxy Issues
Slowness experienced due to the next
hop proxy being marked as down
To troubleshoot a slowness problem,
we recommend setting the Number
of retries to '3' and the After final
failure wait to '0', to ensure that Web
Gateway does not introduce extra
delay even if it detects that the NHP is
down.
If you've configured Web Gateway to use a Next Hop Proxy (NHP) to handle some of your web
traffic, you might have seen some dashboard alert warnings indicating that the NHP is down or
connection to it has failed. In many cases, when these alerts are triggered, the NHP you have
configured is not actually down.
9
Web Gateway Troubleshooting Tools
10
Troubleshooting Tools
Web Gateway and Command Line
• Web Gateway Interface:
Backup/Restore
Log files
Rule tracing
Feedback
tcpdump
ping/nslookup/traceroute
• Command line:
tcpdump
netstat
Manual review of log files in /opt/mwg/log/
The Troubleshooting page provides features for basic troubleshooting, as well as log files you
can generate to send to technical support for assistance. These features are:
Web Gateway Interface:
• Log files
• Rule tracing
• Feedback
• tcpdump
• ping/nslookup/traceroute
• Backup/Restore
Command line:
• tcpdump
• netstat
• Manual review of log files in /opt/mwg/log/
11
Performing a Backup
Troubleshooting > [appliance] > Backup/Restore
Best practice before making configuration changes.
• Back up to file.
• Navigate to backup
location.
• Optionally, type
encryption password.
• Complete backup.
Performing a backup may not specifically be a troubleshooting tool, but it is a best practice
before making any changes to the configuration. Having a backup allows you to restore the
web gateway to its original configuration. The steps to perform a backup are very
straightforward. From the Troubleshooting page:
• In the left pane within the appropriate appliance group, select Backup/Restore.
• In the right pane, click Backup to file.
• Navigate to the backup location and click Save.
• Type an optional password if the backup should be encrypted and click OK.
• At the Backup successful window, click OK.
Notes:
When backing up the appliance configuration, you have the option of including the Single Sign
On (SSO) credentials in the credential store in the backup file. Likewise, when restoring, you have
the option of restoring the SSO credentials from the backup file to the credential store.
Make sure the UTF-8 character format is used on your administration system for Web Gateway
if you want to insert special characters, for example, German umlaut (ä, ö, ü), in passwords
required for encrypting and decrypting a backup.
12
Restoring a Backup
Troubleshooting > [appliance] > Backup/Restore
Here are the steps to restore from a backup. From the Troubleshooting page:
1. In the left pane within the appropriate appliance group, select Backup/Restore.
2. Click Restore from File.
3. Follow the onscreen instructions and prompts to complete the restore.
4. Because restore automatically logged you out of the Web Gateway, you will need to
log back in once the restore is complete.
13
Feedback Files Overview
Generate before Contacting Technical Support
The feedback file is a compilation of major configuration elements, such as log files, rule and
connection traces, tcpdumps, and other configuration and diagnostic details. If you open a
ticket with technical support, you are often instructed to provide a feedback file. As a best
practice, create the file before contacting support.
14
Creating a Feedback File
Troubleshooting > [appliance] > Feedback
Only five stored at a time. Oldest is deleted when sixth one is added.
You can also create a feedback file from the command line by
typing: /opt/mwg/bin/feedback.sh.
The feedback script is used to collect large amounts of information from the Web Gateway. The
output of a feedback script is the best way to gather pertinent information about the customer’s
web gateway.
In the left pane of the Troubleshooting page for your appliance, click Feedback and then
complete these steps:
1. Make sure Pause running Skyhigh Secure Web Gateway to create a backtrace
(recommended) is selected.
2. Click Create Feedback File.
3. A feedback file is created and appears with its name, size, and date in the list under
Feedback file.
4. View the file now or download and save it for future analysis. Other actions are Delete
and Copy Link.
Note: You can also create a feedback file from the command line by typing
/opt/mwg/bin/feedback.sh.
