﻿<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>LevelBlue Knowledge Base » Knowledgebase » Legacy Products » Secure Web Gateway » Third Party</title><generator>InstantKB.NET 2.0.6</generator><description>LevelBlue Knowledge Base</description><link>https://support.levelblue.com/kb/</link><webMaster>website@m86security.com</webMaster><lastBuildDate>Tue, 21 Apr 2026 19:38:25 GMT</lastBuildDate><ttl>20</ttl><item><title>How do I test Websense URL categorization</title><link>https://support.levelblue.com/kb/Goto14541.aspx</link><description>&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;SWG 10.x &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Question:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;How do I test Websense URL categorization? &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Reply:&lt;/h2&gt;&lt;p&gt;The Websense categorization used in SWG uses technology from the older brand name SurfControl. You can test URLs using the following link:&lt;br /&gt;&lt;br /&gt;&lt;a href="http://mtas.surfcontrol.com/mtas/mtas.asp" class="ApplyClass" target="_blank"&gt;http://mtas.surfcontrol.com/mtas/mtas.asp&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;This page does not require registration.&lt;/p&gt;&lt;h2&gt;Notes:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;Websense/SurfControl has several database versions. Trustwave cannot guarantee that SWG will return exactly the same result as the test site. The test site provides the best available information. &lt;/li&gt;    &lt;li&gt;Trustwave does not have a credential for the testing page on the main Websense.com support website. &lt;/li&gt;    &lt;li&gt;&lt;span style="font-size: 11px; line-height: 12px;"&gt;The fastest way to ask websense to change URL categorization is just email them to : &lt;/span&gt;&lt;a href="mailto:suggest@websense.com" style="font-size: 8pt;"&gt;suggest@websense.com&lt;/a&gt;&lt;span style="font-size: 11px; line-height: 12px;"&gt; &lt;/span&gt;&lt;span style="font-size: 11px; line-height: 12px;"&gt;Must state we are using surf control engine + version&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;</description><pubDate>Mon, 04 Nov 2013 04:54:23 GMT</pubDate><dc:creator>ofer Kalef</dc:creator></item><item><title>No updates for Virtual SWG system</title><link>https://support.levelblue.com/kb/Goto15616.aspx</link><description>&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;&lt;span style="line-height: 12px;"&gt;Virtual SWG 10.x&lt;/span&gt;&lt;/li&gt;    &lt;li&gt;&lt;span style="line-height: 12px;"&gt;Virtual SWG 11.x&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Symptoms:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;Updates are not installed, and no new updates are shown as available when attempting to retrieve manually.&lt;/li&gt;    &lt;li&gt;&lt;span style="line-height: 12px;"&gt;System Log shows an error on connecting with the Updates server.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Causes:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;This may happen due to the default date/time settings used for a Virtual installation - &lt;span style="line-height: 12px;"&gt;check the current date/time set on SWG to verify.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Resolution:&lt;/h2&gt;&lt;div&gt;Update the date/time settings using the config_time Limited Shell command. The best update method is to specify an NTP server, public or local.&lt;/div&gt;&lt;p&gt;&lt;/p&gt;</description><pubDate>Sun, 08 Sep 2013 07:05:56 GMT</pubDate><dc:creator>ofer Kalef</dc:creator></item><item><title>SWG Support Policy Aug 2013</title><link>https://support.levelblue.com/kb/Goto16128.aspx</link><description>&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;SWG&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Question:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;What is the Trustwave SWG support policy&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Information:&lt;/h2&gt;&lt;p&gt;See attached File&lt;/p&gt;&lt;br /&gt;</description><pubDate>Mon, 26 Aug 2013 03:18:54 GMT</pubDate><dc:creator>ofer Kalef</dc:creator></item><item><title>Install local updates on SWG appliances</title><link>https://support.levelblue.com/kb/Goto13868.aspx</link><description>&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;SWG 10.x &lt;/li&gt;    &lt;li&gt;SWG 11.x &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Question:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;What is the procedure for installing a local update file on a Secure Web Gateway (SWG) appliance? &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Reply:&lt;/h2&gt;&lt;p&gt;Patches, fixes and software updates for Secure Web Gateway appliances are released periodically. &lt;br /&gt;Patches typically address specific issues and are initially released as standalone packages before they are included in a general maintenance update. This article describes how to install any .fup patch or update.&lt;/p&gt;&lt;ol&gt;    &lt;li&gt;Download the update package as instructed by support personnel and save it locally on your desktop. &lt;/li&gt;    &lt;li&gt;Navigate to &lt;strong&gt;Administration&lt;/strong&gt; &lt;strong&gt;&amp;gt;&lt;/strong&gt; &lt;strong&gt;Updates and Upgrades&lt;/strong&gt; &lt;strong&gt;&amp;gt;&lt;/strong&gt; &lt;strong&gt;Management&lt;/strong&gt;.&lt;br /&gt;    &lt;img alt="" style="width: 600px; height: 277px;" src="https://support.levelblue.com/KB/Uploads/Images/SM/13868/01.PNG" /&gt; &lt;/li&gt;    &lt;li&gt;In the Available Updates tab, click &lt;strong&gt;Import Updates&lt;/strong&gt; .&lt;br /&gt;    &lt;br /&gt;    &lt;img alt="" style="width: 600px; height: 324px;" src="https://support.levelblue.com/KB/Uploads/Images/SM/13868/02.PNG" /&gt; &lt;/li&gt;    &lt;li&gt;&lt;strong&gt;Browse&lt;/strong&gt; to the update location on the local machine and click the &lt;strong&gt;Import&lt;/strong&gt; button.&lt;br /&gt;    &lt;br /&gt;    &lt;img alt="" style="width: 600px; height: 322px;" src="https://support.levelblue.com/KB/Uploads/Images/SM/13868/03.png" /&gt; &lt;/li&gt;    &lt;li&gt;Wait for the upload process to complete.&lt;br /&gt;    The amount of time will vary depending on the size of the update and the speed of the connection to the Policy Server.  &lt;br /&gt;    Make sure that the required update package appears in the list of available updates.  &lt;br /&gt;    It may be necessary to click the &lt;strong&gt;Refresh&lt;/strong&gt; button in order to update the list.&lt;br /&gt;    &lt;br /&gt;    &lt;img alt="" style="width: 600px; height: 273px;" src="https://support.levelblue.com/KB/Uploads/Images/SM/13868/04.PNG" /&gt; &lt;/li&gt;    &lt;li&gt;&lt;span style="line-height: 12px; font-size: 11px;"&gt;To see more information about the update, click the &lt;strong&gt;+&lt;/strong&gt; icon next to the update row and click the Release Notes link in the detailed description.