﻿<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>LevelBlue Knowledge Base » Knowledgebase » Legacy Products » Secure Web Gateway » Networking</title><generator>InstantKB.NET 2.0.6</generator><description>LevelBlue Knowledge Base</description><link>https://support.levelblue.com/kb/</link><webMaster>website@m86security.com</webMaster><lastBuildDate>Tue, 21 Apr 2026 19:38:04 GMT</lastBuildDate><ttl>20</ttl><item><title>Streaming iTunes Radio Stations Through Finjan</title><link>https://support.levelblue.com/kb/Goto13645.aspx</link><description>&lt;div class="atb62"&gt;&lt;li&gt;&lt;strong&gt;Question&lt;/strong&gt;&lt;br /&gt;&lt;p&gt;Various iTunes radio stations do not stream when connected through the Finjan proxy.&lt;/p&gt;&lt;p&gt;What are the possible solutions that would allow a stable streaming environment?&lt;/p&gt;&lt;/li&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="atb63"&gt;&lt;li&gt;&lt;strong&gt;Answer&lt;/strong&gt;&lt;br /&gt;&lt;p&gt;When used on a Windows platform, the iTunes application will inherit IE proxy settings.&lt;/p&gt;&lt;p&gt;The extracts below from the network trace show that radio stations stream content on ports that are different from the standard HTTP port 80:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div style="width: 670px; overflow-x: scroll;"&gt;&lt;img alt="" style="width: 575px; height: 226px; border-width: 0px; border-style: solid;" src="https://support.levelblue.com/kb/attachments/images/1022~itunestreaming.jpg" /&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The Finjan default is to allow HTTP port 80 only. Consequently, additional ports must be allowed so that iTUnes radio stations can stream through Finjan.&lt;/p&gt;&lt;p&gt;According to the KB article provided by Apple - &lt;a href="http://support.apple.com/kb/TS1629"&gt;http://support.apple.com/kb/TS1629&lt;/a&gt;  - iTunes radio stations are meant to stream traffic on ports, 80, 8000-8999, 42000-42999. Data however, indicates that there may be stations using ports beyond these ranges. &lt;/p&gt;&lt;p&gt;When Finjan is set to allow all HTTP ports iTunes radio stations will stream content smoothly.&lt;/p&gt;&lt;p&gt;Global network security policy may differ between customers, so the decision is whether or not to allow all HTTP ports as shown in the figure below:&lt;/p&gt;&lt;div style="width: 670px; overflow-x: scroll;"&gt;&lt;img alt="" style="width: 575px; height: 232px; border-width: 0px; border-style: solid;" src="https://support.levelblue.com/kb/attachments/images/1023~ports.jpg" /&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;/li&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="atb64"&gt;&lt;li&gt;&lt;strong&gt;Software Version&lt;/strong&gt;&lt;br /&gt;&lt;p&gt;8.5.0&lt;br /&gt;9.0&lt;br /&gt;9.2&lt;/p&gt;&lt;/li&gt;&lt;/div&gt;&lt;br /&gt;&lt;dl style="margin-top: 10px;"&gt;    &lt;dt&gt;&lt;em&gt;This article applies to:&lt;/em&gt;&lt;/dt&gt;    &lt;dd&gt;&lt;em&gt;NG 1000&lt;/em&gt;&lt;/dd&gt;    &lt;dd&gt;&lt;em&gt;NG 5000&lt;/em&gt;&lt;/dd&gt;    &lt;dd&gt;&lt;em&gt;NG 6000&lt;/em&gt;&lt;/dd&gt;    &lt;dd&gt;&lt;em&gt;NG 8000&lt;/em&gt;&lt;/dd&gt;    &lt;em&gt;    &lt;/em&gt;&lt;/dl&gt;    &lt;em&gt;    &lt;dl style="margin-top: 10px;"&gt;        &lt;dt&gt;&lt;em&gt;This article was previously published as:&lt;/em&gt;        &lt;/dt&gt;        &lt;dd&gt;&lt;em&gt;Finjan KB 1920&lt;/em&gt;        &lt;/dd&gt;    &lt;/dl&gt;    &lt;/em&gt;</description><pubDate>Fri, 12 Sep 2014 02:28:47 GMT</pubDate><dc:creator>Stanislav Michailov</dc:creator></item><item><title>How to run a tcpdump trace from SWG</title><link>https://support.levelblue.com/kb/Goto14333.aspx</link><description>&lt;div&gt;&lt;span style="line-height: 18px;"&gt;&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;SWG 9.x &lt;/li&gt;    &lt;li&gt;SWG 10.x &lt;/li&gt;    &lt;li&gt;&lt;span style="font-size: 11px; line-height: 12px;"&gt;SWG 11.x&lt;/span&gt; &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Question:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;What are the steps for recording a packet capture from SWG? &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Procedure:&lt;/h2&gt;&lt;/span&gt;&lt;div style="font-family: verdana, arial, tahoma; background-image: none; padding-bottom: 0px; text-align: left; padding-top: 0px; padding-left: 0px; margin: 0px; padding-right: 0px; background-color: #ffffff;"&gt;&lt;div&gt;&lt;span style="line-height: 18px;"&gt;SWG comes with a number of commands designed to assist administrators with troubleshooting.  The &lt;strong&gt;tcpdump&lt;/strong&gt; command can be used to collect a network trace for detailed review.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="line-height: 18px;"&gt;The article below &lt;/span&gt;&lt;span style="line-height: 18px;"&gt;provides step-by-step instructions on how to run this command and how to copy traces from SWG to a local computer.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="line-height: 18px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="line-height: 12px;"&gt;&lt;span style="font-size: 8pt; color: #000000; line-height: 18px;"&gt;This task requires SSH access to SWG - could be All-In-One/Policy Server/Scanning Server.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="line-height: 18px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="line-height: 12px;"&gt;&lt;span style="font-size: 8pt; color: #000000; line-height: 18px;"&gt;1. Login to the limited shell interface using an SSH client (PuTTY, a free SSH client for Windows is depicted in the screenshots below).&lt;/span&gt;&lt;/div&gt;&lt;div style="line-height: 12px;"&gt;&lt;span style="font-size: 8pt; color: #000000; line-height: 18px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="line-height: 12px;"&gt;&lt;span style="line-height: 18px;"&gt;2. Run the &lt;strong&gt;tcpdump&lt;/strong&gt; command:&lt;/span&gt;&lt;/div&gt;&lt;div style="line-height: 12px;"&gt;&lt;span style="font-size: 8pt; color: #000000; line-height: 18px;"&gt;&lt;span class="Apple-tab-span" style="white-space: pre;"&gt;&lt;/span&gt;&lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/SM/14333/tcpdump.png" /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="line-height: 12px;"&gt;&lt;span class="Apple-tab-span" style="font-size: 8pt; white-space: pre; color: #000000; line-height: 18px;"&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="line-height: 12px;"&gt;&lt;span style="font-size: 8pt; color: #000000; line-height: 18px;"&gt;3. The limited shell's implementation of tcpdump supports filters to reduce the number of packets to be collected, similar to the filters available on the Linux tcpdump command (e.g., &lt;em&gt;port 8080&lt;/em&gt;, &lt;em&gt;host 192.168.1.29&lt;/em&gt;, etc.).&lt;/span&gt;&lt;/div&gt;&lt;div style="line-height: 12px;"&gt;&lt;span style="font-size: 8pt; color: #000000; line-height: 18px;"&gt;    To record all traffic without a filter, press Enter to start the process:&lt;/span&gt;&lt;/div&gt;&lt;div style="line-height: 12px;"&gt;&lt;span class="Apple-tab-span" style="font-size: 8pt; white-space: pre; color: #000000; line-height: 18px;"&gt;&lt;span class="Apple-tab-span" style="white-space: pre;"&gt;&lt;/span&gt;&lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/SM/14333/filter.png" /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="line-height: 12px;"&gt;&lt;span class="Apple-tab-span" style="font-size: 8pt; white-space: pre; color: #000000; line-height: 18px;"&gt;&lt;span class="Apple-tab-span" style="white-space: pre;"&gt;&lt;/span&gt;&lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/SM/14333/running.png" /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="line-height: 12px;"&gt;&lt;span style="font-size: 8pt; color: #000000; line-height: 18px;"&gt;4. Press 'Ctrl C' to stop the trace. Please note that the SSH session might time out and close when you stop the trace, depending on the time this command was running.&lt;/span&gt;&lt;/div&gt;&lt;div style="line-height: 12px;"&gt;&lt;span style="font-size: 8pt; color: #000000; line-height: 18px;"&gt;    This however will not affect the output file - it will collect all relevant packets up to the moment when the trace was stopped. &lt;/span&gt;&lt;/div&gt;&lt;div style="line-height: 12px;"&gt;&lt;span style="font-size: 8pt; color: #000000; line-height: 18px;"&gt;    SWG rotates the output file every 100 MB, so if the trace was running for a long period of time multiple files should be expected.&lt;/span&gt;&lt;/div&gt;&lt;span style="font-family: verdana, arial, tahoma; line-height: 18px;"&gt;&lt;h2&gt;&lt;span class="Apple-tab-span" style="white-space: pre;"&gt;&lt;/span&gt;&lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/SM/14333/complete.png" /&gt;&lt;/h2&gt;&lt;/span&gt;&lt;div style="line-height: 12px;"&gt;&lt;span style="font-size: 8pt; color: #000000; line-height: 18px;"&gt;5. Now it is necessary to retrieve the trace file(s) from SWG for further review.  This is done using SFTP (a method for transferring files via SSH).  The screenshots below depict&lt;/span&gt;&lt;span style="line-height: 18px;"&gt; using FileZilla (a free SFTP client for Windows) for this purpose. &lt;/span&gt;&lt;/div&gt;&lt;div style="line-height: 12px;"&gt;&lt;span style="line-height: 18px;"&gt;    In addition to specifying the host (the IP or name of the SWG), be sure to indicate the following parameters:&lt;br /&gt;    &lt;strong&gt;Port:&lt;/strong&gt; 22&lt;br /&gt;    &lt;strong&gt;Server Type / Protocol:&lt;/strong&gt; SFTP&lt;br /&gt;    &lt;strong&gt;Username:&lt;/strong&gt; &lt;span style="color: #ff0000;"&gt;support&lt;/span&gt;&lt;br /&gt;    &lt;strong&gt;Password:&lt;/strong&gt; &lt;em&gt;use the same password that is used for the limited shell's &lt;strong&gt;admin&lt;/strong&gt; account&lt;/em&gt;&lt;br /&gt; &lt;br /&gt;    Once the connection is established, the support home directory will load:&lt;/span&gt;&lt;/div&gt;&lt;div style="line-height: 12px;"&gt;&lt;span style="line-height: 18px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="line-height: 12px;"&gt;&lt;span style="line-height: 18px;"&gt;&lt;span class="Apple-tab-span" style="white-space: pre;"&gt;&lt;/span&gt;&lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/SM/14333/filezilla_01.png" /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="line-height: 12px;"&gt;&lt;span style="line-height: 18px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="line-height: 12px;"&gt;&lt;span style="line-height: 18px;"&gt;6. Navigate to the /support/tcpdump/ directory to copy the trace file(s) to your local file system: &lt;/span&gt;&lt;/div&gt;&lt;div style="line-height: 18px;"&gt;&lt;span style="font-size: 8pt; color: #000000; line-height: 18px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="line-height: 18px;"&gt;&lt;span class="Apple-tab-span" style="font-size: 8pt; white-space: pre; color: #000000; line-height: 18px;"&gt;&lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/SM/14333/filezilla_02.png" /&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;span&gt;&lt;h2 style="line-height: 18px;"&gt;Notes:&lt;/h2&gt;&lt;p style="line-height: 18px;"&gt;Any other tool supporting SFTP connections could be used for this purpose.  