15
Log Files Overview
Useful Information for Configuration Changes and Troubleshooting
Although of the log folders contain information that is helpful, when troubleshooting you will
most likely be viewing the log files in the debug, mwg-errors, and user-defined-logs folders.
Additionally, to view log files on configuration changes, you would go to the audit folder.
16
Reviewing Log Files
Troubleshooting > [appliance] > Log Files
To view system log files from the Web Gateway interface, complete the below steps from the
Troubleshooting page of a selected appliance. You can also view log files from the command
line.
17
Packet Tracing Overview
Record Network Activities (tcpdump)
Analyze network
behavior, performance,
and applications.
Analyze network
infrastructure.
A useful tool for troubleshooting web gateway network problems is tcpdump. You can use it to:
You can run a tcpdump from the user interface or from the command line.
Note: This tool is not unique to the Web Gateway. It is a command available on most UNIX/LINUX
operating systems.
18
Commonly Used Switches
Specified at User Interface or Command Line
Switch Description
-i <interface> To filter by interface, type:
tcpdump –i <interfacename>
-s <snaplen> The number of bytes captured per packet.
To capture all bytes, regardless of size, type:
tcpdump -s 0
-w <filename> To write the output to a file using a raw data format that can be read by
Wireshark, type:
tcpdump –w <filename>
<expression> To filter by IP address, type:
tcpdump host <hostname or IP>
<expression> To filter by protocol, type:
tcpdump ip
tcpdump tcp
tcpdump icmp
<expression> To filter by port, type:
tcpdump port <portnumber>
The table highlights some commonly used switches for a tcpdump. You can specify these
switches when running a tcpdump from the user interface, as well as from the command line.
19
Running a Packet Tracing
Troubleshooting > [appliance] > Packet Tracing
View now in
Wireshark.
In the left pane of the Troubleshooting page for your appliance, click Packet tracing and then
complete these steps:
1. In the Command line parameters field, type parameters for the packet tracing, as
needed.
2. Click tcpdump start. A feedback file is created.
3. To stop the ongoing generation of a packet tracing file, click tcpdump stop.
4. Using the items on the toolbar of the list, you can perform several file-related
activities, such as view or download a file.
Note: You can also run a tcpdump from the command line.
20
Rule Tracing Central Overview
Troubleshooting > Rule Tracing Central
Rules pane:
View
processed
rules.
Traces pane:
Create and Details pane:
manage rule View details
traces. about rule
criteria.
Another helpful tool is Rule tracing central. This page provides a central location to create,
review, and manage rule traces. The page is organized by these panes:
21
Using Rule Tracing Central: Traces Pane
Manage Rule Traces
• Appliance names list: Select a Web Gateway appliance within your network that you
want to import rule traces from or create, review, and manage rule traces on.
• Import: Import rule traces from the appliance directory or the local directory.
• Client IP address field: Enter the IP address of the client that is the source of the
requests rule processing is traced for.
• Go / Stop icon (cross): Start or stop the creation of rule traces.
• Go: Starts the creation of rule traces. After clicking Go, the button
shows the stop icon.
• Stop icon: Stops the creation of rule traces.
• Source: Select the source of rule traces that entries should be shown for on the traces
pane. Clicking the button displays a list of the zipped rule tracing files that you have
imported. After selecting a file, entries for the rule traces contained in the file appear
on the traces pane. The button then shows the name of the selected file. If you do not
select a file, entries for the rule traces that were created in the latest tracing are
shown.
• Action icons bar: View menu of actions for rule execution; for example, Block, Redirect,
Remove, Authenticate, Stop Cycle, Stop Rule Set, and Continue.
• Export: Export selected or visible traces.
• Clear: Clear traces.
22
Using Rule Tracing Central: Cycle Pane
View Processed Rules
23
Interpreting the Cycle Pane
Most Impactful Rules Have Solid Color
Arrow pointing right: Request Cycle (If hollow, triggered but
not processed).
Arrow pointing left: Response cycle (If hollow, triggered but
not processed).
Gray Arrow: Rule triggered but was not most critical action in
cycle.