&lt;/span&gt; &lt;/li&gt;    &lt;li&gt;Click the required update and choose the &lt;strong&gt;Install Now&lt;/strong&gt; option.&lt;br /&gt;    &lt;br /&gt;    &lt;img alt="" style="width: 600px; height: 270px;" src="https://support.levelblue.com/KB/Uploads/Images/SM/13868/05.png" /&gt; &lt;/li&gt;&lt;/ol&gt;</description><pubDate>Fri, 09 Aug 2013 01:53:28 GMT</pubDate><dc:creator>ofer Kalef</dc:creator></item><item><title>What is the procedure to follow if updates fail to install?</title><link>https://support.levelblue.com/kb/Goto15992.aspx</link><description>&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;SWG 10.x &lt;/li&gt;    &lt;li&gt;SWG 11.x &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Question:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;What is the procedure to follow if all updates fail to install: Requests to https://mirror.updateng.finjan.com/updates return 500 (Connect failed: connect: Connection timed out; Connection timed out) &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Reply:&lt;/h2&gt;&lt;p&gt;1. Try to ping &lt;span style="line-height: 12px;"&gt;mirror.updateng.finjan.com and see if it resolves.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="line-height: 12px;"&gt;2. Check &lt;/span&gt;&lt;a href="http://www.whatsmydns.net/#A/mirror.updateng.finjan.com" style="line-height: 18px; font-size: 8pt;"&gt;http://www.whatsmydns.net/#A/mirror.updateng.finjan.com&lt;/a&gt; to see if there is a worldwide problem, and try to ping the various IPs of &lt;span style="line-height: 12px;"&gt;mirror.updateng.finjan.com&lt;/span&gt;&lt;/p&gt;&lt;p&gt;3. If you are running Version 11.x and behind a proxy, make sure you have installed MHF01 or higher.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: 8pt;"&gt;It is probable that your firewall blocks &lt;/span&gt;&lt;span style="font-size: 8pt;"&gt;mirror.updateng.finjan.com. Check your firewall and open port 443 to &lt;/span&gt;&lt;span style="line-height: normal;"&gt;[1] &lt;/span&gt;&lt;strong style="font-size: 8pt; line-height: normal;"&gt;updateng.finjan.com&lt;/strong&gt;&lt;span style="line-height: normal;"&gt; and [2] &lt;/span&gt;&lt;strong style="font-size: 8pt; line-height: normal;"&gt;mirror.&lt;span style="line-height: 12px;"&gt;updateng.finjan.com&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</description><pubDate>Mon, 08 Jul 2013 02:43:50 GMT</pubDate><dc:creator>ofer Kalef</dc:creator></item><item><title>Block page displays an unfamiliar category</title><link>https://support.levelblue.com/kb/Goto15606.aspx</link><description>&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;SWG 10.x&lt;/li&gt;    &lt;li&gt;SWG 11.x&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Question:&lt;/h2&gt;&lt;span style="font-size: 13px;"&gt;&lt;span style="line-height: 12px;"&gt;The User gets a Block page with a block reason that contains an unfamiliar category. The User is using the Websense/IBM filter but the category in the block reason is not a Websense/IBM category. &lt;/span&gt;&lt;br /&gt;&lt;span style="line-height: 12px;"&gt;In the Web Log Transaction Entry &lt;strong&gt;Details &amp;gt; Request &lt;/strong&gt;&lt;/span&gt;&lt;span style="line-height: normal; white-space: pre-wrap;"&gt;&lt;strong&gt;&amp;gt; Websense&lt;/strong&gt; (or &lt;strong&gt;IBM&lt;/strong&gt;), the categories seem correct. Why is there an inconsistency?&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;h2&gt;Reply:&lt;/h2&gt;&lt;p&gt;&lt;span style="font-size: 13px;"&gt;If the block page came from a cloud scanner, the reason is an inconsistency between the category in the block reason and the filter engine categories, which correctly shows in the &lt;span style="font-size: 13px;"&gt;Web Log Transaction Entry &lt;strong&gt;Details &amp;gt; Request &lt;/strong&gt;&lt;span style="line-height: normal; white-space: pre-wrap;"&gt;&lt;strong&gt;&amp;gt; Websense&lt;/strong&gt; (or &lt;strong&gt;IBM&lt;/strong&gt;)&lt;/span&gt;&lt;/span&gt;&lt;span style="line-height: normal; white-space: pre-wrap;"&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;</description><pubDate>Mon, 17 Jun 2013 01:33:14 GMT</pubDate><dc:creator>ofer Kalef</dc:creator></item><item><title>Kaspersky blocks files with reason "could not be scanned by AV"</title><link>https://support.levelblue.com/kb/Goto15189.aspx</link><description>&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;SWG 10.x, 11.x&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Question:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;Kaspersky blocks files with error "could not be scanned by AV" but file seems valid and can be opened with archive software.&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Reply:&lt;/h2&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Check the Response node in the weblog transaction.&lt;/p&gt;&lt;p&gt;Possible reasons:&lt;/p&gt;&lt;p&gt;Scan timeout - try increasing scan timeout in Administration-&amp;gt;System Settings-&amp;gt;Scanning-&amp;gt;Scanning Engines-&amp;gt;Anti-Virus (Kaspersky)-&amp;gt;Scanning Time Limit&lt;/p&gt;&lt;p&gt;Encrypted file - A file in the archive may be encrypted and Kaspersky fails to open it. This triggers a block of the whole archive with reason password protected.&lt;/p&gt;&lt;p&gt;Corrupt file - A file in the archive is corrupted and that's why the whole archive is marked as corrupted. &lt;/p&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;</description><pubDate>Mon, 04 Feb 2013 06:15:52 GMT</pubDate><dc:creator>ofer Kalef</dc:creator></item><item><title>Windows 7 end users cannot authenticate with NTLM</title><link>https://support.levelblue.com/kb/Goto14592.aspx</link><description>&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;SWG 10.x&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Symptoms:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt; Client can connect with an XP workstation, but not with Windows 7&lt;/li&gt;    &lt;li&gt;Using 2008 AD server&lt;/li&gt;    &lt;li&gt;Client connections return a "STATUS_INVALID_PARAM" error code when you use a "Send NTLMv2 response only" authentication level in Windows Server&lt;br /&gt;    2008 or in Windows Vista&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Causes:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;An issue in AD server&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Resolution:&lt;/h2&gt;&lt;p&gt;MS Solution to implement on the AD server is in:&lt;/p&gt;&lt;p&gt;&lt;a href="http://support.microsoft.com/kb/957441" target="_blank"&gt;http://support.microsoft.com/kb/957441&lt;/a&gt; &lt;/p&gt;</description><pubDate>Thu, 