Configure Symantec Appliance Proxy Forwarding
With this
Web Security Service
connectivity method, you configure a Symantec Blue Coat ProxySG
or ASG appliance to forward non-internal web traffic to WSS
for security and acceptable web-use policy checks.Technical Requirements
This section provides a high-level set of technical requirements:
- Deployed Symantec Blue CoatProxySGor ASG appliance:
- Minimum version: SGOS 6.7.x.
- The gateway firewall must allow ports8080,8443, and8084(if configured). See Required Ports and Protocols.
- SGOS 6+ required to use the non-standard8084port.
- Know the egress IP address.
- Identity/Authentication:
- WSSWeb Security—TheAuth Connectoris not required, but necessary in most deployments. Without it, you cannot define pre-trafficWSSpolicies against users or groups.
- WSSCASB Gateway—If yourWSSaccount is provisioned for CASB Gateway (CASB-only mode), theAuth Connectorisnotrequired.WSSdoes not require users or groups for policies. The on-premises ProxySG appliance provides the user/group information to CloudSOC. CASB Gateway uses SpanVA to map users to groups.
- To configure an existing gatewayProxySGor ASG appliance to forward HTTP/HTTPS traffic from downstream devices/clients up toWSS, you must create forwarding hosts that carry HTTP, HTTPS, and SSL traffic. The forwarding policy that is installed on the appliance directs traffic to the correct forwarding host comprised of the following:
- Required: HTTP—Traffic forwarded on port8443(encrypted).
- Required: Unintercepted SSL—Traffic forwarded on port8080.
- Optional: Intercepted SSL—A gateway appliance running SGOS 6.5.x or later supports the following. A local proxy performs SSL interception and forwards the user authentication information (in addition to traffic) toWSSon port8084. If you configure the appliance to intercept some SSL traffic (specific categories), you must create this service.
- Install theWSSroot certificate and add it to the browser-trusted list (see the prerequisite procedure).
- The best practice is 1 public IP address for every 5000 users. For example, if you have 10,000 on-premises users whose connections must egress toWSS, use two gateway proxies.
- Enable port randomization and ensure that Reflect Client IP is disabled (seeStep 7).
- Distribute the root cert to endpoints.
Best Practice—Authentication
Authentication is
not
combined. Therefore, if local authentication fails and the information is not forwarded, the WSS
authentication process also fails. The best practice is to use two ProxySG
/ASG appliances to eliminate local authentication single point of failure.Prerequisite—Install the Root Certificate
Install the
WSS
root certificate on the appliance and add it to the browser-trusted list. This is required if the ProxySG
appliance is forwarding any SSL traffic regardless of where the termination occurs.Step 1—Obtain the
WSS
Certificate- In theWSSportal, navigate toPolicy > TLS/SSL Interception.
- Expand theTLS/SSL Interception Certificatearea.
- ClickDownload.
- ClickSave Fileand save the certificate to an internally accessible location.
- Open the file with a text application (notepad, for example). Copy the contents to the clipboard.
Step 2—Upload the Certificate to the
ProxySG
Appliance- In theProxySGManagement Console, selectConfiguration > SSL > CA Certificates > CA Certificates.
- ClickImport.

- Namethe certificate. If you are replacing an existing certificate, enter a different name.
- Pastethe root certificate from the clipboard into theCA Certificate PEMarea.
- ClickOK.
- Click theCA Certificate Liststab.
- Selectbrowser-trusted.
- ClickEdit.
- Locate and select theWSSroot certificate.
- ClickAddto move it to the browser-trusted field.
- If you are replacing the certificate,Removethe old one from the list.
- ClickOK.
- ClickApplyto enable the changes.
If you require more information about appliance certificate management, consult the following.
Procedure—Configure the Appliance
The following task demonstrates configuration with the
ProxySG
appliance running SGOS 6.8.x. If you create hosts with the example names in this procedure, you do not need to edit the installed forwarding policy.
Prerequisite—Verify that proper authentication is configured on the
ProxySG
appliance. To display user names in reports and make user names and groups available for custom policy, you must configure
ProxySG
appliance authentication. For more information about Proxy Edition authentication, refer to the document for your SGOS Version
(drop-down):For MACH 5 Edition
ProxySG
appliances, authentication configuration requires adding more authentication Content Policy Language (CPL) to the Local policy file. See Reference: Additional Authentication CPL for SGOS MACH 5 Proxy Forwarding.Step 1—Create a Location in the Portal
Create a fixed
Location
in the WSS
portal. A Location instructs WSS
to accept incoming connections from the firewall device IP address. - In theWSSportal, navigate toConnectivity > Locations.
- ClickAdd Location.
- Complete theLocationdialog.

- Namethe location. For example, enter a location designation or employee group identification name.
- SelectProxy Forwardingas theAccess Method.
- Enter the gatewayIP/Subnetthat you defined in theProxySGforwarding host configuration dialog or ISA/TWG policy.
- Enter resource and location information.

- Select theEstimated Userrange that sends web requests through this gateway interface.Symantecuses this information to ensure proper resources are allocated.
- Select aCountryandTime Zone.
- Fill out location information and enter comments (optional).
- ClickSave.
Step 2—Verify that the External/Explicit HTTP proxy services are enabled and set the HTTPS proxy service to TCP Tunnel.
To avoid connection issues, the
External HTTP
or Explicit HTTP
proxy services (configured together for ports 80
and 8080
) must be enabled and the HTTPS
proxy service configured use TCP Tunnel
as the Proxy Setting
. - In theProxySGappliance Management Console, selectConfiguration > Services > Proxy Services.
- Verify that either theExplicit HTTPor theExternal HTTPservice is enabled (set toIntercept). The selected service depends on your gateway deployment method.

