BCC Proxy Admin
BCC Proxy Admin
BCC Proxy Admin
Chapter 5: Services 41
¡X
Blue Coat Educational Services — BCCPA Course v 1.7.1
X
Chapter 1: Blue Coat SG and Firewalls
Most organizations use firewalls to protect their n e t w o r k s . Firewalls — w h i c h typically are placed
between a private n e t w o r k a n d outside public n e t w o r k — monitor traffic to d e t e r m i n e w h e t h e r it
s h o u l d be allowed in or out.
A l t h o u g h firewalls protect against external attacks, they do not enable organizations to control
users within their n e t w o r k . This is the role of proxies. Proxies enable organizations to authenticate
users, report on n e t w o r k activity, a n d enforce policy: key elements in creating a p r o d u c t i v e a n d
safe Web e n v i r o n m e n t .
This chapter discusses the basics of firewalls a n d proxies and h o w they w o r k together. It explains
h o w organizations can use proxies to control their n e t w o r k s a n d introduces the key basic
d e p l o y m e n t s : forward proxy a n d reverse proxy.
1
Blue Coat Educational Services — BCCPA Course v 1.7.1
Firewalls
Firewalls enable an o r g a n i z a t i o n ' s users to request Web pages, d o w n l o a d files, a n d chat while
m a k i n g sure that outsiders cannot use the Internet to access n e t w o r k services like file or print
s h a r i n g . Some firewalls are pieces of software that r u n on y o u r computer. Other firewalls are built
into h a r d w a r e a n d protect the entire n e t w o r k from attacks.
2
Chapter 1: Blue Coat SG and Firewalls
Firewalls
As y o u can see from Slide 1-2, firewalls typically reside in w h a t is k n o w n as the DMZ, the
so-called neutral z o n e between a c o m p a n y ' s private n e t w o r k a n d the outside public n e t w o r k .
Internal clients a n d services are shielded from the "lawless" Internet by the firewall, w h i c h blocks
u n w a n t e d traffic a n d malicious intrusion a t t e m p t s .
Firewalls n o r m a l l y allow clients on the internal n e t w o r k to use instant messaging, listen to music,
etc., unless ports u s e d by those services are explicitly blocked by a firewall administrator.
3
Blue Coat Educational Services — BCCPA Course v 1.7.1
Proxy
4
Chapter 1: Blue Coat SG and Firewalls
What is a Proxy?
Forward Proxy
Internal External
Slide 1 - 4 : D e f i n i t i o n of a p r o x y
After the proxy h a s retrieved the content from the OCS, it delivers it to the client using the s a m e
connection that the client initially established w i t h the proxy. Therefore, a proxy is in a u n i q u e
position to:
• D e t e r m i n e w h i c h client requests to p e r m i t a n d w h i c h to d e n y
• Modify any content it receives from the OCS before s e n d i n g it to the client
5
Blue Coat Educational Services — BCCPA Course v 1.7.1
• Blocking u n w a n t e d or malicious d o w n l o a d s
• Blocking p o p - u p s a n d s p y w a r e intrusion
• Protecting c o p y r i g h t e d m e d i a a n d intellectual p r o p e r t y
6
Chapter 2: Blue Coat SG Deployment
• Explicit proxy
• Transparent proxy
• Reverse proxy
You will learn w h a t a proxy is, w h a t it does, a n d h o w it can be deployed, particularly the Blue
Coat SG. You will discover w h y setting up an explicit proxy is the easiest, but not necessarily the
most scalable, proxy d e p l o y m e n t . You will look at the complexities of Layer 4 transparent
redirection a n d w e i g h its benefits against the simplicity of the explicit proxy. Next, y o u will look at
t r a n s p a r e n t redirection t h r o u g h the Web Cache C o m m u n i c a t i o n Protocol (WCCP) to explore its
load-balancing a n d traffic-segregation benefits.
Blue Coat solution at each remote location enables y o u to maintain control of the n e t w o r k by:
• Enforcing content-filtering policies
Enabling edge-to-core compression between Blue Coat SG devices to optimize traffic across the
W A N T h e d e p l o y m e n t strategy that y o u i m p l e m e n t can d e t e r m i n e the availability of Blue Coat SG
features a n d functionalities. More importantly, this decision determines h o w users are affected by
the proxy d e p l o y m e n t .
For example, a t r a n s p a r e n t proxy d e p l o y m e n t that uses a Layer 4 switch (see Slide 2-5) might
a p p e a r to be an elegant, scalable, a n d easy-to-maintain solution. However, initial setup cost can be
prohibitive a n d consistent user authentication can prove challenging to i m p l e m e n t . On the other
h a n d , d e p l o y i n g an explicit proxy using PAC files might a p p e a r more laborious to implement, b u t
this m e t h o d does not require a n y additional e q u i p m e n t a n d user authentication is easier to
implement, m a k i n g it a consistently p o p u l a r option.
7
Blue Coat Educational Services — BCCPA Course v 1.7.1
Deployment Options
• Explicit Proxy
- Clients "knoW there is a proxy in the path
• Transparent Proxy
- Clients do not "know"there is a proxy in the path
• Reverse Proxy
- Protects a web server from clients on the internet
• Explicit proxy
• Reverse proxy
Reverse proxy is a proxy server that delivers content for one or more Web servers. All traffic
directed to the back-end servers goes to the proxy server instead. Some reasons to install a
reverse proxy are to defend a n d secure the servers b e h i n d it, distribute load across several
Web servers, cache static content, integrate full SSL termination capabilities into y o u r Blue
Coat SG, a n d to c o m p r e s s content.
8
Chapter 2: Blue Coat SG Deployment
Explicit Proxy
D e p l o y i n g an explicit proxy is the least complex solution a n d generally d o e s not require any
additional software or h a r d w a r e . A s i m p l e packet capture can s h o w y o u if a client is using an
explicit proxy. Clients using an explicit proxy format the GET request in a different w a y than
clients u s i n g a t r a n s p a r e n t proxy or no proxy at all.
W h e n the b r o w s e r does not have a proxy set, the s t a n d a r d GET request has formatting similar to
the following:
GET / HTTP/1.1
HOST: www.bluecoat.com
W h e n the b r o w s e r is configured to use a proxy, the GET request includes the entire URL:
Note: In an explicit proxy request, the destination IP address of the client request is the IP
a d d r e s s of the proxy, a n d not the IP a d d r e s s of the 0 C S .
9
Blue Coat Educational Services — BCCPA Course v 1.7.1
Transparent Proxy
Slide 2 - 3 : T r a n s p a r e n t p r o x y d e p l o y m e n t
10
Chapter 2: Blue Coat SG Deployment
Slide 2 - 4 : Explicit p r o x y c o n f i g u r a t i o n
In an explicit proxy d e p l o y m e n t , every client is configured to forward all traffic to the Blue Coat
SG. For example, y o u can easily set y o u r b r o w s e r to s e n d all HTTP requests to a proxy server.
Figure 2-1 below s h o w s the proxy configuration screen for a Firefox® client.
Once the Firefox client has been configured as s h o w n above, the client s e n d s all HTTP requests
over port 8080 to the proxy with the h o s t n a m e myproxysg. You can see h o w straightforward this
m e t h o d is; however, it is impractical for m o s t organizations (except the very smallest) because y o u
h a v e to m a n u a l l y configure the b r o w s e r on each client machine. M a n u a l l y configuring an explicit
proxy requires a lot of administrator time a n d — unless the proxy is paired w i t h good firewall
rules — can be easily bypassed a n d defeated.
11
Blue Coat Educational Services — BCCPA Course v 1.7.1
Slide 2 - 5 : N e t w o r k w i t h c o n t e n t switch
Most Layer 4 switches also offer a v e r y useful set of additional features. For example:
• A d v a n c e d load balancing
• URL h a s h i n g
s
A d v a n c e d fault tolerance a n d r e d u n d a n c y
12
Chapter 2: Blue Coat SG Deployment
Slide 2 - 6 : E q u i p m e n t w i t h WCCP
W C C P v2.0 s u p p o r t s the redirection of traffic other than HTTP traffic t h r o u g h a traffic segregation
m e t h o d called Service Groups.
13
Blue Coat Educational Services — BCCPA Course v 1.7.1
In the configuration s h o w n in Slide 2-7, the Blue Coat SG receives all o u t b o u n d traffic a n d inspects
it. If the traffic matches a n y filtering criteria set by the administrators, Blue Coat SG further
inspects the traffic to d e t e r m i n e if a n y rule or action (allow, block, redirect, cache, etc.) needs to be
applied.
If there are too m a n y nodes a t t a c h e d to the network, Blue Coat SG becomes a single point of
failure a n d is susceptible to o v e r l o a d i n g a n d congestion: The Blue Coat SG is n o w processing a n d
f o r w a r d i n g all packets — not j u s t t h o s e that match given policies.
14
Chapter 2: Blue Coat SG Deployment
Slide 2 - 8 : T r a n s p a r e n t : d e f a u l t r o u t e r
The Blue Coat SG can act as a default g a t e w a y for clients. In this scenario, the Blue Coat SG is
capable of routing a n y kind of traffic: UDP, TCP, NetBIOS, unicast, multicast, etc. U n d e r such
situations, the Blue Coat SG can either terminate a n d process the traffic or forward the traffic to
the next h o p .
If the destination TCP port m a t c h e s the service that is set to intercept, the packets are processed.
Otherwise, the packets are f o r w a r d e d based on the destination M A C a d d r e s s a n d the IP a d d r e s s in
the packet.
15
Blue Coat Educational Services — BCCPA Course v 1.7.1
Firewall Rules
Source Destination Action
• 172.16.0.100 ANY ALLOW
•172.16.1.10 25 ALLOW
•ANY ANY DENY
16
Chapter 2: Blue Coat SG Deployment
Edge Deployment
Slide 2-10 represents graphically w h a t is discussed in the introduction of this chapter. On the left
side, y o u can see a representation of a traditional n e t w o r k layout for a large enterprise w i t h several
satellite offices. On the right side y o u can see the configuration that s o m e companies are m i g r a t i n g
to. Each office has separate a n d i n d e p e n d e n t n e t w o r k access. The dotted lines represent the V P N
t u n n e l s that the satellite office uses to access d a t a centers at the m a i n corporate offices.
Blue C o a t ' s p r o d u c t s are d e s i g n e d to fit into this model. You can use the same h a r d w a r e for
s t a n d - a l o n e small offices as well. H o w e v e r , features available in the SGOS are designed to fit into
both d e p l o y m e n t scenarios.
In m o v i n g Internet access from the core (headquarters) to the e d g e (remote office), c o m p a n i e s m a y
h a v e lost the ability to g r a n u l a r l y control who does vWjarand when. The availability of h a r d w a r e
that is cost-effective, easy to deploy, a n d easy to control allows companies to deploy the Blue Coat
solution at each remote location a n d still maintain control of the n e t w o r k by:
• Enforcing content-filtering policies
Controlling the content of selected SSL transactions
17
Blue Coat Educational Services — BCCPA Course v 1.7.1
Reverse Proxy
Slide 2 - 1 1 : Reverse p r o x y
Unlike a forward proxy, w h i c h caches arbitrary content for clients, a reverse proxy serves specific
content on behalf of b a c k - e n d servers. Reverse proxies are n e t w o r k servers or appliances that
typically reside in the D M Z b e t w e e n Web applications a n d the Internet.
The reverse proxy is effectively a "trusted processor" for Web servers, acting as a m i d d l e m a n
b e t w e e n users a n d the Web applications they access. A reverse proxy protects Web servers from
direct Internet access a n d off-loads from t h e m c o m p u t a t i o n a l l y intensive processes to e n h a n c e
performance.
To the o u t s i d e w o r l d , the reverse proxy is the Web server. For example, in Slide 2-11, all requests
g o i n g to h t t p : / / w w w . s i t e . c o m (or the c o r r e s p o n d i n g IP address) are directed to the proxy, even
t h o u g h the actual content resides on the back-end server. W h e n content is requested, the proxy
either serves the content from its cache or obtains the content from a back-end Web server. If the
reverse proxy is accelerating several different Web servers, the proxy (or Layer 4 switch) m a i n t a i n s
Web-server m a p p i n g so that content can be obtained from the correct server.
18
Chapter 2: Blue Coat SG Deployment
Web Server
As s h o w n in Slide 2-12, the reverse proxy sits outside the firewall a n d intercepts all traffic
i n t e n d e d for the Web server. It then serves the requested content from its cache or gets the content
from the back-end Web server a n d delivers it to the client (while caching it for s u b s e q u e n t
requests).
The Blue Coat SG appliances are built on p r o v e n proxy architecture with an optimized TCP stack
to serve large a m o u n t s of H T T P a n d HTTPS traffic v e r y quickly. This enables the Blue Coat SG to
accelerate all static a n d d y n a m i c content, efficiently off-loading TCP connections from Web
servers. Each appliance can service T C P connections an o r d e r of m a g n i t u d e faster than a Web
server r u n n i n g UNIX® or W i n d o w s ® NT. This is critical because some d y n a m i c content, s u c h as
CGI scripts a n d Active Server Pages, cannot be cached. To further accelerate Web content, the Blue
Coat SG incorporates two p a t e n t - p e n d i n g algorithms: Object Pipelining a n d A d a p t i v e Refresh.
Object Pipelining eliminates a large portion of the delay c a u s e d by the serial retrieval of objects.
Object Pipelining enables the Blue Coat SG to o p e n as m a n y s i m u l t a n e o u s TCP connections as the
Web application permits a n d retrieves objects in parallel. T h e objects are then delivered from the
appliance straight to the user's d e s k t o p as fast as the b r o w s e r can request them. As a result, Blue
Coat typically accelerates first-time Web p a g e retrievals by 50 percent.
19
Blue Coat Educational Services — BCCPA Course v 1.7.1
Slide 2 - 1 3: Securing c o r p o r a t e c o n t e n t
T h e illustration a b o v e s h o w s h o w the Blue Coat SG securely isolates servers from direct Internet
access, this t i m e acting as an i n t e r m e d i a r y b e t w e e n c o r p o r a t e Web mail applications a n d the
external clients that a t t e m p t to access them. By front-ending the Outlook® server, y o u can:
20
Chapter 2: Blue Coat SG Deployment
Mixed Deployment
In this slide y o u see h o w the s a m e organization can d e p l o y the Blue Coat SG differently in
separate locations as well as in the s a m e location. Organizations can combine a variety of
d e p l o y m e n t s in their different offices. Slide 2-14 s h o w s fives different d e p l o y m e n t s in a single
organization: four in satellite offices a n d one in the m a i n office.
21
Blue Coat Educational Services — BCCPA Course v 1.7.1
22
Chapter 3: Blue Coat SG Initial Setup
This section w a l k s y o u t h r o u g h the steps y o u need to complete w h e n setting up the Blue Coat SG
for the first time. Some of the concepts also a p p l y to reconfiguring an existing Blue Coat SG or one
that has been restored to factory-default settings.
After y o u complete this chapter, y o u will do a lab exercise that w a l k s y o u t h r o u g h the installation
a n d registration process for y o u r Blue Coat SG. The current chapter is a high-level o v e r v i e w of the
entire s e t u p process.
W h e n the license key file is created, it consists of all three c o m p o n e n t s . The SGOS base is a
required c o m p o n e n t of the license key file.
23
Blue Coat Educational Services — BCCPA Course v 1.7.1
• Serial Console
- Easy and reliable
• LCD/Keypad
- A built-in interface for proxy configuration (most models)
• TCP/IP
- Access reserved site https://proxysq.bluecoat.com:8083
- Blue Coat SG200-X in bridging mode only
Slide 3 - 1 : Access m e t h o d s
• Gathered the netmask, default router, a n d default D N S information for the location w h e r e y o u
w a n t to install Blue Coat SG.
The Blue Coat SG, d e p e n d i n g on the actual m o d e l a n d OS version, allows y o u to use different
m e t h o d s for initial configuration.
For the Blue Coat SG200-X, y o u can u s e y o u r b r o w s e r for the initial configuration, even before the
appliance has an IP a d d r e s s associated w i t h it.
24
Chapter 3: Blue Coat SG Initial Setup
W h e n y o u connect to a Blue Coat SG for the first time, the system forces y o u to enter the
a p p r o p r i a t e n e t w o r k p a r a m e t e r s . If the s y s t e m is already configured, y o u can o p t to re-run the
initial setup. You will do this in the lab exercise that follows this chapter.
Telnet, SSH, a n d M a n a g e m e n t Console access can be restricted to a selected list (or range) of IP
addresses. There are no risks associated w i t h this p r o c e d u r e because y o u can always u s e the serial
access to reconfigure those settings via the CLI.
Note: You s h o u l d not set a p a s s w o r d to protect the serial access. Losing the p a s s w o r d m a y
force y o u to R M A y o u r Blue Coat SG.
25
Blue Coat Educational Services — BCCPA Course v 1.7.1
Password Levels
T h e Blue Coat CLI offers two sets of c o m m a n d s , a limited set for basic access a n d a more extensive
set for a d v a n c e d configuration. T h e basic access c o m m a n d s are available as soon as y o u log in
w i t h the a p p r o p r i a t e u s e r n a m e a n d p a s s w o r d . The extensive set of c o m m a n d s is available in the
e n a b l e m o d e . You need a separate p a s s w o r d to enter enable m o d e .
Note: A user w i t h enable m o d e access can completely alter the Blue Coat SG configuration
a n d can c h a n g e virtually a n y policy that has been i m p l e m e n t e d .
26
Chapter 3: Blue Coat SG Initial Setup
Slide 3 - 4 : License m o d u l e s
The Blue Coat SG, w h e n o p e r a t i n g in trial m o d e , allows y o u to use any of the available features.
However, once y o u license the separate c o m p o n e n t s , those that are not licensed cease to function
— even if y o u are still in y o u r initial, 60-day trial period.