24 May 2012 01:45:52 GMT</pubDate><dc:creator>Rudolf Kessler</dc:creator></item><item><title>Authentication failure withMS AD 2008 R2 when using windows 7/vista Client</title><link>https://support.levelblue.com/kb/Goto14542.aspx</link><description>&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;SWG 10.x &lt;/li&gt;    &lt;li&gt;Windows Vista or Windows 7 clients &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Symptoms:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;Trying to configure authentication against Microsoft AD 2008 R2. &lt;/li&gt;    &lt;li&gt;With Windows XP clients, authentication is successful when you disable NTLM V2 enforcement. &lt;/li&gt;    &lt;li&gt;However with Windows 7 or Windows Vista c&lt;span id="result_box" lang="en" class="hps"&gt;lients&lt;/span&gt;, you see "Authentication failure" in the weblog viewer. &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Causes:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;This problem occurs because of an additional security check in Windows Server 2008 and Windows Vista. &lt;/li&gt;    &lt;li&gt;This problem is limited to clients that use NTLMv2 authentication without extended security. &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Resolution:&lt;/h2&gt;&lt;p&gt;To resolve this issue , you can install and configure a Hotfix that Microsoft provides for this issue. See the following Microsoft Knowledge Base article:&lt;/p&gt;&lt;ul&gt;    &lt;li&gt;&lt;a href="http://support.microsoft.com/kb/957441" class="ApplyClass" target="_blank"&gt;http://support.microsoft.com/kb/957441&lt;/a&gt; &lt;/li&gt;&lt;/ul&gt;</description><pubDate>Mon, 14 May 2012 02:17:31 GMT</pubDate><dc:creator>Rudolf Kessler</dc:creator></item><item><title>Bluecoat Proxy SG fails to "Sense Settings" in ICAP mode with version 10</title><link>https://support.levelblue.com/kb/Goto14141.aspx</link><description>&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;SWG 10.x &lt;/li&gt;    &lt;li&gt;Bluecoat Proxy SGOS (seen with 5.5.x.x)  &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Symptoms:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;Maximum number of ICAP connections is 16K (16,384) in SWG 10.x.&lt;/li&gt;    &lt;li&gt;ICAP client service configuration fails to detect and apply this value in ICAP Response mode (sense Request Mode settings work fine). Value is unchanged, and remains under 16K. &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Causes:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;In SWG 10.x, the maximum number of possible established connections to the proxy or ICAP port is 16K, and can be divided between all available ICAP clients. The RESP/REQ mode ratio is 70:30 (hard-coded value), but the weighting of connections to each ICAP client can be configured as desired.&lt;br /&gt;    &lt;ul&gt;        &lt;li&gt;Example: If using two ICAP clients weighted at 50:50, they are each capable of handling 8K (8,192) connections (see ICAP section under Scanner / "Devices"). Therefore, each ICAP client's theoretical maximum connections is 5,734 (70%) in RESP mode and 2,458 (30%) in REQ mode. &lt;/li&gt;    &lt;/ul&gt;    &lt;/li&gt;    &lt;li&gt;It appears that Bluecoat Proxy SG cannot use more than 4K (4,096) connections for one service. If SWG's "Sense Settings" tries to use a value higher than this, the configuration process fails to accept this higher value.  &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Resolution:&lt;/h2&gt;&lt;ul&gt;&lt;/ul&gt;    There are two options:    &lt;ul&gt;        &lt;li&gt;The preferred option is to change the weighting in SWG devices    section and limit it to 35% per ICAP client (even if when combined they do not add up to 100%). Now "Sense Settings" should complete successfully. &lt;/li&gt;        &lt;li&gt;Although not recommended, the second option is to skip "Sense Settings" and set 4096 manually in RESP mode. &lt;/li&gt;    &lt;/ul&gt;    &lt;h2&gt;Notes:&lt;/h2&gt;    &lt;p&gt;SWG's ICAP server responds correctly:&lt;br /&gt;    &lt;br /&gt;    &lt;img alt="" width="498" height="287" src="https://support.levelblue.com/kb/Uploads/Images/14141/14141_sense_settings.jpg" /&gt;&lt;br /&gt;    &lt;br /&gt;    Bluecoat SGOS does not accept the value:&lt;br /&gt;    &lt;br /&gt;    &lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/14141/14141_false_number.jpg" /&gt;&lt;br /&gt;    &lt;br /&gt;    &lt;br /&gt;    If set manually, Bluecoat SGOS returns an error:&lt;br /&gt;    &lt;br /&gt;    &lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/14141/14141_set_manually_fails.jpg" /&gt;&lt;br /&gt;    &lt;br /&gt;    &lt;br /&gt;    Solution: Limit weighting to 35%, as this will return a valid number and "Sense Settings" will successfully complete.&lt;br /&gt;    &lt;br /&gt;    &lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/14141/14141_weight_35.jpg" /&gt;&lt;br /&gt;    &lt;br /&gt;    &lt;br /&gt;    &lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/14141/14141_sense_settings_OK.jpg" /&gt;&lt;/p&gt;</description><pubDate>Fri, 02 Mar 2012 07:08:55 GMT</pubDate><dc:creator>Rudolf Kessler</dc:creator></item><item><title>IE8 running on Windows 7 does not load certain sites</title><link>https://support.levelblue.com/kb/Goto13928.aspx</link><description>&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;SWG 9.x &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Question:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;Why do certain HTTP/HTTPS sites not load in Internet Explorer 8 under Windows 7 or Windows 2008 R2, especially when using Identification (Get User Credentials) or Authentication? &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Reply:&lt;/h2&gt;&lt;p&gt;This behavior seems to be an IE8 limitation – IE8 is sometimes stuck when SWG responds to an HTTP CONNECT request (the start of an HTTPS session) with an HTTP 407 Proxy Authenticate message.  If the message body (the HTML code) is smaller than a certain size, IE8 hangs after a number of consequential requests/responses. &lt;/p&gt;&lt;h2&gt;Solution:&lt;/h2&gt;&lt;p&gt;&lt;span&gt;Secure Web Gateway appliances can be configured to work around this issue. The issue does not occur if the HTTP message “HTTP 407 Proxy Authenticate” has at least a specific length. This can be achieved by adding additional dummy-data to the Authentication error message.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Since this modification requires root access, please contact Trustwave Technical Support, referring to this issue and article number 13928 (public) / 13710 (internal).