731
Field descriptions
Assets field descriptions
Parameters for http—Web Proxy tab
These parameters let you further customize the behavior of the HTTP protocol.
Associated tasks
None.
Parameters for http—Description tab
Optionally, provides an extended description. This information is useful to help track changes or it can
be used as criteria for searches.
The maximum length is 20,000 alphanumeric characters.
Allow HTTP over valid SSL on the
following ports
Allows SSL connections over the ports defined.
Once this option is checked, you can select one of the following:
■
All ports
■
Ports named in the following list
■
Standard ports (443, 563)
Allow DCOM Over HTTP
DCOM is a binary protocol layered over RPC and designed to enable COM-
based components to interoperate across networks. This check box is
unchecked by default.
For DCOM to work, the connecting client must be able to reach the server by
its actual IP address. Therefore, it is necessary to create client-side
transparency using an address transform on the system depending on
whether the DCOM connection is incoming or outgoing (server-side
transparency exists by default).
Note:
DCOM normally uses dynamic port allocation, but because you are
sending DCOM over HTTP, it uses the designated HTTP ports.
Allow FTP protocol conversion
Lets the system handle FTP URLs. The same authentication that can occur in
normal HTTP requests can occur here, but file name extensions, Java, and
allowed URL filtering have no effect on these connections.
This option is unchecked by default.
Table D-210
Parameters for http—Web Proxy tab
Field
Description
External Web proxy
Improves the performance of internal Web browsers by using an external Web caching
proxy. A Web caching proxy maintains a cache of material previously downloaded from
external sites. Internal users requesting previously cached materials receive them from
the caching proxy.
External Web proxy port Port on which to connect to the external Web proxy.
The default value is 80.
Table D-209
Parameters for http—Options tab (Continued)
Field
Description
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...