SWG has been tested with FileZilla and WinSCP. &lt;/p&gt;&lt;p style="line-height: 18px;"&gt; &lt;/p&gt;&lt;p style="line-height: 18px;"&gt;&lt;strong&gt;Filters&lt;/strong&gt; (step 3), examples:&lt;/p&gt;&lt;p style="line-height: 18px;"&gt;&lt;em&gt;not port 22&lt;/em&gt; (to exclude the ssh connection)&lt;/p&gt;&lt;p style="line-height: 18px;"&gt;&lt;em&gt;host 192.168.16.13 or host 192.168.16.241 and not port 22&lt;/em&gt; (two hosts, no ssh traffic)&lt;/p&gt;&lt;p style="line-height: 18px;"&gt;&lt;em&gt;host 192.168.16.13 and port 8080&lt;/em&gt; (only http traffic on a specific client)&lt;/p&gt;&lt;/span&gt;&lt;/div&gt;</description><pubDate>Fri, 20 Jun 2014 15:52:38 GMT</pubDate><dc:creator>Eric Hanson</dc:creator></item><item><title>SWG support for HTTP HEAD requests </title><link>https://support.levelblue.com/kb/Goto16140.aspx</link><description>&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;SWG 10.x&lt;/li&gt;    &lt;li&gt;SWG 11.x &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Question:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;Will an SWG proxy honor HTTP HEAD requests ?&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Information:&lt;/h2&gt;&lt;p&gt;An HTTP HEAD request is very similar to an HTTP GET request, the difference being that it asks the Server to return the response headers only, and not the actual resource itself.&lt;/p&gt;&lt;p&gt;This method is useful when the resource needs to be evaluated without actually downloading it, saving bandwidth for example. &lt;/p&gt;&lt;p&gt;SWG supports the HTTP HEAD method without any specific configuration changes, and by default the transactions shown below &lt;span style="line-height: 12px;"&gt;are allowed&lt;/span&gt;&lt;span style="line-height: 12px;"&gt;:&lt;/span&gt;&lt;/p&gt;&lt;p&gt;     &lt;img alt="" style="width: 575px; height: 111px;" src="https://support.levelblue.com/KB/Uploads/Images/SM/16140/head_cli_01.png" /&gt;&lt;/p&gt;&lt;p&gt;If needed, a custom rule may be added to the policy to block HTTP HEAD requests, using the HTTP Method condition:&lt;/p&gt;&lt;p&gt;     &lt;img alt="" style="width: 575px; height: 342px;" src="https://support.levelblue.com/KB/Uploads/Images/SM/16140/head_policy.PNG" /&gt;&lt;/p&gt;&lt;p&gt;This is how an SWG proxy works when an HTTP HEAD request is blocked by the policy:&lt;/p&gt;&lt;p&gt;     &lt;img alt="" style="width: 575px; height: 86px;" src="https://support.levelblue.com/KB/Uploads/Images/SM/16140/head_cli_02.png" /&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;     &lt;img alt="" style="width: 575px; height: 333px;" src="https://support.levelblue.com/KB/Uploads/Images/SM/16140/head_logs_02.png" /&gt; &lt;/p&gt;&lt;p&gt; &lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;br /&gt;</description><pubDate>Tue, 24 Sep 2013 08:33:51 GMT</pubDate><dc:creator>ofer Kalef</dc:creator></item><item><title>Incorrect Policy enforcement for Windows 7 / Windows Vista users due to the NCSI feature</title><link>https://support.levelblue.com/kb/Goto15205.aspx</link><description>&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;SWG 10.x&lt;/li&gt;    &lt;li&gt;SWG 11.x&lt;/li&gt;    &lt;li&gt;Users running &lt;span style="font-size: 11px; line-height: 12px;"&gt;Microsoft &lt;/span&gt;Windows Vista or &lt;span style="font-size: 11px; line-height: 12px;"&gt;Microsoft &lt;/span&gt;Windows 7&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Symptoms:&lt;/h2&gt;&lt;p&gt;S&lt;span style="line-height: 12px;"&gt;ymptoms may vary d&lt;/span&gt;&lt;span style="line-height: 12px;"&gt;epending on SWG identification implementation.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;In some cases, when the user first boots into the Windows OS they get a message from Microsoft Networking with a yellow exclamation icon in the system tray. &lt;/p&gt;&lt;p&gt;The error message that opens is "No Internet Access".&lt;/p&gt;&lt;p&gt;T&lt;span style="line-height: 12px;"&gt;he yellow exclamation icon goes away a&lt;/span&gt;&lt;span style="line-height: 12px;"&gt;s soon as the user opens Internet Explorer.&lt;/span&gt;&lt;/p&gt;&lt;ul&gt;    &lt;/ul&gt;    &lt;p&gt;Another variation is that the users are identified as Unknown Users, and as a result the incorrect security policy is enforced for such users.&lt;/p&gt;    &lt;div&gt;This can be verified in the Web Logs view showing Authenticated User Names containing '$' signs:&lt;/div&gt;    &lt;div&gt;&lt;br /&gt;    &lt;/div&gt;    &lt;div&gt;&lt;span class="Apple-tab-span" style="white-space: pre;"&gt;       &lt;img alt="" style="width: 580px; height: 266px;" src="https://support.levelblue.com/KB/Uploads/Images/SM/15205/01.png" /&gt;&lt;/span&gt;&lt;/div&gt;    &lt;h2&gt;Causes:&lt;/h2&gt;    This behavior is unique to Window Vista and Windows 7 OS versions after the Network Connectivity Status Indicator (NCSI) feature was introduced in Windows Vista.&lt;br /&gt;    NCSI is designed to be responsive to network conditions, so it examines the connectivity of a network in a variety of ways. Once a test fails, NCSI may report an error, even if the network can &lt;span style="font-size: 11px; line-height: 18px;"&gt;actually &lt;/span&gt;be fully accessed.  &lt;br /&gt;    For example, NCSI tests connectivity by trying to connect to http://www.msftncsi.com, a simple website that exists only to support the functionality of NCSI. &lt;br /&gt;    &lt;br /&gt;    &lt;div&gt;Try to manually visit the website http://www.msftncsi.com/ncsi.txt. You should see “Microsoft NCSI”:&lt;br /&gt;    &lt;br /&gt;    &lt;img alt="" src="https://support.levelblue.com/KB/Uploads/Images/SM/15205/NCSI.PNG" /&gt;&lt;br /&gt;    &lt;br /&gt;    A proxy server requiring user authentication won't allow it to access the Internet.&lt;br /&gt;    &lt;h2&gt;Resolution:&lt;/h2&gt;    &lt;p&gt;There are two ways to resolve this issue:&lt;/p&gt;    &lt;p&gt;1. By bypassing *.msftncsi.com/* for Authentication purposes.&lt;/p&gt;    &lt;p&gt;&lt;/p&gt;    &lt;p&gt;2. By modifying registry settings to disable the NCSI functionality:&lt;/p&gt;    &lt;p&gt;   - Run regedit (administrative permission is required)&lt;/p&gt;    &lt;p&gt;   - Navigate to the following key:&lt;/p&gt;    &lt;p&gt;     HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\NlaSvc\Parameters\Internet\&lt;/p&gt;    &lt;p&gt;   - Locate EnableActiveProbing parameter&lt;/p&gt;    &lt;p&gt;   - Allowed values: 1 - Enable NCSI, 0 - Disable NCSI &lt;/p&gt;    &lt;p&gt;    &lt;img alt="" style="width: 580px; height: 283px;" src="https://support.levelblue.com/KB/Uploads/Images/SM/15205/02.png" /&gt;&lt;/p&gt;    &lt;p&gt;These registry settings can be distributed globally as part of the Group Policy push from the Domain Controller.&lt;/p&gt;    &lt;h2&gt;&lt;/h2&gt;    &lt;/div&gt;</description><pubDate>Mon, 19 Aug 2013 06:35:52 GMT</pubDate><dc:creator>ofer Kalef</dc:creator></item><item><title>Viewing firewall filtering options - Internal</title><link>https://support.levelblue.com/kb/Goto13226.aspx</link><description>&lt;div class="atb17"&gt;&lt;li&gt;&lt;strong&gt;Description&lt;/strong&gt;&lt;br /&gt;When networking problems occur, one may want to review the firewall filters integrated into the Finjan appliances.&lt;/li&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="atb18"&gt;&lt;li&gt;&lt;strong&gt;Symptoms&lt;/strong&gt;&lt;br /&gt;Network problems occur such as no response to/from a finjan appliance or while the device is working and communicating with other network resources.&lt;/li&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="atb19"&gt;&lt;li&gt;&lt;strong&gt;Cause&lt;/strong&gt;&lt;br /&gt;Finjan appliances are equipped with an integrated fully-capable firewalling mechanism which may be blocking connections due to a malfunction (not so probable as firewall rules seldom change) or due to a manual override.&lt;/li&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="atb20"&gt;&lt;li&gt;&lt;strong&gt;Solution&lt;/strong&gt;&lt;br /&gt;To view the firewall filters on a Finjan appliance type:&lt;br /&gt;&lt;br /&gt;&lt;span style="color: #0000ff;"&gt;iptables -L -nvx&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;NOTE: &lt;/strong&gt;&lt;ol&gt;    &lt;li&gt;&lt;strong style="font-size: 8pt;"&gt;The iptables command is also used to change the firewalling rules, &lt;span style="color: #ff0000;"&gt;DO NOT&lt;/span&gt; use the iptables command to perform any other operation other than the one stated above unless approved by PM or R&amp;amp;D.&lt;/strong&gt;&lt;/li&gt;    &lt;li&gt;&lt;strong&gt;iptables rules are defined via the GUI-&amp;gt;Devices-&amp;gt;IP-&amp;gt;Acces list tab and limited shell  command access_list&lt;/strong&gt;&lt;/li&gt;&lt;/ol&gt;&lt;/li&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;li&gt;&lt;strong&gt;Software Version&lt;/strong&gt;&lt;br /&gt;10.x&lt;p&gt;&lt;/p&gt;&lt;/li&gt;&lt;span style="line-height: 12px;"&gt;11.x&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;dl style="margin-top: 10px;"&gt;    &lt;dt&gt;&lt;em&gt;This article applies to:&lt;/em&gt;&lt;/dt&gt;    &lt;dd&gt;&lt;em&gt;NG 1000&lt;/em&gt;&lt;/dd&gt;    &lt;dd&gt;&lt;em&gt;NG 5000&lt;/em&gt;&lt;/dd&gt;    &lt;dd&gt;&lt;em&gt;NG 8000&lt;/em&gt;&lt;/dd&gt;    &lt;em&gt;    &lt;/em&gt;&lt;/dl&gt;    &lt;em&gt;    &lt;dl style="margin-top: 10px;"&gt;        &lt;dt&gt;&lt;em&gt;This article was previously published as:&lt;/em&gt;        &lt;/dt&gt;        &lt;dd&gt;&lt;em&gt;Finjan KB 1320&lt;/em&gt;        &lt;/dd&gt;    &lt;/dl&gt;    &lt;/em&gt;</description><pubDate>Sun, 07 Jul 2013 05:37:15 GMT</pubDate><dc:creator>ofer Kalef</dc:creator></item><item><title>How to bypass Authentication by header</title><link>https://support.levelblue.com/kb/Goto14067.aspx</link><description>&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;SWG 10.x &lt;/li&gt;    &lt;li&gt;SWG 11.x &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Question:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;Some sites or programs require you to bypass Authentication in order for it to be accessed through the SWG appliance. For example, Google Earth’s update mechanism will not allow the program to run if it cannot contact its host site, and the host site cannot be reached when using Authentication through the SWG. &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Procedure:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;To bypass authentication in our Google Earth example, we will use the User-Agent header that Google Earth uses to access its host site. &lt;/li&gt;&lt;/ul&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;ol&gt;    &lt;li&gt;Navigate to &lt;strong&gt;Polices &amp;gt; Condition Settings &amp;gt; Header Fields&lt;/strong&gt;. &lt;/li&gt;    &lt;li&gt;Under &lt;strong&gt;Exclude by Headers&lt;/strong&gt;, click &lt;strong&gt;Edit&lt;/strong&gt; and enter the following information: &lt;/li&gt;&lt;/ol&gt;&lt;blockquote style="margin-right: 0px;" dir="ltr"&gt;&lt;div&gt;&lt;span style="white-space: pre;" class="Apple-tab-span"&gt;&lt;/span&gt;Header Name: &lt;/div&gt;&lt;div&gt;&lt;span style="white-space: pre;" class="Apple-tab-span"&gt;&lt;/span&gt;Condition: &lt;/div&gt;&lt;div&gt;&lt;span style="white-space: pre;" class="Apple-tab-span"&gt;&lt;/span&gt;Header Value: &lt;/div&gt;&lt;/blockquote&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;img alt="" style="width: 566px; height: 85px;" src="https://support.levelblue.com/kb/Uploads/Images/JB/Headerlayout.png" /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;blockquote style="margin-right: 0px;" dir="ltr"&gt;&lt;div&gt;3. Save and Commit changes.