&lt;/span&gt;&lt;/p&gt;</description><pubDate>Mon, 02 May 2011 06:37:47 GMT</pubDate><dc:creator>Rudolf Kessler</dc:creator></item><item><title>ICAP Timeout Error When Browsing Through BlueCoat Proxy</title><link>https://support.levelblue.com/kb/Goto13558.aspx</link><description>&lt;div class="atb65"&gt;&lt;li&gt;&lt;b&gt;Description&lt;/b&gt;&lt;br /&gt;When browsing through a BlueCoat proxy with a Finjan scanner configured as an ICAP, client timeouts occurs. &lt;/li&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="atb66"&gt;&lt;li&gt;&lt;b&gt;Symptoms&lt;/b&gt;&lt;br /&gt;&lt;p&gt;The following error is shown when trying to browse to a site:&lt;/p&gt;&lt;p&gt;&lt;em&gt;ICAP Error (icap_error)&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;em&gt;An error occurred while performing an ICAP operation: Request timed out: Timed out while waiting for a response from the ICAP server.&lt;br /&gt;There could be a network problem, the ICAP service may be misconfigured, or the ICAP server may have reported an error.&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;em&gt;For assistance, contact your network support team.&lt;/em&gt; &lt;/p&gt;&lt;/li&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="atb67"&gt;&lt;li&gt;&lt;b&gt;Cause&lt;/b&gt;&lt;br /&gt;This is a result of a misconfigured default connection timeout value in the BlueCoat (That was changed in SGOS ver 5). &lt;/li&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="atb68"&gt;&lt;li&gt;&lt;b&gt;Solution&lt;/b&gt;&lt;br /&gt;&lt;p&gt;To resolve this please increase the connection timeout for the RESP_MOD service as follows:&lt;/p&gt;&lt;p&gt;&lt;img alt="" style="border-bottom: 0px solid; border-left: 0px solid; border-top: 0px solid; border-right: 0px solid;" src="https://support.levelblue.com/kb/attachments/images/943~BC.png" /&gt;&lt;/p&gt;&lt;/li&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="atb69"&gt;&lt;li&gt;&lt;b&gt;Software Version&lt;/b&gt;&lt;br /&gt;all SWG versions, but not related to &lt;/li&gt;&lt;/div&gt;&lt;dl style="margin-top: 10px;"&gt;    &lt;dt&gt;&lt;i&gt;This article applies to:&lt;/i&gt; &lt;/dt&gt;    &lt;dd&gt;&lt;i&gt;SWG 3000&lt;/i&gt; &lt;/dd&gt;    &lt;dd&gt;&lt;i&gt;SWG 5000&lt;/i&gt; &lt;/dd&gt;    &lt;dd&gt;&lt;i&gt;SWG 7000&lt;/i&gt; &lt;i&gt;    &lt;dl style="margin-top: 10px;"&gt;        &lt;dt&gt;&lt;i&gt;This article was previously published as:&lt;/i&gt; &lt;/dt&gt;        &lt;dd&gt;&lt;i&gt;Finjan KB 1817&lt;/i&gt; &lt;/dd&gt;    &lt;/dl&gt;    &lt;/i&gt;&lt;/dd&gt;&lt;/dl&gt;</description><pubDate>Fri, 10 Dec 2010 09:07:11 GMT</pubDate><dc:creator>Rudolf Kessler</dc:creator></item><item><title>TCP Errors and Broken Sessions in a Proxy Chain with BlueCoat</title><link>https://support.levelblue.com/kb/Goto13375.aspx</link><description>&lt;div class="atb65"&gt;&lt;li&gt;&lt;b&gt;Description&lt;/b&gt;&lt;br /&gt;In a proxy chain with BlueCoat Proxy SG (downstream proxy) and Finjan Vital Security (upstream proxy) clients get "TCP errors" and see broken sessions. &lt;/li&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="atb66"&gt;&lt;li&gt;&lt;b&gt;Symptoms&lt;/b&gt;&lt;br /&gt;Clients browsing the internet see "TCP error" pages, and experience overall performance drop. &lt;/li&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="atb67"&gt;&lt;li&gt;&lt;b&gt;Cause&lt;/b&gt;&lt;br /&gt;This might be related to a specific HTTP setting on the BlueCoat Proxy SG:&lt;br /&gt;"HTTP persistent server" enables support for persistent server requests to web servers. &lt;br /&gt;It is enabled by default and set to 15 minutes. &lt;br /&gt;That means a session is kept open for 15 minutes, even if no data is retrieved, in order to avoid the necessity of a new TCP session setup (if required).&lt;br /&gt;&lt;br /&gt;This makes sense if the BlueCoat is the external proxy as the load is distributed over all addressed internet servers.&lt;br /&gt;&lt;br /&gt;However, in a proxy chain the upstream proxy has to hold all sessions even if no data is retrieved anymore. &lt;br /&gt;This is a waste of resources with regards to the capacity of established connections, and can lead to the situation that no new sessions can be established. &lt;/li&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="atb68"&gt;&lt;li&gt;&lt;b&gt;Solution&lt;/b&gt;&lt;br /&gt;Disable session persistency for server connections as follows: &lt;/li&gt;&lt;/div&gt;&lt;ol&gt;    &lt;li&gt;    &lt;div class="atb68"&gt;Get SSH or serial access to the BlueCoat Proxy SG.&lt;/div&gt;    &lt;/li&gt;    &lt;li&gt;Change to enable mode ("en"). &lt;/li&gt;    &lt;li&gt;Change to config  mode ("config t"). &lt;/li&gt;    &lt;li&gt;In HTTP settings: disable persistent server requests ("http no persistent server"). &lt;/li&gt;    &lt;li&gt;Quit config mode ("exit"). &lt;/li&gt;&lt;/ol&gt;&lt;p&gt;This setting is active now.&lt;br /&gt;You might want to check the settings afterwards:&lt;/p&gt;&lt;ul&gt;    &lt;li&gt;Type "show http". &lt;/li&gt;    &lt;li&gt;The console output should look like this: &lt;/li&gt;&lt;/ul&gt;&lt;blockquote style="margin-right: 0px;" dir="ltr"&gt;&lt;p&gt;&lt;span style="font-family: courier new;"&gt;Persistent connections:&lt;br /&gt;  Client connections:   enabled &lt;br /&gt;  Server connections:   &lt;strong&gt;disabled&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt; &lt;/p&gt;&lt;li&gt;&lt;b&gt;Software Version&lt;/b&gt;&lt;br /&gt;not related to SWG &lt;br /&gt;&lt;dl style="margin-top: 10px;"&gt;    &lt;dt&gt;&lt;i&gt;This article applies to:&lt;/i&gt; &lt;/dt&gt;    &lt;dd&gt;&lt;i&gt;NG 5000 / SWG 3000&lt;/i&gt; &lt;/dd&gt;    &lt;dd&gt;&lt;i&gt;NG 6000 / SWG 5000&lt;/i&gt; &lt;/dd&gt;    &lt;dd&gt;&lt;i&gt;NG 8000 / SWG 7000    &lt;dl style="margin-top: 10px;"&gt;        &lt;dt&gt;&lt;i&gt;This article was previously published as:&lt;/i&gt; &lt;/dt&gt;        &lt;dd&gt;&lt;i&gt;Finjan KB 1523&lt;/i&gt; &lt;/dd&gt;    &lt;/dl&gt;    &lt;/i&gt;&lt;/dd&gt;&lt;/dl&gt;&lt;/li&gt;</description><pubDate>Wed, 17 Nov 2010 02:46:43 GMT</pubDate><dc:creator>Rudolf Kessler</dc:creator></item><item><title>SWG block pages and helpdesk systems</title><link>https://support.levelblue.com/kb/Goto13842.aspx</link><description>&lt;P&gt;&lt;STRONG&gt;Question:&lt;/STRONG&gt;&lt;BR&gt;When users receive a full-page block message from a Secure Web Gateway scanner, is it possible for them to click a button on the page that will submit a helpdesk request to allow the page?&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Answer:&lt;/STRONG&gt;&lt;BR&gt;Full page block messages are comprised of editable HTML code, and it is possible to embed FORM tags within them.  This should be done with the Message Templates, rather than in the Block / Warn Messages.  