Green Arrow: Rule triggered and was most impacting action in
cycle (Redirect, Stop Rule Set, Stop Cycle, or Continue Action).
Yellow Arrow: Remove action.
Depending on the cycle and action taken by a rule, the arrow next to the rule or rule set in the
cycles pane is different color or direction. The most impactful rules have a solid color; for
example, Block, Authenticate, Stop Rule Set.
24
Using Rule Tracing Central: Rules Pane
View Details about Rule Criteria
• Top Properties tab: Shows the criteria of the rule set or rule that is currently selected in
the rules pane.
• Details tab: Shows the criteria of the rule set or rule that is currently selected in the
rules pane.
25
Rule Tracing Comparison
Rule Tracing Central and Rule Tracing Files
The two rule tracing options have similarities, but also important differences. Before we move on
to the next tool, here is a quick comparison:
• Rule tracing central is IP-based and initiated from the user interface by specifying a
single IP address. All rule activity for that IP address will be traced and displayed in the
Rule Tracing Central window.
• Rule tracing files is rule-based and initiated by adding an Enable RuleEngine Tracing
event to a rule. All activity through that rule is traced. The trace files display on the
Troubleshooting > Rule Tracing Files page. Selecting a trace file and clicking Analyze
transfers the trace data to the Rule Tracing Central window.
26
Connection Tracing Overview
Configuration > Appliances [appliance] > Troubleshooting
Connection Tracing record activities on connections between an appliance and other network
components. Before you begin, enable connection tracing (Configuration > Appliances >
[appliance] > Troubleshooting).
27
Working with Connection Traces Files
Troubleshooting > [appliance] > Connection Tracing
Each time a rule is accessed a new file is created. Files are logged as .xml files.
Connection tracing is usually broken into client side (C) and the server side (S) connections. The
names of the connection traces consist of three parts:
Supported actions from this page are View, Delete, Download, or Copy Link.
28
Example of a Connection Trace
29
Working with Core Files
Record Memory Content after Failure
Core files record memory content after failure has caused appliance to terminate operation.
This feature is disabled by default. Before you begin, enable this feature (Configuration >
Appliances > [appliance] > Troubleshooting).
30
System and Network Tools Overview
Troubleshoot Problems on Appliance
System Tools:
• service restart
• AV threads
Network Tools:
• ping and ping6
• nslookup
• traceroute and traceroute6
• ip neigh
• ntp
You can work with several system and network tools to troubleshoot problems on an appliance.
System Tools are service restart and AV threads. Network Tools are ping and ping6, nslookup,
traceroute and traceroute6, ip neigh, and ntp.
31
Using System Tools
Troubleshooting > [appliance] > System Tools
32
Display Running AV Threads
1. Select the Troubleshooting top-level menu.
2. On the troubleshooting tree, select System Tools, then click AV threads.
Note: To export the thread list to a location within your file system, click Export and
specify the location in the window that opens.
You can display the threads that are currently running to perform anti-malware scanning
activities. Seeing many threads lets you know that scanning a particular request or response is
consuming a high amount of resources.
The list of threads that is shown includes the threads that perform scanning activities, as well as
the threads that deliver requests and responses to the scanning modules. Both kinds of threads
are referred to as anti-malware working threads or simply as AV threads.
33
Using Network Tools
Troubleshooting > [appliance] > Network Tools
The figure shows an example of the results for ip neigh, which manipulates neighbor objects
that establish bindings between protocol addresses and link layer addresses for hosts sharing
the same link.
34
Command Line Interface (CLI)
Useful Commands
Other than troubleshooting, only use the command line at the request of technical
support. Make sure you have the Web Gateway software and a new configuration
backup before using the command line.
Important: Other than troubleshooting, only use the command line at the request of technical
support. You can permanently damage the Web Gateway by running normal UNIX commands.
Always make sure you have the Web Gateway software and a new configuration backup before
using the command line.
35
Things to look out for when using in ICAP
ICAP is the same as using SWG in any other mode but has some additional areas
that can be viewed/looked for, using the same tools.
