Trustwave and Cybereason Merge to Form Global MDR Powerhouse for Unparalleled Cybersecurity Value. Learn More

Trustwave and Cybereason Merge to Form Global MDR Powerhouse for Unparalleled Cybersecurity Value. Learn More

Services
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

Database Security

Prevent unauthorized access and exceed compliance requirements.

Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Microsoft Security
Unlock the full power of Microsoft Security
Offensive Security
Solutions to maximize your security ROI
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats
Loading...
Loading...

INFO: In what environment should the ICAP mode be used?

Expand / Collapse


This article applies to:

  • R3000

Question:

In what environment should the ICAP mode be used?

Reply

In what environment should the ICAP mode be used?

 

      ICAP Operation Mode lets you set up an R3000 with a proxy server – The ICAP option (System > Mode > Operation Mode) is used only if this R3000 will function with an ICAP server to off-load content from the source R3000 server, such as Internet filtering. The ICAP Server Settings frame is used for configuring options response settings for the ICAP R3000 server. When an end user makes a request for Internet content, this request is routed to the proxy server, which then submits the request to the ICAP server. The ICAP server sends back a response to the proxy server—which may send the request to the original R3000 server in some network setups, and then return a response to the proxy server. Based on the end user's filtering profile, the proxy server either fulfills the request or returns a block page.

NOTE: When using the ICAP mode, the following items must be taken into consideration:

      In order for Tier 3 authentication to work correctly with the ICAP mode, the virtual IP used for authentication has to be a real and available IP address.

      The proxy server must be configured to not forward any traffic to the R3000's virtual IP (used for authentication) via ICAP, or else the Tier 3 applet will be blocked if the R3000 is configured to block uncategorized sites.

      To display block pages correctly and to prevent “looping,” the proxy server must be configured to not forward any traffic to the R3000 via the ICAP server. Looping occurs in environments in which an R3000 is filtering traffic from end users to an internal proxy.

      Also to prevent "looping," if a custom URL is being used for the X Strikes block page, the proxy must be configured to not forward any traffic to that custom URL.

      In order for the authentication form to display correctly, the proxy server must be configured to accept the certificate coming from port 8081 of the R3000 as being valid.

      Since the authentication form is only accessible via HTTPS, the proxy server must be configured to give workstations access to HTTPS sites from the R3000.


This article was previously published as:
8e6 KB 292284

To contact Trustwave about this article or to request support:


Rate this Article:
     
Tags:

Add Your Comments


Comment submission is disabled for anonymous users.
Please send feedback to Trustwave Technical Support or the Webmaster
.