Message Templates can be edited at &lt;STRONG&gt;Policies&lt;/STRONG&gt; -&amp;gt; &lt;STRONG&gt;End User Messages&lt;/STRONG&gt; -&amp;gt; &lt;STRONG&gt;Message Template&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;In order to provide the helpdesk with information about the blocked content (for example, Transaction IDs, etc.), it is useful to pass the block / warn message text as part of the form submission.  The USER_NOTIF variable is replaced with this text at the time that the block page is generated.  This variable can be included as the value of a form INPUT tag.  In this scenario, USER_NOTIF must be enclosed in quotes.  It is crucial to leave at least one space before or after USER_NOTIF (between USER_NOTIF and the quotes) in order for the SWG appliance to recognize this variable and replace it with the block / warn message.&lt;/P&gt;&lt;P&gt;For questions regarding the proper way to post web form data to a specific helpdesk system, please contact the helpdesk vendor.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Software Versions:&lt;/STRONG&gt;&lt;BR&gt;9.x&lt;/P&gt;</description><pubDate>Tue, 15 Jun 2010 20:13:00 GMT</pubDate><dc:creator>Eric Hanson</dc:creator></item><item><title>Microsoft Windows Update Fails If User Authentication/Identification Is Used</title><link>https://support.levelblue.com/kb/Goto13568.aspx</link><description>&lt;div class="atb65"&gt;&lt;li&gt;&lt;b&gt;Description&lt;/b&gt;&lt;br&gt;&lt;P&gt;Microsoft Windows Update (although whitelisted) fails if user authentication/identification is used.&lt;BR&gt;&lt;BR&gt;&lt;/P&gt;&lt;/div&gt;&lt;br&gt;&lt;div class="atb66"&gt;&lt;li&gt;&lt;b&gt;Symptoms&lt;/b&gt;&lt;br&gt;&lt;P&gt;In an environment where authentication or identification is defined and a user attempts to use Microsoft/Windows Update site, after selecting the hotfixes to install, the site's control starts running and then reports the installation attempt failed.&lt;BR&gt;&lt;BR&gt;&lt;IMG alt="" src="/kb/attachments/images/953~Windows Update Failure.png" border=0&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;/div&gt;&lt;br&gt;&lt;div class="atb67"&gt;&lt;li&gt;&lt;b&gt;Cause&lt;/b&gt;&lt;br&gt;Windows Update site use an ActiveX control to query and manage downloads from Microsoft.&lt;BR&gt;&lt;BR&gt;This ActiveX is not a fully functional browser, and so does not handle authentication mechanisms (such as NTLM) correctly.&lt;P&gt;The reason that the pages are blocked is because whenever the ActiveX is trying to access the web, the authentication fails and the wrong policy is assigned to the user at hand, in such a case the policy that will be used is the one assigned to Unknown Users.&lt;/P&gt;&lt;P&gt;If the policy that is assigned to Unknown Users is to block all access to the internet, the ActiveX component will  fail to download updates from the update site.&lt;BR&gt;&lt;/P&gt;&lt;/div&gt;&lt;br&gt;&lt;div class="atb68"&gt;&lt;li&gt;&lt;b&gt;Solution&lt;/b&gt;&lt;br&gt;&lt;P&gt;Since authentication will not work for the Microsoft/Windows Update site, the following options are availlable::&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Grant access to windows update to all machines by assigning a policy with limited access to the Unknown Users  group.&lt;BR&gt; &lt;LI&gt;Limit access to Windows Update by a combination of Source IP identification and limited access rules .&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Both solutions will require setting up a security policy rule to whitelist the Microsoft/Windows update site.&lt;BR&gt;&lt;BR&gt;For the following examples, this Security Policy will be referred as “The Restricted SP”.&lt;BR&gt;&lt;BR&gt;This can be an existing Security Policy that will be modified or a new Security Policy that will be created specifically for this solution.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;TIP:&lt;/STRONG&gt; To identify the URLs to whitelist, you can find the currently blocked URLs in the Web Logs screen of the Policy Server admin web GUI.&lt;/P&gt;&lt;P&gt;For more information on how to perform the actions described above, please consult the User Manuals .&lt;BR&gt; &lt;BR&gt;&lt;U&gt;&lt;STRONG&gt;Solution 1&lt;BR&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;BR&gt;Assign The Restricted SP to the Unknown Users.&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;Solution 2&lt;/STRONG&gt;&lt;BR&gt;&lt;/U&gt;&lt;BR&gt;Limiting access by client IP:&lt;BR&gt;&lt;BR&gt;Since we don’t want to lose the identification by username, we will duplicate and change the current Identification Policy and add a rule at the end to identify by client IP.&lt;/P&gt;&lt;P&gt;Create a new user or user group which will be assigned The Restricted SP, enter the IP ranges for this user group, or add individual users with specific IP addresses.&lt;BR&gt;An example is given below, for more information on how to perform these actions, consult the User Manuals.&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Go to Users -&amp;gt; Users/User Groups.&lt;LI&gt;Right click on the Users/User Group root and select Add Group.&lt;LI&gt;Name the new group (for example: Windows Update only)&lt;LI&gt;Assign the Restricted SP as the Security Policy.&lt;LI&gt;Assign the Logging Policy and HTTPS Policy according to your organization's requirements.&lt;LI&gt;If an IP range is appropriate, fill the table with the relevant IP address range.&lt;LI&gt;Save the new user group.&lt;LI&gt;Right-Click the new user group and select Add User.&lt;LI&gt;Enter a user name.&lt;LI&gt;Fill the table with the assigned IP addresses for this user.&lt;LI&gt;Save the user.&lt;LI&gt;Repeat steps 8-11 for each user that will use Windows Update.&lt;LI&gt;Commit changes.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Now when you have the Users and Security Policies setup up you will need to create the appropriate Identification Policy.&lt;BR&gt;Perform the following steps from the policy server web admin GUI:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Go to Administration -&amp;gt; System Settings -&amp;gt; Finjan Devices. &lt;LI&gt;Browse to the Devices -&amp;gt; IP -&amp;gt; Scanning Server -&amp;gt; Authentication. &lt;LI&gt;Note the assign Identification Policy.&lt;LI&gt;Now that you know what is the current Identification Policy, go to Policies -&amp;gt; Identification. &lt;LI&gt;Right-click on the relevant identification policy (from step 3) and select Duplicate Policy. &lt;LI&gt;Enter the name for the new policy (for example: Get User Credentials or IP). &lt;LI&gt;Right click on the new policy and select Add Rule. &lt;LI&gt;Enter the name for the new Rule: Identify Users by Source IP. &lt;LI&gt;Check the checkbox Enable Rule. &lt;LI&gt;Select the Action: Identify by source IP. &lt;LI&gt;Save the policy.