Ensure you have access to the ICAP server from the ICAP client on port 1344
(telnet <serverip> 1344)
Ensure that preview size is identical on client and server
For policy issues use Rule Tracing
If using ICAPS ensure both sides trust the CA used to sign the certificate used.
For networking issues take a packet trace on port 1344 and the relevant IP
addresses and view in Wireshark
36
Knowledge Check
37
Check your Learning
Multiple choice: Choose the correct answer.
A. 2 (two)
B. 3 (three)
C. 4 (four)
D. 5 (five)
38
Check your Learning
True - False
A. True
B. False
39
Check your Learning
True - False
A. True
B. False
40
Review
Common problem areas are network issues and rule set/rule issues.
Commonly used Web Gateway troubleshooting tools are Feedback, Log Files,
Packet tracing (tcpdump), Rule Tracing Central, and Rule Tracing Files.
Other Web Gateway tools you may sometimes use are Core Files, Connection
Tracing, System Tools, and Network Tools.
Enable Connection Tracing only when needed.
ALWAYS specify a specific IP to trace.
Optionally, limit the size of connection tracing file.
Data tracing can very quickly fill log file space. Turn off when complete.
Other than troubleshooting, only use the command line at the request of technical
support.
Make sure you have the Web Gateway software and a new configuration backup
before using the command line.
• Common problem areas are network issues and rule set/rule issues.
• Commonly used Web Gateway troubleshooting tools are Feedback, Log Files, Packet tracing
(tcpdump), Rule Tracing Central, and Rule Tracing Files.
• Other Web Gateway tools you may sometimes use are Core Files, Connection Tracing,
System Tools, and Network Tools.
• Enable Connection Tracing only when needed.
• ALWAYS specify a specific IP to trace.
• Optionally, limit the size of connection tracing file.
• Data tracing can very quickly fill log file space. Turn off when complete.
• Other than troubleshooting, only use the command line at the request of technical support.
• Make sure you have the Web Gateway software and a new configuration backup before
using the command line.
41
Lab Exercises
Lab 20: Basic Troubleshooting
Goals:
Use Web Gateway troubleshooting tools.
Perform a rule trace.
Duration:
20 minutes*
The labs for this course are included in a separate lab guide. Each lab lists the lab goals,
required systems, and any files needed to complete the lab; for example, text files or
executables. At the top of each lab, there is a scenario. The scenario often contains the
information needed to complete the lab. Beneath each scenario, there are detailed steps. The
steps are supplied as a resource, in the event you need additional information to complete the
lab.
Note: The steps will vary depending on if your lab environment is local- or cloud-based.
42
Skyhigh Security is a registered trademark of Musarubra US LLC. Other names and brands are the property
of these companies or may be claimed as the property of others. Copyright © 2022. March 2022
43
Module 21: Advanced Threat Defense
Overview and Integration
1
Module 21 Objectives
• Recall the Advanced Threat Defense solution and its key features.
• Identify the components in a basic ATD deployment architecture.
• Identify the products with which ATD integrates.
• Explain how ATD integrates with Web Gateway (Web Gateway or SWG).
2
Challenge: Signature-less detection
Zero-day/targeted attacks for which signatures not readily available
Criminal
in nature – not Theft
just nuisance Sabotage Espionage
Evade
Stealthy legacy-
Targeted
Unknown based
Data loss
defenses Discovered
Costly clean-up
after the Fact
Long-term
damage
Key Challenges
Existing blocking and prevention capabilities are insufficient to protect
against motivated, advanced attackers.
Some attacks are not advanced; they are simply designed to bypass
traditional signature-based mechanisms.
Advanced malware refers to zero-day or targeted malware for which antivirus signatures are
not readily available. These attacks include Advanced Persistent Threats (APT), bots, Worms,
Trojans, and Viruses. Because there are usually no signatures advanced malware, these threats
are hard to detect. Your organization is likely receiving the first and only attack from the
malware.
Advanced malware is likely criminal in nature instead of a nuisance, and you probably only find
out about it after the attack has succeeded. Because traditional defenses are unlikely to block
these new threats, additional protection is needed.