- Configure theHTTPSservice to useTCP_Tunnel.
- Select theExplicit HTTPSorExternal HTTPSservice and clickEdit Service.

- From theProxydrop-down list, selectTCP Tunnel.
- SelectDetect Protocol; accept the Detect Protocol warning.
- Clear theEnable ADNoption.
- ClickOK.
- In theListenersarea, set theActiontoIntercept.
- ClickApply.
Step 3—Create a server forwarding host for HTTPS (Port 8443).
Forwards HTTP traffic—with an encrypted connection—to
WSS
.- In the Management Console, select theConfiguration > Forwarding > Forwarding Hosts > Forwarding Hoststab.
- ClickNew. The Management Console displays the Add Forwarding Hosts dialog.
- Create theWSShost.

- Enter anAliasname for the host. For example:WSSSecure8443.
- Enter theWSSHostname:proxy.threatpulse.net(unless you were given another service point name).
- SelectServer.
- Clear thePorts: HTTPoption.
- Enter8443in thePorts: HTTPSfield.
- Host Affinity Methods—HTTP: SelectClient IP Address.
- Host Affinity Methods—SSL: SelectClient IP Address.
- ClickOKto close the dialog.
- ClickApply.
Step 4—Create a Proxy Forwarding Host for Unintercepted SSL (Port 8080)
This host forwards HTTPS, SSL, and TCP traffic to
WSS
. Installed policy directs the traffic over port 8080
or 443
. If configured, WSS
intercepts SSL for policy inspection.- Remaining on theForwarding Hoststab, clickNew. The Management Console displays the Add Forwarding Hosts dialog.
- Create theWSShost.

- Enter anAliasname for the host. For example:WSSHTTP8080.
- Enter theWSSHostname:proxy.threatpulse.net(unless you were given another service point name).
- SelectProxy.
- Enter8080in thePorts: HTTPfield.
- ClickOKto close the dialog.
- ClickApply.
Step 5—(Conditional Option) Create a Proxy Forwarding host for locally-intercepted SSL traffic (port 8084).
If your gateway
ProxySG
appliance is running SGOS 6.5.x or later and you have configured it to intercept some SSL traffic for local inspection and user authentication forwarding, configure a forwarding host for port 8084
.- Remaining on theForwarding Hoststab, clickNew. The Management Console displays the Add Forwarding Hosts dialog.
- Create theWSShost.

- Enter anAliasname the host. For example:WSSInterceptedHTTPS8084.
- Enter theWSSHostname:proxy.threatpulse.net(unless you were given another service point name).
- SelectProxy.
- Enter8084in thePorts: HTTPfield.
- Host Affinity Methods—HTTP: SelectClient IP Address.
- ClickOKto close the dialog.
- ClickApply.
Step 6—On the gateway
ProxySG
appliance, define policy that sends traffic to the forwarding host. This is a critical step that routes the web traffic to
WSS
.- In the Management Console, select theConfiguration > Policy > Policy Filestab.
- Install the forwarding policy:
- In theInstall Policyarea, selectText Editorfrom theInstall Forward File Fromdrop-down list.
- ClickInstall. The interface displays the Edit and Install the Forward File dialog.
- Enter the forwarding policy to theendof any existing forwarding policy. To copy and paste a template created bySymantec, see Reference: Proxy Forwarding Policy.
- ClickInstallto close the dialog.
- This step is required if these groups are not currently referenced in the gateway proxy policies or if you want the ability to defineWSSpolicy against these groups.Define policy that lists the groups of interest that are allowed access toWSS. Add this policy to the Forward file or the Central file (if you use one for easier distribution).
- In theInstall Policyarea, selectText Editorfrom theInstall Forward File FromorInstall Central File Fromdrop-down list.
- ClickInstall; the interface displays the Edit and Install the File dialog.
- Paste the following policy to the end of your existing central policy. The policy defines which defines the groups of interest that are subject toWSSpolicy and are visible in reports:define condition threatpulse_groups group = (group_name,group_name,group_name) end
- ClickInstallto close the dialog.
- ClickApply.
Step 7—Randomize Ports and Disable Reflect Client IP.
Enable port randomization and allow for the full TCP-IP port range.
From the
ProxySG
appliance CLI (enable > configure
mode), enter the following commands:#config term#(config)tcp-ip inet-lowport 1024#(config)tcp-ip tcp-randomize-port enable#(config)exit
Do not use the
Reflect Client IP
option because it disables port randomization and which the use of another port-mapping algorithm.- ProxySGManagement Console: Select theConfiguration > Proxy Settings > General > Generaltab and clear theReflect client’s source IP when connecting to serversoption.
- ProxySGCLI (enable > configure mode):SGOS#(config)generalSGOS#(config general)reflect-client-ip disable
The Reflect Client IP option is also available in policy. Verify that you do not have any policy actions that enable Reflect Client IP.
Troubleshooting
In a deployment where the
ProxySG
appliance forwards traffic to WSS
and a large number of users use the service, latency increases and page-loading timeouts might occur because the pool of TCP connections is exhausted. Next Step
- Distribute the root cert to all endpoints. Distribute WSS Root Cert to Endpoints