![Securepoint RC 100 Product Overview Download Page 91](http://html1.mh-extra.com/html/securepoint/rc-100/rc-100_product-overview_1231872091.webp)
9 Menu Applications
Securepoint 10
Securepoint
Security Solutions
91
9.1 HTTP Proxy
The HTTP proxy is set between the internal net and the internet. It analyzes content of inter-
net sites, blocks suspicious websites and checks data for viruses.
The client sends his query to the proxy. The proxy gets the data from the internet, analyses it
and sends it to the client. The proxy acts as an exchange agent. For the client the proxy acts
as a server. For the server in the internet the proxy acts as a client.
9.1.1 General
On the tab General you can make basic settings for the Proxy.
Setting up the
port
of the proxy. The default port is 8080.
If you want to define the
Outgoing Addr
ess enter the desired IP address.
If you use another proxy, activate the checkbox
Cascade
.
In this case enter the IP address of the other proxy in the field
Parent Proxy
and the
port in the field
Parent Proxy Port
.
Decide in which networks the proxy should be activated as a
transparent proxy
.
Transparent means that the proxy isn’t visible for the user. You needn’t insert the
proxy settings in the browser. The firewall conducts the packets to the proxy automat-
ically. But if you don’t insert the proxy setting in the browser the user authentication
fails and protocols like HTTPS and FTP must be activated by rules.
Under
Exceptions
enter subnets and IP addresses which should be except from the
proxy redirect. Source and destination addresses must be specified for these excep-
tions.
Select an authentication mode.
None
à
no authentication
Local
à
authentication against the local user database
Radius
à
authentication against a Radius server
Active Directory
à
authentication at the AD of the network
NTLM
à
authentication against the NT LAN manager
Click the button Settings to define if all users or just
a defined group are allowed to authenticate.
If you want to limit uploads and downloads activate the checkbox
Enable Size Limit
.
If you don’t want to limit the upload or the download, activate the relative
radio but-
ton unlimited
.
The
Anonymize Logging
logs without user name and IP address.