For example, s u p p o s e that y o u are in the trial p e r i o d a n d are using a content-filtering license to
block certain types of Web content. If after a w e e k in trial m o d e , y o u decide to license y o u r Blue
Coat SG but do not license the content-filtering c o m p o n e n t , the content-filtering feature will not
w o r k — even if y o u , in theory, still have seven w e e k s to go in the trial period.
27
Blue Coat Educational Services — BCCPA Course v 1.7.1
• Log in to WebPower
4. Log in u s i n g y o u r W e b P o w e r User ID a n d P a s s w o r d .
5. Register y o u r h a r d w a r e a n d a d d the licenses for the c o m p o n e n t s y o u h a v e p u r c h a s e d .
28
Chapter 4: Blue Coat SG Graphical User Interface
You u s e the c o m m a n d line interface (CLI) to perform the initial configuration of y o u r Blue Coat
SG. You also can u s e CLI to perform a n y task on y o u r appliance; however, most users take
a d v a n t a g e of t h e Blue Coat SG's graphical user interface (GUI) to perform m o s t configuration,
m a n a g e m e n t , a n d m o n i t o r i n g tasks.
• Maintenance tab: U s e d to keep the Blue Coat SG up to date. You can license c o m p o n e n t s ,
archive t h e configuration, a n d u p g r a d e or d o w n g r a d e SGOS.
This chapter i n t r o d u c e s the elements of the M a n a g e m e n t Console, including the Visual Policy
M a n a g e r (VPM), w h i c h p r o v i d e s an easy w a y to create sophisticated policies w i t h o u t having to
use C o n t e n t Policy L a n g u a g e (CPL). The rest of the course is b a s e d on the u s e of graphical tools.
Note: If, w h e n y o u access the M a n a g e m e n t Console h o m e page, you get a "host mismatch"
or an "invalid certificate" message, y o u need to recreate the security certificate u s e d
by t h e HTTPS-Console.
29
Blue Coat Educational Services — BCCPA Course v 1.7.1
T h e M a n a g e m e n t Console's Configuration tab is the starting point for most of the tasks that y o u
p e r f o r m on the Blue Coat SG. You access this tab to c h a n g e the appliance's configuration a n d
create objects a n d p a r a m e t e r s that y o u u s e in creating policies.
• Services: Configuring the m a n y proxy services available on the Blue Coat SG, including
C o m m o n Internet File System (CIFS), FTP, HTTP, HTTPS, instant m e s s a g i n g (IM), MAPI, SSL,
SOCKS, streaming, a n d TCP-Tunnel.
Health Checks: Configuring health checks on (and thus the availability of) a forwarding host or
external server that is p r o v i d i n g a service.
• Policy: Setting the default proxy policy to d e n y or allow traffic, v i e w i n g a n d installing policy
files, accessing the V P M to create n e w policy.
Content Filtering: Configuring the Blue Coat SG to use Blue Coat WebFilter (BCWF) or a
t h i r d - p a r t y application to block access to certain Web sites based on their content.
30
Chapter 4: Blue Coat SG Graphical User Interface
Access Logging: Enabling the logging of traffic t h r o u g h the Blue Coat SG, configuring access
log settings, selecting an access log u p l o a d client, setting an u p l o a d schedule.
31
Blue Coat Educational Services — BCCPA Course v 1.7.1
• Restarting the Blue Coat SG, restoring the s y s t e m to its default settings, clearing the DNS,
object, a n d byte caches.
32
Chapter 4: Blue Coat SG Graphical User Interface
• Statistics include
- System usage
- HTTP/FTP, CIFS, MAPI, and byte-caching history
- Resources
- Efficiency
9
Take disks offline, put them online
• Resources
Efficiency
• Bandwidth management
In addition, the General option on the Statistics tab provides information about system
configuration a n d the status of h a r d w a r e sensors a n d allows y o u to take disks offline a n d offline.
33
Blue Coat Educational Services — BCCPA Course v 1.7.1
Policies enable y o u a p p l y y o u r organization's rules t h r o u g h the Blue Coat SG. For example, y o u
can d e n y u s e r s access to . m p e g files d u r i n g business h o u r s or p r e v e n t t h e m from ever accessing
g a m i n g o r p o r n o g r a p h y sites.
The Visual Policy M a n a g e r (VPM) is a graphical policy editor included w i t h the Blue Coat SG. It
translates y o u r c o m m a n d s into CPL so y o u do not need in-depth k n o w l e d g e of the language to
create policies. You do not n e e d to edit policy files manually. You l a u n c h the V P M from the
M a n a g e m e n t Console.
In the VPM, policies are g r o u p e d into layers that use triggers a n d actions to apply rules. A n y
c o m b i n a t i o n of triggers a n d actions can be c o m b i n e d to control e m p l o y e e s ' use of n e t w o r k
resources.
Before discussing the V P M in m o r e detail, it is necessary to discuss s o m e basic terminology:
• Policy. A policy is the aggregation of all variables that define a practical business rule. For
example, an organization's administrative access policy defines w h o is allowed to access the
V P M a n d h o w those users will be authenticated.
Rule: A rule is a set of variables that define a m e t h o d or action. This concept can also be
defined as a list of triggers a n d p r o p e r t y settings. Rules define " w h o , what, w h e n , where, a n d
how."
34
Chapter 4: Blue Coat SG Graphical User Interface
The order of policy layers is of critical importance. T h e Blue Coat SG evaluates policy layers in the
o r d e r in w h i c h t h e y are listed in the V P M (from left to right). W h e n the Blue Coat SG goes t h r o u g h
policy layers, it d o e s not execute a given rule w i t h i n the layer immediately. Instead, it compiles a
list of all the rules that meet the condition; w h e n it has gone t h r o u g h all the policy layers, it
evaluates the list, resolves any a p p a r e n t conflicts, a n d then executes the required actions. If there is
a conflict b e t w e e n rules in different policy layers, the m a t c h i n g rule in the policy layer evaluated
iasr takes precedence.
35
Blue Coat Educational Services — BCCPA Course v 1.7.1
• Web Access: Determines w h a t resources user clients accessing the proxy or the Web can access
a n d a n y restrictions that apply.
Web Content: Determines caching behavior, such as verification a n d ICAP redirection.
36
Chapter 4: Blue Coat SG Graphical User Interface
A rule is an action within a policy layer. A policy layer can contain multiple rules. Each rule is
n u m b e r e d a n d listed in a separate row. The Blue Coat SG evaluates the rules in the order in w h i c h
they are listed in a policy layer (from top to bottom). If multiple rules exist within a policy layer,
the Blue Coat SG finds the first one that matches a given situation, ignores the remaining rules, a n d
goes on to the next policy layer. This is particularly true for the Web Access Layer. Therefore, rule
order is i m p o r t a n t .
However, there are likely to be exceptions to such a broad policy. For example, y o u require the
m a n a g e r of the p u r c h a s i n g d e p a r t m e n t to be able to access the Web sites of suppliers. M e m b e r s of
the sales d e p a r t m e n t need to access their customer Web sites. Creating Web Access rules for both
these situations is also simple. But if y o u p u t all these rules in a single policy layer, then the rule
prohibiting access to e v e r y o n e m u s t be ordered last, or the other t w o rules are not applied.
Remember, w h e n the Blue Coat SG finds a m a t c h i n g rule, it m o v e s to the next layer w i t h o u t
evaluating the r e m a i n i n g rules.
As the Blue Coat SG scans the layers, it records the first m a t c h i n g rule in each layer. If a conflict
arises, the Blue Coat SG applies the rule evaluated last. Therefore, the most effective rule is the
first m a t c h i n g rule in the last layer, because policies are evaluated from left to right a n d rules are
processed from top to bottom.
37
Blue Coat Educational Services — BCCPA Course v 1.7.1
As y o u can see in the illustration above, layers are processed from left to right a n d rules are
processed from top to bottom. W h e n e v a l u a t i n g rules, Blue Coat SG finds the first matching rule
a n d m o v e s on to the next layer. Rules in the last layer always take precedence because they are
e v a l u a t e d last.
Figure 4 - 1 : Forcing the publications group to authenticate using the existing NTLM realm
38
Chapter 4: Blue Coat SG Graphical User Interface
url.host.exact="www.playboy.com" url.port=8 0
end condition HostPortl
<Proxy>
39
Blue Coat Educational Services — BCCPA Course v 1.7.1
Layers are evaluated From left to right and rules are evaluated from top to bottom. When multiple rules exist
within a policy layer, the Blue Coat SG finds the first one that matches a given situation, ignores the
remaining rules, and goes on to the next policy layer.
So r e m e m b e r to order y o u r layers a n d rules accordingly.
40
Chapter 5: Services
Chapter 5: Services
The Blue Coat SG's M a n a g e m e n t Console includes a Services feature that enables y o u to easily
configure w h i c h traffic needs to be processed or ignored. Services define the ports for w h i c h the
Blue Coat SG listens for requests. Each service can be applied to all IP addresses of the Blue Coat
SG or limited to individual IP a d d r e s s e s . A variety of attributes can be defined for each service.
The Blue Coat SG ships w i t h a n u m b e r of predefined services. You can create additional services
as n e e d e d . Unless there is a service, set to yes, w h i c h matches the destination TCP port a n d the IP
a d d r e s s r a n g e for an incoming transaction, the connection will not be terminated by the proxy.
D e p e n d i n g on the specific d e p l o y m e n t m o d e , traffic that is not terminated may be d r o p p e d or
f o r w a r d e d to the next available h o p b u t not processed against the existing policies.
• HTTPS Console: The HTTPS Console provides secure access to the M a n a g e m e n t Console
t h r o u g h the HTTPS protocol. You can create multiple m a n a g e m e n t HTTPS consoles, allowing
y o u to s i m u l t a n e o u s l y access the M a n a g e m e n t Console u s i n g a n y IP address belonging to the
box as well as any of the Blue Coat SG's virtual IP (VIP) addresses. The default is HTTPS over
p o r t 8082. The Blue Coat SG s h i p s w i t h an HTTPS Console already created a n d enabled. You
do not n e e d to create other HTTPS Consoles unless y o u n e e d t h e m for other purposes.
• SSH Console: The SSH Console is created a n d enabled by default. Only one SSH Console can
exist on the Blue Coat SG. If y o u inadvertently deleted the S S H v l a n d SSHv2 host keys from
the s y s t e m at the s a m e time, y o u automatically disabled the SSH Console a n d must enable the
SSH Console after y o u create a host key. This console allows y o u access to the Blue Coat SG
t h r o u g h the CLI with y o u r SSH service.
• Telnet Console: The Telnet Console allows y o u to connect to a n d m a n a g e the Blue Coat SG
u s i n g the Telnet protocol. R e m e m b e r that Telnet is an insecure protocol that s h o u l d not be
u s e d in insecure conditions. By default, only SSH is created a n d enabled. Blue Coat Systems
r e c o m m e n d s against using Telnet because of the security hole it creates.
41
Blue Coat Educational Services — BCCPA Course v 1.7.1
Service Ports
T h e Service Ports feature allows the Blue Coat SG to c o m m u n i c a t e w i t h other systems (clients,
servers, other proxies etc). Service p o r t defines the ports a n d a d d r e s s e s w h e r e the Blue Coat SG
listens for i n c o m i n g requests. Each service is associated w i t h a proxy t y p e . A variety of attributes
can be defined , d e p e n d i n g on the proxy type.
These consoles are d e s i g n e d to allow y o u access to the Blue Coat SG. Some of the consoles are
created a n d enabled by default on the Blue Coat SG. The HTTPS a n d SSH consoles are created
a n d enabled by default, w h e r e a s the HTTP a n d Telnet consoles are created but disabled by
default because of security concerns.
Application Proxies
The v a r i o u s Application proxies available on the Blue Coat SG are Instant m e s s e n g e r (IM),
SOCKS, FTP, MMS, RTSP, H T T P a n d HTTPS. These services are disabled by default a n d are
configurable on the Blue Coat SG.
42
Chapter 5: Services
If a listener detects traffic , the service port actions define w h e t h e r that traffic is intercepted or
ignored. An action can be performed only if the traffic matches the proxy listener. There are t w o
possible actions: yes a n d no.
• Yes: Tells the proxy service to intercept a n d proxy a n y traffic that matches the proxy listener. If
policies exist for the proxy service they will be enforced.
• No: Tells the proxy service to ignore any traffic that matches the proxy listener. Policies w o u l d
not be enforced on the traffic.
The Blue Coat SG ships w i t h a n u m b e r of predefined proxy services. By default, the action for each
service is set to no. The table on the next p a g e lists the proxy services a n d listeners which ship w i t h
Blue Coat SG.
Important: Blue Coat SG matches the services from the most specific to the least specific.
The Default service is m a t c h e d only if a more specific service is not available.
43
Blue Coat Educational Services — BCCPA Course v 1.7.1
44
Chapter 5: Services
Slide 18-3 discusses the client connection status w h e n the Blue Coat SG service is set to No a n d the
traffic is ignored.
1. U n d e r an explicit proxy set-up , the connection is refused. T h e service then determines if the
Blue Coat SG is set-up in a b r i d g i n g m o d e .
4. If the Blue Coat SG is not in default router m o d e , then the client connection is refused .
45
Blue Coat Educational Services — BCCPA Course v 1.7.1
Slide 5 - 1 : Service A t t r i b u t e s
Described below are the v a r i o u s attributes on the Blue Coat SG, d e p e n d i n g on the protocol, not all
attributes are available:
• Explicit
Enables or disables explicit attribute for the port. Explicit allows connections to a Blue Coat SG
IP address.if DNS redirection is u s e d to direct traffic to the Blue Coat SG, the explicit flag on its
services m u s t be enabled, as these connections are r o u t e d t h r o u g h DNS to the Blue Coat SGs
IP address.
• Transparent
Enables or disables t r a n s p a r e n t proxy attribute for port. This allows connections to a n y IP
a d d r e s s other than those b e l o n g i n g to the Blue Coat SG.
Authenticate- 401
46
Chapter 5: Services
• S e n d Client IP
Enables or disables s e n d i n g of client's IP a d d r e s s instead of the Blue Coat SG's IP address.
47
Blue Coat Educational Services — BCCPA Course v 1.7.1
48
Chapter 6: Hypertext Transfer Protocol
Client: A software application that s e n d s requests to a server (see below) over an established
connection.
Server. A software application that accepts connections from a client, process the requests it
receives, a n d s e n d s back responses.
Proxy. A software application (even so-called appliances run a software application of s o m e sort),
w h i c h acts as both a server a n d a client. The application poses as a server for the initial client a n d
acts as a client for the remote server. In fact, a proxy m a k e s requests on behalf of other clients; this
is w h y it is considered b o t h a client a n d a server. Client requests are serviced internally or are
p a s s e d to another server. A proxy can also translation-modify the request it receives from the
client a n d send it to the server or to other servers. Proxies can also be used as "helper applications
for h a n d l i n g requests via protocols not i m p l e m e n t e d by the user agent."
49
Blue Coat Educational Services — BCCPA Course v 1.7.1
Cache: A cache is a p r o g r a m ' s local store of response messages a n d the s u b s y s t e m that controls
m e s s a g e storage, retrieval, a n d deletion. A cache stores cacheable responses to r e d u c e response
time a n d n e t w o r k b a n d w i d t h c o n s u m p t i o n for future requests for the s a m e content. A n y client or
server m a y include a cache (though a cache cannot be u s e d by a server while it is acting as a
tunnel). A n y given p r o g r a m m a y be capable of being b o t h a client a n d a server; o u r use of these
t e r m s refers only to the role p e r f o r m e d by the p r o g r a m for a particular connection, rather than to
the p r o g r a m ' s capabilities in general. Likewise, any server m a y act as an origin server, proxy,
gateway, or t u n n e l — c h a n g i n g behavior to a d d r e s s the n e e d s of each request.
Note: Portions of the following content are from RFC 1945 C o p y r i g h t (C) The Internet
Society (1996) a n d RFC 2616 C o p y r i g h t (C) The Internet Society (1999). All Rights
Reserved.
50
Chapter 6: Hypertext Transfer Protocol
HTTP Protocol
• Definition
- "Application-level protocol with the lightness and
speed necessary for distributed, collaborative,
hypermedia information systems"
51
Blue Coat Educational Services — BCCPA Course v 1.7.1
HTTP Protocol
An H T T P transaction is a l w a y s initiated by the client. The client s e n d s a request to the server. The
server processes the request a n d returns a response. Responses w i t h o u t a previous request are
ignored; in essence the client rejects all unsolicited traffic.
52
Chapter 6: Hypertext Transfer Protocol
HTTP URL
• Default port is 80
http://www.bluecoat.com:80
http://www.bluecoat.com
After specifying the h o s t n a m e , y o u can specify the resource y o u w a n t from the server (page,
image, files, etc.). You m u s t specify the full p a t h (as seen by the Web server) for that resource. For
example, the following URLs request t w o different resources on a Web site:
http://www.bluecoat.com/resources/training/index.html
http://www.bluecoat.com/images/BCS_leftnav_resources.jpg
In the request, y o u can also pass p a r a m e t e r s that a script (running on the Web server) can process
a n d use to return a specific p a g e based on y o u r previous selections:
2
http://www.bluecoat.com/test.cgi?parameter=value
Resources are s e p a r a t e d from the h o s t n a m e a n d from each other by the / character; parameters are
s e p a r a t e d from the script n a m e by the ? character a n d from each other by the & character.
Special characters in the URL are represented by their hexadecimal ASCII code, preceded by the
s y m b o l %. For example:
h t t p : / / w w w . b l u e c o a t . c o m / t h i s is a s a m p l e . h t m l is an invalid URL
h t t p : / / w w w . b l u e c o a t . c o m / t h i s % 2 0 i s % 2 0 a % 2 0 s a m p l e . h t m l is a valid URL
53
Blue Coat Educational Services — BCCPA Course v 1.7.1
HTTP Message
54
Chapter 6: Hypertext Transfer Protocol
Request Methods
• GET
- Retrieves whatever information (in the form of an
entity) is identified by the URL
- Changes to a conditional GET if the request message
includes an If-Modified-Since or similar header
• HEAD
- Identical to GET except that the server MUST NOT
return a message-body in the response
The GET request m e t h o d instructs the server to retrieve the information identified by the request
URL. GET is u s e d to ask for a specific d o c u m e n t — w h e n y o u click on a hyperlink, GET is used.