&lt;LI&gt;Go to Administration -&amp;gt; System Settings -&amp;gt; Finjan Devices. &lt;LI&gt;Browse to the Devices -&amp;gt; IP -&amp;gt; Scanning Server -&amp;gt; Authentication and click Edit. &lt;LI&gt;Change the Identification Policy to the new policy created in steps 5-11. &lt;LI&gt;Save and Commit the changes.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Now you have an identification process that first try to perform an identification/authentication handshake (will work with supported browsers), and if  fails will Identify the client using the Source IP (X-Client-IP HTTP Header).&lt;BR&gt;If the user is browsing from an IP address assigned to the user group using the Restricted SP then the user will have access to the Microsoft/Windows Update site.&lt;BR&gt;&lt;BR&gt;All other users will be treated as Unknown Users.&lt;/P&gt;&lt;/div&gt;&lt;br&gt;&lt;div class="atb69"&gt;&lt;li&gt;&lt;b&gt;Software Version&lt;/b&gt;&lt;br&gt;9.0&lt;BR&gt;9.2&lt;/div&gt;&lt;br&gt;&lt;br clear=all&gt;&lt;DL style="margin-top:10px;"&gt;&lt;DT&gt;&lt;i&gt;This article applies to:&lt;/i&gt;&lt;dd&gt;&lt;i&gt;NG 5000&lt;/i&gt;&lt;/dd&gt;&lt;dd&gt;&lt;i&gt;NG 6000&lt;/i&gt;&lt;/dd&gt;&lt;dd&gt;&lt;i&gt;NG 8000&lt;/dd&gt;&lt;/DL&gt;&lt;DL style="margin-top:10px;"&gt;&lt;DT&gt;&lt;i&gt;This article was previously published as:&lt;/i&gt;&lt;DD&gt;&lt;i&gt;Finjan KB 1833&lt;/i&gt;&lt;/DL&gt;</description><pubDate>Wed, 29 Jul 2009 00:00:00 GMT</pubDate><dc:creator>support finjan</dc:creator></item><item><title>Websense - 9.0 Technical Brief</title><link>https://support.levelblue.com/kb/Goto13506.aspx</link><description>&lt;IFRAME src="https://support.levelblue.com/kb/attachments/1726.pdf" width=670 height=800&gt;&lt;/IFRAME&gt;&lt;DL style="margin-top:10px;"&gt;&lt;DT&gt;&lt;i&gt;This article applies to:&lt;/i&gt;&lt;dd&gt;&lt;i&gt;NG 1000&lt;/i&gt;&lt;/dd&gt;&lt;dd&gt;&lt;i&gt;NG 5000&lt;/i&gt;&lt;/dd&gt;&lt;DD&gt;&lt;I&gt;NG 6000&lt;/I&gt;&lt;/DD&gt;&lt;DD&gt;&lt;I&gt;NG 8000&lt;/DD&gt;&lt;/DL&gt;&lt;DL style="margin-top:10px;"&gt;&lt;DT&gt;&lt;i&gt;This article was previously published as:&lt;/i&gt;&lt;DD&gt;&lt;i&gt;Finjan KB 1726&lt;/i&gt;&lt;/DL&gt;</description><pubDate>Mon, 04 May 2009 00:00:00 GMT</pubDate><dc:creator>Eric Hanson</dc:creator></item><item><title>NG-6000 Firmware update process</title><link>https://support.levelblue.com/kb/Goto13376.aspx</link><description>&lt;IFRAME src="https://support.levelblue.com/kb/attachments/1525.pdf" width=670 height=800&gt;&lt;/IFRAME&gt;&lt;DL style="margin-top:10px;"&gt;&lt;DT&gt;&lt;i&gt;This article applies to:&lt;/i&gt;&lt;dd&gt;&lt;i&gt;NG 6000&lt;/dd&gt;&lt;/DL&gt;&lt;DL style="margin-top:10px;"&gt;&lt;DT&gt;&lt;i&gt;This article was previously published as:&lt;/i&gt;&lt;DD&gt;&lt;i&gt;Finjan KB 1525&lt;/i&gt;&lt;/DL&gt;</description><pubDate>Fri, 27 Mar 2009 00:00:00 GMT</pubDate><dc:creator>support finjan</dc:creator></item><item><title>How to Access the NG-8040 L2-7 Switch</title><link>https://support.levelblue.com/kb/Goto13398.aspx</link><description>&lt;div class="atb65"&gt;&lt;li&gt;&lt;b&gt;Description&lt;/b&gt;&lt;br&gt;External management access to the NG-8040 layer 2-7 switch has to be enabled through the Chassis Management Console.&lt;/div&gt;&lt;br&gt;&lt;div class="atb66"&gt;&lt;li&gt;&lt;b&gt;Symptoms&lt;/b&gt;&lt;br&gt;Web GUI, telnet or secure shell connections cannot be established.&lt;/div&gt;&lt;br&gt;&lt;div class="atb67"&gt;&lt;li&gt;&lt;b&gt;Cause&lt;/b&gt;&lt;br&gt;External access is disabled by default and has to be enabled explicitly.&lt;/div&gt;&lt;br&gt;&lt;div class="atb68"&gt;&lt;li&gt;&lt;b&gt;Solution&lt;/b&gt;&lt;br&gt;In the Blade center management console select I/O module tasks -&amp;gt; Configuration &lt;BR&gt;Navigate to the relevant bay (the slot where the L2-7 switch is installed) and select "Advanced Configuration"&lt;BR&gt;Enable "External management over all ports" in the section "Advanced Setup" and save this setting.&lt;BR&gt;&lt;BR&gt;&lt;div&gt;&lt;img alt="" src="https://support.levelblue.com/kb/attachments/images/767~726.jpg" border=0&gt;&lt;/div&gt;&lt;BR&gt;&lt;BR&gt;Now it is possible to access the switch through web GUI, telnet or SSH, if configured.&lt;/div&gt;&lt;br&gt;&lt;div class="atb69"&gt;&lt;li&gt;&lt;b&gt;Software Version&lt;/b&gt;&lt;br&gt;&lt;P&gt;N/A&lt;/P&gt;&lt;/div&gt;&lt;br&gt;&lt;DL style="margin-top:10px;"&gt;&lt;DT&gt;&lt;i&gt;This article applies to:&lt;/i&gt;&lt;dd&gt;&lt;i&gt;NG 8000&lt;/dd&gt;&lt;/DL&gt;&lt;DL style="margin-top:10px;"&gt;&lt;DT&gt;&lt;i&gt;This article was previously published as:&lt;/i&gt;&lt;DD&gt;&lt;i&gt;Finjan KB 1551&lt;/i&gt;&lt;/DL&gt;</description><pubDate>Fri, 27 Mar 2009 00:00:00 GMT</pubDate><dc:creator>support finjan</dc:creator></item><item><title>Read Headers identification method description and usage</title><link>https://support.levelblue.com/kb/Goto13544.aspx</link><description>&lt;div class="atb62"&gt;&lt;li&gt;&lt;b&gt;Question&lt;/b&gt;&lt;br&gt;&lt;P&gt;The Vital Security Web Appliance uses four different methods to identify and authenticate network users before allowing any web transaction:&lt;/P&gt;&lt;P&gt;1. Source IP.&lt;BR&gt;2. Read Headers.&lt;BR&gt;3. Get User Credentials.&lt;BR&gt;4. Authentication.&lt;/P&gt;&lt;P&gt;This article describes and demonstrates the Read Headers method.&lt;/P&gt;The "Read Headers" method was meant to be implemented in a topology which includes an additional proxy device that authenticates users on the network, such as a Microsoft ISA server, which is used as an example in the following scenario.&lt;/div&gt;&lt;br&gt;&lt;div class="atb63"&gt;&lt;li&gt;&lt;b&gt;Answer&lt;/b&gt;&lt;br&gt;&lt;P&gt;In the "Read Headers" identification method, the Vital Security Web Appliance relies on the downstream proxy to provide headers information in each transaction. &lt;BR&gt;These headers would be used then to identify the username of the person who originated the transaction and/or the IP of the client machine from which the transaction originated. &lt;BR&gt;The Vital Security Web Appliance can be configured to monitor specific headers, such as X-Authenticated-User for username and/or X-Client-IP for client IP address information. In this scenario, it is assumed that the information forwarded by the downstream proxy is valid.&lt;BR&gt;The Vital Security Web Appliance does not attempt to verify the supplied data.&lt;/P&gt;&lt;P&gt;Please note that the Microsoft ISA server must be properly configured to forward this information to the Vital Security Web Appliance. &lt;BR&gt;Vital Security IP forwarding plugin should be installed on the Micrsoft ISA server for this purpose (please review the below Finjan Vital Knowledge Base article on this topic: &lt;A href="http://kb.finjan.com/article.asp?article=1282&amp;p=4"&gt;http://kb.finjan.com/article.asp?article=1282&amp;p=4&lt;/A&gt; ).