McAfee MAP-3300-SWG Product Guide - Page 164

Basic HTTP settings, User Authentication, Table 142, Option Definitions

Page 164 highlights

Overview of Web features Web Configuration • Basic HTTP settings • User Authentication • Timeouts Basic HTTP settings Table 142 Option Definitions Option Enable the HTTP protocol HTTP ports Definition Normally, this option is selected. Specifies the ports that the appliance will scan for threats when in Explicit Proxy mode. Typical ports are 80 for listening, and port 443 for secure web access using HTTPS. Do not add secure ports such as 443 as listening ports. If an appliance is operating in a transparent mode, you can exclude some parts of the network from scanning traffic in a protocol, either all the time or for some periods during the day. The most secure option is to scan all traffic. Before turning off scanning of any traffic, consider the security risks. Click these icons and the port headings to reveal icons for managing the port information: Enable reverse DNS If this option is not set, web access is faster but: lookups • HTTPS URL filtering cannot work because the URLs are recorded by name, such as www.example.com, not as IP addresses. • The logs are less informative because they contain only IP addresses such as 192.168.200.254, not names such as www.example.com. User Authentication Use this section to enable user authentication for this policy. By default, authentication is disabled. To set up authentication services, select System | Users, Groups and Services | Web User Authentication on the navigation bar. Table 143 Option Definitions Option Authentication group Protocol preset Advanced settings Request Verbs Definition Select an authentication group from the list of all available authentication groups configured globally. The list is disabled if authentication is off. The selected authentication group defines which authentication service is used. Authentication can be configured to try more than one authentication service in a defined order. Allows you to make settings for any exception to the default setting. For example, you can require that some parts of the network use different devices for their authentication. You do not normally need to change the following settings. Request verbs are acted on to start the authentication redirect process. This is normally set to GET. 164 McAfee Email and Web Security Appliances 5.6.0 Product Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336

Basic HTTP settings
User Authentication
Timeouts
Basic HTTP settings
Table 142
Option Definitions
Option
Definition
Enable the HTTP
protocol
Normally, this option is selected.
HTTP ports
Specifies the ports that the appliance will scan for threats when in Explicit Proxy
mode. Typical ports are 80 for listening, and port 443 for secure web access using
HTTPS.
Do not add secure ports such as 443 as listening ports.
If an appliance is operating in a transparent mode, you can exclude some parts of
the network from scanning traffic in a protocol, either all the time or for some
periods during the day. The most secure option is to scan all traffic. Before turning
off scanning of any traffic, consider the security risks.
Click these icons and the port headings to reveal icons for managing the port
information:
Enable reverse DNS
lookups
If this option is not set, web access is faster but:
HTTPS URL filtering cannot work because the URLs are recorded by name, such as
www.example.com, not as IP addresses.
The logs are less informative because they contain only IP addresses such as
192.168.200.254, not names such as www.example.com.
User Authentication
Use this section to enable user authentication for this policy. By default, authentication is disabled.
To set up authentication services, select
System
|
Users, Groups and Services
|
Web User Authentication
on the
navigation bar.
Table 143
Option Definitions
Option
Definition
Authentication group
Select an authentication group from the list of all available authentication
groups configured globally. The list is disabled if authentication is off. The
selected authentication group defines which authentication service is used.
Authentication can be configured to try more than one authentication service in
a defined order.
Protocol preset
Allows you to make settings for any exception to the default setting. For
example, you can require that some parts of the network use different devices
for their authentication.
Advanced settings
You do not normally need to change the following settings.
Request Verbs
Request verbs are acted on to start the authentication redirect process. This is
normally set to GET.
Overview of Web features
Web Configuration
164
McAfee Email and Web Security Appliances 5.6.0 Product Guide