3
Solution: Advanced Threat Defense
Advanced detection for zero-day malware
• Advanced malware analysis appliance
deployed in existing network to detect
and protect against advanced stealthy
and targeted attacks.
• Centrally managed to streamline
workflows and expedite response and
remediation.
Addresses three key requirements for advanced malware protection: Find malware, Stop
further attacks, and initiates actions across endpoints by providing intelligence to other
security products to Fix the problem.
ATD identifies and facilitates the detection and prevention of sophisticated, hard-to-detect
threats. It addresses the three key requirements to solve today’s advanced malware problem:
• Find: Files are sent from your existing security products (from network to endpoint) to
ATD for in-depth analysis, which identifies or FINDs malware.
• Stop: After analysis, ATD generates and makes available a hash and other meta data
for integrated security solutions to consume, instantly enable protection, and
effectively STOP further attacks.
• Fix: Initiates actions across endpoints by providing intelligence to other security
products.
4
Key features
Multilayered defense mechanism against malware
Static Analysis (code unpacking): Static Analysis
Components
• Whitelist/Blacklist
• Embedded Gateway Anti-Malware Whitelist/Blacklist
Engine (GAM) for signature-less
emulation capability GAM Engine GTI
• Embedded Anti-Malware Engine for Anti-Malware
signature-based detection Engine
• Integration with Global Threat
Intelligence (GTI) for cloud-based look- Dynamic Analysis
ups Components
Predefined Android
Dynamic Analysis (sandboxing): VM
• Secure virtual machine (VM) to monitor
User-defined VMs
behavior for malicious activities
5
Static analysis (code unpacking)
Removes obfuscation
Packing or protecting changes the composition of the code or obfuscates it to evade and
reverse engineering. Most products cannot properly unpack, but it is the only way to reveal the
original (source) executable code for analysis. Another reason to unpack a file is to evade
standard AV engines.
ATD includes extensive unpacking capabilities that remove obfuscation, exposing the original
executable code. It enables static code analysis to look beyond high-level file attributes for
anomalies and to reverse engineer the code, analyzing all the attributes and instruction sets to
determine the intended behavior.
6
Local whitelist and blacklist
MD5 hash values
Whitelist Blacklist
Local Whitelist
This is the list of MD5 hash values of trusted files, which need not be analyzed. This whitelist is
based on the Application Control database that is used by other solutions in the suite. This has
over 230,000,000 entries. The whitelist feature is enabled by default. The static Application
Control database cannot be modified; however, you can add or delete entries based on file
hash. You can also query the white
The default whitelist entries are not periodically updated; however, they might be updated when
you upgrade the ATD software. When you upgrade the ATD software to build 3.4.8.190 and
above, MD5 added into the whitelist will be merged into Global Whitelist.
Local Blacklist
This is the list of MD5 hash values of known malware stored in the ATD database. When ATD
detects a malware through its heuristic Gateway Anti-Malware engine or through dynamic
analysis, it updates the local blacklist with the file's MD5 hash value. A file is added to this list
automatically only when its malware severity as determined by ATD is medium, high, or very
high. The blacklist is not pre-populated. You manage the blacklist using the command line
interface (CLS).
7
Embedded anti-malware engines
Engine updates downloaded every 90 minutes
ATD includes two embedded engines for malware detection: Gateway Anti-Malware Engine
(GAM) and Anti-Malware Engine.
By default, ATD downloads the updates for Gateway Anti-Malware Engine and Anti-Malware
Engine every 90 minutes. Manual update of DAT is not allowed. Multiple URLs are needed for the
updates to function properly.
Anti-Malware Engine
Using patented technology, the Anti-Malware Engine analyzes potentially malicious code to
detect and block Trojans, viruses, worms, adware, spyware, and other threats. This includes
analyzing all the instructions and properties to identify the intended behaviors, which might not
surface immediately. In addition, the engine provides detailed malware classification
information, widens the security cover, and identifies associated malware that leverages code
re-use.