&lt;/P&gt;&lt;P&gt;The plugin setup file can be downloaded from the below location:&lt;BR&gt;&lt;A href="http://download.finjan.com/products/ng/ipfwd/index.htm"&gt;http://download.finjan.com/products/ng/ipfwd/index.htm&lt;/A&gt;&lt;/P&gt;See the below image to confirm that Vital Security ISA connector is configured properly to forward the necessary information through HTTP headers of each transaction:&lt;P&gt;&lt;div style="width:670px;overflow-x:scroll;"&gt;&lt;img alt="" src="https://support.levelblue.com/kb/attachments/images/909~ISA Add-ins.jpg" border=0&gt;&lt;/div&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;The Vital Security Web Appliance should be then configured to use "Read Headers" identification policy: &lt;P&gt;This policy is designed to use one rule "Always Identify Users by Headers" :&lt;/P&gt;&lt;P&gt;This rule is set to "Identify by headers" action based on specific headers information:&lt;/P&gt;The headers to be used by this rule are predefined in the below "Pre Authenticated Headers" list: &lt;P&gt;As mentioned above, assuming that the information (IP / username) forwarded by the downstream proxy is valid, it then would be properly logged for further usage in reports / log viewer.&lt;/P&gt;&lt;/div&gt;&lt;br&gt;&lt;div class="atb64"&gt;&lt;li&gt;&lt;b&gt;Software Version&lt;/b&gt;&lt;br&gt;8.5.0&lt;/div&gt;&lt;br&gt;&lt;DL style="margin-top:10px;"&gt;&lt;DT&gt;&lt;i&gt;This article applies to:&lt;/i&gt;&lt;dd&gt;&lt;i&gt;NG 1000&lt;/i&gt;&lt;/dd&gt;&lt;dd&gt;&lt;i&gt;NG 5000&lt;/i&gt;&lt;/dd&gt;&lt;DD&gt;&lt;I&gt;NG 6000&lt;/I&gt;&lt;/DD&gt;&lt;DD&gt;&lt;I&gt;NG 8000&lt;/DD&gt;&lt;/DL&gt;&lt;DL style="margin-top:10px;"&gt;&lt;DT&gt;&lt;i&gt;This article was previously published as:&lt;/i&gt;&lt;DD&gt;&lt;i&gt;Finjan KB 1798&lt;/i&gt;&lt;/DL&gt;</description><pubDate>Mon, 23 Mar 2009 00:00:00 GMT</pubDate><dc:creator>Amir Foox</dc:creator></item><item><title>IBM Proventia Web Filter 9.0</title><link>https://support.levelblue.com/kb/Goto13507.aspx</link><description>&lt;IFRAME src="https://support.levelblue.com/kb/attachments/1727.pdf" width=670 height=800&gt;&lt;/IFRAME&gt;&lt;DL style="margin-top:10px;"&gt;&lt;DT&gt;&lt;i&gt;This article was previously published as:&lt;/i&gt;&lt;DD&gt;&lt;i&gt;Finjan KB 1727&lt;/i&gt;&lt;/DL&gt;</description><pubDate>Mon, 23 Mar 2009 00:00:00 GMT</pubDate><dc:creator>Eric Hanson</dc:creator></item><item><title>Using Transparent Authentication Mechanism with FireFox</title><link>https://support.levelblue.com/kb/Goto13272.aspx</link><description>&lt;div class="atb54"&gt;&lt;li&gt;&lt;b&gt;Question&lt;/b&gt;&lt;br&gt;As a result of the new Transparent Authentication mechanism added in Vital Security software version 8.4.3, the browser allows the end-user to connect to the internet &lt;U&gt;without sending requests for authentication&lt;/U&gt; from the end-user.&lt;BR&gt;&lt;BR&gt;This authentication request arrives from the browser as a result of the HTTP 401 Unauthorized Response sent from the web-server. &lt;BR&gt;&lt;BR&gt;If the authentication domain is resolvable as a hostname inside the orginization, the &lt;STRONG&gt;IE&lt;/STRONG&gt; browser will forward authentication details automatically. &lt;BR&gt;However, the &lt;STRONG&gt;FireFox &lt;/STRONG&gt;browser &lt;U&gt;will not do it automatically&lt;/U&gt;.&lt;BR&gt;&lt;BR&gt;How can we enable this automatic option  for FireFox  so that it does not send repeated requests for authentication to the end-user?&lt;/div&gt;&lt;br&gt;&lt;div class="atb55"&gt;&lt;li&gt;&lt;b&gt;Answer&lt;/b&gt;&lt;br&gt;In order to enable this automatic option for the FireFox browser, please do the following:&lt;OL&gt;&lt;LI&gt;Open FireFox browser.&lt;LI&gt;Type &lt;STRONG&gt;about:config&lt;/STRONG&gt; in the FireFox address bar.&lt;LI&gt;Select &lt;STRONG&gt;network.automatic-ntlm-auth.trusted-uris&lt;/STRONG&gt; in the Filter bar.&lt;LI&gt;Type in the virtual redirection hostname that you have defined for your Finjan appliance (e.g. vhost in the example below):&lt;BR&gt;&lt;BR&gt;&lt;div style="width:670px;overflow-x:scroll;"&gt;&lt;img alt="" src="https://support.levelblue.com/kb/attachments/images/489~trans_auth232.jpg" border=0&gt;&lt;/div&gt;&lt;LI&gt;&lt;DIV align=left&gt;Virtual Redirection Hostname must be defined exactly as it is set for Finjan appliance: &lt;BR&gt;&lt;BR&gt;&lt;div style="width:670px;overflow-x:scroll;"&gt;&lt;img alt="" src="https://support.levelblue.com/kb/attachments/images/488~trans_auth.jpg" border=0&gt;&lt;/div&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;/div&gt;&lt;br&gt;&lt;div class="atb56"&gt;&lt;li&gt;&lt;b&gt;VSOS&lt;/b&gt;&lt;br&gt;8.4.3&lt;/div&gt;&lt;br&gt;&lt;DL style="margin-top:10px;"&gt;&lt;DT&gt;&lt;i&gt;This article applies to:&lt;/i&gt;&lt;dd&gt;&lt;i&gt;NG 1000&lt;/i&gt;&lt;/dd&gt;&lt;dd&gt;&lt;i&gt;NG 5000&lt;/i&gt;&lt;/dd&gt;&lt;dd&gt;&lt;i&gt;NG 8000&lt;/dd&gt;&lt;/DL&gt;&lt;DL style="margin-top:10px;"&gt;&lt;DT&gt;&lt;i&gt;This article was previously published as:&lt;/i&gt;&lt;DD&gt;&lt;i&gt;Finjan KB 1390&lt;/i&gt;&lt;/DL&gt;</description><pubDate>Mon, 23 Mar 2009 00:00:00 GMT</pubDate><dc:creator>support finjan</dc:creator></item><item><title>Juniper SSL VPN fails to connect with Finjan SSL Appliance</title><link>https://support.levelblue.com/kb/Goto13378.aspx</link><description>&lt;div class="atb65"&gt;&lt;li&gt;&lt;b&gt;Description&lt;/b&gt;&lt;br&gt;When deploying a Finjan Vital Security SSL solution and requiring the tunnelling of Juniper SSL VPN connections through the solution, Finjan cannot scan the traffic going through the Juniper SSL VPN.&lt;/div&gt;&lt;br&gt;&lt;div class="atb66"&gt;&lt;li&gt;&lt;b&gt;Symptoms&lt;/b&gt;&lt;br&gt;The connection fails constantly.&lt;/div&gt;&lt;br&gt;&lt;div class="atb67"&gt;&lt;li&gt;&lt;b&gt;Cause&lt;/b&gt;&lt;br&gt;This is due to the traffic stream of mixed protocols which the scanning engines cannot handle.&lt;/div&gt;&lt;br&gt;&lt;div class="atb68"&gt;&lt;li&gt;&lt;b&gt;Solution&lt;/b&gt;&lt;br&gt;To make a Juniper VPN connection work through an SSL/NG appliance pair, you must add the full domain name to the URL List in the Policies Section of the SSL appliance configuration. If wild cards are used, for example &lt;FONT color=#ff0000&gt;*.capita.co.uk&lt;/FONT&gt; then this can cause a certificate miss-match and again the connection will fail.&lt;BR&gt;&lt;BR&gt;&lt;div style="width:670px;overflow-x:scroll;"&gt;&lt;img alt="" src="https://support.levelblue.com/kb/attachments/images/704~tony8.jpg" border=0&gt;&lt;/div&gt;&lt;/div&gt;&lt;br&gt;&lt;div class="atb69"&gt;&lt;li&gt;&lt;b&gt;Software Version&lt;/b&gt;&lt;br&gt;N/A&lt;/div&gt;&lt;br&gt;&lt;DL style="margin-top:10px;"&gt;&lt;DT&gt;&lt;i&gt;This article was previously published as:&lt;/i&gt;&lt;DD&gt;&lt;i&gt;Finjan KB 1528&lt;/i&gt;&lt;/DL&gt;</description><pubDate>Mon, 23 Mar 2009 00:00:00 GMT</pubDate><dc:creator>support finjan</dc:creator></item><item><title>How can I configure SSH access to the Load Balancer switch (NG-8040)?