&lt;/div&gt;&lt;/blockquote&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="line-height: 12px;"&gt;Other programs and hardware are known to need to have authentication bypassed in order to be used. Here are the programs and the Header names used to allow access. &lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;table border="0" cellpadding="0" cellspacing="0" style="border-collapse: collapse; width: 448pt;" class="telerik-reTable-2"&gt;    &lt;colgroup&gt;&lt;col width="88" style="width: 66pt;" /&gt;    &lt;col width="69" style="width: 52pt;" /&gt;    &lt;col width="210" style="width: 158pt;" /&gt;    &lt;col width="229" style="width: 172pt;" /&gt;    &lt;/colgroup&gt;    &lt;thead&gt;    &lt;/thead&gt;    &lt;tbody&gt;        &lt;tr height="21" style="height: 15.75pt; line-height: 12px;" class="telerik-reTableHeaderRow-2"&gt;            &lt;td class="telerik-reTableHeaderFirstCol-2" align="left" style="height: 15.75pt; width: 66pt;"&gt;Application&lt;/td&gt;            &lt;td class="telerik-reTableHeaderOddCol-2" style="border-left-style: none; width: 52pt;"&gt;Header&lt;/td&gt;            &lt;td class="telerik-reTableHeaderEvenCol-2" align="left" style="border-left-style: none; width: 158pt;"&gt;Value&lt;/td&gt;            &lt;td class="telerik-reTableHeaderOddCol-2" style="border-left-style: none; width: 172pt;"&gt;Expression&lt;/td&gt;        &lt;/tr&gt;        &lt;tr height="29" style="height: 21.75pt; line-height: 12px;" class="telerik-reTableOddRow-2"&gt;            &lt;td class="telerik-reTableFirstCol-2" align="left" style="height: 21.75pt; width: 66pt;"&gt;Google Earth&lt;/td&gt;            &lt;td class="telerik-reTableOddCol-2" style="border-left-style: none; width: 52pt;"&gt;User-Agent&lt;/td&gt;            &lt;td class="telerik-reTableEvenCol-2" align="left" style="border-left-style: none; width: 158pt;"&gt;Regular            Expression&lt;/td&gt;            &lt;td class="telerik-reTableOddCol-2" align="left" style="border-left-style: none; width: 172pt;"&gt;^GoogleEarth.*&lt;/td&gt;        &lt;/tr&gt;        &lt;tr height="29" style="height: 21.75pt; line-height: 12px;" class="telerik-reTableEvenRow-2"&gt;            &lt;td class="telerik-reTableFirstCol-2" align="left" style="height: 21.75pt; border-top-style: none; width: 66pt;"&gt;iPhone&lt;/td&gt;            &lt;td class="telerik-reTableOddCol-2" style="border-top-style: none; border-left-style: none; width: 52pt;"&gt;User-Agent&lt;/td&gt;            &lt;td class="telerik-reTableEvenCol-2" align="left" style="border-top-style: none; border-left-style: none; width: 158pt;"&gt;Regular Expression&lt;/td&gt;            &lt;td class="telerik-reTableOddCol-2" align="left" style="border-top-style: none; border-left-style: none; width: 172pt;"&gt;Apple iPhone.*&lt;/td&gt;        &lt;/tr&gt;        &lt;tr height="29" style="height: 21.75pt; line-height: 12px;" class="telerik-reTableOddRow-2"&gt;            &lt;td class="telerik-reTableFirstCol-2" align="left" style="height: 21.75pt; border-top-style: none; width: 66pt;"&gt;iPad&lt;/td&gt;            &lt;td class="telerik-reTableOddCol-2" style="border-top-style: none; border-left-style: none; width: 52pt;"&gt;User-Agent&lt;/td&gt;            &lt;td class="telerik-reTableEvenCol-2" align="left" style="border-top-style: none; border-left-style: none; width: 158pt;"&gt;Regular Expression&lt;/td&gt;            &lt;td class="telerik-reTableOddCol-2" align="left" style="border-top-style: none; border-left-style: none; width: 172pt;"&gt;Apple iPad.*&lt;/td&gt;        &lt;/tr&gt;        &lt;tr height="29" style="height: 21.75pt; line-height: 12px;" class="telerik-reTableEvenRow-2"&gt;            &lt;td class="telerik-reTableFirstCol-2" align="left" style="height: 21.75pt; border-top-style: none; width: 66pt;"&gt;iTunes&lt;/td&gt;            &lt;td class="telerik-reTableOddCol-2" style="border-top-style: none; border-left-style: none; width: 52pt;"&gt;User-Agent&lt;/td&gt;            &lt;td class="telerik-reTableEvenCol-2" align="left" style="border-top-style: none; border-left-style: none; width: 158pt;"&gt;Regular Expression&lt;/td&gt;            &lt;td class="telerik-reTableOddCol-2" align="left" style="border-top-style: none; border-left-style: none; width: 172pt;"&gt;iTunes/.*&lt;/td&gt;        &lt;/tr&gt;        &lt;tr height="21" style="height: 15.75pt; line-height: 12px;" class="telerik-reTableOddRow-2"&gt;            &lt;td class="telerik-reTableFirstCol-2" align="left" style="height: 15.75pt; width: 66pt;"&gt;-&lt;/td&gt;            &lt;td class="telerik-reTableOddCol-2" style="border-left-style: none; width: 52pt;"&gt;-&lt;/td&gt;            &lt;td class="telerik-reTableEvenCol-2" align="left" style="border-left-style: none; width: 158pt;"&gt;-&lt;/td&gt;            &lt;td class="telerik-reTableOddCol-2" align="left" style="border-left-style: none; width: 172pt;"&gt;AppleCoreMedia/.*&lt;/td&gt;        &lt;/tr&gt;        &lt;tr height="29" style="height: 21.75pt; line-height: 12px;" class="telerik-reTableEvenRow-2"&gt;            &lt;td class="telerik-reTableFirstCol-2" align="left" style="height: 21.75pt; border-top-style: none; width: 66pt;"&gt;Microsoft Updates&lt;/td&gt;            &lt;td class="telerik-reTableOddCol-2" style="border-top-style: none; border-left-style: none; width: 52pt;"&gt;User-Agent&lt;/td&gt;            &lt;td class="telerik-reTableEvenCol-2" align="left" style="border-top-style: none; border-left-style: none; width: 158pt;"&gt;Equals&lt;/td&gt;            &lt;td class="telerik-reTableOddCol-2" align="left" style="border-top-style: none; border-left-style: none; width: 172pt;"&gt;Windows-Update-Agent&lt;/td&gt;        &lt;/tr&gt;        &lt;tr height="21" style="height: 15.75pt; line-height: 12px;" class="telerik-reTableOddRow-2"&gt;            &lt;td class="telerik-reTableFirstCol-2" align="left" style="height: 15.75pt; width: 66pt;"&gt;-&lt;/td&gt;            &lt;td class="telerik-reTableOddCol-2" style="border-left-style: none; width: 52pt;"&gt;-&lt;/td&gt;            &lt;td class="telerik-reTableEvenCol-2" align="left" style="border-left-style: none; width: 158pt;"&gt;Regular            Expression&lt;/td&gt;            &lt;td class="telerik-reTableOddCol-2" align="left" style="border-left-style: none; width: 172pt;"&gt;^MicrosoftBITS/.*&lt;/td&gt;        &lt;/tr&gt;        &lt;tr height="29" style="height: 21.75pt; line-height: 12px;" class="telerik-reTableEvenRow-2"&gt;            &lt;td class="telerik-reTableFirstCol-2" align="left" style="height: 21.75pt; border-top-style: none; width: 66pt;"&gt;Adobe Flash&lt;/td&gt;            &lt;td class="telerik-reTableOddCol-2" style="border-top-style: none; border-left-style: none; width: 52pt;"&gt;User-Agent&lt;/td&gt;            &lt;td class="telerik-reTableEvenCol-2" align="left" style="border-top-style: none; border-left-style: none; width: 158pt;"&gt;Regular Expression&lt;/td&gt;            &lt;td class="telerik-reTableOddCol-2" align="left" style="border-top-style: none; border-left-style: none; width: 172pt;"&gt;^Adobe Flash Update.*&lt;/td&gt;        &lt;/tr&gt;    &lt;/tbody&gt;&lt;/table&gt;&lt;style type="text/css" id="telerik-reTable-2"&gt;    .telerik-reTable-2   {    border-collapse: collapse;    border: solid 0px;    font-family: Tahoma;    }    .telerik-reTable-2 tr.telerik-reTableHeaderRow-2     {    border-width: 1.0pt 1.0pt 3.0pt 1.0pt;    margin-top: 0in;    margin-right: 0in;    margin-bottom: 10.0pt;    margin-left: 0in;    line-height: 115%;    font-size: 11.0pt;    font-family: "Calibri","sans-serif";    width: 119.7pt;    border: solid white 1.0pt;    border-bottom: solid white 3.0pt;    background: #4F81BD;    padding: 0in 5.4pt 0in 5.4pt;    color: #FFFFFF;    }    .telerik-reTable-2 td.telerik-reTableHeaderFirstCol-2   {    border-width: 1.0pt 1.0pt 3.0pt 1.0pt;    border: solid white 1.0pt;    border-bottom: solid white 3.0pt;    padding: 0in 5.4pt 0in 5.4pt;    }    .telerik-reTable-2 td.telerik-reTableHeaderLastCol-2  {    border-width: 1.0pt 1.0pt 3.0pt 1.0pt;    border: solid white 1.0pt;    border-bottom: solid white 3.0pt;    padding: 0in 5.4pt 0in 5.4pt;    }    .telerik-reTable-2 td.telerik-reTableHeaderOddCol-2 {    border-width: 1.0pt 1.0pt 3.0pt 1.0pt;    border: solid white 1.0pt;    border-bottom: solid white 3.0pt;    padding: 0in 5.4pt 0in 5.4pt;    }    .telerik-reTable-2 td.telerik-reTableHeaderEvenCol-2 {    border-width: 1.0pt 1.0pt 3.0pt 1.0pt;    border: solid white 1.0pt;    border-bottom: solid white 3.0pt;    padding: 0in 5.4pt 0in 5.4pt;    }    .telerik-reTable-2 tr.telerik-reTableOddRow-2 {    color: #666666;    background-color: #F2F3F4;    font-size: 10pt;    vertical-align: top;    }    .telerik-reTable-2 tr.telerik-reTableEvenRow-2 {    color: #666666;    background-color: #E7EBF7;    font-size: 10pt;    vertical-align: top;    }    .telerik-reTable-2 td.telerik-reTableFirstCol-2  {    margin-top: 0in;    margin-right: 0in;    margin-bottom: 10.0pt;    margin-left: 0in;    line-height: 115%;    font-size: 11.0pt;    font-family: "Calibri","sans-serif";    width: 119.7pt;    border-top: none;    border-left: solid white 1.0pt;    border-bottom: none;    border-right: solid white 3.0pt;    background: #4F81BD;    padding: 0in 5.4pt 0in 5.4pt;    color: #FFFFFF;    }    .telerik-reTable-2 td.telerik-reTableLastCol-2 {    padding:0in 5.4pt 0in 5.4pt;    }    .telerik-reTable-2 td.telerik-reTableOddCol-2  {    padding: 0in 5.4pt 0in 5.4pt;    }    .telerik-reTable-2 td.telerik-reTableEvenCol-2 {    padding:0in 5.4pt 0in 5.4pt;    }    .telerik-reTable-2 tr.telerik-reTableFooterRow-2    {    color: #666666;    background-color: #FFFFFF;    font-size: 10pt;    vertical-align: top;    padding: 0in 5.4pt 0in 5.4pt;    }    .telerik-reTable-2 td.telerik-reTableFooterFirstCol-2  {    margin-top: 0in;    margin-right: 0in;    margin-bottom: 10.0pt;    margin-left: 0in;    line-height: 115%;    font-size: 11.0pt;    font-family: "Calibri","sans-serif";    width: 119.7pt;    border-top: none;    border-left: solid white 1.0pt;    border-bottom: none;    border-right: solid white 3.0pt;    background: #4F81BD;    padding: 0in 5.4pt 0in 5.4pt;    color: #FFFFFF;    }    .telerik-reTable-2 td.telerik-reTableFooterLastCol-2 {    padding: 0in 5.4pt 0in 5.4pt;    }    .telerik-reTable-2 td.telerik-reTableFooterOddCol-2  {    padding: 0in 5.4pt 0in 5.4pt;    }    .telerik-reTable-2 td.telerik-reTableFooterEvenCol-2  {    padding: 0in 5.4pt 0in 5.4pt;    }&lt;/style&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;p&gt; &lt;/p&gt;</description><pubDate>Mon, 17 Jun 2013 01:26:10 GMT</pubDate><dc:creator>ofer Kalef</dc:creator></item><item><title>How To Exclude Web Applications From the Authentication Mechanism</title><link>https://support.levelblue.com/kb/Goto13553.aspx</link><description>&lt;div class="atb65"&gt;&lt;li&gt;&lt;strong&gt;Description&lt;/strong&gt;&lt;br /&gt;Some web applications (such as Citrix Webmeeting) get stuck due to authentication requests which can not be handled by such applications.