8
GTI Integration
File and Web Reputation
File Reputation:
• Compresses threat protection time period from days to milliseconds.
• Increases malware and zero-day detection rates.
• Reduces downtime and remediation costs associated with malware attacks.
Web Reputation:
• Protects against Web 2.0 threats, social engineering, and malware downloads.
• Increases awareness of online dangers.
• Blocks threats at the network edge.
GTI is a global threat correlation engine and intelligence base of global messaging and
communication behavior, which enables the protection of the customers against both known
and emerging electronic threats across all threat areas. The communication behavior includes
the reputation, volume, and network traffic patterns. ATD uses the File and Web Reputation
features of GTI.
Notes:
• A domain name system (DNS) must be configured for GTI to run.
• For File Reputation queries to succeed, make sure ATD is able to communicate with
tunnel.message.trustedsource.org over HTTPS (TCP/443). Advanced Threat Defense
retrieves the URL updates from List.smartfilter.com over HTTP (TCP/80).
9
Dynamic analysis (sandboxing)
Executes suspicious file in secure virtual analyzers and monitors behavior for
malicious activities
For dynamic analysis, ATD executes a suspicious file in a secure virtual machine (VM) and
monitors its behavior for malicious activities. This VM is referred to as an analyzer VM.
When you create a VM profile, ATD creates an analyzer VM from the image file you selected in
the VM profile record. Simultaneously, it prints the logs, which you can view in the Advanced
Threat Defense web application. Through these log entries, you can view what is happening as
the analyzer VM is being created. You can use this information for troubleshooting purposes.
10
Integration Overview
ATD and SWG
SIA
In the following sections, we take a closer look at how ATD integrates directly with Web Gateway.
With this deployment type, ATD provides an additional engine for malware protection and
enables Web Gateway to automatically send suspicious files to ATD for further analysis.
11
Integration Overview (Continued)
How It Works
When your network user downloads a file, the native Gateway Anti-malware Engine on Web
Gateway scans the file and determines a malware score.
Based on this score and the file type, Web Gateway sends a copy of the file to ATD for deeper
inspection and dynamic analysis.
A progress page informs the user the requested file is being analyzed for malware.
Based on the malware severity level that ATD reports, Web Gateway allows or blocks the
download.
If the download is blocked, Web Gateway displays a block page that provides the reason.
Malware details are available in the log file.
12
Before you begin
Checklist
You know:
ATD IP address
Password and user profile for SWG configured on ATD appliance
Before you begin, ensure the solution requirements are met. Note that solid knowledge of SWG is
required, as well as prior experience with policy and rule configuration.
13
Integration workflow
ATD and Web Gateway
Configure
Configure log Configure error scanning
handler rule set handler rule set engine ATD
settings
Before beginning the integration, review the high-level workflow. Notice there is setup within ATD
and Web Gateway.
14
Configuring SWG User Account in ATD
ATD Web Application > Manage > ATD Configuration > ATD Users
Username
Password
User Type
Restful Access
Web Access (useful)
First verify the Web Gateway user account from within the ATD interface. Although many of
these settings are preconfigured, it is important to confirm they are correct.
15
Import Forwarding Rule Set
Two Options
Offline scanning
Wait for result
Next, import the primary rule set you want to use for forwarding traffic to ATD. As discussed
earlier, you have two options: MATD – Offline Scanning with Immediate File Availability or
MacAfee Advanced Threat Defense. The main difference is that the first rule set provides online
scanning, while the later waits for the result. Remember, like other rule sets imported from the
library, you must resolve the conflicts.
16
Gateway Anti-Malware Rule Sets Overview
Two Options for Primary Forwarding Rule Set and Rules
Before configuring the rule sets, take a moment to review the rules includes in each rule set.
Notice the MATD – Offline Scanning with Immediate File Availability rule set is further divided
down into two nested rule sets, each with different rules.
17
Configuring Advanced Threat Defense Rule Set
Workflow
IMPORTANT:
Here is the workflow for configuring the Advanced Threat Defense rule set. Remember, use this
rule set if you want to wait for the results.
