416
With "Break SSL" enabled, this option only applies if SSL
breaking has been disabled for a certain domain but SSL checks
are still enabled. On the other hand, for breaking an SSL
connection, it must always be encrypted. Furthermore HTTP
must be spoken inside.
Break SSL
Normally it is not possible to examine the contents of encrypted connections. This does
not necessarily apply to SX-GATE's virusscan proxy. It is able to split connections
into one encrypted connection between browser and proxy and an other encrypted
connection between proxy and web server on the Internet. In this case the proxy will
present a self-created certificate to the client, which resembles the original. It is signed
by the Certificate Authority from "System > Certificates > Root CA", tab "SSL proxy
CA". There, you can also download the public key which should be installed on all client
browsers. Otherwise users will be prompted to accept the certificate once for each
server they want to access.
Connections to server listed on tab "General" in "Trusted servers
(incl. subdomains)" will not be broken open.
Block unknown CA
What should the proxy do when it encounters a server certificate which is either self-
signed or has been issued by a CA which is unknown to SX-GATE? When disabled,
the proxy will issue a self-signed certificate for the server, so the browser will show a
warning and the user has to decide if he wants to trust the connection or not. When
enabled, SX-GATE will deny the connection without prompting the user.
Block expired certificates
When enabled, server certificates beyond its validity period will be blocked by the proxy.
Otherwise the user's web client will show a warning and the user is prompted to choose
whether to accept or refuse the connection.
Block unmatched servernames
When enabled, access to servers is only allowed if the server's name is listed in the
certificate. Otherwise the user's web client will show a warning and the user is prompted
to choose whether to accept or refuse the connection.
Verify revocation status of certificates by using OCSP
no
OCSP will not be used to check revocation status of certificates.