For example:
GET /sampletext.html HTTP/1.1
If the URL refers to a process, such as c o m m o n g a t e w a y interface (CGI), the processed data is
r e t u r n e d in the r e s p o n s e a n d not the source text of the process.
Responses to a GET request are cacheable, if a n d only if the request meets the requirements for
H T T P caching described in Section 13 of the RFC.
The H E A D request m e t h o d is identical to the GET m e t h o d except that H E A D returns only the
m e s s a g e h e a d e r s a n d not the message body. H E A D can be used to obtain metainformation about
the entity, for e x a m p l e the validity a n d accessibility of hypertext links.
The response to a H E A D request can be u s e d to u p d a t e previously cached data from that resource.
For example, if the h e a d e r s indicate that the cached d a t a has been modified, then the proxy m u s t
treat its cached d a t a as stale.
55
Blue Coat Educational Services — BCCPA Course v 1.7.1
Request Methods
• POST
- Designed to allow a uniform method to cover the
following functions:
• Posting a message to a bulletin board, newsgroup,
mailing list or similar group of articles
• Providing a block of data, such as the result of submitting
a form, to a data-handling process
• Extending a database through an append operation
• CONNECT
- Reserved for use with a proxy that can dynamically
switch to being a tunnel (e.g. SSL tunneling)
The request URI refers to the p r o g r a m that will process the data instead of a resource to be
retrieved.
The r e s p o n s e is the p r o g r a m o u t p u t a n d not fixed content.
The most c o m m o n use of POST is to s u b m i t H T M L form data to CGI scripts. The CGI script
receives the m e s s a g e b o d y t h r o u g h STDIN, a n d decodes it.
You can u s e a POST request to s e n d w h a t e v e r d a t a y o u want, not j u s t form submissions. The only
stipulation is that the receiving p r o g r a m m u s t agree on the format.
56
Chapter 6: Hypertext Transfer Protocol
Response Codes
H T T P uses a set of r e s p o n s e codes to c o m m u n i c a t e messages from the server to the client. There
are five g r o u p s of response code:
• 3xx — Used to redirect the client from the requested URL to a n e w one
You s h o u l d interpret the term "error" cautiously. For example, authentication requests are
h a n d l e d u s i n g the 4xx messages. W h e n a client requests a password-protected resource, the server
replies w i t h a 401 error. While that is not an error per se, HTTP h a n d l e s it as such.
57
Blue Coat Educational Services — BCCPA Course v 1.7.1
HTTP Protocol
Request Response
HTTP/1 .x 200 OK
GET/HTTP/1.1 Content-Type: text/html
Host: www.google.com Server: GWS/2.1
User-Agent: Firefox/1.0 Content-Length: 1121
Accept: text/xml
Date: Wed, 05 Jan 2005 22:09 GMT
The client issues a request specifying a m e t h o d , a resource, a n d the protocol version. The m e t h o d
is GET, w h i c h is the most c o m m o n l y u s e d one; it enables the client to retrieve the requested
resource from the server. The resource is /, w h i c h indicates the root of the Web server. Web servers
associate a default file n a m e w i t h the root of a directory (index.htm, default.htm, welcome.html,
etc.):
GET / HTTP/1 . i and
G E T /index.htm H T T P / 1 . 1
The server replies w i t h a 200 OK message, indicating that the request is valid a n d has been
accepted. The response will be 1,121 bytes.
58
Chapter 6: Hypertext Transfer Protocol
There is no predefined limit to the n u m b e r of proxy servers or similar devices that a request can
traverse. The client is usually aware, at the most, of the very first proxy in the chain. The proxy can
then forward the request directly to the origin content server (OCS) or to another proxy. The s a m e
concept applies to t h e other proxies in the chain.
59
Blue Coat Educational Services — BCCPA Course v 1.7.1
GET Requests
The GET request that a p r o x y - a w a r e client uses is v e r y characteristic. You can easily recognize
w h a t is s o m e t i m e s called a "via-proxy GET request" because the entire URL a p p e a r s in the GET
request.
The via-proxy GET request contains the entire URL, w h i c h is logical (especially if H T T P / 1 . 0 is
used) because there is no H o s t header. The destination IP a d d r e s s of the client request is the IP
a d d r e s s of the proxy. The proxy has to k n o w the location of the origin content server that the client
n e e d s the d a t a from. In general, in a direct Web request, the destination Web server is the
destination IP a d d r e s s for the client request, a n d not that of a n y intermediary.
60
Chapter 7: HTTP Compression
HTTP compression is an a l g o r i t h m that reduces the size of a file w i t h o u t causing loss of data,
i m p r o v i n g n e t w o r k efficiency a n d performance.
Server-side b a n d w i d t h (between the Blue Coat SG a n d the origin content server [OCS])
The Blue Coat SG can m a n a g e multiple v a r i a n t s of the s a m e objects in cache. A file can be stored in
gzip, deflate, or text format. The Blue Coat SG also can modify the c o m p r e s s e d content; for
instance, JavaScript® contained in a gzip file can be stripped out.
Be a w a r e that the Blue Coat SG does not compress s o m e types of M u l t i p u r p o s e Internet Mail
Extensions (MIME) types, w h i c h usually refer to already compressed formats:
• audio/*
• video/*
• image/jpeg/gif/png/pjpeg
application/x-zip-compressed/x-compressed/x-gzip
• application/zip/gzip
• application/pdf
• N e t s c a p e ® 4.x b r o w s e r
By default, Internet Explorer does not request compressed content w h e n the Blue Coat SG is set in
explicit proxy m o d e .
Important: The Blue Coat SG compresses content only if the response is 200 OK.
61
Blue Coat Educational Services — BCCPA Course v 1.7.1
HTTP Compression
T h e user agent (UA) lists the s u p p o r t e d c o m p r e s s i o n formats in the Accept-Encoding header; the
formats are listed in o r d e r of preference. Plain text is a l w a y s an implicitly a s s u m e d format. The
OCS s h o u l d choose the first format listed. If there are no c o m m o n compression protocols
s u p p o r t e d , the UA will r e t u r n plain text. The OCS declares the compression format that it chose in
the Content-Encoding header.
62
Chapter 7: HTTP Compression
Proxy-Connection: Keep-Alive
Compression supported
GET http://www.bluecoat.com/
HTTP/1.0 J
Accept: */*
Accept-Language: en-us
Host: www.google.com
Proxy-Connection: Keep-Alive
Slide 7 - 2 : C l i e n t - s i d e s u p p o r t
At the t o p of the slide y o u see the packet c a p t u r e from a UA that s u p p o r t s compression; more
specifically, it s u p p o r t s gzip a n d deflate compressed content.
At the b o t t o m of the slide y o u see the packet capture from UA that does s u p p o r t H T T P / 1 . 1 ;
therefore, it does not s u p p o r t compression. N o t e the lack of the Accept-Encoding header.
63
Blue Coat Educational Services — BCCPA Course v 1.7.1
HTTP/1.1^200 OK
Date: THu, 27 Jul 2006 22:58:49 GMT
Server: Apache/2.2.3 (Unix)
Content-Type: text/html
Content-length: 14230
Slide 7 - 3 : Server-side s u p p o r t
64
Chapter 7: HTTP Compression
Client-Side Compression
- Client does support compression
- Server does not support compression
This slide s h o w s a scenario in w h i c h the client s u p p o r t s compression; however, the OCS does not
serve c o m p r e s s e d content. You can configure the Blue Coat SG to:
This process is called client-side compression. In this scenario, y o u do not have any W A N
b a n d w i d t h benefit, but y o u h a v e L A N b a n d w i d t h benefits. Client side compression feature
d e t e r m i n e s is c o m p r e s s e d content can be served based on the UA HTTP request (presence or lack
of the Accept-Encoding header). If the UA requests protocols other than gzip a n d deflate, the SG
passes the request as-is to the OCS a n d does not perform any modification on the content
returned.
While this feature does not seem particularly interesting, y o u need a client-side compression
action in y o u r policy in order to enable server-side compression (discussed next in this chapter).
65
Blue Coat Educational Services — BCCPA Course v 1.7.1
Server-Side Compression
- Client does not support compression
- Server does support compression
Slide 7 - 5 : Server-side c o m p r e s s i o n
This slide s h o w s a scenario in w h i c h t h e client does not s u p p o r t compression; however, the OCS
d o e s h a v e the ability to deliver c o m p r e s s e d content. You can configure the Blue Coat SG to:
2. U n c o m p r e s s the content.
This process is called server-side compression. In this scenario, y o u do not have any L A N
b a n d w i d t h benefit, but y o u h a v e W A N b a n d w i d t h benefits. This is a likely scenario in y o u r
organization. Several UAs, for o n e reason or another, m a y not s u p p o r t H T T P / 1 . 1 , or, if they do,
they do not s u p p o r t c o m p r e s s i o n algorithms. By enabling a server-side compression policy, y o u
can save precious W A N b a n d w i d t h . In order to i m p l e m e n t server-side compression, y o u also need
a client-side compression policy.
66
Chapter 7: HTTP Compression
Object Variants
In p r e v i o u s versions of the SGOS, the H T T P proxy did not cache objects if the server sent
c o m p r e s s e d content. However, w i t h H T T P compression a n d v a r i a n t object s u p p o r t in n e w e r
versions of the SGOS (starting w i t h 4.1.1.1), objects are cached regardless of their encoding,
p r o v i d e d that all other conditions allow caching.
Variants are objects that are stored in the cache in various forms. The Blue Coat SG creates three
v a r i a n t types:
• uncompressed
g z i p compressed
• deflate c o m p r e s s e d
Be a w a r e that the presence of multiple variant objects in the cache m a y affect the object-carrying
capacity of the disk.
67
Blue Coat Educational Services — BCCPA Course v 1.7.1
Slide 7 - 7 : C o m p r e s s i o n a n d policies
You m a y w a n t to apply several policies to the content that a UA in y o u r organization receives. For
instance, y o u m a y w a n t r e m o v e active content (JavaScript, ActiveX®, Visual Basic® script, etc.)
from all sites except for s o m e on a special w h i t e list. If the p r o x y does not u n d e r s t a n d the
c o m p r e s s i o n protocol that is being applied to an HTTP response, it cannot d e t e r m i n e if active
c o n t e n t (or a n y other t y p e of content) is present in that response. You m a y have the best policies in
place b u t they will not a p p l y to the content.
T h e Blue Coat SG, starting w i t h SGOS 4.x, can automatically u n c o m p r e s s a response if there are
relevant policies that need to be a p p l i e d . If y o u do not h a v e a n y content-specific policy, then the
content is not u n c o m p r e s s e d ; it is s e r v e d as is, unless y o u h a v e other client-side compression
policies. If y o u h a v e content-specific policies, a n d the content is compressed, then the Blue Coat
SG can automatically — w i t h o u t the need for a n y special policy — do the following:
1. D e c o m p r e s s the OCS response.
2. A p p l y the content policy. (That is, r e m o v e JavaScript.)
3. C o m p r e s s the content a n d serve it.
68
Chapter 8: Authentication Introduction
• They a t t e m p t to access the Internet. (You can limit access t h r o u g h the Blue Coat SG to
a u t h o r i z e d users.)
The first t w o instances are controlled by the Blue Coat SG directly; you, as the administrator,
decide the authentication a n d security policies. The third authentication t y p e is i n d e p e n d e n t from
the Blue Coat SG; however, the p r o x y can h a n d l e the request a n d pass it to the user a n d back to the
origin content server (OCS) transparently.
There are a few steps that y o u can take in order to make access to the policy a n d configuration
m o r e secure. For instance, it is a g o o d idea to give selective read a n d write permission to modify
the policies on the Blue Coat SG, based on Active Directory® or LDAP g r o u p s .
69
Blue Coat Educational Services — BCCPA Course v 1.7.1
The Blue Coat SG h a n d l e s three t y p e s of security challenges. Two are controlled by the Blue Coat
SG itself, a n d one is d e t e r m i n e d by the security on the OCS.
• Blue Coat SG security refers to the ability to control or limit (read only, read a n d write) access
to the m a n a g e m e n t , configuration, a n d rules a d m i n i s t r a t i o n of the Blue Coat SG.
Remote resource authentication refers to the authentication challenges that a r e m o t e OCS can
issue to a u s e r agent (UA) before s e n d i n g the requested content. The Blue Coat SG does not
h a v e a n y control over this challenge; however, it can pass the challenge from the OCS to the
UA a n d the credentials from the UA to the OCS.
70
Chapter 8: Authentication Introduction
• Role-based security
- Use realm-based authentication
- Granular permission selection
You can control access to the Blue Coat SG in several w a y s . Of course, the most i m p o r t a n t security
aspect of any mission-critical server, like the Blue Coat SG, is physical security. You s h o u l d ensure
that only authorized p e r s o n n e l can physically reach the unit.
Once y o u have ensured that the Blue Coat SG is "safe" in the server room, y o u can i m p l e m e n t
m e a s u r e s to limit a d m i n i s t r a t i v e access only to a u t h o r i z e d users. You m a y w a n t to secure the front
panel w i t h a personal identification n u m b e r (PIN) to a v o i d accidental misconfiguration, w h i c h
can h a p p e n if s o m e o n e b u m p s against the unit. You can safely enable the following security
m e a s u r e s by taking these steps:
* Limit access to the M a n a g e m e n t Console and CLI only to a selected pool of IP addresses.
Important: If y o u decide to enable a p a s s w o r d for the serial console (not advisable), there is
no recovery option. If y o u lose the p a s s w o r d y o u need to RMA the unit!
71
Blue Coat Educational Services — BCCPA Course v 1.7.1
SSH W i t h
Security Measures Serial Password SSH W i t h RSA Management
Available Console Authentication Authentication Console
Slide 8 - 3 : Security m e a s u r e s
W h e n d e c i d i n g h o w to give other users read-only or read-write access to the Blue Coat SG,
s h a r i n g the basic console account settings is only o n e option. This page a n d the next s u m m a r i z e all
available options.
72
Chapter 8: Authentication Introduction
This is a less flexible o p t i o n t h a n Blue Coat Content Policy L a n g u a g e (CPL) because y o u cannot
control the level of access w i t h policy, but it is a better choice than sharing the console credentials.
Using the CLI or the M a n a g e m e n t Console GUI, create an authentication realm to be used for
a u t h o r i z i n g a d m i n i s t r a t i v e access. For administrative access, the realm m u s t s u p p o r t BASIC
credentials — for e x a m p l e , LDAP, RADIUS, Local, or N T L M w i t h BASIC credentials enabled.
Using the Visual Policy M a n a g e r (VPM), or by a d d i n g CPL rules to the Local or Central policy
file, specify policy rules that: (1) require a d m i n i s t r a t o r s to log in using credentials from the
previously created a d m i n i s t r a t i v e realm, a n d (2) specify the conditions u n d e r w h i c h
administrators are either d e n i e d all access, given read-only access, or given read-write access.
A u t h o r i z a t i o n can be based on IP address, g r o u p m e m b e r s h i p , time of day, a n d m a n y other
conditions.
• To prevent a n y o n e from u s i n g the console credentials to m a n a g e the Blue Coat SG, set the
console ACL to d e n y all access (unless y o u plan to use SSH with RSA authentication). You can
also restrict access to a single IP a d d r e s s that can be u s e d as the emergency recovery
workstation.
The chart s h o w n in Slide 8-3 details the various w a y s administrators can access the Blue Coat SG
console a n d the authentication a n d authorization m e t h o d s that a p p l y to each.
73
Blue Coat Educational Services — BCCPA Course v 1.7.1
Authentication
• Granular Reporting
• Manage Exceptions
Slide 8-4 details the main reasons w h y Blue Coat c u s t o m e r s enable authentication. M a n y
c o m p a n i e s base policy to allow or d e n y access to specific resources on the realm g r o u p s that they
h a v e set up (Active Directory, Novell, RADIUS, etc.)
W h e n the UA m a k e s its first request to the p r o x y the proxy returns an HTTP 407 response
message, asking the user to authenticate (407 Proxy Authentication Required). The browser
resends the s a m e request b u t this time it a d d s the authentication credentials. The information
(username a n d p a s s w o r d ) are, in general, passed in clear text u s i n g Base64 encoding. N T L M is the
m o s t notable exception (the message is still Base64-encoded); N T L M does not transmit the
p a s s w o r d over the n e t w o r k .
Most b r o w s e r s cache the authentication information as long as the browser main process is
running; unless y o u t e r m i n a t e the application y o u s h o u l d not be p r o m p t e d again for u s e r n a m e
and password.
75
Blue Coat Educational Services — BCCPA Course v 1.7.1
Slide 8 - 6 : Explicit p r o x y a u t h e n t i c a t i o n
1. From RFC 2 6 1 6 .
76
Chapter 8: Authentication Introduction
Authentication Options
Slide 8 - 7 : A u t h e n t i c a t i o n o p t i o n s
The Blue Coat SG allows y o u to control h o w users are authenticated. W h e n y o u create a rule in the
Web Authentication Layer, y o u can decide if the authentication s u p e r s e d e d a DENY statement or
not. You can also control w h e t h e r the user can enter double-byte language credentials.
Force Authenticate
Forces the u s e r to authenticate even t h o u g h the request is going to be d e n i e d for reasons that
do not d e p e n d on authentication. This action is useful to identify a user before the denial so
that the u s e r n a m e is logged along w i t h the denial.
• Authenticate
Creates an authentication object to verify users. An authentication realm m u s t exist on the
Blue Coat SG to be selected t h r o u g h VPM.