&lt;br /&gt;This article describes how to exclude them from authentication mechanism.&lt;/li&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="atb66"&gt;&lt;li&gt;&lt;strong&gt;Symptoms&lt;/strong&gt;&lt;br /&gt;Example:&lt;br /&gt;Citrix Webmeeting gets stuck, or the connection setup wizard does not succeed.&lt;/li&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="atb67"&gt;&lt;li&gt;&lt;strong&gt;Cause&lt;/strong&gt;&lt;br /&gt;An authentication request is sent to the client in a later session stage, but the application cannot handle it correctly.&lt;/li&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="atb68"&gt;&lt;li&gt;&lt;strong&gt;Solution&lt;/strong&gt;&lt;br /&gt;The solution is to exclude this application / site from authentication mechanism.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Drawback:&lt;/strong&gt; The client is not authenticated or identified anymore and the policy for unknown users is applied.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;1. Step:&lt;/strong&gt; Create a list of URLs you want to exclude (It might be necessary to do a packet trace and analyze the destination URLs)&lt;br /&gt;&lt;br /&gt;&lt;img alt="" src="https://support.levelblue.com/kb/attachments/images/929~add_url-list.jpg" style="border-width: 0px; border-style: solid; " /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;2. Step:&lt;/strong&gt; add a condition to your authentication policy (it might be different from this example):&lt;br /&gt;&lt;br /&gt;&lt;img alt="" src="https://support.levelblue.com/kb/attachments/images/930~add_condition_1.jpg" style="border-width: 0px; border-style: solid; " /&gt;&lt;br /&gt;&lt;br /&gt;&lt;img alt="" src="https://support.levelblue.com/kb/attachments/images/931~add_condition_2.jpg" style="border-width: 0px; border-style: solid; " /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Note:&lt;/strong&gt; This condition is based on URLs, basically other conditions such as header fields are also possible - it depends on the needs.&lt;br /&gt;&lt;br /&gt;&lt;img alt="" src="https://support.levelblue.com/kb/attachments/images/932~add_condition_3.jpg" style="border-width: 0px; border-style: solid; " /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Step 3:&lt;/strong&gt; Commit your changes&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Note:&lt;/strong&gt; This option applies also to other identification policies (IP, Basic)&lt;/li&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="atb69"&gt;&lt;li&gt;&lt;strong&gt;Software Version&lt;/strong&gt;&lt;br /&gt;9.x&lt;/li&gt;&lt;/div&gt;&lt;br /&gt;&lt;dl style="margin-top: 10px; "&gt;    &lt;dt&gt;&lt;em&gt;This article applies to:&lt;/em&gt;&lt;/dt&gt;    &lt;dd&gt;&lt;em&gt;NG 1000&lt;/em&gt;&lt;/dd&gt;    &lt;dd&gt;&lt;em&gt;NG 5000&lt;/em&gt;&lt;/dd&gt;    &lt;dd&gt;&lt;em&gt;NG 6000&lt;/em&gt;&lt;/dd&gt;    &lt;dd&gt;&lt;em&gt;NG 8000&lt;/em&gt;&lt;/dd&gt;    &lt;em&gt;    &lt;/em&gt;&lt;/dl&gt;    &lt;em&gt;    &lt;dl style="margin-top: 10px; "&gt;        &lt;dt&gt;&lt;em&gt;This article was previously published as:&lt;/em&gt;        &lt;/dt&gt;        &lt;dd&gt;&lt;em&gt;Finjan KB 1810&lt;/em&gt;        &lt;/dd&gt;    &lt;/dl&gt;    &lt;/em&gt;</description><pubDate>Fri, 31 Aug 2012 07:06:10 GMT</pubDate><dc:creator>Rudolf Kessler</dc:creator></item><item><title>How do I use the Upstream Proxy Policy?</title><link>https://support.levelblue.com/kb/Goto14062.aspx</link><description>&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;Secure Web Gateway 10.x   &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Question:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;Is it possible to use different upstream proxies based on conditions? &lt;/li&gt;    &lt;li&gt;How do I use the upstream proxy policy? &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Procedure:&lt;/h2&gt;&lt;p&gt;In order to forward requests to different upstream proxies, basically three steps are necessary:&lt;/p&gt;&lt;ol&gt;    &lt;li&gt;Define conditions &lt;/li&gt;    &lt;li&gt;Create an upstream proxy "Object" &lt;/li&gt;    &lt;li&gt;Assign this upstream proxy to the scanner(s) &lt;/li&gt;&lt;/ol&gt;&lt;p&gt;The best practice is to perform the steps in the order that they are listed above. As an example, an administrator might want to use a specific upstream proxy for an individual URL.  The administrator would follow the steps below.&lt;br /&gt;&lt;br /&gt;1. Create a URL list accordingly:&lt;br /&gt;&lt;br /&gt;&lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/14062/14062_cond-URL-list.jpg" /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;2. Create a "Upstream Proxy Object":&lt;br /&gt;&lt;br /&gt;2.1 Policies &amp;gt; &lt;strong&gt;Condition Settings&lt;/strong&gt; &amp;gt; Upstream Proxy&lt;br /&gt;&lt;br /&gt;&lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/14062/14062_cond-upstr-prx-01.jpg" /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;2.2 In order to add a Upstream Proxy, right click [Upstream Proxy]:&lt;br /&gt;&lt;br /&gt;&lt;img alt="" style="width: 245px; height: 99px; " src="https://support.levelblue.com/kb/Uploads/Images/14062/14062_cond-upstr-prx-02.jpg" /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;2.3 Define your Upstream Proxy details (IP address, ports, ...):&lt;br /&gt;&lt;br /&gt;&lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/14062/14062_cond-upstr-prx-03.jpg" /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;3. Create the Upstream Proxy policy and assign it to the Scanner(s)&lt;br /&gt;&lt;br /&gt;3.1 Under Policies &amp;gt; Upstream Proxy, add a Policy:&lt;br /&gt;&lt;br /&gt;&lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/14062/14062_pol-upstr-prx-01.jpg" /&gt;&lt;br /&gt;&lt;br /&gt;&lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/14062/14062_pol-upstr-prx-02.jpg" /&gt; &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;3.2 Add a rule to this policy, in order to use the condition(s) defined in step 1:&lt;br /&gt;&lt;br /&gt;&lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/14062/14062_pol-upstr-prx-03.jpg" /&gt;&lt;br /&gt;&lt;br /&gt;&lt;img alt="" style="width: 538px; height: 233px; " src="https://support.levelblue.com/kb/Uploads/Images/14062/14062_pol-upstr-prx-04.jpg" /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;3.3 Add the condition(s)&lt;br /&gt;&lt;br /&gt;&lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/14062/14062_pol-upstr-prx-05.jpg" /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;3.4 As a last step, assign this Upstream Policy to your scanner(s); the new Upstream Proxy policy can now be found in a dropdown-list in "Scanner Device Policies":&lt;br /&gt;&lt;br /&gt;&lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/14062/14062_pol-upstr-prx-06.jpg" /&gt;&lt;/p&gt;&lt;h2&gt;Notes:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;Upstream Proxy policies can be defined "per scanner", providing the ability to distinguish between local and cloud scanners! &lt;/li&gt;    &lt;li&gt;Security Policies are evaluated regardless of Upstream Proxy Policies; according to your requirements it might be necessary to whitelist client requests accordingly before they are sent to the upstream proxy! &lt;/li&gt;    &lt;li&gt;Of course other conditions, such as header fields or IP range can be used. &lt;/li&gt;    &lt;li&gt;One Upstream Proxy Policy can point to more than one upstream proxy. This does not automatically include Backup Upstream Proxy functionality. &lt;/li&gt;    &lt;li&gt;Important for troubleshooting: When caching is enabled the scanner process connects to the caching server (upstream) and the caching server connects to the "real" configured upstream server. So when looking at traffic captures or logs, this behavior will be seen in the logs/cap files. &lt;/li&gt;&lt;/ul&gt;</description><pubDate>Fri, 22 Jun 2012 07:40:32 GMT</pubDate><dc:creator>Rudolf Kessler</dc:creator></item><item><title>WCCP in 9.2 - Technical Brief</title><link>https://support.levelblue.com/kb/Goto13634.aspx</link><description>&lt;iframe src="https://support.levelblue.com/kb/attachments/1909.pdf" width="670" height="800"&gt;&lt;/iframe&gt;&lt;dl style="margin-top: 10px; "&gt;    &lt;dt&gt;&lt;em&gt;This article applies to:&lt;/em&gt;&lt;/dt&gt;    &lt;dd&gt;&lt;em&gt;NG 5000&lt;/em&gt;&lt;/dd&gt;    &lt;dd&gt;&lt;em&gt;NG 6000&lt;/em&gt;&lt;/dd&gt;    &lt;dd&gt;&lt;em&gt;NG 8000&lt;/em&gt;&lt;/dd&gt;    &lt;em&gt;    &lt;/em&gt;&lt;/dl&gt;    &lt;em&gt;    &lt;dl style="margin-top: 10px; "&gt;        &lt;dt&gt;&lt;em&gt;This article was previously published as:&lt;/em&gt;        &lt;/dt&gt;        &lt;dd&gt;&lt;em&gt;Finjan KB 1909&lt;/em&gt;        &lt;/dd&gt;    &lt;/dl&gt;    &lt;/em&gt;</description><pubDate>Thu, 24 May 2012 01:09:49 GMT</pubDate><dc:creator>Rudolf Kessler</dc:creator></item><item><title>What is the SWG update server address?</title><link>https://support.levelblue.com/kb/Goto14508.aspx</link><description>&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;SWG 9.x &lt;/li&gt;    &lt;li&gt;SWG 10.x &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Question:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;I want to restrict Policy Servers' requests, but updates should be allowed. What access do I have to permit through my Firewall? &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Reply:&lt;/h2&gt;&lt;p&gt;The required access is:&lt;/p&gt;&lt;ul&gt;    &lt;li&gt;Destination &lt;strong&gt;Port 443&lt;/strong&gt; / HTTPS &lt;/li&gt;    &lt;li&gt;Hosts [1] &lt;strong&gt;updateng.finjan.com&lt;/strong&gt; and [2] &lt;strong&gt;mirror.&lt;span style="line-height: 12px; font-size: 11px; "&gt;updateng.finjan.com&lt;/span&gt;&lt;/strong&gt; &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Notes:&lt;/h2&gt;&lt;p&gt;Trustwave strongly recommends that you use DNS. The IP addresses of these servers could change.