</title><link>https://support.levelblue.com/kb/Goto13401.aspx</link><description>&lt;div class="atb62"&gt;&lt;li&gt;&lt;b&gt;Question&lt;/b&gt;&lt;br&gt;How can I configure SSH access to the Load Balancer switch (NG-8040)?&lt;/div&gt;&lt;br&gt;&lt;div class="atb63"&gt;&lt;li&gt;&lt;b&gt;Answer&lt;/b&gt;&lt;br&gt;The relevant command is only available while using the serial access for configuration (see related article What kind of cable do I need for the 8040 Serial Console? - &lt;A href="http://kb.finjan.com/article.asp?article=1472&amp;p=4"&gt;&lt;FONT color=#0000ff&gt;http://kb.finjan.com/article.asp?article=1472&amp;p=4&lt;/FONT&gt;&lt;/A&gt;):&lt;BR&gt;&lt;BR&gt;&lt;FONT face="Courier New" size=2&gt;&amp;gt;&amp;gt; Main# /c/sys/access/sshd&lt;BR&gt;------------------------------------------------------------&lt;BR&gt;[SSH Server Menu]&lt;BR&gt;     intrval  - Set interval for generating the RSA server key&lt;BR&gt;     hkeygen  - Generate the RSA host key&lt;BR&gt;     skeygen  - Generate the RSA server key&lt;BR&gt;     sshport  - Set SSH server port number&lt;BR&gt;     scpadm   - Set SCP-only admin password&lt;BR&gt;     ena      - Enable SCP apply and save&lt;BR&gt;     dis      - Disable SCP apply and save&lt;BR&gt;     &lt;STRONG&gt;&lt;FONT color=#00ff00&gt;on       - Turn SSH server ON (SSHv1/SSHv2)&lt;BR&gt;&lt;/FONT&gt;&lt;/STRONG&gt;     off      - Turn SSH server OFF&lt;BR&gt;     cur      - Display current SSH server configuration&lt;BR&gt;&lt;BR&gt;&amp;gt;&amp;gt; SSH Server# &lt;FONT color=#3366ff&gt;&lt;STRONG&gt;on&lt;BR&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;FONT face="Times New Roman"&gt;&lt;FONT size=3&gt;&lt;BR&gt;Apply and save.&lt;/FONT&gt;&lt;/FONT&gt;&lt;BR&gt;&lt;/FONT&gt;&lt;BR&gt;Telnet access just provides the command for enabling the SCP option:&lt;BR&gt;&lt;BR&gt;&lt;FONT face="Courier New" size=2&gt;&amp;gt;&amp;gt; Main# /c/sys/access/sshd&lt;BR&gt;------------------------------------------------------------&lt;BR&gt;[SSH Server Menu]&lt;BR&gt;     sshport  - Set SSH server port number&lt;BR&gt;     ena      - Enable SCP apply and save&lt;BR&gt;     cur      - Display current SSH server configuration&lt;BR&gt;&lt;FONT face="Times New Roman" size=3&gt;&lt;BR&gt;The current settings can be checked with the command "cur" (current)&lt;BR&gt;&lt;BR&gt;&lt;FONT face="Courier New" size=2&gt;&amp;gt;&amp;gt; Main# &lt;STRONG&gt;&lt;FONT color=#3366ff&gt;/c/sys/access/sshd/&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;FONT face="Courier New" size=2&gt;&lt;FONT face="Times New Roman" size=3&gt;&lt;FONT face="Courier New" size=2&gt;&lt;FONT color=#3366ff&gt;&lt;STRONG&gt;cur&lt;/STRONG&gt;&lt;BR&gt;&lt;/FONT&gt;SSH RSA server key autogen disabled&lt;BR&gt;SSH RSA host key currently ready to service&lt;BR&gt;SSH RSA server key currently ready to service&lt;BR&gt;SSH server currently on port 22&lt;BR&gt;SSH SCP-only administrator password not configured&lt;BR&gt;SSH SCP apply and save currently enabled&lt;BR&gt;SSH server currently ON&lt;/FONT&gt;&lt;BR&gt;&lt;BR&gt;The config dump then shows &lt;BR&gt;&lt;FONT face="Courier New" size=2&gt;/c/sys/access/sshd/ena&lt;/FONT&gt; (SCP enabled)&lt;BR&gt;&lt;FONT face="Courier New" size=2&gt;/c/sys/access/sshd/on&lt;/FONT&gt; (SSH enabled)&lt;/FONT&gt;&lt;/FONT&gt;&lt;/div&gt;&lt;br&gt;&lt;div class="atb64"&gt;&lt;li&gt;&lt;b&gt;Software Version&lt;/b&gt;&lt;br&gt;N/A&lt;/div&gt;&lt;br&gt;&lt;DL style="margin-top:10px;"&gt;&lt;DT&gt;&lt;i&gt;This article applies to:&lt;/i&gt;&lt;dd&gt;&lt;i&gt;NG 8000&lt;/dd&gt;&lt;/DL&gt;&lt;DL style="margin-top:10px;"&gt;&lt;DT&gt;&lt;i&gt;This article was previously published as:&lt;/i&gt;&lt;DD&gt;&lt;i&gt;Finjan KB 1554&lt;/i&gt;&lt;/DL&gt;</description><pubDate>Mon, 23 Mar 2009 00:00:00 GMT</pubDate><dc:creator>support finjan</dc:creator></item><item><title>Can a Lotus Notes client identify Windows Active Directory users, using Vital Security NG (NTLM authentication)?</title><link>https://support.levelblue.com/kb/Goto13188.aspx</link><description>&lt;div class="atb35"&gt;&lt;li&gt;&lt;b&gt;Question&lt;/b&gt;&lt;br&gt;Can a Lotus Notes client identify Windows Active Directory users using Vital Security NG (NTLM authentication)?&lt;/div&gt;&lt;br&gt;&lt;div class="atb36"&gt;&lt;li&gt;&lt;b&gt;Answer&lt;/b&gt;&lt;br&gt;No, Lotus Notes does not support NTLM authentication.&lt;BR&gt;Therefore it can't authenticate Active Directory users that were imported by the Vital Security NG proxy, using NTLM authentication.&lt;BR&gt;&lt;BR&gt;There is an open feature request for IBM to add NTLM support to Lotus Notes.&lt;BR&gt;Please refer to the following link for more information: &lt;BR&gt;&lt;A title=http://www-1.ibm.com/support/docview.wss?rs=474&amp;uid=swg21190929 href="http://www-1.ibm.com/support/docview.wss?rs=474&amp;uid=swg21190929"&gt;&lt;FONT face=Arial size=2&gt;http://www-1.ibm.com/support/docview.wss?rs=474&amp;uid=swg21190929&lt;/FONT&gt;&lt;/A&gt;&lt;?xml:namespace prefix = o ns = "urn:schemas-microsoft-com:office:office" /&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;BR&gt;&lt;BR&gt;&lt;LI&gt;&lt;STRONG&gt;Software Version&lt;BR&gt;&lt;/STRONG&gt;8.3.0&lt;BR&gt;8.3.5&lt;BR&gt;8.4.0&lt;BR&gt;8.4.3&lt;BR&gt;8.5.0&lt;/LI&gt;&lt;/div&gt;&lt;br&gt;&lt;DL style="margin-top:10px;"&gt;&lt;DT&gt;&lt;i&gt;This article applies to:&lt;/i&gt;&lt;dd&gt;&lt;i&gt;NG 1000&lt;/i&gt;&lt;/dd&gt;&lt;dd&gt;&lt;i&gt;NG 5000&lt;/i&gt;&lt;/dd&gt;&lt;dd&gt;&lt;i&gt;NG 8000&lt;/dd&gt;&lt;/DL&gt;&lt;DL style="margin-top:10px;"&gt;&lt;DT&gt;&lt;i&gt;This article was previously published as:&lt;/i&gt;&lt;DD&gt;&lt;i&gt;Finjan KB 1260&lt;/i&gt;&lt;/DL&gt;</description><pubDate>Mon, 23 Mar 2009 00:00:00 GMT</pubDate><dc:creator>support finjan</dc:creator></item><item><title>Forwarding IP Addresses from a Squid Cache to a NG Appliance</title><link>https://support.levelblue.com/kb/Goto13564.aspx</link><description>&lt;IFRAME src="https://support.levelblue.com/kb/attachments/1823.pdf" width=670 height=800&gt;&lt;/IFRAME&gt;&lt;DL style="margin-top:10px;"&gt;&lt;DT&gt;&lt;i&gt;This article applies to:&lt;/i&gt;&lt;dd&gt;&lt;i&gt;NG 1000&lt;/i&gt;&lt;/dd&gt;&lt;dd&gt;&lt;i&gt;NG 5000&lt;/i&gt;&lt;/dd&gt;&lt;DD&gt;&lt;I&gt;NG 6000&lt;/I&gt;&lt;/DD&gt;&lt;DD&gt;&lt;I&gt;NG 8000&lt;/DD&gt;&lt;/DL&gt;&lt;DL style="margin-top:10px;"&gt;&lt;DT&gt;&lt;i&gt;This article was previously published as:&lt;/i&gt;&lt;DD&gt;&lt;i&gt;Finjan KB 1823&lt;/i&gt;&lt;/DL&gt;</description><pubDate>Mon, 23 Mar 2009 00:00:00 GMT</pubDate><dc:creator>Peleg Samson</dc:creator></item></channel></rss>