Authentication Charset
77
Blue Coat Educational Services — BCCPA Course v 1.7.1
T h e response c o d e 401 notifies t h e UA that the "request requires u s e r authentication. The response
M U S T i n c l u d e a www-Authenticate h e a d e r field [...] containing a challenge applicable to the
r e q u e s t e d resource. T h e client MAY r e p e a t the request w i t h a suitable Authorization h e a d e r field
[...]. If the request a l r e a d y i n c l u d e d A u t h o r i z a t i o n credentials, then t h e 401 response indicates that
a u t h o r i z a t i o n has been refused for those credentials. If the 401 response contains the s a m e
challenge as t h e prior response, a n d the UA has already a t t e m p t e d authentication at least once,
t h e n the user S H O U L D be p r e s e n t e d the entity t h a t w a s given in the response, since that entity
2
m i g h t include relevant diagnostic i n f o r m a t i o n . "
You need to be a w a r e of the key difference b e t w e e n the w a y s the UA. behaves w h e n it receives a
407 message a n d w h e n it receives a 401 m e s s a g e .
If y o u r UA receives a 407 after the initial request to the C N N Web site, it will automatically s e n d
the u s e r ' s credentials to the p r o x y w h e n r e q u e s t i n g the Ferrari Web site, w i t h o u t p r o m p t i n g the
u s e r again. If the UA receives a 401 after the initial request to the C N N Web site, it p r o m p t s the
u s e r for a u t h e n t i c a t i o n information ( u s e r n a m e a n d p a s s w o r d ) ; if the UA receives a 401 again
w h e n connecting to the Ferrari Web site, it will nor u s e the credential s u b m i t t e d by the user for the
C N N Web site. The UA p r o m p t s the user again, as it cannot a s s u m e that the 401 credential
requests are " p o r t a b l e " across different URIs.
2. From RFC 2 6 1 6 .
Chapter 9: Authentication Realms
A realm authenticates a n d authorizes users for access to Blue Coat® SG™ services u s i n g either
explicit proxy or t r a n s p a r e n t proxy m o d e . Multiple authentication realms can be u s e d on a single
Blue Coat SG. Multiple realms are essential if the enterprise is a m a n a g e d service p r o v i d e r or if the
c o m p a n y has m e r g e d w i t h or acquired a n o t h e r company. Even for companies u s i n g only one
protocol, multiple realms m i g h t be necessary. This w o u l d be the case for a c o m p a n y using an
L D A P server w i t h m u l t i p l e authentication b o u n d a r i e s . You can use realm s e q u e n c i n g to search
multiple realms at once.
• Realm n a m e
2. To p u r g e the credentials cache w h e n y o u m a k e policy changes, select Flush When Policy File
Changes. (This option is selected by default.)
o To flush only the entries for a particular realm in the credentials cache, select the realm
from the d r o p - d o w n list, click Flush realm a n d confirm.
79
Blue Coat Educational Services — BCCPA Course v 1.7.1
Authentication Realms
• IWA
- Windows NT Domains and Active Directory
• LDAP
- Active Directory and other LDAP Databases
• Sequence
- List of authentication realms to be processed
You s h o u l d ask y o u r instructor to cover the details of the realm that y o u use in y o u r network, if
y o u r realm is not a m o n g the ones discussed here.
Chapter 9: Authentication Realms
IWA Realm
• Basic Credentials
- Username and password are sent base64 encoded
- Least secure option
® NTLM Credentials
- Uses the Microsoft proprietary authentication
- Medium security option
• Kerberos Credentials
- Uses Microsoft implementation of M.l.T Kerberos v5
- Highly secure option
BASIC authentication
This m e t h o d is clearly described in the H T T P RFC, since the earliest version. Every User
A g e n t (UA) a n d every OCS on the Internet m u s t s u p p o r t at least basic credentials. The
u s e r n a m e a n d p a s s w o r d are e n c o d e d u s i n g Base64. Because Base64 is not encryption, the
u s e r n a m e a n d p a s s w o r d are available to a n y b o d y w h o can r u n a packet trace of the
c o m m u n i c a t i o n between the UA a n d the proxy. The credentials a p p e a r as
username: password in a Proxy-Authorization header. Every browser s h o u l d s u p p o r t basic
credentials.
• N T L M Authentication
81
Blue Coat Educational Services — BCCPA Course v 1.7.1
NTLM Authentication
• Widely used
- Prevalence of Windows OS on desktops
Slide 9 - 3 : NTLM a u t h e n t i c a t i o n
82
Chapter 9: Authentication Realms
NTLM Authentication
Slide 9 - 4 : NTLM a u t h e n t i c a t i o n
The client c o m p u t e s the DES encryption of the challenge using the p a s s w o r d as the key a n d t h e n
s e n d s it to the server. This reply is k n o w n a n d Type 3 message. If the Type 3 message matches the
calculation d o n e by the server, because of the properties of DES encryption, the server k n o w s that
the client has k n o w l e d g e of the correctly p a s s w o r d . If there is a mismatch, the authentication fails.
83
Blue Coat Educational Services — BCCPA Course v 1.7.1
BCAAA
2.API: A software package p r o v i d i n g a level of abstraction between the application and the k e r -
nel; it is d e s i g n e d to enable t h i r d - p a r t y software vendors to access a selected set of f u n c t i o n s .
84
Chapter 9: Authentication Realms
1. The client m a k e s a request to the Blue Coat SG. The Blue Coat SG replies w i t h a 407 HTTP
response c o d e (explicit authentication mode), w h i c h p r o m p t s the user agent (UA) to resend
the request, this time including the authentication credentials. Blue Coat SG closes the
connection. N o t e that the Blue Coat SG explicitly defines the authentication required as
NTLM.
2. The client r e s e n d s the original request. This time, the UA includes the Type 1 message,
e n c o d e d u s i n g Base64. This is a s t a n d a r d technique used in H T T P to pass binary data b e t w e e n
entities. T h e Type 1 message is sent from the Blue Coat SG to the BCAAA over port 16101 (you
can customize the port over w h i c h Blue Coat SG a n d BCAAA communicate.) The BCAAA
decodes the message from the Base64 to its original format and, using W i n d o w s API, passes
the Type 1 m e s s a g e to the d o m a i n controller for authentication.
4. The UA receives the Type 2 message, w h i c h contains the challenge, a n d calculates, using the
u s e r ' s p a s s w o r d , the Type 3 m e s s a g e for that challenge.
5. The client s e n d s the Type 3 m e s s a g e to the Blue Coat SG as a Base64-encoded string. The Blue
Coat SG passes the information to the BCAAA, w h i c h passes it to the d o m a i n controller for
the final validation. If the Type 3 m e s s a g e contains the correct encryption to the challenge, the
d o m a i n controller authenticates the u s e r a n d notifies the BCAAA, w h i c h passes the
information to the Blue Coat SG.
85
Blue Coat Educational Services — BCCPA Course v 1.7.1
6. After a successful authentication, the Blue Coat SG returns a 200 HTTP response code to the
client. At this point, the connection b e t w e e n the Blue Coat SG a n d the UA is a u t h e n t i c a t e d a n d
the u s e r starts receiving the r e q u e s t e d data.
Important: Slide 9-6 contains an intentional error. M a k e sure that y o u r instructor discusses
it. If he or she does not, ask w h e r e the error is on the slide. Can y o u find it?
86
Chapter 9: Authentication Realms
LDAP Realm
Slide 9 - 8 : LDAP a u t h e n t i c a t i o n
The Blue Coat SG s u p p o r t s the use of external LDAP database servers to authenticate a n d
a u t h o r i z e users on a p e r - g r o u p or per-attribute basis. L D A P g r o u p - b a s e d authentication for the
Blue Coat SG can be configured to s u p p o r t a n y LDAP-compliant directory including:
T h e Blue Coat SG also provides the ability to search for a single user in a single root of an LDAP
directory information tree (DIT), a n d to search in multiple Base Distinguished N a m e s (DNs).
Important: You can configure an LDAP realm to use SSL w h e n c o m m u n i c a t i n g to the LDAP
server.
87
Blue Coat Educational Services — BCCPA Course v 1.7.1
• C o u n t r y (C): You can create branches in y o u r L D A P tree to reflect the different countries
w h e r e y o u r c o m p a n y has representation.
88
Chapter 9: Authentication Realms
L D A P allows m o r e t h a n one object class to have the s a m e value. This can h a p p e n u n d e r one or
t w o conditions:
The full n a m e of an object, in this case a user, is identified by the full path from the object (leaf) to
the D o m a i n Context (root).
89
Blue Coat Educational Services — BCCPA Course v 1.7.1
Sequence Realm
• You can place LDAP, Local, or IWA realms in a s e q u e n c e realm. However, y o u can h a v e only
one IWA realm in a s e q u e n c e .
Sequencing begins w h e n a client m a k e s an authentication request to the Blue Coat SG. The Blue
Coat SG then challenges the client for authentication. T h e client s u b m i t s credentials, w h i c h the
Blue Coat SG t h e n checks against the different realms in the sequence.
Chapter 9: Authentication Realms
Sequence Authentication
Slide 9 - 1 2 : Sequence a u t h e n t i c a t i o n f l o w c h a r t
The basic principles of s e q u e n c e authentication are simple: The Blue Coat SG begins seeking
authentication from the first realm on its list a n d e n d s the process as soon as the credentials are
a u t h e n t i c a t e d . The flowchart in the slide above depicts the entire process.
1. The Blue Coat SG seeks to authenticate the u s e r ' s credentials w i t h Realm 1. If it finds a match,
the user is authenticated a n d the process e n d s .
2. If there is no match w i t h Realm 1, the Blue Coat SG seeks to authenticate the u s e r ' s credentials
w i t h Realm 2. If it finds a match, the user is authenticated a n d the process ends.
Note: Browsers count a cycle t h r o u g h all the realms in the sequence as a single attempt.
They do not c o u n t each q u e r y of individual realms as a single attempt.
4. If multiple attempts are allowed, the Blue Coat SG tries to authenticate the credentials again.
The process continues until the credentials are authenticated or the n u m b e r of attempts has
been exhausted a n d authentication is denied.
• M a k e certain that the realm exists before y o u a d d it to a sequence. You also cannot r e n a m e or
delete a realm as long as it is part of a sequence. If y o u m u s t r e n a m e or delete a realm, y o u
m u s t r e m o v e it from the s e q u e n c e first. You can then r e n a m e or delete it.
• If y o u h a v e an IWA realm in a sequence, it m u s t be either the first or last on the list. Make it the
first r e a m on the list if y o u w a n t to enable single sign-on.
91
Blue Coat Educational Services — BCCPA Course v 1.7.1
• You cannot nest sequence realms; that is, y o u cannot place a s e q u e n c e realm inside a n o t h e r
sequence realm.
Chapter 10: Policy Management
W h i l e there are m a n y p r o b l e m s associated w i t h using the Internet as a business tool, there are
several that generally cause the m o s t concern:
• Intellectual p r o p e r t y loss leading to decreased competitive a d v a n t a g e
• Malicious viruses
The Blue Coat® SG™ Policy Processing Engine provides a comprehensive policy architecture that
s p a n s all users, content types, applications, a n d security services. This framework allows a
security a d m i n i s t r a t o r to control Web protocols a n d Web c o m m u n i c a t i o n s across the entire
enterprise.
• Configurable b a n d w i d t h limits
A u t h e n t i c a t i o n - a w a r e proxy device, including user a n d g r o u p configurations
Flexible user-defined conditions a n d actions
93
Blue Coat Educational Services — BCCPA Course v 1.7.1
The V P M enables y o u to establish policy rules that identify w h o is allowed to access content a n d
h o w they will authenticate. A collection of rules that a p p l y to the s a m e m e c h a n i s m is identified as
a layer. For example, the set of rules that define a d m i n i s t r a t o r access is contained in the A d m i n
Access Layer.
To create an overall Web access policy, y o u s h o u l d create rules in the following V P M layers:
Web Authentication Layer. This layer identifies w h i c h source a n d destination requests will be
e v a l u a t e d a n d d e t e r m i n e s w h i c h authentication realm will be u s e d for credential validation. For
example, y o u can create a rule that states that the Engineering g r o u p m u s t authenticate, a n d
specify the authentication m e t h o d to be used. However, to create such a rule, y o u m u s t first define
the a p p r o p r i a t e authentication realms in the Blue Coat SG M a n a g e m e n t Console — V P M realm
objects are retrieved from the Blue Coat SG.
Web Access Layer. This layer specifies w h i c h source, destination, service a n d time requests will be
e v a l u a t e d a n d d e t e r m i n e s the a u t h o r i z e d action for the request. For example, y o u can define the
allowable content for all E n g i n e e r i n g g r o u p m e m b e r s , or create specific rules for i n d i v i d u a l users.
94
Chapter 10: Policy Management
Policy Translation
Simple Language
Who Where How When What
XYZ Employees BBC On web At any time May not visit
In this example, all e m p l o y e e s of XYZ C o m p a n y are prohibited from visiting the BBC World Web
site ( h t t p : / / w w w . b b c w o r l d . c o m ) at any time. W h e n the Blue Coat SG receives a request for the
BBC UK Web site, it evaluates the source first. Because the source is "any," it proceeds to evaluate
the destination. Because the destination does not m a t c h ( h t t p : / / w w w . b b c . c o . u k ) , the request is
allowed.
95
Blue Coat Educational Services — BCCPA Course v 1.7.1
Policy Translation
Simple Language
Who Where How When What
X Y Z Employees Travel On web At any time May not visit
In this example, all e m p l o y e e s of XYZ C o m p a n y are prohibited from visiting travel sites at any
t i m e . To block an entire category of Web sites (like travel sites), y o u m u s t d e p l o y s o m e t y p e of
content-filtering software, s u c h as Blue Coat WebFilter, Websense®, SmartFilter,® or
SurfControl®. Content filtering c o m p a n i e s m a i n t a i n d a t a b a s e s of Web site categories a n d
continually u p d a t e t h e m w i t h n e w sites.
96
Chapter 10: Policy Management
Policy Translation
Simple Language
Who Where How When What
Engineering Gaming On web M-F, 08-17 May not visit
97
Blue Coat Educational Services — BCCPA Course v 1.7.1
Layer
8-171
1 DENY |
W e b Access Policy
As Slide 10-5 illustrates, policy rules that a p p l y to the s a m e business rule can be g r o u p e d into a
layer. R e m e m b e r that rules are e v a l u a t e d from t o p to bottom; once a m a t c h i n g rule is found, all
s u b s e q u e n t rules are i g n o r e d .
Important: The m o s t effective rule is a l w a y s the first rule in the last layer.
In this example, the Web access policy goes from general to specific. All employees are prohibited
from accessing the BBC Web site a n d all travel-related Web sites. However, the Engineering g r o u p
has the a d d e d restriction of not being allowed to b r o w s e g a m i n g sites d u r i n g business h o u r s .
Users in other g r o u p s do not h a v e this restriction. N o t e that Blue Coat SG provides the flexibility
to create even m o r e specific rules, specifying actions for individual e m p l o y e e s or IP addresses.
98
Chapter 10: Policy Management
VPM Objects
• Trigger Objects
- Source
- Destination
- Service
- Time
Action Objects
- Action
- Track
The V P M evaluates rules based u p o n trigger a n d action objects. Trigger objects represent the
" w h o , w h e r e , how, a n d w h e n " of a rule, while Action objects represent the "what." For example, if
the Source field in a rule is set to ENG, a request from a n y user in that g r o u p triggers evaluation of
the Destination, Service, a n d Time fields.
If all triggers match, the V P M determines the action to a p p l y by evaluating the Action a n d Track
fields. The Action field n o r m a l l y allows or denies access or imposes a special condition (like
requiring authentication). The Track field logs the result of the rule (for example, logging the fact
that a user requested "illegal" content).
99
Blue Coat Educational Services — BCCPA Course v 1.7.1
Default Policy
Deny
- Default option for Blue Coat SG
- All network traffic received by the proxy is blocked
Allow
- Network traffic is allowed through the proxy
- Other policies can deny selected traffic
The default policy sets the p r o x y b e h a v i o r w h e n no other action is specified. The Blue Coat SG
default policy is Deny. A default policy of D e n y prohibits access to the Blue Coat SG: To allow
access, y o u m u s t create policies that explicitly grant access. A default policy of Allow permits any
a n d all access to the Blue Coat SG: To d e n y access, y o u m u s t create explicit d e n y policies.
100
Chapter 11: Content Filtering
Content filtering is a major functionality of the Blue Coat SG. There are t w o possible d e p l o y m e n t
options for content filtering:
The content filter d a t a b a s e is merely a list of sites, pages, a n d IP addresses organized by category.
D e p e n d i n g on the vendor, a URL can belong only to one category or can belong to several
categories. W h a t e v e r the case, the role of the d a t a b a s e is to offer additional information to the Blue
Coat SG (and to the administrator) about the request that is being m a d e by a user.
The content filter d a t a b a s e does not block a n y site or a n y category by default. It is up to the
administrator, t h r o u g h CPL or the Visual Policy M a n a g e r (VPM), to build a set of rules to allow or
d e n y access to specific resources based on information obtained by the content filer.
N o n e of the m a n y s u p p o r t e d v e n d o r databases is available w h e n y o u first configure the Blue Coat
SG. You need to obtain a valid key for one of the v e n d o r s , d o w n l o a d the database, a n d then install
it. You m a y obtain a d e m o license for almost a n y of the v e n d o r s s u p p o r t e d .
In SGOS v4.1.1.1 or higher, y o u can test the Blue Coat WebFilter a n d a n o t h e r v e n d o r at the s a m e
time.
101
Blue Coat Educational Services — BCCPA Course v 1.7.1
Slide 1 1 - 1 : Logical f l o w o f c o n t e n t f i l t e r i n g
The logical flow of a transaction via proxy, w h e n content filtering is enabled, is fairly simple:
1. The u s e r m a k e s a request.
2. The proxy extracts the URL from the request a n d s e n d s it to the content filter for
categorization.
3. The content filter r e t u r n s one or m o r e categories ( d e p e n d i n g on the vendor) for that URL.
4. The policy e n g i n e considers the u s e r ' s information, the t i m e of the day, the URL, a n d its
categorization, a n d based on the policies in place makes a decision to allow or d e n y the
request.
