215
Defining your security environment
Controlling full application inspection of traffic
Specifying the location of the icon directory
The HTTP proxy acts as a non-caching proxy between clients and servers. The HTTP proxy also acts as
a local Web server with its own document set. The server primarily fulfills requests for the security
gateway’s home page and icons used in the FTP protocol converter. Using the procedure in this
section, you can change the location in which the HTTP proxy looks for icons during conversion.
Prerequisites
Complete the following task before beginning this procedure.
■
“Configuring access for Web traffic”
To specify the location of the icon directory
1
In the SGMI, in the left pane, under Assets, click
Proxies
.
2
In the right pane, on the Proxies tab, click the HTTP proxy, and then click
Properties
.
3
In the Proxy Properties dialog box, on the Icon tab, type the URL for the icons’ new location.
4
Click
OK
.
5
Optionally, do one of the following:
■
To save your configuration now and activate later, on the toolbar, click
Save
.
■
To activate your configuration now, on the toolbar, click
Activate
.
When prompted to save your changes, click
Yes
.
Related information
None.
Changing the default extension added to URLs
By default, the HTTP proxy adds the extension .html to any URL you enter that has no extension. You
can use the procedure in this section to change the behavior. Changes you make take affect
immediately after you save and activate the new configuration.
Prerequisites
Complete the following task before beginning this procedure.
■
“Configuring access for Web traffic”
To change the default extension added to URLs
1
In the SGMI, in the left pane, under Assets, click
Proxies
.
2
In the right pane, on the Proxies tab, click the HTTP proxy, and then click
Properties
.
3
In the Proxy Properties dialog box, on the Default Extensions tab, type a new default extension.
4
Click
OK
.
5
Optionally, do one of the following:
■
To save your configuration now and activate later, on the toolbar, click
Save
.
■
To activate your configuration now, on the toolbar, click
Activate
.
When prompted to save your changes, click
Yes
.
Related information
None.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...