&lt;/p&gt;</description><pubDate>Mon, 14 May 2012 02:24:49 GMT</pubDate><dc:creator>Rudolf Kessler</dc:creator></item><item><title>How do I change the IP address of a Policy Server / All-in-one?</title><link>https://support.levelblue.com/kb/Goto14546.aspx</link><description>&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;SWG 9.x &lt;/li&gt;    &lt;li&gt;SWG 10.x &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Question:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;How do I change the IP address of a Policy Server or All-in-one Device? &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Procedure:&lt;/h2&gt;&lt;p&gt;The most obvious procedure would be to run the command 'config_network' from the limited shell.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;However,&lt;/strong&gt; changing the IP addresses requires more than interface settings to be changed. &lt;br /&gt;&lt;br /&gt;Therefore a complete pass of the command 'setup' is required.&lt;/p&gt;&lt;p&gt;Basically, two steps are necessary:&lt;/p&gt;&lt;ol&gt;    &lt;li&gt;run 'setup' &lt;/li&gt;    &lt;li&gt;apply new settings in the GUI &lt;/li&gt;&lt;/ol&gt;&lt;p&gt;You may also find that firewall settings need to be changed. Firewall settings will differ for each site and are not covered in this article.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Example:&lt;/strong&gt; old IP 192.168.6.135/24, new IP 192.168.6.131/24&lt;/p&gt;&lt;p&gt; &lt;/p&gt;&lt;h3&gt;1. Run 'setup'&lt;/h3&gt;&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; Although existing settings are not listed in the script´s overview, it is &lt;strong&gt;not &lt;/strong&gt;necessary to re-enter items which will stay the same. Simply press "enter" for these items (such as Role / Time zone / date / interface ...)&lt;/p&gt;&lt;ul&gt;    &lt;li&gt;When the script comes to "Set IP Address", enter the new address with its netmask:  &lt;/li&gt;&lt;/ul&gt;&lt;blockquote style="border-bottom-style: none; padding-bottom: 0px; border-right-style: none; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 40px; padding-left: 0px; padding-right: 0px; border-top-style: none; border-left-style: none; padding-top: 0px; border-image: initial; "&gt;&lt;p&gt;&lt;span style="font-family: 'courier new'; "&gt;[...]&lt;/span&gt; &lt;/p&gt;&lt;p&gt;&lt;span style="font-family: 'courier new'; "&gt;(B - go back, Enter - accept default values, Q - exit from setup)&lt;/span&gt; &lt;/p&gt;&lt;p&gt;&lt;span style="font-family: 'courier new'; color: #548dd4; "&gt;  &lt;strong&gt;--Set IP Address--&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-family: 'courier new'; "&gt;Current IP address:                         &lt;span style="color: #ff0000; "&gt;&lt;strong&gt;192.168.6.135&lt;/strong&gt;&lt;/span&gt;/24&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family: 'courier new'; "&gt;Insert new IP address in format IP/[netmask|prefix]&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family: 'courier new'; "&gt;or Enter to accept current settings:        &lt;/span&gt;&lt;span style="font-family: 'courier new'; color: #00b050; "&gt;&lt;strong&gt;192.168.6.131&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-family: 'courier new'; "&gt;/24&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-family: 'courier new'; "&gt;  ---Configuration status---&lt;/span&gt; &lt;/p&gt;&lt;p&gt;&lt;span style="font-family: 'courier new'; "&gt;Machine type             : Virtual SWG (1 CPU)&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family: 'courier new'; "&gt;Version                  : 10.1.2.09&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family: 'courier new'; "&gt;       ------------&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family: 'courier new'; "&gt;Role                     : All in One&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family: 'courier new'; "&gt;Time Zone                : Europe/Berlin&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family: 'courier new'; "&gt;Current date and time    : 2012-04-02 14:06&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family: 'courier new'; "&gt;Interface                : eth0&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family: 'courier new'; "&gt;IP Address               : &lt;span style="color: #00b050; "&gt;&lt;strong&gt;192.168.6.131&lt;/strong&gt;&lt;/span&gt;/24&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family: 'courier new'; "&gt;Default gateway          : None&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family: 'courier new'; "&gt;Hostname                 : None&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family: 'courier new'; "&gt;DNS server               : None&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family: 'courier new'; "&gt;DNS search               : None&lt;/span&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;&lt;p&gt;&lt;span style="font-family: 'courier new'; "&gt;(B - go back, Enter - accept default values, Q - exit from setup)&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family: 'courier new'; "&gt;[...]&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;At the end of the script, save the new configuration.&lt;/strong&gt; &lt;/li&gt;&lt;/ul&gt;&lt;div&gt;When you save configuration, the configuration files and the data base will be modified, and services restarted.&lt;/div&gt;&lt;h3&gt;2. Apply new settings in the GUI&lt;/h3&gt;&lt;ol style="list-style-type: lower-alpha; "&gt;    &lt;li&gt;Log in to the GUI (using the new IP address) as superuser 'admin'. Navigate to &lt;em&gt;M86 Devices&lt;/em&gt; under &lt;em&gt;Administration&lt;/em&gt;.&lt;br /&gt;    &lt;br /&gt;    &lt;br /&gt;    &lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/14546/14546_IP_change_01.jpg" /&gt; &lt;/li&gt;    &lt;li&gt;Change to Edit mode. &lt;/li&gt;    &lt;li&gt;Make sure that the new IP address is selected ('Device IP:'), then &lt;strong&gt;save and commit&lt;/strong&gt;. &lt;/li&gt;    &lt;li&gt;After some time (a few minutes) the change will become active:&lt;br /&gt;    &lt;br /&gt;    &lt;br /&gt;    &lt;br /&gt;    &lt;div&gt;&lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/14546/14546_IP_change_02.jpg" /&gt;&lt;br /&gt;    &lt;/div&gt;    &lt;/li&gt;&lt;/ol&gt;&lt;h2&gt;Notes:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;Remember to check firewall settings if necessary.&lt;/li&gt;&lt;/ul&gt;</description><pubDate>Mon, 14 May 2012 01:48:56 GMT</pubDate><dc:creator>Rudolf Kessler</dc:creator></item><item><title>Skype Blocking - 9.0 Technical Brief</title><link>https://support.levelblue.com/kb/Goto13514.aspx</link><description>&lt;iframe width="670" height="800" src="https://support.levelblue.com/kb/attachments/1740.pdf"&gt;&lt;/iframe&gt;&lt;dl style="margin-top: 10px;"&gt;    &lt;dt&gt;&lt;em&gt;This article applies to:&lt;/em&gt;&lt;/dt&gt;    &lt;dd&gt;&lt;em&gt;NG 1000&lt;/em&gt;&lt;/dd&gt;    &lt;dd&gt;&lt;em&gt;NG 5000&lt;/em&gt;&lt;/dd&gt;    &lt;dd&gt;&lt;em&gt;NG 6000&lt;/em&gt;&lt;/dd&gt;    &lt;dd&gt;&lt;em&gt;NG 8000&lt;/em&gt;&lt;/dd&gt;    &lt;em&gt;    &lt;/em&gt;&lt;/dl&gt;    &lt;em&gt;    &lt;dl style="margin-top: 10px;"&gt;        &lt;dt&gt;&lt;em&gt;This article was previously published as:&lt;/em&gt;        &lt;/dt&gt;        &lt;dd&gt;&lt;em&gt;Finjan KB 1740&lt;/em&gt;        &lt;/dd&gt;    &lt;/dl&gt;    &lt;/em&gt;</description><pubDate>Tue, 19 Jul 2011 05:52:19 GMT</pubDate><dc:creator>Rudolf Kessler</dc:creator></item><item><title>SWG DNS lookup</title><link>https://support.levelblue.com/kb/Goto14045.aspx</link><description>&lt;h2&gt;&lt;p class="MsoNoSpacing"&gt;&lt;span style="font-weight: normal; font-size: 19px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;/h2&gt;&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;SWG 9.x &lt;/li&gt;    &lt;li&gt;SWG 10.x &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Question:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;&lt;span style="font-size: 11pt; line-height: 115%; font-family: calibri, sans-serif;"&gt;Does SWG perform DNS lookups for blocked transactions?&lt;/span&gt; &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Answer:&lt;/h2&gt;&lt;p&gt;&lt;span style="font-size: 11pt; line-height: 115%; font-family: calibri, sans-serif;"&gt;The Trustwave Secure Web Gateway may perform name resolution for the destination host involved in a blocked transaction, especially when the transaction is blocked during the response phase.  In order to block a transaction based content from the target site, SWG must first retrieve the content for scanning purposes.  It is normal for SWG to perform a DNS lookup during the course of connecting to a destination site.  If a network monitoring tool reports that SWG is performing DNS lookups in relation to transactions that should be blocked, this does not indicate that SWG is allowing malicious content to reach client systems.&lt;/span&gt;&lt;/p&gt;</description><pubDate>Fri, 10 Jun 2011 19:34:26 GMT</pubDate><dc:creator>Eric Hanson</dc:creator></item><item><title>How to download files larger than 1 GB through the Finjan</title><link>https://support.levelblue.com/kb/Goto13556.aspx</link><description>&lt;div class="atb65"&gt;&lt;li&gt;&lt;b&gt;Description&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;There is a hard coded limitation of 1 GB filesize. &lt;/li&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="atb66"&gt;&lt;li&gt;&lt;b&gt;Symptoms&lt;/b&gt;&lt;br /&gt;&lt;p&gt;If a file that is larger than 1 GB is requested by the client through the Finjan, the proxy will return an error:&lt;/p&gt;&lt;p&gt;Error Occurred &lt;br /&gt;      HTTP Error Status: 403 Forbidden&lt;br /&gt;      Error Reason: Response body too large Please contact your system administrator&lt;/p&gt;Without a reason being given in the web log. &lt;/li&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="atb67"&gt;&lt;li&gt;&lt;b&gt;Cause&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;The largest file-size that is limited to traverse through the Finjan is 1 GB. This limit is hard coded and can not be increased through the GUI. &lt;/li&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="atb68"&gt;&lt;li&gt;&lt;b&gt;Solution&lt;/b&gt;&lt;br /&gt;&lt;p&gt;In order to circumvent this issue, please follow the steps below:&lt;/p&gt;&lt;p&gt;1. Create a header fields list (please note the correct header name "Content-Length"):&lt;/p&gt;&lt;p&gt;&lt;img alt="" style="border-bottom: 0px solid; border-left: 0px solid; border-top: 0px solid; border-right: 0px solid;" src="https://support.levelblue.com/kb/attachments/images/938~1782_1.jpg" /&gt;&lt;/p&gt;&lt;p&gt;Define a header value of ~ 1 GB (in Bytes, e.g. "1048576000"):&lt;br /&gt;&lt;br /&gt;&lt;img alt="" style="border-bottom: 