All You Need To Know About Bluecoat Proxy
All You Need To Know About Bluecoat Proxy
All You Need To Know About Bluecoat Proxy
Firewalls
Intranet Public
Web Web
Servers Firewall Servers
Internal Public
Network Internet
Users
Firewalls block Hackers
at the perimeter . . .
Forward Proxy
Internal External
Proxy
Intranet
Web
Servers Proxy Firewall
Internal Public
Network Internet
Users
Restrict or control “Splash page” for Control pop-ups, ads, Prevent downloading
Access to unproductive Acceptable Internet And spyware of copyrighted
Web sites Use policy MP3 files
Stop web content Stop viruses from Keep intellectual Log and archive IM
Such as .vbs, .exe Web mail (Yahoo, property from getting traffic by individual
Hotmail, etc) and IM out over IM text messages
Proxy- Web Caching
Web servers
Public
Internet
ProxySG Deployment
Deployment Options
• Explicit Proxy
- Clients “know” there is a proxy in the path
• Transparent Proxy
- Clients do not “know” there is a proxy in the path
Explicit Proxy: Manually Configured
Internet
Internet
Internet
Internet
172.16.0.100
172.16.1.10
Internet
Firewall Rules
Source Destination Action
172.16.0.100 ANY ALLOW
172.16.1.10 25 ALLOW
ANY ANY DENY
Edge Deployment
Core Deployment Edge Deployment
Internet Internet
Satellite office
Satellite office
• New Hardware
• New Features
- Compression (HTTP and SOCKS)
• New Proxy Services
• Bandwidth Management
Edge office considerations
• Forwarding
- Forwarding failure modes
• Authentication
- Edge authentication vs. core authentication
• Logging
- Edge logging vs. core logging
ProxySG Initial Setup
Initial Setup Access
• Serial Console
- Easy and reliable
• LCD / Keypad
- A built-in interface for proxy configuration (most models)
• TPC/IP
- Access reserved site https://proxysg.bluecoat.com:8083
Password Levels
• Forwarding objects
• SSL configuration
• Access login
- Setup and configuration
Management Console Overview
• Licensing
• ProxySG monitoring
Visual Policy Manager
Visual Policy Manager
• Admin Authentication
• Admin Access
• DNS Access
• SOCKS Authentication
• Web Authentication
• Web Access
• Web Content
• Forwarding
Visual Policy Manager - Rules
• Definition
- “Application-level protocol with the lightness and
speed necessary for distributed, collaborative,
hypermedia information systems”
Step 1: Request
Step 2: Response
• Default port is 80
HTTP Message
• GET
- Retrieves whatever information (in the form of an
entity) is identified by the URL
- Changes to a conditional GET if the request
message includes an if-Modified-Since or similar
header
• HEAD
- Identical to GET except that the server MUST NOT
return a message-body in the response
Request Methods
• POST
- Designed to allow a uniform method to cover the
following functions:
- Posting a message to a bulletin board, newsgroup, mailing
list or similar group of articles
- Providing a block of data, such as the result of submitting a
form, to a data-handling process
- Extending a database through an append operation
• CONNECT
- Reserved for user with a proxy that can dynamically
switch to being a tunnel (e.g. SSL tunneling)
Request Methods
• OPTIONS
- Represents a request for information about the
communication identified in the URL
- Determines the options and/or requirements
associated with a resource, or the capabilities of a
server, without implying a resource action of initiating
a resource retrieval
• PUT
- The PUT method requests that the enclosed entity
be stored under the supplied Request-URI
Response Codes
Step 1: Request
Step 2: Response
• Request • Response
Get / HTTP /1.1 HTTP/1.x 200 OK
Host: www.google.com Content-Type: text/html
User-Agent: Firefox/1.0 Server: GWS/2.1
Accept: text/xml Content-Length: 1121
Date: Wed, 05 Jan 2005 22:09 GMT
Cascaded HTTP Requests
• ProxySG Security
- Console Access
- Physical Access (front panel, serial port)
• ProxySG Authentication