Categorization Techniques
Slide 1 1 - 2 : C a t e g o r i z a t i o n techniques
103
Blue Coat Educational Services — BCCPA Course v 1.7.1
• Hybrid Solution
- Onbox database for Blue Coat SG
- Optional Service Component to categorize unrated
URLs
• Data Quality
- 58 Categories
- Consistency
- Relevant URLs (feedback)
- Immediate coverage for new sites (DRTR)
BCWF also focuses on quality of results. It provides nearly 60 categories to allow a high degree of
control in w r i t i n g policy. It also is highly consistent in h o w it categorizes resources a n d gives top
priority to categorizing resources that are requested most frequently. T h e optional DRTR service
also p r o v i d e s i m m e d i a t e coverage for sites that h a v e not been previously categorized.
104
Chapter 11 : Content Filtering
1
Slide 11 - 4 : Blue Coat WebFilter d a t a s h e e t
105
Blue Coat Educational Services — BCCPA Course v 1.7.1
W h e n a u s e r requests a resource on the Internet, the Blue Coat SG first checks if that resource is
categorized in the BCWF d a t a b a s e l o a d e d locally. If the resource is not categorized in the m a i n list,
the Blue Coat SG s e n d s a request to the nearest DRTR server.
The Internet changes constantly; therefore, no rating service can ever categorize every Web page.
A static list is only a partial solution to the need for categorizing content.
W h e n u s e r s request a n e w URL that has not been rated in the BCWF ratings database, the BCWF
service uses its DRTR technology to retrieve the p a g e from its host server to be analyzed for its
content.
The DRTR service looks at a n u m b e r of elements, including the w o r d s on the page, the context of
each w o r d , a n d the formatting u s e d on the p a g e a n d r e s p o n d s in one of t w o w a y s . If DRTR can
d e t e r m i n e a rating for a n e w Web site in real time, it then rates a n d categorizes it. These sites are
then a d d e d to the BCWF ratings database.
If the DRTR service cannot d e t e r m i n e a rating for a n e w Web site in real time, it then categorizes
the site as "other" a n d m o v e s it to a third-stage rating process called D y n a m i c Background Rating
(DBR) for additional review. Once DBR has reviewed the site, it either assigns it to one of BCWF's
58 content categories or q u e u e s in a list for the h u m a n reviewers to rate it.
1. T h e u s e r ' s request is m a t c h e d against the BCWF installed on the local machine. There is a 95
percent success rate; 95 of every 100 URLs requested are found the local database (provided
that it is kept up to date). This l o o k u p requires less than 5 m s .
2. If the URL is not available in the current database, BCWF queries the external database. This
d a t a b a s e contains the most up-to-date list of Web sites; it is u p d a t e d every 15 m i n u t e s a n d
contains w h a t will become the n e w available list on the following day. This search can take up
to 0.3 s e c o n d s a n d returns s o m e a d d i t i o n a l sites.
3. W h e n the external database does not h a v e a categorization for the URL, it s e n d s a request to
the DRTR server. There are multiple locations a r o u n d the w o r l d that h a n d l e this process; all of
t h e m feature high-availability servers a n d high b a n d w i d t h . The DRTR server returns only a
response to the Blue Coat SG if the URL is categorized as Adult, Pornography, Gambling, or
o n e of a few other generally unacceptable categories. The DRTR can correctly categorize up to
95 percent of the requests it receives for these kinds of sites.
107
Blue Coat Educational Services — BCCPA Course v 1.7.1
The other sites are not categorized. This behavior reduces the overall n u m b e r of positive
matches for DRTR requests to 12 percent. So, for every 100 a d u l t URLs scanned by the DRTR,
as m a n y as 95 are correctly categorized; however, for every 100 generic requests received by
the DRTR only 12 return a positive m a t c h . This process can take up to five seconds.
4. The URLs that do not return a positive m a t c h after the DRTR l o o k u p are forwarded to the
D y n a m i c Background Rating (DBR) for additional review. This process is more intensive t h a n
the DRTR a n d can take up to 1 hour. T h e URLs that are categorized by the DBR are u p l o a d e d
to the Master Rating Database (MRD). F r o m the MRD they are sent in to the external d a t a b a s e
(the o n e queried at Step 2 of this process) a n d into the BUFF database, w h i c h is the d a t a b a s e
u s e d to create the d o w n l o a d list available daily to all of the BCWF subscribers.
5. The URLs that do not h a v e a m a t c h after being processed by the DBR are q u e u e d for h u m a n
review by a multilingual t e a m of content researchers. The r e v i e w e d URLs are then u p l o a d e d
into the external database (the o n e u s e d in Step 2) a n d in the BUFF. The h u m a n rating process
can take a d a y or more.
While this process m a y s e e m laborious on the surface, it represents the state-of-the-art a t t e m p t to
offer the most accurate, reliable, fast, a n d scalable a n s w e r to o r g a n i z a t i o n s ' need to protect
themselves from i n a p p r o p r i a t e Web surfing.
Chapter 1 1 : Content Filtering
Slide 1 1 - 7 : Dynamic c a t e g o r i z a t i o n m o d e s
1. Do not categorize dynamically. The l o a d e d database is consulted for category information. URLs
not in the database s h o w up as category none. This m o d e is distinct from disabling the service.
W h e n Do not categorize dynamically is set as the default, d y n a m i c categorization (in either real
time or b a c k g r o u n d mode) can be explicitly invoked by policy. W h e n the service is disabled,
no d y n a m i c categorization is d o n e , regardless of policy, a n d the Blue Coat SG does not m a k e
a n y contact w i t h the d y n a m i c categorization service.
2. Categorize dynamically in the background: Objects not categorized by the database are
d y n a m i c a l l y categorized as time permits. Proxy requests are not blocked while DRTR is
consulted. Objects not found in the database a p p e a r as category pending, indicating that
DRTR w a s requested, but the object w a s served before the DRTR response w a s available.
3. Categorize dynamically in real-time: T h e default. Objects not categorized by the database are
d y n a m i c a l l y categorized on first access. If this entails consulting the DRTR service, the proxy
request is blocked until DRTR r e s p o n d s . The a d v a n t a g e of real-time m o d e d y n a m i c
categorization is that Blue Coat policy has access to the results of d y n a m i c categorization,
w h i c h m e a n s that policy decisions are m a d e immediately u p o n receiving all available
information.
The g r a p h s in the slide above s h o w the sequence of events w h e n the Blue Coat SG processes a
transaction a n d DRTR is enabled.
e v a l u a t i o n is completed. The DRTR server returns the result at time t^ ; note that t >td p
o If y o u configure DRTR to categorize in real time, the Blue Coat SG holds the transaction
for a time t = ( t -t ) a n d will use the result from the DRTR in the final policy evaluation.
w d p
109
Blue Coat Educational Services — BCCPA Course v 1.7.1
o If y o u configure DRTR to r u n in the b a c k g r o u n d , the Blue Coat SG does not w a i t for the
r e s p o n s e from the DRTR server after t h e policy e n g i n e is r e a d y to m a k e a decision. T h e
DRTR response will be u s e d for s u b s e q u e n t connection requests to that resource.
You m a y experience a delay of up to 5 s e c o n d s if decide to u s e the DRTR in real time. This is the
m a x i m u m a m o u n t of time t h a t t h e Blue Coat SG waits for a response from the DRTR). In the rare
case w h e r e u s e r s experience DRTR-related response delays, y o u m a y w a n t to try configuring
DRTR to o p e r a t e in the b a c k g r o u n d before disabling it completely.
110
Chapter 1 1 : Content Filtering
Blue Coat has a w o r l d w i d e c u s t o m e r base. The Blue Coat SG can use a distributed n e t w o r k of
servers to enable customers to d o w n l o a d the BCWF database u p d a t e s reliably a n d efficiently a n d
to expedite DRTR transactions.
Currently, Blue Coat has DRTR a n d d o w n l o a d sites in the U.S., Europe, a n d Japan. Each location
features h i g h - b a n d w i d t h Internet access a n d a fully fault-tolerant a n d load-balanced security a n d
d o w n l o a d architecture.
The Blue Coat SG can discover, by contacting sp.cwfservice.net, the closest a n d most available
d o w n l o a d site for y o u .
111
Blue Coat Educational Services — BCCPA Course v 1.7.1
:
, Top iLWgBagM^*^" " « » » « » ^ : ^
Category v^Prob ability Thresholdj
P
Il5
english LÔ0ÏÏBÏÏ
Slovenian 0.00000 0.50000^1.00 / 0.98
Italian 0.00000 0.50000 1.00 / 1.00
clmese i 0.00000 0.50000 1 . 0 0 / 0 . 9 7
1
• •'" 'Top ' Categories
r
Categor> Probability : Threshold P/R
Sp orts/Reereation/Hobbies 1.00001 0.57908 0.80 / 0.60
News/Media o.ooooc 1.00000 0.83 / 0.73
Education 0.0000(1 0.98417 0.80 / 0.78
Miscellaneous 0.0000c|: NEVER 1 . 0 0 / 0 . 2 3
Probability
T h e n o r m a l i z e d probability calculated from each token (e.g., w o r d on the page) represents the
probability that the entire p a g e is in l a n g u a g e Y a n d it belongs to category X. In the e x a m p l e
s h o w n above, the p a g e is v e r y likely to be in English. T h e n o r m a l i z e d probability is 1.00, i.e., the
DRTR is convinced that it i n d e e d is English. Also, this is p a g e is very likely to belong to the
category S p o r t s / R e c r e a t i o n / H o b b i e s .
Threshold
T h r e s h o l d is the n o r m a l i z e d m i n i m u m probability v a l u e for a given category to reach the
d e s i g n a t e d precision a n d recall values.
Precision (Accuracy)
T h e precision d e t e r m i n e s h o w accurate DRTR is. For instance, out of 100 sites that DRTR m a r k e d
as Pornography, h o w m a n y are correctly categorized? If DRTR claims 100 pages to be category X
a n d 85 of t h e m actually are category X, then the precision is 0.85.
Recall (Coverage)
T h e recall defines the ability of DRTR to catch all of the sites in a certain category. If the DRTR has
processed 100 sites that are in the p o r n o g r a p h y category, h o w m a n y w e r e categorized correctly? A
recall v a l u e of 0.85 m e a n s t h a t o u t of 100 pages that actually are category X, DRTR categorizes 85
of t h e m correctly. The goal for a tool like DRTR is to find a s w e e t spot w h e r e the precision is h i g h
e n o u g h w i t h o u t c o m p r o m i s i n g the recall value. The recall a n d precision value m o v e in o p p o s i t e
directions; w h e n one gets better, the other one gets w o r s e . Blue Coat WebFilter aims at 85-90
p e r c e n t precision. Blue Coat has by far the fewest false positives in any published testing b e t w e e n
content filtering v e n d o r s .
112
Chapter 1 1 : Content Filtering
Additional Notes
DRTR does not return a categorization to the requesting Blue Coat SG unless the recall a n d
precision value are w i t h i n specific p a r a m e t e r s that Blue Coat defines. For instance if y o u process
the site h t t p : / / w w w . j a l . c o . j p t h r o u g h the DRTR, y o u will get the result of Unrated. In actuality,
the DRTR engine has correctly identified that the l a n g u a g e is Japanese a n d the category is Travel;
however, the recall value is too l o w for the DRTR to be confident e n o u g h to return the
categorization of Travel.
113
Blue Coat Educational Services — BCCPA Course v 1.7.1
Local Database
• Custom Categories
- Custom allowed list
- Customer denied list
- Internal URLs
Slide 1 1 - 1 0 : Local d a t a b a s e
You can create y o u r o w n local d a t a b a s e file a n d d o w n l o a d it to the Blue Coat SG. This file is
created in the s a m e w a y t h a t policy files are created, except that only define category s t a t e m e n t s
are allowed in the local d a t a b a s e . You m i g h t find it convenient to p u t y o u r local d a t a b a s e on the
s a m e server as a n y policy files y o u are using.
T w o m a i n reasons to use a local d a t a b a s e instead of a policy file for defining categories are:
A local d a t a b a s e is m o r e efficient t h a n policy if y o u h a v e a large n u m b e r of URLs.
• It allows the local d a t a b a s e to s h a r e categories across multiple boxes that h a v e different policy.
If y o u have extensive category definitions, Blue Coat r e c o m m e n d s that y o u put t h e m into a local
d a t a b a s e rather than into a policy file. The local d a t a b a s e stores c u s t o m categories in a m o r e
scalable a n d efficient m a n n e r , a n d separates the a d m i n i s t r a t i o n of categories from policy.
Chapter 11: Content Filtering
You can configure the Local D a t a b a s e to be u p d a t e d as frequently as once a day. Ordinarily, the
Blue Coat SG checks if the d a t a b a s e has changed before initiating a d o w n l o a d . If the database is up
to date, then no d o w n l o a d is necessary a n d n o n e is p e r f o r m e d . You can override this check a n d
force a d o w n l o a d by selecting Force Full Update; this o p t i o n is not n e e d e d u n d e r n o r m a l
circumstances.
The following is an e x a m p l e of a local database file.
define category mycompany_allowed
bluecoat.com
Symantec.com
kaspersky.com
sophos.com
microsoft.com
end
115
Blue Coat Educational Services — BCCPA Course v 1.7.1
116
Chapter 12: Managing Downloads
As users d o w n l o a d seemingly safe content such as music files, they can also u n k n o w i n g l y
d o w n l o a d h i d d e n viruses, Trojans, or m a l w a r e . W h e n y o u a d d the time a n d resources lost while
employees b r o w s e a n d d o w n l o a d content, y o u can see that corporations s i m p l y cannot afford to
overlook the problems p o s e d by u s e r d o w n l o a d s .
MIME types are not peculiar to HTTP. They w e r e originally d e v e l o p e d to deliver non-text e-mail
attachments but are n o w u s e d in m a n y other applications as well. The details of MIME types are
defined in RFC 2045 a n d RFC 2049. MIME types are very i m p o r t a n t because they can be used to
identify the content type, a n d block the d o w n l o a d , if necessary.
The process of transferring d a t a over HTTP is relatively simple:
1. The u s e r agent (UA) requests the specific file u s i n g o n e of the allowed m e t h o d s (most likely
GET).
2. The origin content server r e s p o n d s (if everything is correct in the request) a n d specifies:
D The t y p e of file being delivered (text, image, application)
The Blue Coat SG k n o w s the file that y o u are requesting, based on the URL presented, a n d reads
the information in the r e s p o n s e h e a d e r as well as in the response d a t a portion. As result, the Blue
Coat SG can d e t e r m i n e w h i c h t y p e of file y o u are a t t e m p t i n g to d o w n l o a d u s i n g a n y of the
following p a r a m e t e r s : file extension, declared MIME type, or file header.
117
Blue Coat Educational Services — BCCPA Course v 1.7.1
HTTP Threats
• Malicious software
- Spyware Malware
• Bandwidth
- Large downloads can clog the network
• Productivity
- Most downloads are not business relavant
A c o m p l e t e security policy s h o u l d include tight control of the file types that uses can d o w n l o a d
a n d the sources from w h i c h they can d o w n l o a d . The best a p p r o a c h is to block the following file
types: exécutables, ActiveX®, JavaScript®, a n d other scripts. You also s h o u l d create a white list of
a p p r o v e d sites; this list u s u a l l y includes d o w n l o a d sites for y o u r antivirus v e n d o r s , operating
s y s t e m v e n d o r s , a n d other suppliers of critical software u p d a t e s .
118
Chapter 12: Managing Downloads
HTTP Downloads
The bottom d i a g r a m s h o w s a UA asking for a file that most like is an image file. The OCS
r e s p o n d s a n d declares the attached file as an H T M L p a g e in text format. However, in this scenario,
the OCS has a p p l i e d gzip compression to the file a n d has declared it in the response header. The
presence of the content-encoding h e a d e r signals to the UA that the file received needs to be
d e c o m p r e s s e d u s i n g gzip. The OCS can a p p l y a different type of encoding, as long as the client has
declared, explicitly or implicitly, that it will accept that encoding.
119
Blue Coat Educational Services — BCCPA Course v 1.7.1
HTTP Downloads
The presence of this h e a d e r indicates that the message is MIME-formatted. The value is
typically "1.0", so this h e a d e r a p p e a r s as " M I M E - v e r s i o n : i . o . "
Content-Type
• Transfer-Encoding
120
Chapter 12: Managing Downloads
• File extensions
- avi, bmp, jpeg, etc.
• MIME types
- text/html, image/gif, etc.
e
Apparent Data Type
- Initial bytes in a file
Slide 1 2 - 4 : File t y p e d e t e c t i o n m e t h o d s
N o w that y o u k n o w the process b e h i n d Web d o w n l o a d s , let's talk about h o w to block them. The
Blue Coat SG p r o v i d e s a high-performance a n d flexible w a y to create a n d enforce user d o w n l o a d
policies. You can block by
• File extension types: For example, y o u can configure the Blue Coat SG to block users from
d o w n l o a d i n g . m p 3 files.
MIME types: For example, y o u can configure the Blue Coat SG to block all (or only some)
a u d i o or i m a g e files.
• Apparent Data Type: The A p p a r e n t Data Type refers to special data located at the beginning of a
file that is u s e d to indicate its type. The Blue Coat SG will scan these data files to d e t e r m i n e if
the special d a t a is present.
You can even create policies that specify w h e n a n d w h e r e d o w n l o a d s are blocked. For example,
y o u can block users from d o w n l o a d i n g video files from a n y n e w s sites d u r i n g w o r k hours.
121
Blue Coat Educational Services — BCCPA Course v 1.7.1
1 J :
- '•l'-- .'" ' •"• •" 'I . . . .