0px solid; border-left: 0px solid; border-top: 0px solid; border-right: 0px solid;" src="https://support.levelblue.com/kb/attachments/images/1002~header_length_1GB.jpg" /&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;&lt;p&gt;2. Create a rule using the header list as a condition:&lt;/p&gt;&lt;p&gt;&lt;img alt="" style="border-bottom: 0px solid; border-left: 0px solid; border-top: 0px solid; border-right: 0px solid;" src="https://support.levelblue.com/kb/attachments/images/940~1782_3.jpg" /&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;&lt;p&gt;&lt;img alt="" style="border-bottom: 0px solid; border-left: 0px solid; border-top: 0px solid; border-right: 0px solid;" src="https://support.levelblue.com/kb/attachments/images/941~1782_4.jpg" /&gt;&lt;/p&gt;NOTE: This will not work if the server does not reply with correct headers, such as in the example below:&lt;br /&gt;&lt;img alt="" style="border-bottom: 0px solid; border-left: 0px solid; border-top: 0px solid; border-right: 0px solid;" src="https://support.levelblue.com/kb/attachments/images/942~kb.jpg" /&gt; &lt;/li&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="atb69"&gt;&lt;li&gt;&lt;b&gt;Software Version&lt;/b&gt;&lt;br /&gt;9.0 &lt;br /&gt;9.2 &lt;/li&gt;&lt;/div&gt;&lt;br /&gt;&lt;dl style="margin-top: 10px;"&gt;    &lt;dt&gt;&lt;i&gt;This article applies to:&lt;/i&gt; &lt;/dt&gt;    &lt;dd&gt;&lt;i&gt;NG 1000&lt;/i&gt; &lt;/dd&gt;    &lt;dd&gt;&lt;i&gt;NG 5000&lt;/i&gt; &lt;/dd&gt;    &lt;dd&gt;&lt;i&gt;NG 6000&lt;/i&gt; &lt;/dd&gt;    &lt;dd&gt;&lt;i&gt;NG 8000    &lt;dl style="margin-top: 10px;"&gt;        &lt;dt&gt;&lt;i&gt;This article was previously published as:&lt;/i&gt; &lt;/dt&gt;        &lt;dd&gt;&lt;i&gt;Finjan KB 1815&lt;/i&gt; &lt;/dd&gt;    &lt;/dl&gt;    &lt;/i&gt;&lt;/dd&gt;&lt;/dl&gt;</description><pubDate>Tue, 25 Jan 2011 07:41:54 GMT</pubDate><dc:creator>Rudolf Kessler</dc:creator></item><item><title>ICAP Timeout Error When Browsing Through BlueCoat Proxy</title><link>https://support.levelblue.com/kb/Goto13558.aspx</link><description>&lt;div class="atb65"&gt;&lt;li&gt;&lt;b&gt;Description&lt;/b&gt;&lt;br /&gt;When browsing through a BlueCoat proxy with a Finjan scanner configured as an ICAP, client timeouts occurs. &lt;/li&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="atb66"&gt;&lt;li&gt;&lt;b&gt;Symptoms&lt;/b&gt;&lt;br /&gt;&lt;p&gt;The following error is shown when trying to browse to a site:&lt;/p&gt;&lt;p&gt;&lt;em&gt;ICAP Error (icap_error)&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;em&gt;An error occurred while performing an ICAP operation: Request timed out: Timed out while waiting for a response from the ICAP server.&lt;br /&gt;There could be a network problem, the ICAP service may be misconfigured, or the ICAP server may have reported an error.&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;em&gt;For assistance, contact your network support team.&lt;/em&gt; &lt;/p&gt;&lt;/li&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="atb67"&gt;&lt;li&gt;&lt;b&gt;Cause&lt;/b&gt;&lt;br /&gt;This is a result of a misconfigured default connection timeout value in the BlueCoat (That was changed in SGOS ver 5). &lt;/li&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="atb68"&gt;&lt;li&gt;&lt;b&gt;Solution&lt;/b&gt;&lt;br /&gt;&lt;p&gt;To resolve this please increase the connection timeout for the RESP_MOD service as follows:&lt;/p&gt;&lt;p&gt;&lt;img alt="" style="border-bottom: 0px solid; border-left: 0px solid; border-top: 0px solid; border-right: 0px solid;" src="https://support.levelblue.com/kb/attachments/images/943~BC.png" /&gt;&lt;/p&gt;&lt;/li&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="atb69"&gt;&lt;li&gt;&lt;b&gt;Software Version&lt;/b&gt;&lt;br /&gt;all SWG versions, but not related to &lt;/li&gt;&lt;/div&gt;&lt;dl style="margin-top: 10px;"&gt;    &lt;dt&gt;&lt;i&gt;This article applies to:&lt;/i&gt; &lt;/dt&gt;    &lt;dd&gt;&lt;i&gt;SWG 3000&lt;/i&gt; &lt;/dd&gt;    &lt;dd&gt;&lt;i&gt;SWG 5000&lt;/i&gt; &lt;/dd&gt;    &lt;dd&gt;&lt;i&gt;SWG 7000&lt;/i&gt; &lt;i&gt;    &lt;dl style="margin-top: 10px;"&gt;        &lt;dt&gt;&lt;i&gt;This article was previously published as:&lt;/i&gt; &lt;/dt&gt;        &lt;dd&gt;&lt;i&gt;Finjan KB 1817&lt;/i&gt; &lt;/dd&gt;    &lt;/dl&gt;    &lt;/i&gt;&lt;/dd&gt;&lt;/dl&gt;</description><pubDate>Fri, 10 Dec 2010 09:07:11 GMT</pubDate><dc:creator>Rudolf Kessler</dc:creator></item><item><title>FTP over HTTP: Unauthorized - Error 401</title><link>https://support.levelblue.com/kb/Goto13414.aspx</link><description>&lt;div class="atb65"&gt;&lt;li&gt;&lt;strong&gt;Description&lt;/strong&gt;&lt;br /&gt;When trying to access an FTP site, error 401 with error reason: “FTP over HTTP: Unauthorized” is returned.&lt;/li&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="atb66"&gt;&lt;li&gt;&lt;strong&gt;Symptoms&lt;/strong&gt;&lt;br /&gt;When browsing to a password protected FTP site through the Vital Security Web Appliance, the browser returns the following error:&lt;br /&gt;&lt;br /&gt;&lt;img alt="" src="https://support.levelblue.com/kb/attachments/images/755~kb%20FTP%20401%20Error.jpg" style="border-width: 0px; border-style: solid;" /&gt;&lt;br /&gt; &lt;br /&gt;When browsing straight to the web-site, a dialog box which requires the user credentials appears:&lt;br /&gt;&lt;br /&gt;&lt;img alt="" src="https://support.levelblue.com/kb/attachments/images/756~kb%20FTP%20Dialog.jpg" style="border-width: 0px; border-style: solid;" /&gt;&lt;/li&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="atb67"&gt;&lt;li&gt;&lt;strong&gt;Cause&lt;/strong&gt;&lt;br /&gt;The problem is caused because the Secure Web Gateway Appliance is trying to access the FTP server with an anonymous account, which results in a failed login attempt.&lt;br /&gt;This happens generally due to protocol requirements, and not specific to SWG appliance or software!&lt;/li&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="atb68"&gt;&lt;li&gt;&lt;strong&gt;Solution&lt;/strong&gt;&lt;br /&gt;In order to resolve this issue, the login credentials must be included in the URL in the following format: &lt;a href="ftp://username:password@ftp.adress.com/"&gt;&lt;span style="color: #0000ff;"&gt;ftp://&lt;strong&gt;username&lt;/strong&gt;:&lt;strong&gt;password&lt;/strong&gt;@ftp.adress.com&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="atb69"&gt;&lt;li&gt;&lt;strong&gt;Software Version&lt;/strong&gt;&lt;br /&gt;general protocol requirement, not related to any SWG version&lt;/li&gt;&lt;/div&gt;&lt;br /&gt;&lt;dl style="margin-top: 10px;"&gt;    &lt;dt&gt;&lt;em&gt;This article applies to:&lt;/em&gt;&lt;/dt&gt;    &lt;dd&gt;&lt;em&gt;all SWG appliances&lt;br /&gt;    &lt;/em&gt;&lt;/dd&gt;&lt;/dl&gt;&lt;dl style="margin-top: 10px;"&gt;    &lt;dt&gt;&lt;em&gt;&lt;em&gt;This article was previously published as:&lt;/em&gt;    &lt;/em&gt;&lt;/dt&gt;    &lt;dd&gt;&lt;em&gt;&lt;em&gt;Finjan KB 1576&lt;/em&gt;    &lt;/em&gt;&lt;/dd&gt;&lt;/dl&gt;</description><pubDate>Sun, 28 Nov 2010 04:34:23 GMT</pubDate><dc:creator>Rudolf Kessler</dc:creator></item><item><title>Scanning non-standard ports with SWG</title><link>https://support.levelblue.com/kb/Goto13979.aspx</link><description>&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;SWG 9.x and 10.x &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Question:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;Can the Secure Web Gateway (SWG) product be configured to scan HTTP, HTTPS, or FTP transactions over non-standard ports?  &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Procedure:&lt;/h2&gt;&lt;p&gt;SWG scans transactions on the standard ports indicated below, as long as the appropriate modules are activated:&lt;/p&gt;&lt;p style="text-align: center;"&gt;&lt;table class="telerik-reTable-2" style="width: 142px; height: 72px;"&gt;    &lt;thead&gt;    &lt;/thead&gt;    &lt;tbody&gt;        &lt;tr class="telerik-reTableHeaderRow-2"&gt;            &lt;td class="telerik-reTableHeaderEvenCol-2"&gt;            &lt;p style="text-align: center;"&gt;&lt;strong&gt;Protocol&lt;/strong&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td class="telerik-reTableHeaderOddCol-2"&gt;            &lt;p style="text-align: center;"&gt;&lt;strong&gt;Port&lt;/strong&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr class="telerik-reTableOddRow-2"&gt;            &lt;td class="telerik-reTableEvenCol-2"&gt;            &lt;p style="text-align: center;"&gt;HTTP&lt;/p&gt;            &lt;/td&gt;            &lt;td class="telerik-reTableOddCol-2"&gt;            &lt;p style="text-align: center;"&gt;80&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr class="telerik-reTableEvenRow-2"&gt;            &lt;td class="telerik-reTableEvenCol-2"&gt;            &lt;p style="text-align: center;"&gt;HTTPS&lt;/p&gt;            &lt;/td&gt;            &lt;td class="telerik-reTableOddCol-2"&gt;            &lt;p style="text-align: center;"&gt;443&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr class="telerik-reTableOddRow-2"&gt;            &lt;td class="telerik-reTableEvenCol-2"&gt;            &lt;p style="text-align: center;"&gt;FTP&lt;/p&gt;            &lt;/td&gt;            &lt;td class="telerik-reTableOddCol-2"&gt;            &lt;p style="text-align: center;"&gt;21&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;    &lt;/tbody&gt;&lt;/table&gt;&lt;/p&gt;&lt;style id="telerik-reTable-2" type="text/css"&gt;    .telerik-reTable-2 {    BORDER-RIGHT: 0px solid; BORDER-TOP: 0px solid; BORDER-LEFT: 0px solid; BORDER-BOTTOM: 0px solid; FONT-FAMILY: Tahoma; BORDER-COLLAPSE: collapse    }    .telerik-reTable-2 TR.telerik-reTableHeaderRow-2 {    BORDER-RIGHT: white 1pt solid; PADDING-RIGHT: 5.4pt; BORDER-TOP: white 1pt solid; PADDING-LEFT: 5.4pt; FONT-SIZE: 11pt; BACKGROUND: #4f81bd; PADDING-BOTTOM: 0in; MARGIN: 0in 0in 10pt; BORDER-LEFT: white 1pt solid; WIDTH: 119.7pt; COLOR: #ffffff; LINE-HEIGHT: 115%; PADDING-TOP: 0in; BORDER-BOTTOM: white 3pt solid; FONT-FAMILY: "Calibri","sans-serif"    }    .telerik-reTable-2 TD.telerik-reTableHeaderFirstCol-2 {    BORDER-RIGHT: white 1pt solid; PADDING-RIGHT: 5.4pt; BORDER-TOP: white 1pt solid; PADDING-LEFT: 5.4pt; PADDING-BOTTOM: 0in; BORDER-LEFT: white 1pt solid; PADDING-TOP: 0in; BORDER-BOTTOM: white 3pt solid    }    .telerik-reTable-2 TD.telerik-reTableHeaderLastCol-2 {    BORDER-RIGHT: white 1pt solid; PADDING-RIGHT: 5.4pt; BORDER-TOP: white 1pt solid; PADDING-LEFT: 5.4pt; PADDING-BOTTOM: 0in; BORDER-LEFT: white 1pt solid; PADDING-TOP: 0in; BORDER-BOTTOM: white 3pt solid    }    .telerik-reTable-2 TD.telerik-reTableHeaderOddCol-2 {    BORDER-RIGHT: white 1pt solid; PADDING-RIGHT: 5.4pt; BORDER-TOP: white 1pt solid; PADDING-LEFT: 5.4pt; PADDING-BOTTOM: 0in; BORDER-LEFT: white 1pt solid; PADDING-TOP: 0in; BORDER-BOTTOM: white 3pt solid    }    .telerik-reTable-2 TD.telerik-reTableHeaderEvenCol-2 {    BORDER-RIGHT: white 1pt