Like other rule sets, correct placement in the rule set list is important. Be sure to move it directly
after the Gateway Anti-Malware rule set.
18
Advanced Threat Defense Rule Set
Default Configuration
To see the Advanced Threat Defense Supported Types, select Policy > Lists >
Subscribed Lists > MediaType.
The figure shows the default configuration of the Advanced Threat Defense Rule Set. Key
settings here are:
19
Advanced Threat Defense Supported Types
Skyhigh-maintained List (Read-only)
Policy > Lists > Subscribed Lists > MediaType > McAfee Advanced Threat Defense
Supported Types
To see the Trellix Advanced Threat Defense Supported Types, select Policy > Lists > Subscribed
Lists > MediaType > McAfee Advanced Threat Defense Supported Types. This is a maintained list
and is read-only.
20
Advanced Threat Defense Rule Set
Move the rule set directly after the Gateway Anti-Malware rule set.
Gateway Anti-Malware scanning options (engine) are also defined at Policy >
Settings > Engines > Anti-Malware > Gateway Anti-Malware.
The figure shows the rules within the Advanced Threat Defense Rule Set.
1. Enable progress page: Enables an event that displays a page to users to indicate the
progress made when a web object is downloaded to a client.
2. Only send media types with high probability to MATD: Includes two criteria parts for
the range of web objects passed to ATD for additional scanning. If both parts of the
criteria match, further processing is stopped. The object is not passed on to ATD.
• MediaType.EnsuredTypes: Determines if the object being processed belongs
to a media type in a specific list. The default is the Skyhigh-maintained list
named McAfee Advanced Threat Defense Supported Types. Optionally, you
can use a custom list.
• Antimalware.Proactive.Probability: Determines the probability an object is
malicious remains below a specific value.
3. Upload file to ATD and wait for scanning result: Uses Antimalware.Infected property to
determine if a web object is infected. If the object is found to be infected, the
forwarding is blocked, and a block message is shown to the user who requested the
object. The statistics counter records the block action.
21
Configuring Settings for ATD
Policy > Settings > Engines > Anti-Malware > Gateway Anti-Malware
The remaining setup is from within Web Gateway. For demonstration purposes, we begin the
required scanning engine settings and other settings for the ATD appliance.
From the Web Gateway interface:
22
Configuring Settings for ATD (Continued)
Recommended
6. Scroll down and verify Reuse Previous Detection, McAfee Web Gateway will retrieve
the latest report from MATD based on the hash of the file is selected
(checked/ticked). This allows Web Gateway to use existing results for the same file
based on file’s hash. This speeds the scanning process and also prevents infection of
other end users from the same file.
7. Click Save Changes.
23
Example Progress Page
Displays When User Begins Download
This figure shows an example progress page that displays when a users begins a download.
24
Example Malware Detected Page
Displays When Infected File Detected
This figure shows an example progress page that displays when an infected file is detected.
25
Configuring Offline Scanning Rule Sets
Workflow
IMPORTANT:
IMPORTANT:
Move MATD - Init Offline
Save Changes. Move ATD - Handle
Scan rule set directly
Offline Scan rule set to
after Gateway Anti-
top of list (first rule set).
Malware rule set.
Optionally, import the MATD – Offline Scanning with Immediate File Availability rule set. The
workflow is similar to the one for the MacAfee Advanced Threat Defense except for rule set
placement.
• Move the MATD - Init Offline Scan rule set directly after the Gateway Anti-Malware rule
set.
• Move the MATD - Handle Offline Scan to the top of the rule set list (first rule set in the
list). It is important your policy tree. It is important this rule set is before any
authentication or whitelisting/blacklisting rules.
26
MATD - Offline Scanning Rule Set
After importing the MATD - Offline Scanning with Immediate File Availability rule set, two
rule sets are implemented and appear on the rule sets tree: MATD - Init Offline Scan and
MATD - Handle Offline Scan.
MATD - Init
This ruleset should be Offline Scan
placed immediately
after the Gateway
Ant- Malware rule set.