E H T T P / 1 . 1 200 O K \ r \ n
D a t e : T h u , 2 1 Sep 2006 0 5 : 5 2 : 1 2 G M T \ r \ n
server: Apache/1.3.31 (unix^Wi
L a s t - M o d i f i e d : T h u , 2 1 S e p 2006 0 5 : 4 9 : 3 5 GMT\r\n
ETag: "c3eOl-4299-451227ef"\r\n
Accept-Ranges: b y t e s \ r \ n
content-Length: 17049\r\n
Keep-Alive: timeout=15, max=100\r\n
conrigct i on: Keep-Al i y e \ r \ n
fc"ont~eTfE"-Type: text/pTai n \ r \ n 1
\r\n
id Line-based t e x t data: t e x t / p l a i n
[GIF819aAO0 3 \ 2 3 5 \ Q Q C p \ 0 0 0 \ 0 0 b ' i \ 0 0 0 \ 0 0 0 \ 0 0 0 \ 0 0 0 3 \ O C
\ 0 3 53\264\2 50\321\243H\223*']\312\264\2 51\323\247F
D\265W\2 6 7 p \ 2 0 6 \ 3 5 4 \ t \ 3 3 2 \ 1 7 7 \ 3 5 0 \ 2 3 5 ' ~ \ 2 0 1 \ 3 1 0 \ C
\224\037<\237
T H t \ 0 0 2 \ 3 01\2 61\034w\a\021\2 03\001\000\3 56\2 21g\3
\ 2 7 4 \ 3 2 1 \ 3 6 7 O \ 2 0 1 \ 2 1 3 \ 2 5 5\34 5 \ 2 4 1 \ 1 7 7 \ 3 2 1 \ 2 Q 5 e \ 3 3
It is possible, h o w e v e r not very likely, that files are hosted on a server w i t h the incorrect extension.
For example, it is possible that malicious Web sites host executable files b u t w i t h an extension that
m a k e s t h e m look like a n o t h e r file t y p e . Because, m o r e often than not, the OCS declares the MIME
t y p e of a file solely based on the file's extension, y o u can get a total m i s m a t c h between the actual
file a n d its M I M E type.
The slide s h o w s a GIF i m a g e that w a s r e n a m e d , from test. gif to test. txt, a n d hosted on an
A p a c h e Web server. W h e n the UA issues a G E T request for the t e s t . txt file, the OCS generates a
response in w h i c h the h e a d e r declares the MIME t y p e as t e x t / p l a i n (as it s h o u l d be for a .txt file).
If y o u take a close look to the packet capture, y o u can see h o w the d a t a part clearly contains a GIF
file. (GIF files u s u a l l y contain the v a l u e GIF89 as file header.) You can do the s a m e with an
executable file. If y o u r policies d e n y access to GIF files b a s e d solely on file extension or MIME
type, this particular file w o u l d be accepted because it does not m a t c h s u c h policies.
The a p p a r e n t d a t a type, discussed in detail later, allows y o u to control file d o w n l o a d s using the
information in the file rather t h a n the extension or the MIME type.
122
Chapter 13: Managing Instant Messaging
IM differs from e-mail in that messages are e x c h a n g e d in real time. To accomplish this, an IM
client p r o g r a m connects to an IM server. Most IM services offer a feature that indicates w h e t h e r
p e o p l e on a u s e r ' s list of contacts are currently online and available to chat.
The Blue Coat SG serves as an IM proxy. You can select allowed protocols, establish authentication
rules for u s i n g IM, allow or d e n y a t t a c h m e n t s by file type, allow or d e n y chat activity, block IM
access by u s e r or other criteria, a n d filter k e y w o r d s .
Several IM clients are capable of requesting that their c o m m u n i c a t i o n s be encrypted. This can lead
to a serious security p r o b l e m because the Blue Coat SG cannot d e t e r m i n e w h a t is being sent or
received to enforce its policy rules. T h e Blue Coat SG allows the administrator to block all
e n c r y p t e d traffic.
The Blue Coat SG s u p p o r t s instant m e s s a g i n g t h r o u g h the HTTP proxy. IM clients are configured
to connect to IM services t h r o u g h HTTP, w h i c h allows IM activity from b e h i n d restrictive
firewalls.
The application of policies a n d IM activity logging is accomplished by the H T T P proxy h a n d i n g
off IM c o m m u n i c a t i o n s to the IM proxy.
A O L a n d Yahoo clients lose certain features w h e n connected t h r o u g h H T T P proxy rather than
t h r o u g h SOCKS or t r a n s p a r e n t connections:
• AOL: Direct connections, file transfers, a n d files sharing are not available.
The Blue Coat SG s u p p o r t s explicit proxy authentication if explicit SOCKS V5 proxy is specified in
the IM client configuration.
Consider the following proxy authentication notes, which a p p l y to IM clients using HTTP proxy:
123
Blue Coat Educational Services — BCCPA Course v 1.7.1
124
Chapter 13: Managing Instant Messaging
Verbal h a r a s s m e n t
125
Blue Coat Educational Services — BCCPA Course v 1.7.1
Additionally, the Blue Coat SG has the ability to d e t e r m i n e if the traffic is coming from a client that
is directly connected to it or from an external source. This allows y o u to create a d v a n c e policy a n d
restrict c o m m u n i c a t i o n s only to u s e r s w i t h i n y o u r n e t w o r k .
The Blue Coat SG can m o n i t o r a n d record every transaction that occurs over IM. You can keep the
logs, r u n reports, a n d even replay a n y conversation b e t w e e n i n d i v i d u a l users or within chat
r o o m s . This feature is extremely i m p o r t a n t for regulatory compliance.
Within certain limitations, y o u can associate IM traffic w i t h the actual u s e r logged onto the
m a c h i n e that sent a message. The t y p e of authentication that can be u s e d (SOCKS version 5, H T T P
407, etc.) d e p e n d s on the client v e n d o r a n d the client version.
126
Chapter 13: Managing Instant Messaging
Protocol Handoff
The Blue Coat SG can receive traffic on any TCP port. As long as there is a service r u n n i n g a n d
listening for connections on that TCP port, the traffic is intercepted a n d processed u s i n g the
policies that y o u created. Each port, or port range, is associated w i t h a protocol; the Blue Coat SG
expects to receive that type of traffic on that port or port range. For instance, y o u can associate
HTTP w i t h T C P port 80.
W h e n y o u associate a port w i t h a specific protocol (with the exception on TCP-Tunnel) the Blue
Coat SG expects the traffic on those ports to contain the actual protocol specified. For example, if
y o u assign p o r t 80 to HTTP, the Blue Coat SG expects to receive HTTP traffic on that port. If y o u
send a n y t h i n g that is not HTTP, the connection will time out after few seconds. However, if y o u
encapsulate IM over H T T P a n d connect to the Blue Coat SG, the IM protocol is recognized a n d
policy applied.
The Blue Coat SG can detect IM traffic e n c a p s u l a t e d over HTTP, proxied over SOCKS ports, a n d
native-protocoled over TCP-Tunnel ports a n d IM-specific ports.
127
Blue Coat Educational Services — BCCPA Course v 1.7.1
Slide 1 3 - 4 : IM reflection
IM reflection involving clients in different buildings a n d even on different sites is still possible by
u s i n g SOCKS a n d H T T P forwarding, policy, a n d a Blue Coat SG hierarchy.
129
Blue Coat Educational Services — BCCPA Course v 1.7.1
• IM clients on the left side of the slide are logged into the s a m e Blue Coat SG, while the one on
the right is o u t s i d e the n e t w o r k .
• IM activity b e t w e e n the clients on the left is reflected by the Blue Coat SG.
This slide a n d the next illustrate the choice of actions w h e n reflection is not possible. The Blue
Coat SG a d m i n i s t r a t o r m u s t d e c i d e to allow or d e n y IM traffic.
130
Chapter 13: Managing Instant Messaging
An a d m i n i s t r a t o r can a d d a policy rule to deny IM service to clients nor logged into the Blue Coat
SG. The clients w i t h i n the area of reflection are allowed to c o m m u n i c a t e to the IM server for the
initial connection; the authentication a n d authorization is still m a n a g e d by the actual IM server.
After the initial logon, the clients within the reflection area can s e n d a n d receive messages only to
a n d from other clients in the s a m e zone.
If a client in the reflection area a t t e m p t s to connect to an outside user:
• It receives a m e s s a g e from the Blue Coat SG notifying it that the message w a s blocked.
• The internal client receives a message from the Blue Coat SG notifying it that the message w a s
blocked.
IM reflection w i t h fail closed keeps users in a n e t w o r k from s p e n d i n g w o r k time chatting w i t h
friends a n d family m e m b e r s a n d prevents t h e m from c o m m u n i c a t i n g sensitive or proprietary
c o m p a n y information to outsiders. Fail-closed reflection completely isolates the internal users
from the outside w o r l d . While this m a y s e e m harsh, it allows y o u to secure y o u r n e t w o r k against
loss of confidential information a n d w a s t e d productivity.
• Fail o p e n for certain allowed users a n d contact n a m e s for a n y t h i n g except for file transfer.
Important: Clients in the reflection area a p p e a r online a n d active to the external clients;
h o w e v e r m they cannot send or receive messages to a n d from the outside world.
131
Blue Coat Educational Services — BCCPA Course v 1.7.1
132
Chapter 14: Managing Peer-to-Peer Traffic
Peers participating in the Gnutella n e t w o r k (the third largest peer-to-peer network) connect to
a b o u t five other n o d e s . T h e initial n o d e s can be h a r d - c o d e d in the d o w n l o a d e d client software or
can be found u s i n g G w e b c a c h e (the Gnutella version of DNS) a n d even IRC. Once a list of nodes is
available to a peer, the host can search for material. Queries are sent to k n o w n hosts; if one of the
hosts has the requested content, it s e n d s it; otherwise, it forwards the request to its o w n list of
k n o w n hosts. Content can be retrieved from m o r e than o n e host at the time; this feature reduces
total d o w n l o a d time a n d b a n d w i d t h c o n s u m p t i o n for the hosts that offer content.
Very few, if any, p u r e peer-to-peer n e t w o r k s are used for file sharing today. Gnutella started using
a total peer-to-peer m o d e l ; however, for scalability reasons, it n o w uses a m i x e d - m o d e system.
133
Blue Coat Educational Services — BCCPA Course v 1.7.1
Figure 14-1: Pure peer-to-peer vs. a mixed-mode network with special peers
Legal issues
F r o m a legal s t a n d p o i n t , peer-to-peer n e t w o r k s are not illegal per se, unless advertised a n d used
solely (or primarily) to violate c o p y r i g h t laws (or any other law for that matter). In the United
States, the S u p r e m e C o u r t has issued t w o rulings that are relevant to the peer-to-peer n e t w o r k s :
In the m o s t recent ruling, the court stated that "We hold that one w h o distributes a device w i t h the
object of p r o m o t i n g its u s e to infringe copyright, as s h o w n by the clear expression or other
affirmative steps taken to foster infringement, is liable for the resulting acts of infringement by
t h i r d parties."
134
Chapter 14: Managing Peer-to-Peer Traffic
135
Blue Coat Educational Services — BCCPA Course v 1.7.1
• P2P protocol: t h e u n d e r l y i n g t e c h n o l o g y t h a t p o w e r s a n e t w o r k
136
Chapter 14: Managing Peer-to-Peer Traffic
Peer-to-Peer Detection
Slide 1 4 - 2 : P e e r - t o - p e e r detection
Most a d v a n c e d users, a n d s o m e t i m e s even the client software, try to tunnel traffic over
w e l l - k n o w n o p e n ports on firewalls a n d s h a p e traffic to look like HTTP. Some users m a y even try
to t u n n e l the traffic over SOCKS. The Blue Coat SG can detect P2P traffic t u n n e l e d over H T T P or
SOCKS by enabling the Detect Protocol setting for each c o r r e s p o n d i n g service.
P2P applications often use a r a n d o m TCP port to c o m m u n i c a t e . The default proxy service (which
listens on all p o r t s not assigned to other services) can be enabled to detect P2P traffic on any TCP
port. The benefit of the default proxy service is that there is no need to create a service a n d
explicitly define a TCP port, a l t h o u g h this also is an option.
137
Blue Coat Educational Services — BCCPA Course v 1.7.1
Slide 1 4 - 3 : D e p l o y m e n t o p t i o n s f o r P2P d e t e c t i o n
For instance, a s s u m e that a P2P application uses port 6134. You h a v e a Blue Coat SG d e p l o y e d in
b r i d g i n g m o d e . The firewall allows all o u t b o u n d traffic. If y o u h a v e not created a service to listen
on port 6134 a n d the default p r o x y service is not listening, then the Blue Coat SG cannot identify
the P2P activity.
On the other h a n d , if the firewall allows all o u t b o u n d traffic a n d the Blue Coat SG default proxy
service is listening, the P2P activity will be detected.
Note: You can e x t e n d the concepts discussed here for the b r i d g i n g m o d e d e p l o y m e n t to all
of the other d e p l o y m e n t s : explicit proxy, Layer 4 switch, WCCP, etc.
138
Chapter 14: Managing Peer-to-Peer Traffic
Sample Deployment
F i r e w a l l a l l o w s all o u t b o u n d t r a f f i c
Firewall allows o u t b o u n d traffic only for the ports controlled by Blue Coat SG
Slide 1 4 - 4 : D e p l o y m e n t o p t i o n s f o r P2P d e t e c t i o n
Both configurations g u a r a n t e e that all o u t b o u n d traffic is inspected by the Blue Coat SG. They also
g u a r a n t e e that p r o p e r policies are applied to the traffic; in particular, P2P traffic can be monitored
a n d blocked.
139
Blue Coat Educational Services — BCCPA Course v 1.7.1
The 1984 U.S. S u p r e m e C o u r t ruling ( k n o w n as the Betamax case) established that a technology,
w h i c h can be u s e d to infringe on copyright, is legal, as long as the p r i m a r y scope a n d use of such a
technology are not illegal. For instance, while a VCR can be u s e d to illegally duplicate movies, the
p r i m a r y objective of its m a n u f a c t u r e — a n d that of most users — is to w a t c h movies a n d record
TV p r o g r a m s , both of w h i c h are legal.
Based on the 1984 ruling, M G M h a d to prove, as it successfully did, that the o w n e r a n d operators
of the P2P n e t w o r k targeted, designed, a n d advertised the n e t w o r k w i t h the p r i m a r y intention of
illegally distributing c o p y r i g h t e d material.
The court ruling a n d other relevant legislation in the U.S. m a y be e x t e n d e d to the users of a P2P
n e t w o r k . The mere possession of illegally o b t a i n e d copyrighted material is a crime in the U.S.
Violators can be fined up to $250,000 a n d be s e n t e n c e d to five years in prison.
140
Chapter 15: Notify User Policy
The Blue Coat® SG™ can do m o r e than let y o u control users' Internet activities. It also allows y o u
to explain y o u r o r g a n i z a t i o n ' s Internet usage policies clearly a n d at the most effective time —
w h e n users try to access questionable or forbidden pages.
The rest of this c h a p t e r introduces the different kinds of notification pages a n d briefly explains
h o w they are created.
141
Blue Coat Educational Services — BCCPA Course v 1.7.1
Notification Types
• Exception page
- Dead end
* Splash page
- Show once
8
Coaching page
- Option to continue
142
Chapter 15: Notify User Policy
Exception Page
• Built-in
- Notify user that access has been denied
- Notify user of network or appliance errors
- Can be customized (better create user-defined ones)
• User-defined
- User-defined to send more specific message
- Can include any HTML or JavaScript code
- Can link external resources (images)
The Blue Coat SG allows y o u to return t w o different kinds of exception pages: built-in a n d
user-defined pages. Both can tell users that access to a certain site or category of sites — s u c h as
adult, g a m b l i n g , or music d o w n l o a d i n g — is blocked.
143
Blue Coat Educational Services — BCCPA Course v 1.7.1
Splash Page
Splash p a g e s generally a p p e a r at a specific time. For instance, a splash p a g e reminds users that an
A U P could a p p e a r each time they l a u n c h their browsers.
W h e n s p l a s h pages appear, users are not p r e v e n t e d from accessing a n y Web sites or other
resources. If the p a g e a p p e a r s w h e n u s e r s t y p e in a URL, they can access the site they r e q u e s t e d by
clicking the reload b u t t o n on their b r o w s e r s . If the splash p a g e a p p e a r s w h e n the b r o w s e r o p e n s ,
u s e r s can access the site they w a n t by t y p i n g in the URL or selecting a b o o k m a r k as usual.
144
Chapter 15: Notify User Policy
Coaching Page
W h e n users see a coaching page, they are informed that their organization's policy prohibits t h e m
from v i e w i n g certain content. However, the coaching p a g e also offers a link to the resource a l o n g
w i t h a w a r n i n g that users' activity will be m o n i t o r e d a n d reported.
You m a y find it useful to use both exception a n d coaching pages. For instance, y o u m a y w a n t to
block users from a d u l t sites a n d return exception pages w h e n they try to access them. You m a y
w a n t to d i s c o u r a g e traffic to travel or Web e-mail sites a n d return coaching pages w h e n users
a t t e m p t to v i e w them.
145
Blue Coat Educational Services — BCCPA Course v 1.7.1
146
Chapter 16: Access Logging
Access logging allows y o u to track traffic for the entire n e t w o r k or specific information on u s e r or
d e p a r t m e n t u s a g e patterns. Each time a u s e r requests a resource, the proxy saves information
a b o u t that request to a file for later analysis.The information t h u s stored is called a log. In a d d i t i o n
to Web policy m a n a g e m e n t , content filtering, a n d Web content virus scanning, companies can
i m p l e m e n t m o n i t o r i n g schemes t h r o u g h the access logging feature. Access logging gives
c o m p a n i e s the ability to audit all traffic for both external a n d internal content requests.
Blue Coat SG can create access logs for the traffic that flows t h r o u g h the system. Each protocol on
the Blue Coat SG can create an access log at the e n d of the transaction for that protocol.For
example, the Blue Coat SG can create access logs for each H T T P request from the client.