solid; PADDING-RIGHT: 5.4pt; BORDER-TOP: white 1pt solid; PADDING-LEFT: 5.4pt; PADDING-BOTTOM: 0in; BORDER-LEFT: white 1pt solid; PADDING-TOP: 0in; BORDER-BOTTOM: white 3pt solid    }    .telerik-reTable-2 TR.telerik-reTableOddRow-2 {    FONT-SIZE: 10pt; VERTICAL-ALIGN: top; COLOR: #666666; BACKGROUND-COLOR: #f2f3f4    }    .telerik-reTable-2 TR.telerik-reTableEvenRow-2 {    FONT-SIZE: 10pt; VERTICAL-ALIGN: top; COLOR: #666666; BACKGROUND-COLOR: #e7ebf7    }    .telerik-reTable-2 TD.telerik-reTableFirstCol-2 {    BORDER-RIGHT: white 3pt solid; PADDING-RIGHT: 5.4pt; PADDING-LEFT: 5.4pt; FONT-SIZE: 11pt; BACKGROUND: #4f81bd; PADDING-BOTTOM: 0in; MARGIN: 0in 0in 10pt; BORDER-LEFT: white 1pt solid; WIDTH: 119.7pt; COLOR: #ffffff; BORDER-TOP-STYLE: none; LINE-HEIGHT: 115%; PADDING-TOP: 0in; FONT-FAMILY: "Calibri","sans-serif"; BORDER-BOTTOM-STYLE: none    }    .telerik-reTable-2 TD.telerik-reTableLastCol-2 {    PADDING-RIGHT: 5.4pt; PADDING-LEFT: 5.4pt; PADDING-BOTTOM: 0in; PADDING-TOP: 0in    }    .telerik-reTable-2 TD.telerik-reTableOddCol-2 {    PADDING-RIGHT: 5.4pt; PADDING-LEFT: 5.4pt; PADDING-BOTTOM: 0in; PADDING-TOP: 0in    }    .telerik-reTable-2 TD.telerik-reTableEvenCol-2 {    PADDING-RIGHT: 5.4pt; PADDING-LEFT: 5.4pt; PADDING-BOTTOM: 0in; PADDING-TOP: 0in    }    .telerik-reTable-2 TR.telerik-reTableFooterRow-2 {    PADDING-RIGHT: 5.4pt; PADDING-LEFT: 5.4pt; FONT-SIZE: 10pt; PADDING-BOTTOM: 0in; VERTICAL-ALIGN: top; COLOR: #666666; PADDING-TOP: 0in; BACKGROUND-COLOR: #ffffff    }    .telerik-reTable-2 TD.telerik-reTableFooterFirstCol-2 {    BORDER-RIGHT: white 3pt solid; PADDING-RIGHT: 5.4pt; PADDING-LEFT: 5.4pt; FONT-SIZE: 11pt; BACKGROUND: #4f81bd; PADDING-BOTTOM: 0in; MARGIN: 0in 0in 10pt; BORDER-LEFT: white 1pt solid; WIDTH: 119.7pt; COLOR: #ffffff; BORDER-TOP-STYLE: none; LINE-HEIGHT: 115%; PADDING-TOP: 0in; FONT-FAMILY: "Calibri","sans-serif"; BORDER-BOTTOM-STYLE: none    }    .telerik-reTable-2 TD.telerik-reTableFooterLastCol-2 {    PADDING-RIGHT: 5.4pt; PADDING-LEFT: 5.4pt; PADDING-BOTTOM: 0in; PADDING-TOP: 0in    }    .telerik-reTable-2 TD.telerik-reTableFooterOddCol-2 {    PADDING-RIGHT: 5.4pt; PADDING-LEFT: 5.4pt; PADDING-BOTTOM: 0in; PADDING-TOP: 0in    }    .telerik-reTable-2 TD.telerik-reTableFooterEvenCol-2 {    PADDING-RIGHT: 5.4pt; PADDING-LEFT: 5.4pt; PADDING-BOTTOM: 0in; PADDING-TOP: 0in    }&lt;/style&gt;&lt;p&gt;In explicit proxy mode, transactions involving other ports are blocked by default.  However, it is possible to scan supported protocols on alternate ports or port ranges.  This can be accomplished by following the steps below.&lt;/p&gt;&lt;ol&gt;    &lt;li&gt;Open the settings of the Scanning Server component under the devices tree and highlight the &lt;strong&gt;HTTP&lt;/strong&gt; node.&lt;br /&gt;    &lt;br /&gt;    &lt;div style="text-align: center;"&gt;&lt;img width="488" height="226" alt="" src="https://support.levelblue.com/kb/Uploads/Images/SWG-HTTP.png" /&gt;&lt;br /&gt;    &lt;/div&gt;    &lt;/li&gt;    &lt;li&gt;Navigate to the &lt;strong&gt;Allowed Server Ports&lt;/strong&gt; tab and enable &lt;strong&gt;Edit&lt;/strong&gt; mode. &lt;br /&gt;      &lt;/li&gt;    &lt;li&gt;Click the green plus icon under "Specific Ports for HTTP" to add a row.&lt;br /&gt;    &lt;br /&gt;    &lt;div style="text-align: center;"&gt;&lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/SWG-Ports.png" /&gt;&lt;br /&gt;    &lt;/div&gt;    &lt;/li&gt;    &lt;li&gt;Put the desired port numbers in the highlighted fields. The input could be a single port (from 2929 to 2929) or a range (from 2900 to 2929).  Alternatively, uncheck a "Specific ports for &lt;em&gt;protocol&lt;/em&gt;" box in order to allow connections to all ports over that protocol.  &lt;strong&gt;Save&lt;/strong&gt; and &lt;strong&gt;Commit&lt;/strong&gt; the changes.&lt;br /&gt;    &lt;br /&gt;    &lt;div style="text-align: center;"&gt;&lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/SWG-Committed.png" /&gt;&lt;/div&gt;    &lt;/li&gt;&lt;/ol&gt;&lt;h2&gt;Notes:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;Follow the same logic to allow specific ports for HTTPS or FTP over HTTP transactions that use the SWG appliance’s HTTP proxy service.  To allow the HTTPS proxy service to connect to additional ports, configure the Allowed Server Ports under the &lt;strong&gt;HTTPS&lt;/strong&gt; node.  To allow the native FTP proxy to connect to additional ports, configure the Allowed Server Ports under the &lt;strong&gt;FTP&lt;/strong&gt; node.&lt;br /&gt;      &lt;/li&gt;    &lt;li&gt;Please note that these settings apply for individual scanning devices. If required, they should be explicitly set on every scanning device in a distributed environment.&lt;br /&gt;      &lt;/li&gt;    &lt;li&gt;It is also possible to configure these settings as system defaults.  As such, they will automatically be applied to any new scanning device(s) that are added to the cluster in the future.&lt;br /&gt;    &lt;br /&gt;    &lt;div style="text-align: center;"&gt;&lt;img alt="" src="https://support.levelblue.com/kb/Uploads/Images/SWG-Defaults.png" /&gt;&lt;/div&gt;    &lt;/li&gt;&lt;/ul&gt;</description><pubDate>Tue, 19 Oct 2010 19:56:52 GMT</pubDate><dc:creator>Eric Hanson</dc:creator></item><item><title>SWG service restart due to DNS configuration</title><link>https://support.levelblue.com/kb/Goto13843.aspx</link><description>&lt;P&gt;&lt;STRONG&gt;Question:&lt;/STRONG&gt;&lt;BR&gt;Does changing the DNS configuration of a Secure Web Gateway (SWG) appliance restart services?&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Answer:&lt;/STRONG&gt;&lt;BR&gt;Changing the DNS configuration of an SWG appliance does restart key services.  In order to ensure minimal impact to user transactions, it is recommended that all network configuration changes be made off hours, during a scheduled maintenance window.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Software Versions:&lt;/STRONG&gt;&lt;BR&gt;all&lt;/P&gt;</description><pubDate>Tue, 15 Jun 2010 20:23:00 GMT</pubDate><dc:creator>Eric Hanson</dc:creator></item><item><title>How can I view real time network statistics (iptraf)?</title><link>https://support.levelblue.com/kb/Goto13377.aspx</link><description>&lt;div class="atb62"&gt;&lt;li&gt;&lt;b&gt;Question&lt;/b&gt;&lt;br&gt;Is it possible to view real time network statistics via the limited shell of the Finjan appliance?&lt;/div&gt;&lt;br&gt;&lt;div class="atb63"&gt;&lt;li&gt;&lt;b&gt;Answer&lt;/b&gt;&lt;br&gt;The &lt;STRONG&gt;iptraf command &lt;/STRONG&gt;shows a lot of information about the network traffic through the Finjan appliance.&lt;BR&gt;&lt;BR&gt;&lt;STRONG&gt;iptraf&lt;/STRONG&gt; is an ncurses-based IP LAN monitor that generates various network statistics including TCP info, UDP counts,&lt;BR&gt;ICMP and OSPF information, Ethernet load info, node stats, IP checksum errors, and others.&lt;BR&gt;The program comes up in interactive mode, with the various facilities accessed through the main menu.&lt;BR&gt;&lt;BR&gt;Some of the &lt;STRONG&gt;iptraf &lt;/STRONG&gt;options include:&lt;/div&gt;&lt;br&gt;&lt;div class="atb64"&gt;&lt;li&gt;&lt;b&gt;Software Version&lt;/b&gt;&lt;br&gt;8.5.09.09.2&lt;/div&gt;&lt;br&gt;&lt;DL style="margin-top:10px;"&gt;&lt;DT&gt;&lt;i&gt;This article applies to:&lt;/i&gt;&lt;dd&gt;&lt;i&gt;NG 1000&lt;/i&gt;&lt;/dd&gt;&lt;dd&gt;&lt;i&gt;NG 5000&lt;/i&gt;&lt;/dd&gt;&lt;DD&gt;&lt;I&gt;NG 6000&lt;/I&gt;&lt;/DD&gt;&lt;DD&gt;&lt;I&gt;NG 8000&lt;/DD&gt;&lt;/DL&gt;&lt;DL style="margin-top:10px;"&gt;&lt;DT&gt;&lt;i&gt;This article was previously published as:&lt;/i&gt;&lt;DD&gt;&lt;i&gt;Finjan KB 1527&lt;/i&gt;&lt;/DL&gt;</description><pubDate>Thu, 21 Jan 2010 11:03:00 GMT</pubDate><dc:creator>Peleg Samson</dc:creator></item><item><title>Microsoft Windows Update Fails If User Authentication/Identification Is Used</title><link>https://support.levelblue.com/kb/Goto13568.aspx</link><description>&lt;div class="atb65"&gt;&lt;li&gt;&lt;b&gt;Description&lt;/b&gt;&lt;br&gt;&lt;P&gt;Microsoft Windows Update (although whitelisted) fails if user authentication/identification is used.&lt;BR&gt;&lt;BR&gt;&lt;/P&gt;&lt;/div&gt;&lt;br&gt;&lt;div class="atb66"&gt;&lt;li&gt;&lt;b&gt;Symptoms&lt;/b&gt;&lt;br&gt;&lt;P&gt;In an environment where authentication or identification is defined and a user attempts to use Microsoft/Windows Update site, after selecting the hotfixes to install, the site's control starts running and then reports the installation attempt failed.&lt;BR&gt;&lt;BR&gt;&lt;IMG alt="" src="/kb/attachments/images/953~Windows Update Failure.png" border=0&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;/div&gt;&lt;br&gt;&lt;div class="atb67"&gt;&lt;li&gt;&lt;b&gt;Cause&lt;/b&gt;&lt;br&gt;Windows Update site use an ActiveX control to query and manage downloads from Microsoft.&lt;BR&gt;&lt;BR&gt;This ActiveX is not a fully functional browser, and so does not handle authentication mechanisms (such as NTLM) correctly.&lt;P&gt;The reason that the pages are blocked is because whenever the ActiveX is trying to access the web, the authentication fails and the wrong policy is assigned to the user at hand, in such a case the policy that will be used is the one assigned to Unknown Users.&lt;/P&gt;&lt;P&gt;If the policy that is assigned to Unknown Users is to block all access to the internet, the ActiveX component will  fail to download updates from the update site.&lt;BR&gt;&lt;/P&gt;&lt;/div&gt;&lt;br&gt;&lt;div class="atb68"&gt;&lt;li&gt;&lt;b&gt;Solution&lt;/b&gt;&lt;br&gt;&lt;P&gt;Since authentication will not work for the Microsoft/Windows Update site, the following options are availlable::&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Grant access to windows update to all machines by assigning a policy with limited access to the Unknown Users  group.&lt;BR&gt; &lt;LI&gt;Limit access to Windows Update by a combination of Source IP identification and limited access rules .&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Both solutions will require setting up a security policy rule to whitelist the Microsoft/Windows update site.&lt;BR&gt;&lt;BR&gt;For the following examples, this Security Policy will be referred as “The Restricted SP”.&lt;BR&gt;&lt;BR&gt;This can be an existing Security Policy that will be modified or a new Security Policy that will be created specifically for this solution.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;TIP:&lt;/STRONG&gt; To identify the URLs to whitelist, you can find the currently blocked URLs in the Web Logs screen of the Policy Server admin web GUI.&lt;/P&gt;&lt;P&gt;For more information on how to perform the actions described above, please consult the User Manuals .&lt;BR&gt; &lt;BR&gt;&lt;U&gt;&lt;STRONG&gt;Solution 1&lt;BR&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;BR&gt;Assign The Restricted SP to the Unknown Users.