187
Defining your security environment
Understanding proxies
Customizing the HTTP protocol to pass HTTPS traffic
The security gateway uses the HTTPS protocol to send messages over a secure port rather than the
default HTTP port 80. When you enable HTTPS you also specify the port or ports that will be used.
You can also specify HTTPS ports through the HTTP proxy.
“Configuring the HTTP proxy to listen on additional ports for secure connections”
Prerequisites
None.
To customize the HTTP protocol to pass HTTPS traffic
1
In the SGMI, in the left pane, under Assets, click
Protocols
.
2
In the right pane, on the Service Groups tab, click
New
.
3
In the Service Group Properties dialog box, in the Service Group Name text box, type a name that
identifies this service group as supporting HTTPS.
4
On the Protocols tab, click
Add
.
5
In the Select protocols dialog box, select the http protocol, and then click
OK
.
6
On the Protocols tab, under Selected, highlight the http protocol and then click
Configure
.
7
In the Parameters for http dialog box, on the Options tab, check
Allow HTTP over valid SSL on the
following ports
.
8
Select one of the following:
■
All ports
■
Standard ports (443, 563)
■
Ports named in the following list
If you select this option, in the Port text box, type a port and then click Add. Repeat until you
have listed all the ports over which you want to allow HTTPS traffic.
9
Click
OK
.
10
In the Service Group Properties dialog box, click
OK
.
11
Optionally, do one of the following:
■
To save your configuration now and activate later, on the toolbar, click
Save
.
■
To activate your configuration now, on the toolbar, click
Activate
.
When prompted to save your changes, click
Yes
.
Related information
For further information related to this topic, see the following:
■
“Parameters for http—Options tab”
Understanding proxies
Symantec’s application proxies, also known as a proxy daemons, provide full application inspection of
security gateway traffic and help secure your network. Each proxy insures that any traffic it has
examined is allowed through only if it complies with RFC specifications and has met all rule
restrictions. Additionally, each proxy performs protocol-specific security checks that are not normally
implemented in the client and associated server software for the protocols. The security gateway
provides application proxies for most of the popular application protocols. For protocols that do not
currently have a predefined proxy, you can proxy those connections by using the GSP.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...