The access logs can be directed to one or more log facilities, w h i c h associates the logs with their
configured log formats a n d u p l o a d schedules. Most Web servers s u p p o r t the C o m m o n Logfile
Format (CLF) a n d the Extended Log File Format (ELFF). ELFF is the default log file format on Blue
Coat SG.
Data stored in log facilities can be automatically u p l o a d e d to a r e m o t e location for analysis a n d
archival p u r p o s e s . T h e u p l o a d s can take place using HTTP, FTP or one of several vendor specific
protocols.Once u p l o a d e d , reporting tools such as Blue Coat Reporter can be used to analyze log
files.These logs a n d reports g e n e r a t e d from t h e m can be m a d e available in real-time or on a
s c h e d u l e d basis.
147
Blue Coat Educational Services — BCCPA Course v 1.7.1
Access Logging
Slide 1 6 - 1 : Access l o g g i n g
Access logging helps y o u to track Web u s a g e for the entire n e t w o r k or specific information on u s e r
or for d e p a r t m e n t u s a g e p a t t e r n s . Blue Coat SG s u p p o r t s access logging to help y o u m o n i t o r Web
u s a g e . M o n i t o r i n g allows y o u to detect a n d r e m e d y failures a n d w h e n d o n e pro actively, to
anticipate a n d resolve potential p r o b l e m s before they result in p o o r performance or failure.
Blue Coat SG creates access logs for all traffic flowing t h r o u g h the system. Each n e t w o r k protocol
can create an access log record at t h e e n d of each transaction. T h e access logs, each containing a
single logical file a n d s u p p o r t i n g log format, are m a n a g e d by policies, created t h r o u g h the V P M or
CPL.
Access logs t h u s g e n e r a t e d can be u p l o a d e d to a remote server a n d then be analyzed u s i n g Blue
Coat Reporter for generating reports.
148
Chapter 16: Access Logging
Access Logging
6. An access log for this entire transaction is created after the client receives the response from
the Blue Coat SG.
Note: If the connection is d e n i e d , or the content is served from the cache, Steps 2 a n d 3 are
completed by the proxy.
149
Blue Coat Educational Services — BCCPA Course v 1.7.1
• HTTP S SOCKS
• ICP ^ Telnet
Blue Coat SG creates access logs for all traffic flowing t h r o u g h the system. In fact, each protocol
can create an access log at the e n d of each transaction for that protocol. For example, an access log
can be created for each H T T P r e q u e s t t h r o u g h the system.
150
Chapter 16: Access Logging
s Peer-to-Peer y
p2p
You can associate a log w i t h a protocol at a n y point of time. But, if you have a policy that defines
protocol a n d log association, that policy will override a n y settings that y o u m a k e . Multiple access
log facilities are s u p p o r t e d in Blue Coat SG, a l t h o u g h each access log s u p p o r t s a single log format.
You can log a single transaction to multiple log facilities t h r o u g h a global configuration setting for
the protocol that can be modified on a per-transaction basis t h r o u g h policy.
151
Blue Coat Educational Services — BCCPA Course v 1.7.1
Log Facility
A log facility is a s e p a r a t e log that contains a single logical file that s u p p o r t s a single log
format.The facility contains the file's configuration a n d u p l o a d schedule information.a s well as
o t h e r configurable information, s u c h as h o w often to rotate the logs at the destination, a n d the
p o i n t at w h i c h the facility can be u p l o a d e d etc.
Log rotation helps prevent logs from g r o w i n g excessively large. Especially w i t h a b u s y site, logs
can g r o w quickly a n d b e c o m e too big for easy analysis. With log rotation, the Blue Coat SG
periodically creates a n e w log file, a n d archives the older one w i t h o u t d i s t u r b i n g the current
logfile.
152
Chapter 16: Access Logging
Every access log created, uses a specific log format for logging the transaction.The log format is
specified u s i n g a set of format strings. The log format is highly configurable.
Extended Log File Format(ELFF), defined by W3C, a n d general e n o u g h to be used for any
protocol
• SmartReporter
Blue Coat SG can create access logs w i t h a n y one of the above available log formats. You can create
additional log formats using ELFF or custom format strings. The ELFF format strings are extended
version of the C o m m o n log format a n d allow y o u to h a v e more control over the data recorded.
153
Blue Coat Educational Services — BCCPA Course v 1.7.1
Upload Logs
Blue Coat SG has the capabilities to u p l o a d the access logs to a remote server u s i n g different types
of u p l o a d clients. D u r i n g the u p l o a d i n g process, the access logs can be digitally signed a n d
e n c r y p t e d for security. You can digitally sign access logs to certify that a particular Blue Coat SG
w r o t e a n d u p l o a d e d this log file. Signing is s u p p o r t e d for b o t h content t y p e s — text a n d g z i p — a n d
for both u p l o a d t y p e s — c o n t i n u o u s a n d periodic. Each log file has a s i g n a t u r e file associated w i t h
it that contains the certificate a n d the digital signature for verifying the log file. The signature file
has the s a m e n a m e as the access log file but w i t h a .sig extension; that is, filename, log. s i g , if the
access log is a text file, or filename, log. g z i p . s i g , if the access log is a gzip file. If y o u use Blue
Coat Reporter for a n a l y z i n g the access logs, y o u need to decrypt the access logs before loading
t h e m into the database.
You can digitally sign y o u r access log files w i t h or w i t h o u t encryption. If the log is both signed
a n d encrypted, the signing operation is d o n e first, m e a n i n g that the signature is calculated on the
u n e n c r y p t e d version of the file. You m u s t d e c r y p t the log file before verifying the file. A t t e m p t i n g
to verify an e n c r y p t e d file fails.
• HTTP client
• C u s t o m client
• Websense client
154
Chapter 16: Access Logging
Continuous Upload
Slide 1 6 - 8 : C o n t i n u o u s Upload
If the remote server is unavailable to receive c o n t i n u o u s upload log entries, the Blue Coat SG saves
the log information on the Blue Coat SG disk. W h e n the remote server is available again, the
appliance r e s u m e s c o n t i n u o u s u p l o a d i n g . W h e n y o u configure a log for continuous uploading, it
continues to u p l o a d until y o u stop it. To s t o p c o n t i n u o u s u p l o a d i n g , switch to periodic u p l o a d i n g
temporarily. This is s o m e t i m e s required for g z i p or encrypted files, w h i c h m u s t stop u p l o a d i n g
before y o u can v i e w t h e m .
C o n t i n u o s u p l o a d i n g allows y o u to:
• Send log information to a log analysis tool for real-time processing a n d reporting
155
Blue Coat Educational Services — BCCPA Course v 1.7.1
Periodic Upload
With periodic u p l o a d i n g , the Blue Coat SG transmits log entries on a s c h e d u l e d basis, say once a
d a y or at specific time intervals. The log entries are all are batched, s a v e d to disk a n d t h e n
u p l o a d e d to a remote server at a particular time.
156
Chapter 16: Access Logging
Blue Coat SG allows y o u to u p l o a d either compressed access logs or plain text access logs to the
remote server. Blue Coat SG uses GZIP format to u p l o a d compressed access logs. GZIP
c o m p r e s s e d files allow more log entries to be stored in the Blue Coat SG. C o m p r e s s e d log files
h a v e the extension . log. g z . C o m p r e s s e d access logs can be best u p l o a d e d d u r i n g a periodic or
schedule u p l o a d .
Plain text access logs h a v e the extension .log. Text log files are best suited for continuous u p l o a d
to a remote server. If y o u w o u l d like to analyze the log data in real time, c o n t i n u o u s u p l o a d u s i n g
text format is advised.
157
Blue Coat Educational Services — BCCPA Course v 1.7.1
158
Chapter 17: Introduction to Reporter
Blue Coat SG access logs help y o u m o n i t o r activity on a network. However, extracting information
from e n o r m o u s log files can be a t e d i o u s a n d time-consuming task. Blue Coat's Reporter p r o v i d e s
a solution: The a d v a n c e d application m a k e s it easy to analyze log files from one or more Blue Coat
SG appliances, enabling organizations to m a n a g e n e t w o r k resources more effectively.
• A w a r e n e s s of s p y w a r e a n d m a l w a r e m a s k e d by Web content
Reporter p r o v i d e s these benefits by w o r k i n g seamlessly w i t h the Blue Coat SG. The Blue Coat SG
records d a t a a b o u t every transaction that passes t h r o u g h it, creating c o m p r e h e n s i v e logs. Reporter
then allows organizations to create pre-defined or custom reports t h r o u g h an easy-to-use Web
interface or t h r o u g h a c o m m a n d line.
An organization can use these reports to:
• Track user activity that could bring viruses, s p y w a r e , a n d other h a z a r d o u s content into the
network
• C o n s e r v e n e t w o r k resources by identifying abuse patterns
This chapter introduces Reporter, h o w it w o r k s , a n d the benefits it offers. It also discusses the
different versions available.
159
Blue Coat Educational Services — BCCPA Course v 1.7.1
Reporter Deployment
R e p o r t e r is a self-contained application that analyzes Blue Coat SG access logs from one or
m u l t i p l e appliances. It includes a p r o p r i e t a r y Web server, a q u e r y engine, an internal database, a
log reader a n d a log parser.
Note: Be a w a r e that Reporter natively s u p p o r t s only a direct link to the Blue Coat SG. You
m u s t install HTTP or FTP server software in order to take a d v a n t a g e of these u p l o a d
options.
160
Chapter 17: Introduction to Reporter
Reporter Functions
8
Exporting reports
- In HTML by scheduled e-mails
- In Excel-compatible format
• N e t w o r k traffic • S p y w a r e a n d viruses
For example, y o u can generate pre-defined reports giving a s n a p s h o t of Web traffic at a particular
time, identifying the most active users on a network, displaying user activity by risk g r o u p
category, or s h o w i n g which viruses the n e t w o r k has been exposed to.
You also can create c u s t o m reports t h r o u g h a variety of m e t h o d s that will be discussed later in this
chapter.
• Expire d a t a from a database once the d a t a reaches a certain age, such as 30 days.
In addition, y o u can generate reports in real time, p r o v i d e d that y o u establish a direct link to the
Blue Coat SG a n d configure the a p p l i a n c e to u p l o a d log data continuously. This feature t u r n s the
application's Web interface into an u p - t o - t h e - m i n u t e w i n d o w on n e t w o r k activity.
161
Blue Coat Educational Services — BCCPA Course v 1.7.1
162
Chapter 17: Introduction to Reporter
Profiles
Slide 17-3 s h o w s the relationship b e t w e e n a profile, access log, database, and users. The Blue Coat
SG u p l o a d s the log files to the Reporter server. The Reporter administrator creates a profile. W h e n
a u s e r requests a report, Reporter builds a database for that profile a n d creates a report derived
from the d a t a in the database. Reporter displays the report in the form of an H T M L page.
163
Blue Coat Educational Services — BCCPA Course v 1.7.1
Profile Selection
• v7 profiles
- Work with all Blue Coat SG ELFF and Squid formats
and with Blue Coat SG main log files
- Support fewer pre-defined reports - but allow
greater customization
V8 Profiles
Work w i t h Blue Coat SG m a i n format log files
• S u p p o r t direct links to Blue Coat SGs, allowing the creation of reports in real time
V7 Profiles
• Work w i t h all Blue Coat SG ELFF formats — including peer-to-peer, instant messaging, a n d
s t r e a m i n g — a n d w i t h Squid log formats. Also w o r k w i t h m a i n log files if y o u prefer v7 profile
reports or need to a p p l y log filters or a d v a n c e d report filters.
S u p p o r t profiles created in Reporter 7.x (All Reporter 7.1.3 functions available via v7 profiles)
• Do not s u p p o r t direct links to Blue Coat SGs, so do not allow creation of reports in real time
164
Chapter 17: Introduction to Reporter
Enhanced Performance
For large data sets, the time required to expire data from a database has been r e d u c e d from h o u r s
to seconds.
The resulting d a t a b a s e entry inherits all its fields from the p a g e view entry, a n d the counter fields
are a c c u m u l a t e d across all related entries. Also g e n e r a t e d are hits, the total n u m b e r of original log
entries that are i n c l u d e d in this database record.
• Resulting d a t a b a s e records more closely represent user b r o w s i n g activity because each object
is not c o u n t e d as a separate entry.
165
Blue Coat Educational Services — BCCPA Course v 1.7.1
Standard Enterprise
Multiple processor
Scalability Single processor support
Extensive ability
Customizing to create, customize,
Reports Limited ability and edit
T h e list below outlines the differences b e t w e e n the Enterprise a n d S t a n d a r d versions of Blue Coat
Reporter:
• Profiles: With the Enterprise version of Reporter, y o u can create as m a n y profiles as y o u want;
w i t h the S t a n d a r d version, y o u are limited to five profiles.
Multiple Processors: The Enterprise version s u p p o r t s multiple processors; the S t a n d a r d
version s u p p o r t s only one processor.
• R e p o r t / R e p o r t M e n u Editor: The Enterprise version allows y o u to edit the report elements
a n d the report m e n u ; the S t a n d a r d version does not.
Reporter software can be d o w n l o a d e d from the Blue Coat Web site a n d operates by default in
S t a n d a r d m o d e . If y o u evaluate or b u y Enterprise functionality, y o u receive a license key to
activate the Enterprise m o d e . No other licenses are required, except for the Blue Coat SG.
166
Chapter 17: Introduction to Reporter
Because Reporter processes very large access log files, it s h o u l d always be installed on h a r d w a r e
dedicated to its sole use. Reporter can r u n on any c o m p u t e r r u n n i n g W i n d o w s ® XP Pro, 2003
Server for W i n d o w s , or Red Hat® Enterprise Linux (ES or AS) — p r o v i d e d that the c o m p u t e r has
e n o u g h processing power, m e m o r y a n d storage.
If y o u plan to install Reporter, y o u s h o u l d consult the Configuration and Sizing Guide on the Blue
Coat Web site ( h t t p : / / w w w . b l u e c o a t . c o m / p r o d u c t s / r e p o r t e r / R e p o r t e r S i z i n g G u i d e . p d f ) . The
g u i d e r e c o m m e n d s m i n i m u m h a r d w a r e specifications based on the n u m b e r of users being
proxied a n d the v o l u m e of logs to be stored in the Reporter database. Some r e c o m m e n d a t i o n s are
discussed later in this chapter.
You also m u s t transfer log files to a location from w h e r e Reporter can retrieve them. The m e t h o d
y o u choose d e p e n d s on w h e t h e r y o u plan to w o r k w i t h v7 or v8 profiles.
V7 Profiles
Reporter can fetch log files for v7 profiles from:
• An FTP server
• An HTTP s e r v e r
• A local folder
If y o u w a n t to u s e v7 profiles, configure the Blue Coat SG to u p l o a d access log files via FTP or
HTTP, or copy the files to the Reporter server.
167
Blue Coat Educational Services — BCCPA Course v 1.7.1
V8 Profiles
Reporter can retrieve log files for v8 profiles from:
• An FTP server
• A local folder.
To u s e v8 profiles, configure the Blue Coat SG to u p l o a d access log files via FTP, establish a direct
link b e t w e e n the Blue Coat SG a n d Reporter, or c o p y log files to the Reporter server.
W h e n e v e r y o u create a v7 or v8 profile, Reporter requires y o u to specify the log file location. You
can specify only an FTP server, H T T P server, or local file w h e n y o u create a v7 profile; y o u can
specify only an FTP server, direct link to a Blue Coat SG, or a local file w h e n y o u create a v8 profile.
168
Chapter 17: Introduction to Reporter
Viewing Reports
Reports are H T M L pages that display w i t h i n y o u r Web browser. Report options differ d e p e n d i n g
on w h i c h profile, v8 or v7, is u s e d to generate reports.
Some users call the miniature reports widgets. Others call t h e m top 10 reports because m a n y of t h e m
focus on top users, URLs, categories, or s o m e other element of n e t w o r k use.
Pre-Defined Reports
Reporter 8 features m o r e than 150 different pre-defined reports. To access the pre-defined report
m e n u for a v8 profile, click the Show Reports link for that profile a n d then, after the D a s h b o a r d
a p p e a r s , click the Reports tab at the top of the page. The browser displays the list of pre-defined
reports in the left navigation area a n d filter options in the central frame.
To access the pre-defined report m e n u for a v7 profile, click the Show Reports link for that profile.
The b r o w s e r displays the list of available pre-defined reports in the left navigation area a n d an
O v e r v i e w report in the central frame.
169
Blue Coat Educational Services — BCCPA Course v 1.7.1
Real-time Reporting
Reporter 8 s u p p o r t s c o n t i n u o u s u p l o a d s of access logs for reports created with the v8 profile.
D e p e n d i n g on h o w y o u configure y o u r Blue Coat SGs a n d Reporter a n d w h i c h reports y o u select,
y o u can use the D a s h b o a r d to d i s p l a y multiple real-time reports in a single interface.
170
Chapter 17: Introduction to Reporter
Customizing Reports
Slide 1 7 - 9 : C u s t o m i z a t i o n o p t i o n s
O n e of R e p o r t e r ' s benefits is the ability to customize reports easily t h r o u g h the Web interface.
O p t i o n s w i t h i n v8 a n d v7 pre-defined reports allow y o u to specify the d a t a in a report a n d h o w it
is d i s p l a y e d in a table.
Clicking on links within a report enables y o u to view detailed information about a specific
report element, s u c h as URLs, content categories, d o m a i n s , a user, a virus, or a response code.
You also can specify a date or d a t e r a n g e a n d a p p l y filters.
171
Blue Coat Educational Services — BCCPA Course v 1.7.1
Available
Disk
Options CPU RAM Storage Drives Space* OS
The G u i d e ' s first r e c o m m e n d a t i o n is to choose one of three h a r d w a r e options. The options are
b a s e d on the n u m b e r of users being proxied a n d on r e p o r t i n g d a y s , the m a x i m u m n u m b e r of d a y s
of logs in the Reporter database.