&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;Solution 2&lt;/STRONG&gt;&lt;BR&gt;&lt;/U&gt;&lt;BR&gt;Limiting access by client IP:&lt;BR&gt;&lt;BR&gt;Since we don’t want to lose the identification by username, we will duplicate and change the current Identification Policy and add a rule at the end to identify by client IP.&lt;/P&gt;&lt;P&gt;Create a new user or user group which will be assigned The Restricted SP, enter the IP ranges for this user group, or add individual users with specific IP addresses.&lt;BR&gt;An example is given below, for more information on how to perform these actions, consult the User Manuals.&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Go to Users -&amp;gt; Users/User Groups.&lt;LI&gt;Right click on the Users/User Group root and select Add Group.&lt;LI&gt;Name the new group (for example: Windows Update only)&lt;LI&gt;Assign the Restricted SP as the Security Policy.&lt;LI&gt;Assign the Logging Policy and HTTPS Policy according to your organization's requirements.&lt;LI&gt;If an IP range is appropriate, fill the table with the relevant IP address range.&lt;LI&gt;Save the new user group.&lt;LI&gt;Right-Click the new user group and select Add User.&lt;LI&gt;Enter a user name.&lt;LI&gt;Fill the table with the assigned IP addresses for this user.&lt;LI&gt;Save the user.&lt;LI&gt;Repeat steps 8-11 for each user that will use Windows Update.&lt;LI&gt;Commit changes.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Now when you have the Users and Security Policies setup up you will need to create the appropriate Identification Policy.&lt;BR&gt;Perform the following steps from the policy server web admin GUI:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Go to Administration -&amp;gt; System Settings -&amp;gt; Finjan Devices. &lt;LI&gt;Browse to the Devices -&amp;gt; IP -&amp;gt; Scanning Server -&amp;gt; Authentication. &lt;LI&gt;Note the assign Identification Policy.&lt;LI&gt;Now that you know what is the current Identification Policy, go to Policies -&amp;gt; Identification. &lt;LI&gt;Right-click on the relevant identification policy (from step 3) and select Duplicate Policy. &lt;LI&gt;Enter the name for the new policy (for example: Get User Credentials or IP). &lt;LI&gt;Right click on the new policy and select Add Rule. &lt;LI&gt;Enter the name for the new Rule: Identify Users by Source IP. &lt;LI&gt;Check the checkbox Enable Rule. &lt;LI&gt;Select the Action: Identify by source IP. &lt;LI&gt;Save the policy.&lt;LI&gt;Go to Administration -&amp;gt; System Settings -&amp;gt; Finjan Devices. &lt;LI&gt;Browse to the Devices -&amp;gt; IP -&amp;gt; Scanning Server -&amp;gt; Authentication and click Edit. &lt;LI&gt;Change the Identification Policy to the new policy created in steps 5-11. &lt;LI&gt;Save and Commit the changes.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Now you have an identification process that first try to perform an identification/authentication handshake (will work with supported browsers), and if  fails will Identify the client using the Source IP (X-Client-IP HTTP Header).&lt;BR&gt;If the user is browsing from an IP address assigned to the user group using the Restricted SP then the user will have access to the Microsoft/Windows Update site.&lt;BR&gt;&lt;BR&gt;All other users will be treated as Unknown Users.&lt;/P&gt;&lt;/div&gt;&lt;br&gt;&lt;div class="atb69"&gt;&lt;li&gt;&lt;b&gt;Software Version&lt;/b&gt;&lt;br&gt;9.0&lt;BR&gt;9.2&lt;/div&gt;&lt;br&gt;&lt;br clear=all&gt;&lt;DL style="margin-top:10px;"&gt;&lt;DT&gt;&lt;i&gt;This article applies to:&lt;/i&gt;&lt;dd&gt;&lt;i&gt;NG 5000&lt;/i&gt;&lt;/dd&gt;&lt;dd&gt;&lt;i&gt;NG 6000&lt;/i&gt;&lt;/dd&gt;&lt;dd&gt;&lt;i&gt;NG 8000&lt;/dd&gt;&lt;/DL&gt;&lt;DL style="margin-top:10px;"&gt;&lt;DT&gt;&lt;i&gt;This article was previously published as:&lt;/i&gt;&lt;DD&gt;&lt;i&gt;Finjan KB 1833&lt;/i&gt;&lt;/DL&gt;</description><pubDate>Wed, 29 Jul 2009 00:00:00 GMT</pubDate><dc:creator>support finjan</dc:creator></item><item><title>Why is SSL traffic blocked in transparent mode when I don't have an SSL license?</title><link>https://support.levelblue.com/kb/Goto13587.aspx</link><description>&lt;div class="atb62"&gt;&lt;li&gt;&lt;b&gt;Question&lt;/b&gt;&lt;br&gt;Why is HTTPS traffic blocked in transparent mode when I don't have an SSL license?&lt;/div&gt;&lt;br&gt;&lt;div class="atb63"&gt;&lt;li&gt;&lt;b&gt;Answer&lt;/b&gt;&lt;br&gt;&lt;P&gt;Starting with version 9.0, when in transperent mode and a service is disabled (even when it's module is not licensed) all traffic on that service port is blocked.&lt;BR&gt;&lt;BR&gt;Of course this is not the desireable affect for customers who do not purchase the SSL scanning license.&lt;BR&gt;&lt;BR&gt;The solution is to exclude the HTTPS port from being scanned, via the new config_excludes command (avilable since 9.0-M02 and 9.2 onwards).&lt;BR&gt;&lt;BR&gt;Run the config_excludes limited shell command, and answer 'y' to change the configuration.&lt;BR&gt;Choose to Add an exclude settings (2).&lt;BR&gt;Leave the Source IP blank, and press Enter.&lt;BR&gt;Leave the Destination IP blank and press Enter.&lt;BR&gt;Enter 433 in the Destination Port.&lt;BR&gt;Chooce to Save the exclude settings (1).&lt;BR&gt;&lt;BR&gt;That's it, you're done.&lt;/P&gt;&lt;/div&gt;&lt;br&gt;&lt;div class="atb64"&gt;&lt;li&gt;&lt;b&gt;Software Version&lt;/b&gt;&lt;br&gt;9.0-GA&lt;BR&gt;9.0-M02&lt;BR&gt;9.2.0 onwards&lt;BR&gt;&lt;/div&gt;&lt;br&gt;&lt;DL style="margin-top:10px;"&gt;&lt;DT&gt;&lt;i&gt;This article applies to:&lt;/i&gt;&lt;dd&gt;&lt;i&gt;NG 1000&lt;/i&gt;&lt;/dd&gt;&lt;dd&gt;&lt;i&gt;NG 5000&lt;/i&gt;&lt;/dd&gt;&lt;DD&gt;&lt;I&gt;NG 6000&lt;/I&gt;&lt;/DD&gt;&lt;DD&gt;&lt;I&gt;NG 8000&lt;/DD&gt;&lt;/DL&gt;&lt;DL style="margin-top:10px;"&gt;&lt;DT&gt;&lt;i&gt;This article was previously published as:&lt;/i&gt;&lt;DD&gt;&lt;i&gt;Finjan KB 1858&lt;/i&gt;&lt;/DL&gt;</description><pubDate>Mon, 20 Apr 2009 00:00:00 GMT</pubDate><dc:creator>support finjan</dc:creator></item><item><title>Delay and/or failure to get Web server by IP address</title><link>https://support.levelblue.com/kb/Goto13597.aspx</link><description>&lt;div class="atb62"&gt;&lt;li&gt;&lt;b&gt;Question&lt;/b&gt;&lt;br&gt;When browsing to some Websites or using HTTP based applications, client may issue requests to reach the server by its IP address.&lt;BR&gt;Under specific conditions, such requests may result in high delays or even failures getting the Web server.&lt;/div&gt;&lt;br&gt;&lt;div class="atb63"&gt;&lt;li&gt;&lt;b&gt;Answer&lt;/b&gt;&lt;br&gt;The below network capture extract shows internal DNS queries sent by the Finjan appliance to find server 198.161.228.200:&lt;BR&gt;&lt;BR&gt;&lt;div style="width:670px;overflow-x:scroll;"&gt;&lt;img alt="" src="https://support.levelblue.com/kb/attachments/images/980~netowrkcap.jpg" border=0&gt;&lt;/div&gt;&lt;BR&gt;The Finjan appliance will try to run a reverse DNS query for this IP in order to understand whether or not there is any URL list entry matching this IP.&lt;BR&gt;This DNS query fails and the transactions time out.&lt;BR&gt;&lt;BR&gt;These reverse DNS queries can be disabled by adding this particular IP to the Hosts list on the Finjan appliance.&lt;BR&gt; &lt;A href="https://FINJAN-IP:3012"&gt;https://FINJAN-IP:3012&lt;/A&gt; -&amp;gt; Advanced Settings -&amp;gt; Network Settings -&amp;gt; Hosts addresses&lt;BR&gt;&lt;BR&gt;&lt;div style="width:670px;overflow-x:scroll;"&gt;&lt;img alt="" src="https://support.levelblue.com/kb/attachments/images/981~hosts.jpg" border=0&gt;&lt;/div&gt;&lt;BR&gt;&lt;BR&gt;&lt;BR&gt;&lt;BR&gt;&lt;/div&gt;&lt;br&gt;&lt;div class="atb64"&gt;&lt;li&gt;&lt;b&gt;Software Version&lt;/b&gt;&lt;br&gt;Applicable for version 8.5.0&lt;/div&gt;&lt;br&gt;&lt;DL style="margin-top:10px;"&gt;&lt;DT&gt;&lt;i&gt;This article applies to:&lt;/i&gt;&lt;dd&gt;&lt;i&gt;NG 1000&lt;/i&gt;&lt;/dd&gt;&lt;dd&gt;&lt;i&gt;NG 5000&lt;/i&gt;&lt;/dd&gt;&lt;DD&gt;&lt;I&gt;NG 6000&lt;/I&gt;&lt;/DD&gt;&lt;DD&gt;&lt;I&gt;NG 8000&lt;/DD&gt;&lt;/DL&gt;&lt;DL style="margin-top:10px;"&gt;&lt;DT&gt;&lt;i&gt;This article was previously published as:&lt;/i&gt;&lt;DD&gt;&lt;i&gt;Finjan KB 1871&lt;/i&gt;&lt;/DL&gt;</description><pubDate>Mon, 30 Mar 2009 00:00:00 GMT</pubDate><dc:creator>support finjan</dc:creator></item><item><title>What kind of cable do I need for the 8040 Serial Console?</title><link>https://support.levelblue.com/kb/Goto13331.aspx</link><description>&lt;div class="atb62"&gt;&lt;li&gt;&lt;b&gt;Question&lt;/b&gt;&lt;br&gt;What kind of cable do I need for the 8040 serial console (loadbalancer switch)?&lt;/div&gt;&lt;br&gt;&lt;div class="atb63"&gt;&lt;li&gt;&lt;b&gt;Answer&lt;/b&gt;&lt;br&gt;The original IBM cable has the part number (P/N) &lt;STRONG&gt;32R1803&lt;/STRONG&gt;.&lt;BR&gt;It has a SubD9 jack (female) on PC side, and a SGI miniDIN jack (male, non-center-pin) on switch side:&lt;BR&gt;&lt;BR&gt;&lt;IMG alt="" src="https://support.levelblue.com/kb/attachments/images/606~SubD9_female.jpg" border=0&gt;&lt;BR&gt;SubD9 jack (female)&lt;BR&gt;&lt;BR&gt;&lt;BR&gt;&lt;IMG alt="" src="https://support.levelblue.com/kb/attachments/images/607~SGI_mini_DIN.jpg" border=0&gt;&lt;BR&gt;SGI miniDIN jack (male, non-center-pin)&lt;BR&gt;&lt;BR&gt;The wire assignment is as follows:&lt;BR&gt;&lt;BR&gt;&lt;/div&gt;&lt;br&gt;&lt;div class="atb64"&gt;&lt;li&gt;&lt;b&gt;Software Version&lt;/b&gt;&lt;br&gt;N/A&lt;/div&gt;&lt;br&gt;&lt;DL style="margin-top:10px;"&gt;&lt;DT&gt;&lt;i&gt;This article was previously published as:&lt;/i&gt;&lt;DD&gt;&lt;i&gt;Finjan KB 1472&lt;/i&gt;&lt;/DL&gt;</description><pubDate>Fri, 27 Mar 2009 00:00:00 GMT</pubDate><dc:creator>support finjan</dc:creator></item><item><title>Load Balancing Configuration with NG-8040</title><link>https://support.levelblue.com/kb/Goto13294.aspx</link><description>&lt;IFRAME src="https://support.levelblue.com/kb/attachments/1418.pdf" width=670 height=800&gt;&lt;/IFRAME&gt;&lt;DL style="margin-top:10px;"&gt;&lt;DT&gt;&lt;i&gt;This article applies to:&lt;/i&gt;&lt;dd&gt;&lt;i&gt;NG 8000&lt;/dd&gt;&lt;/DL&gt;&lt;DL style="margin-top:10px;"&gt;&lt;DT&gt;&lt;i&gt;This article was previously published as:&lt;/i&gt;&lt;DD&gt;&lt;i&gt;Finjan KB 1418&lt;/i&gt;&lt;/DL&gt;</description><pubDate>Fri, 27 Mar 2009 00:00:00 GMT</pubDate><dc:creator>support finjan</dc:creator></item><item><title>How to Change Port Settings on an NG-8000</title><link>https://support.levelblue.com/kb/Goto13083.aspx</link><description>&lt;IFRAME src="https://support.levelblue.com/kb/attachments/1113.pdf" width=670 height=800&gt;&lt;/IFRAME&gt;&lt;DL style="margin-top:10px;"&gt;&lt;DT&gt;&lt;i&gt;This article applies to:&lt;/i&gt;&lt;dd&gt;&lt;i&gt;NG 8000&lt;/dd&gt;&lt;/DL&gt;&lt;DL style="margin-top:10px;"&gt;&lt;DT&gt;&lt;i&gt;This article was previously published as:&lt;/i&gt;&lt;DD&gt;&lt;i&gt;Finjan KB 1113&lt;/i&gt;&lt;/DL&gt;</description><pubDate>Fri, 27 Mar 2009 00:00:00 GMT</pubDate><dc:creator>support finjan</dc:creator></item></channel></rss>