Trustwave and Cybereason Merge to Form Global MDR Powerhouse for Unparalleled Cybersecurity Value. Learn More

Trustwave and Cybereason Merge to Form Global MDR Powerhouse for Unparalleled Cybersecurity Value. Learn More

Services
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

Database Security

Prevent unauthorized access and exceed compliance requirements.

Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Microsoft Security
Unlock the full power of Microsoft Security
Offensive Security
Solutions to maximize your security ROI
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats
Loading...
Loading...

FAQ: Can WebMarshal pass internet traffic on non-standard HTTPS sites?

Expand / Collapse


This article applies to:

  • WebMarshal

Question:

  • Can WebMarshal pass internet traffic on non-standard HTTPS sites?
  • Can WebMarshal allow HTTPS on ports other than 443?
  • Can WebMarshal allow HTTPS traffic from non-browser applications?
  • WebMarshal blocks secure applets
  • Trouble accessing secure banking sites
  • How do I allow browser client access to Citrix MetaFrame server?

Symptoms:

  • Error: 'The port is invalid' when a user connects to a secure site using a non-standard port, for instance, https//site:9020
  • Error: '407 Proxy Access Denied' when a user connects to a secure site with a non-browser application
  • Error: '401 Unauthorized' when a user connects to a secure site with a non-browser application

Causes:

  • By default WebMarshal versions below 6.8.1 block sites that use non standard HTTPS ports (HTTPS sites that do not use port 443).
  • By default WebMarshal versions below 6.8.1 prevent SSL connections from being made when no User-Agent header is provided in the connect request. Many applets and other non-browser applications do not provide this header.

Solution:

In current supported versions use the HTTPS Connection Restrictions page of Global Settings or the Proxy Wizard to change these settings.

  • To access this page, in the WebMarshal Console click Tools > Global Settings > Advanced Settings > HTTPS Connection Restrictions
    • If Global Settings is not present in your version, click Tools > Proxy Server Properties or Tools > Proxy Server Wizard.
  • On the HTTPS Connection Restrictions (Advanced) page, check the two boxes.

In versions prior to 3.7.4: 

  • To allow HTTPS on all ports, on the WebMarshal server create the following registry value:

In the key:

HKEY_LOCAL_MACHINE\SOFTWARE\NetIQ\WebMarshal\Proxy

Create a new DWORD value called: "AllowNonStandardHTTPSPorts" and set the value to '1' to enable HTTPS on all ports.

  • To allow HTTPS from all applications, on the WebMarshal server create the following registry value:

    In the key:

    HKEY_LOCAL_MACHINE\SOFTWARE\NetIQ\WebMarshal\Proxy

Create a new DWORD value called: "AllowNonBrowserHTTPS" and set the value to '1' to enable HTTPS from any application.

Note: Use due caution when modifying the Registry.

This article was previously published as:
NETIQKB37015

To contact Trustwave about this article or to request support:


Rate this Article:
     

Add Your Comments


Comment submission is disabled for anonymous users.
Please send feedback to Trustwave Technical Support or the Webmaster
.