- Validate users before allowing access to protocols
• Granular Reporting
• Manage Exceptions
Explicit Proxy Authentication
www.bluecoat.com
Remote Resources Authentication
GET /securepage.htm
GET /securepage.htm
Authentication details
Internet
Policy Management
Company Policy Enforcement
Simple Language
Who Where How When What
XYZ Employee BBC On web At any time May not visit
Simple Language
Who Where How When What
XYZ Employee Travel On web At any time May not visit
Simple Language
Who Where How When What
Engineering Gaming On web M-F, 08-17 May not visit
Layer
• Trigger Objects
- Source
- Destination
- Service
- Time
• Action
- Action
- Track
Default Policy
• Deny
- Default option for ProxySG
- All network traffic received by the proxy is blocked
• Allow
- Network traffic is allowed through the proxy
- Other policies can deny selected traffic
Content Filtering- Dynamic
Categorization
Content Filtering – Logical Flow
Content Filter
(Onbox/offbox)
Policy
Engine
Access Denied
Dynamic Categorization
from DRTR
Request
DRTR
Request to
Dynamic Categorization - Functionality
BUFF
DRTR
Master Rating
Database
Dynamic
background rating
30 sec. to 1 hr
Blue Coat Web filter
• Hybrid solution
- Onbox database for ProxySG
- Optional Service Component to categorize unrated
URLs
• Data Quality
- 58 categorizes
- Consistency
- Relevant URLs (feedback)
- Immediate coverage for new sites (DRTR)
Other Vendors
• Smartfilter v4 Support
-Secure Computing changed method for applying
content-filtering database
-License key instead of username/password
-User’s secure-assigned serial number
• Other Filter Vendors
-Optenet -Proventia -Webwasher -Intersafe
Managing Instant Messaging
Instant Messaging
• AIM
- Free , ad-supported instant messaging application
that detects when are online
• AIM includes
- Person-to-person text messaging
- Chat room messaging
- Ability to share files peer-to-peer with one’s buddies
- Ability to play games with each other
AOL Instant Messenger (AIM)
Intranet
Internet
5
3
4
• Exception page
-Dead end
• Splash page
-Show once
• Coaching page
-option to continue
Exception page
• Built-in
-Notify user that access has been denied
-Notify user of network or appliance errors
-Can be customized ( better create user-defined ones)
• User-defines
-User-defined to send more specific message
-Can include any HTML or JavaScript code
-Can link external resources (images)
Splash page
• Management Console
-VPM feature: Notify User action added to the web Access Layer
-To customize which users/transactions are notified, write policy other
triggers as you would for any other action( such as deny or allow )
• Command line
-Not available through the CLI – available through the VPM only
Access logging
Access logging
Log File
Rotation Schedule
Password
1 2
4
5 3
Client On box
logs
OCS
Access Logging – Data Flow
Client On box
logs
OCS
Database
Reporter
ProxyAV
What is ProxyAV ?
• Performance
-ICAP server = separate processor
-Performance = an order of magnitude better
• Choice
-ProxyAV allows different AV vendors
-Automatically download pattern files daily
• Continue Integration
-Integrate the ProxyAV and ProxySG
ICAP Fundamentals
ICAP Cient
ICAP Server
ProxyAV
ICAP REQMOD
• REQMOD
-Scan HTTP PUT requests
-Scan FTP upload requests
-Scan POST requests bodies
• Processing Requests
(REQMOD)
client Server
ProxySG
Request
Response
Virus Scanning
External
ProxyAV
Internal
ICAP RESPMOD
• RESPMOD
-Virus scanning of HTTP and FTP (RETR)
- Virus scanning of FTP over HTTP
• Processing Requests
(RESPMOD)
client Server
ProxySG
Request
Response
Virus Scanning
External
ProxyAV
Internal
Reverse Proxy
Reverse Proxy
www.site.com
External Internal
Why Reverse Proxy?
Internet
1
Securing Corporate E-mail
Outlook Web Reverse Proxy ProxyAV
Access 3
5
2
Internet
Authentication
4
Server
1
Web Business Applications
Authentication Reverse Proxy
server
3
2
4
Internet
Web Sever
5
1
Application
Server