MATD - Handle
Offline Scan
MATD - Init Offline Scan - MATD - Init Offline Scan rule set contains the following rules.
1. Reuse existing report if possible: Enables an event that lets a page be shown to indicate the
progress made when a web object is downloaded to a client. If there is a match, processing
is blocked, and a block page and a block page displays.
2. Only send media types with high probability to MATD: Includes two criteria parts for the
range of web objects passed to ATD for additional scanning. If both parts of the criteria
match, further processing is stopped. The object is not passed on to ATD.
• MediaType.EnsuredTypes: Determines if the object being processed belongs to a
media type in a specific Skyhigh-maintained list.
• Antimalware.Proactive.Probability: Determines the probability an object is malicious
remains below a specific value.
3. Offline Scanning With Immediate File Availability: Uses Antimalware.MATD.GetReport and
Antimalware.MATD.InitBackgroundScan(Number) properties for matching. If there is a
match, processing is blocked, and a block page and a block page displays.
MATD - Handle Offline Scan - MATD - Handle Offline Scan include the following rules:
4. Upload file to ATD and wait for scanning result: Uses Antimalware.Infected property to
determine if a web object is infected. If the object is found to be infected, the forwarding is
blocked, and a block message is shown to the user who requested the object. The statistics
counter records the block action.
5. Offline Scanning With Immediate File Availability: When the rule is processed, it is checked
whether the value of the Antimalware.Infected property is true. If it is, it means the scanning
that was performed by Advanced Threat Defense has found a web object to be infected by
a virus or other malware. A warning message is then created and sent to the administrator
for the network of the user who sent the request to access the web object. The message
contains information on the request that was recorded by the rule of the preceding rule set.
6. Stop Cycle: This rule stops the processing cycle. It is always executed after the preceding
rules have been processed.
Note: Do not modify the criteria in "MATD - Handle Offline Scan" Rule-set.
27
Block on ATD Errors Rule Set
Policy > Error Handler > Add from Rule Set Library > Error Handling
The figures shows the default configuration of the Block on ATD Errors rule set. Only some rules
are needed and are enabled.
You can add the rule set from Policy > Error Handler> Add from Rule Set Library > Error Handling.
28
MATD Scanning Log Rule Set
Policy > Log Handler > Default > Add > Rule Set from Library > Logging > MATD
Scanning Log
You can add the MATD logging rule set under Log Handler.
1. Navigate to Policy > Log Handler > Default. Click Add > Rule Set from Library > Logging > MATD
Scanning Log.
2. Auto-Solve Conflicts and add the rule set.
29
MATD Scanning Log Rule Set (Continued)
Policy > Log Handler > Default > Add > Rule Set from Library > Logging > MATD
Scanning Log
The MATD Scanning Log rule set writes to atdscan.log. Additional headers can be added under
Log header.
Note that it is possible to import a rule set to generate log files that can be processed by
Content Security Reporter that includes information about traffic scanned by ATD. Navigate to
Policy > Log Handler > Default > Add Rule Set from Library > Logging > MATD Scanning Log for
Content Security Reporter.
30
Knowledge Check
31
Check your Learning
Multiple choice: Choose the correct answer.
32
Check your Learning
True - False
A. True
B. False
Correct Answer: A. True. See section Integration Overview for more details.
33
Review
34
Lab Exercises
Lab 21: ATD Integration
Goals:
Integrate SWG and ATD
Duration:
35 minutes*
The labs for this course are included in a separate lab guide. Each lab lists the lab goals,
required systems, and any files needed to complete the lab; for example, text files or
executables. At the top of each lab, there is a scenario. The scenario often contains the
information needed to complete the lab. Beneath each scenario, there are detailed steps. The
steps are supplied as a resource, in the event you need additional information to complete the
lab.
Note: The steps will vary depending on if your lab environment is local- or cloud-based.
35
Skyhigh Security is a registered trademark of Musarubra US LLC. Other names and brands are the property
of these companies or may be claimed as the property of others. Copyright © 2022. March 2022
36