McAfee EPOCDE-AA-BA Product Guide - Page 84

Configuring proxy settings for McAfee Labs Security Threats

Page 84 highlights

8 Setting up repositories Using SuperAgents as distributed repositories 6 Type the IP address or fully-qualified domain name and the port number of the HTTP and/or FTP source where the agent pulls updates. Select Use these settings for all proxy types to make these the default settings for all the proxy types. 7 Select Specify exceptions to designate systems that do not require access to the proxy. Use a semicolon to separate the exceptions. 8 Select Use HTTP proxy authentication and/or Use FTP proxy authentication, then provide a user name and credentials. 9 Click Save. Configuring proxy settings for McAfee Labs Security Threats Use this task to configure proxy settings for the McAfee Labs Security Threats. For option definitions, click ? in the interface. Task 1 Click Menu | Configuration | Server Settings. 2 Select Proxy Settings and click Edit. The Edit Proxy Settings page appears. 3 Select Configure the proxy settings manually. 4 Next to Proxy server settings, select whether to use one proxy server for all communication, or different proxy servers for HTTP and FTP proxy servers. Then type the IP address or fully-qualified domain name and the Port number of the proxy server. If you are using the default source and fallback sites, or if you configure another HTTP source site and FTP fallback site (or vice versa), configure both HTTP and FTP proxy authentication information here. 5 Next to Proxy authentication, configure the settings as appropriate, depending on whether you pull updates from HTTP repositories, FTP repositories, or both. 6 Next to Exclusions, select Bypass Local Addresses, then specify any distributed repositories where the server can connect to directly by typing the IP addresses or fully-qualified domain name of those systems, separated by semicolons. 7 Click Save. Using SuperAgents as distributed repositories Use these tasks to create and configure repositories on systems that host SuperAgents. You cannot create these SuperAgents until agents have been distributed to the target systems. 84 McAfee® ePolicy Orchestrator® 4.6.0 Software Product Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328

6
Type the IP address or fully-qualified domain name and the port number of the HTTP and/or FTP
source where the agent pulls updates. Select
Use these settings for all proxy types
to make these the
default settings for all the proxy types.
7
Select
Specify exceptions
to designate systems that do not require access to the proxy. Use a
semicolon to separate the exceptions.
8
Select
Use HTTP proxy authentication
and/or
Use FTP proxy authentication
, then provide a user name and
credentials.
9
Click
Save
.
Configuring proxy settings for McAfee Labs Security Threats
Use this task to configure proxy settings for the McAfee Labs Security Threats.
For option definitions, click
?
in the interface.
Task
1
Click
Menu
|
Configuration
|
Server Settings
.
2
Select
Proxy Settings
and click
Edit
.
The
Edit Proxy Settings
page appears.
3
Select
Configure the proxy settings manually
.
4
Next to
Proxy server settings
, select whether to use one proxy server for all communication, or different
proxy servers for HTTP and FTP proxy servers. Then type the IP address or fully-qualified domain
name and the
Port
number of the proxy server.
If you are using the default source and fallback sites, or if you configure
another HTTP source site and FTP fallback site (or vice versa), configure
both HTTP and FTP proxy authentication information here.
5
Next to
Proxy authentication
, configure the settings as appropriate, depending on whether you pull
updates from HTTP repositories, FTP repositories, or both.
6
Next to
Exclusions
, select
Bypass Local Addresses
, then specify any distributed repositories where the
server can connect to directly by typing the IP addresses or fully-qualified domain name of those
systems, separated by semicolons.
7
Click
Save
.
Using SuperAgents as distributed repositories
Use these tasks to create and configure repositories on systems that host SuperAgents. You cannot
create these SuperAgents until agents have been distributed to the target systems.
8
Setting up repositories
Using SuperAgents as distributed repositories
84
McAfee
®
ePolicy Orchestrator
®
4.6.0 Software Product Guide