The n u m b e r of users being proxied ranges from fewer t h a n 1,000 to m o r e than 5,000; the n u m b e r
of r e p o r t i n g d a y s ranges from o n e m o n t h to three m o n t h s . The table in Slide 17-10 displays s o m e
of the r e c o m m e n d e d specifications for each of the three h a r d w a r e options.
http://www.bluecoat.com/products/reporter/ReporterSizingGuide.pdf
172
Chapter 18: Blue Coat AV
T h e Blue Coat SG a n d Blue Coat AV appliances p r o v i d e the performance n e e d e d for t o d a y ' s Web
e n v i r o n m e n t s . The virus-checking capabilities are i m p l e m e n t e d t h r o u g h an offbox solution that
uses the Internet Content A d a p t a t i o n Protocol (ICAP) as the c o m m u n i c a t i o n m e c h a n i s m b e t w e e n
the Blue Coat SG a n d the Blue Coat AV. The policy definition for content scanning is fully
i n t e g r a t e d into the policy f r a m e w o r k a n d is defined using the either the M a n a g e m e n t Console or
C o n t e n t Policy L a n g u a g e (CPL).
A Blue Coat ICAP configuration allows administrators to select the virus-scanning servers that are
to be u s e d by the Blue Coat SG appliance. The Blue Coat SG ICAP implementation is fully
compatible w i t h Blue Coat AV, Finjan SurfinGate™, Symantec® A n t i v i r u s Scan Engine (SAVSE)
Server, Trend Micro InterScan® Web Security Suite (IWSS), a n d Webwasher®.
• ICAP resource: A n e t w o r k d a t a object or service that can be identified by a URL Unlike HTTP,
the URI refers to an ICAP service that performs a d a p t a t i o n s of HTTP messages.
173
Blue Coat Educational Services — BCCPA Course v 1.7.1
Traditional, Web antivirus g a t e w a y s often lack scalability a n d performance for HTTP a n d FTP
scanning, leaving d e s k t o p s to defend themselves. The Blue Coat AV, c o m b i n e d w i t h the Blue Coat
SG, p r o v i d e s scalability for v i r u s scanning, as well as c o m p l e t e visibility a n d control of enterprise
Web c o m m u n i c a t i o n s .
The Blue Coat AV enables o r g a n i z a t i o n s to scan for viruses, w o r m s , s p y w a r e , a n d Trojans entering
t h r o u g h Web-based b a c k d o o r s , including:
Personal Web e-mail accounts, w h e r e a majority of viruses a n d w o r m s p r o p a g a t e
174
Chapter 18: Blue Coat AV
A single Blue Coat AV can s u p p o r t multiple Blue Coat SG appliances. While the Blue Coat SG
p r o v i d e s flexible a n d g r a n u l a r control of Web traffic a n d access, the Blue Coat AV provides
high-performance AV s c a n n i n g of both cached a n d non-cached content. The Blue Coat SG a n d the
Blue Coat AV share u n d e r l y i n g Blue Coat processes, w h i c h allows for easy d e p l o y m e n t a n d
integration. Once integrated, this solution allows for the s c a n n i n g a n d p u r g i n g of harmful viruses
a n d other malicious c o d e w i t h o u t compromising the n e t w o r k control, b a n d w i d t h gains, or
security gained t h r o u g h the proxy.
• Kaspersky®
• Sophos
• McAfee®
• Panda
175
Blue Coat Educational Services — BCCPA Course v 1.7.1
• Performance
- ICAP server = separate processor
- Performance = an order of magnitude better
• Choice
- Blue Coat AV allows different AV vendors
- Automatically download pattern files daily
• Continue Integration
- Integrate the Blue Coat AV and Blue Coat SG
176
Chapter 18: Blue Coat AV
ICAP FundamentaSs
The protocol enables ICAP clients (like the Blue Coat SG) to pass HTTP messages to ICAP servers
(like the Blue Coat AV) for s o m e sort of transformation or other processing (hence the t e r m
"adaptation"). The ICAP server executes its transformation service on messages a n d s e n d s back
responses to the client, u s u a l l y w i t h modified messages. Typically, the a d a p t e d messages are
either H T T P requests or H T T P responses.
177
Blue Coat Educational Services BCCPA Course V 1.7.1
ЮАР Fundamentals
4. C r e a t e an o p t i o n a l p a t i e n c e p a g e .
178
Chapter 18: Blue Coat AV
ЮАРREQMOD
• R e t u r n an error.
179
Blue Coat Educational Services — BCCPA Course v 1.7.1
ICAP REQMOD
• REQMOD
- Scan HTTP PUT requests
- Scan FTP upload requests
- Scan POST request bodies
180
Chapter 18: Blue Coat AV
Blue Coat SGBlue Coat S G T h e typical p a t h for requests that are to be modified by the R E Q M O D
m e t h o d is as follows.
1. A client m a k e s a request to the Blue Coat SG (known as the ICAP client) for an object on an
origin server.
2. The Blue Coat SG s e n d s the request to the Blue Coat AV (known as the ICAP server).
3. The Blue Coat AV executes the ICAP resource's service (the a d m i n i s t r a t o r determines the
actual services performed by the ICAP server) on the request a n d s e n d s the (possibly
modified) request back to the Blue Coat SG.
4. The Blue Coat SG s e n d s the request to the origin server.
5. The origin server r e s p o n d s to the request a n d delivers it to the Blue Coat SG.
181
Blue Coat Educational Services — ВССРА Course v 1.7.1
ICAP RESPMOD
• R e t u r n an error.
182
Chapter 18: Blue Coat AV
ICAP RESPMOD
• RESPMOD
- Virus scanning of HTTP and FTP (RETR)
- Virus scanning of FTP over HTTP
183
Blue Coat Educational Services — BCCPA Course v 1.7.1
Blue C o a t SGBlue Coat S G T h e typical p a t h for responses that are to be modified by the
R E S P M O D m e t h o d is as follows.
1. A client m a k e s a request to t h e Blue Coat SG (known as the ICAP client) for an object on an
origin server.
3. The origin server returns the object to the Blue Coat SG, w h i c h s e n d s the response to the Blue
Coat AV.
4. T h e Blue Coat AV executes the ICAP resource's service on the response a n d s e n d s the
(possibly modified) response back to the Blue Coat SG.
184
Chapter 18: Blue Coat AV
Blue Coat SGYou m u s t d e p l o y the Blue Coat AV a n d the Blue Coat SG in the s a m e n e t w o r k
s e g m e n t . As Slide 18-12 illustrates, the Blue Coat SG cannot act as an ICAP server for ICAP clients
o u t s i d e the local network.
A typical m a i n office deployment.consists of one Blue Coat SG 800 serviced by several Blue Coat
AV appliances. D e p l o y i n g several Blue Coat AV appliances e n h a n c e s scanning performance
because ICAP requests are load-balanced across them. Branch offices are typically served by o n e
Blue Coat SG 200 a n d one Blue Coat AV.
185
Blue Coat Educational Services — BCCPA Course v 1.7.1
186
Chapter 19: Service and Support
• 90-day p h o n e s u p p o r t w a r r a n t y
• 1-year h a r d w a r e w a r r a n t y
For the first 90 d a y s of the warranty, if Blue Coat d e t e r m i n e s that a problem is caused by a
h a r d w a r e failure, it will a d v a n c e ship a replacement unit w i t h i n five business days.
Teamed together, Blue Coat Systems products a n d service offerings provide the protection a n d
flexibility required to k e e p y o u r n e t w o r k up a n d r u n n i n g .
W o r l d w i d e Service includes:
• P l a t i n u m Service
187
Blue Coat Educational Services — BCCPA Course v 1.7.1
• 8 x 5 Web S u p p o r t
o A d v a n c e H a r d w a r e Replacement
• Gold Service
• Unlimited 8 x 5 P h o n e S u p p o r t
a 8 x 5 Web S u p p o r t
o A d v a n c e H a r d w a r e Replacement
a U n l i m i t e d Access to OS Software Releases
T h e following information is required for all issues sent to Blue Coat Support:
• Contact Information:
• Company name
o Contact n a m e
• Phone number
• E-mail a d d r e s s
• H a r d w a r e Serial N u m b e r :
• Issue:
• Description:
• Time (s)/Frequency:
a Expectation:
• http://x.x.x.x:yyyy/Sysinfo
Information from "Specific R e q u i r e m e n t s " sections covers specific issues
Sending files to Blue Coat: h t t p s : / / u p l o a d . b l u e c o a t . c o m
188
Chapter 19: Service and Support
Support Organization
• Professional Services
- Installations
- Deployment
- Upgrades
• Support Services
- Licensing
- Renewals
- WebPower logins
• Technical Support
- Software troubleshooting
- Hardware troubleshooting
- RMAs
Slide 1 9 - 1 : Support o r g a n i z a t i o n
Professional Services
Blue Coat professional services is dedicated to providing superior on-site service for c u s t o m e r s .
The professional service organization is, in essence, a consulting t e a m w h o s e p r i m a r y
responsibilities are:
• C u s t o m i z a t i o n of a d v a n c e d features
• Environment-specific k n o w l e d g e transfer
Note: Professional services are available for an additional per diem fee a n d are not i n c l u d e d
in any s u p p o r t contract.
Support Services
189
Blue Coat Educational Services — BCCPA Course v 1.7.1
• London, United K i n g d o m
• Kuala L u m p u r , Malaysia
• Tokyo, J a p a n
190
Chapter 19: Service and Support
® Online Services
- Case Management (WebPower)
- Documentation
- Licensing & Asset Database
- Instant Support
- Forums
Platinum Support
Products covered u n d e r P l a t i n u m Service are entitled to Technical Phone S u p p o r t for an u n l i m i t e d
n u m b e r of incidents 24 h o u r s a day, 7 d a y s a w e e k — a n d 8 x 5 Technical Online S u p p o r t d u r i n g
regular business h o u r s (see Limitations).
Gold Support
Products covered u n d e r Gold Service are entitled to 8 x 5 technical p h o n e a n d online s u p p o r t for
an unlimited n u m b e r of incidents d u r i n g regular business h o u r s (see Limitations).
191
Blue Coat Educational Services — BCCPA Course v 1.7.1
If, d u r i n g any o n e (1) y e a r period, more than fifteen percent (15%) of the units or subassemblies
r e t u r n e d to Blue Coat Systems for replacement are d i a g n o s e d as "No Trouble Found," C u s t o m e r
m a y be charged a fee of five percent (5%) of the t h e n - c u r r e n t list price of the actual u n i t or
s u b s e q u e n t p r o d u c t (where the actual p r o d u c t is obsolete) for each unit or s u b a s s e m b l y r e t u r n e d
after the fifteen (15%) percent threshold has been r e a c h e d — n o t including the u n i t w h o s e return
results in meeting the fifteen (15%) threshold. Blue Coat Systems will p r o v i d e w r i t t e n notification
to C u s t o m e r in the event it i n t e n d s to a p p l y the fee identified in this p a r a g r a p h .
All Software p r o v i d e d p u r s u a n t to a Service Offering will be g o v e r n e d u n d e r the s a m e t e r m s a n d
conditions as set forth in the license a g r e e m e n t a c c o m p a n y i n g the original software licensed by
Customer. C u s t o m e r has the right to duplicate d o c u m e n t a t i o n for its o w n internal use—in
quantities equal to the n u m b e r of units of e q u i p m e n t a n d software specified on the p u r c h a s e
o r d e r — p r o v i d e d that all copyright, t r a d e m a r k , a n d other proprietary rights notices are also
r e p r o d u c e d in the s a m e form a n d m a n n e r as on the original m e d i a provided.
Limitations
Technical P h o n e S u p p o r t is p r o v i d e d in English 8 h o u r s a day, 5 days a week, excluding holidays.
WebPower
W e b P o w e r is Blue Coat System's online C u s t o m e r S u p p o r t Service. W e b P o w e r users receive
i m m e d i a t e , p e r s o n a l a n d secure Web access to Blue Coat Systems information a n d resources 24
h o u r s a day, 7 d a y s a week, from a n y w h e r e in the w o r l d . Benefits Include:
192
Chapter 19: Service and Support
Escalation Process
• E-mail
WebPower
The SRs are first h a n d l e d by the frontline s u p p o r t team. This team walks customers t h r o u g h
c o m m o n s u p p o r t issues a n d a n s w e r s general questions about the products.
Should an SR require special attention, it is sent up the escalation ladder to the backline s u p p o r t
team. This t e a m performs the function often labeled escalation in other organizations. The backline
s u p p o r t engineers are the most senior t e a m m e m b e r s . They are the interface between frontline
support and development.
• Dot releases
• Minor release
• Major releases
193
Blue Coat Educational Services — BCCPA Course v 1.7.1
Support Tools
• Instant Support
* Tech Briefs
Slide 1 9 - 5 : S u p p o r t t o o l s
You s h o u l d a l w a y s read the release notes for each version of the Blue Coat p r o d u c t that y o u are
installing (Blue Coat® SG™ OS, Blue Coat® Director™ OS, Blue Coat® AV™ OS, Blue Coat®
Reporter™). The release notes contain useful information a n d k n o w n issues.
T h e forums, w h i c h are not filtered, are a v e r y useful w a y for c u s t o m e r s to exchange tips a n d tricks.
It is not u n c o m m o n to h a v e y o u r forum question a n s w e r e d by a Blue Coat s u p p o r t engineer or
developer. The m a i n d r a w back to the forum is that there is no g u a r a n t e e d response time for
questions, a n d responses are voluntary.
194
Appendix A: Deployment Planning
You m a y h a v e a very complex network, b u t it can always be logically reduced to the simple
d i a g r a m s h o w n in Figure A - l . All of the solutions that y o u can think of, to route selected traffic
from y o u r clients to the Blue Coat SG, can be g r o u p e d into t w o m a i n categories: transparent a n d
explicit.
Typically, a firewall allows o u t b o u n d traffic from the clients to the Internet. More restrictive
policies m a y only allow HTTP a n d HTTPS traffic from the clients to the Internet. In either case,
y o u n o w m a y w a n t to block the traffic that y o u w a n t to go t h r o u g h the proxy. For instance, if y o u
w a n t to proxy HTTP a n d HTTPS, y o u s h o u l d block the clients from directly accessing outside
resources over these protocols. Only the Blue Coat SG s h o u l d be allowed t h r o u g h the proxy.
This configuration allows y o u to enforce the use of the proxy by all clients, regardless of the
d e p l o y m e n t strategy that y o u will implement; this solution also deters the most advanced users
from b y p a s s i n g the proxy.
195
Blue Coat Educational Services — BCCPA Course v 1.7.1
Explicit Proxy
Creating an explicit proxy is conceptually the easiest solution a n d in general does not require a n y
a d d i t i o n a l software or h a r d w a r e . A s i m p l e packet capture can s h o w y o u if a client is using explicit
proxy. You can refer to the H T T P c h a p t e r of this book for more details. A client u s i n g explicit
proxy does format the GET request to s u p p o r t proxy.
Manual Configuration
Every client is configured to forward all the traffic to the Blue Coat SG. For instance, y o u can easily
set y o u r b r o w s e r to send all HTTP requests to a proxy server. In Figure A-2 below y o u can see h o w
t h e configuration screen looks for a Firefox® client
T h e client n o w s e n d s all HTTP requests to the proxy w i t h IP a d d r e s s 172.16.90.22 over port 8080.
You can see h o w this m e t h o d is pretty straightforward; however, it is impractical for any
organization but the smallest. This m e t h o d requires a lot of a d m i n i s t r a t o r time a n d , unless it is
p a i r e d w i t h g o o d firewall rules, can be easily bypassed.
M a n u a l configuration can still be useful for testing a n d d e b u g g i n g p u r p o s e s .
You can use a PAC file to create a very basic fault-tolerant a n d load-balanced environment. In this
e x a m p l e y o u can configure four Blue Coat SG appliances (SG01 to SG04) as follows: O n e h a n d l e s
all .com requests; one h a n d l e s all .net requests; one handles all o t h e r d o m a i n s ; a n d the last one is a
hot s t a n d b y for the other three. If a n y of the three main proxies go d o w n , the fourth will take over.
T h e table b e l o w s h o w s the role of each proxy.
SG01 com d o m a i n
SG02 net domain
SG03 all other d o m a i n s
SG04 hot s t a n d - b y
196
Appendix A: Deployment Planning
In particular, the local sites (inside the network) are accessed by t h e clients directly. The proxy
servers c o m m u n i c a t e w i t h the clients over port 8080. Below y o u can see the JavaScript necessary
to achieve the results described above.
{
if (isPlainHostName(host) || dnsDomainls(host, ".mydomain.com"))
return "DIRECT";
r e t u r n " P R O X Y s g 0 1 : 8 08 0; " +
r e t u r n " P R O X Y s g 0 2 : 8 0 8 0; " +
"PROXY sg04:8080";
else
r e t u r n " P R O X Y s g 0 3 : 8 08 0; " +
"PROXY sg04:8080";
The PAC file can reside on a s h a r e d resource. O n e of the main a d v a n t a g e of the PAC file is that it
allows y o u to m a k e changes to y o u r proxy configuration w i t h o u t having to reconfigure each
client.
Note: You s h o u l d save the JavaScript function to file with a .pac filename extension; for
example: "proxy.pac". You s h o u l d also configure y o u r server to m a p the .pac filename
extension t o the MIME type: a p p l i c a t i o n / x - n s - p r o x y - a u t o c o n f i g .
Each client needs to k n o w w h e r e the PAC file is located. Figure A-3 below s h o w s h o w a Firefox
client configuration looks like for PAC.
197
Blue Coat Educational Services — BCCPA Course v 1.7.1
Figure A-4 above s h o w s h o w the configuration for Internet Explorer looks like w h e n there is a
W P A D server.
W i n d o w s XP Professional
W i n d o w s 2003 Server
This solution will become m o r e feasible as m o r e companies roll out Active Directory for the entire
o r g a n i z a t i o n a n d stop using o p e r a t i n g systems that are not s u p p o r t e d .
198
Appendix A: Deployment Planning
Transparent Proxy
You can think of transparent proxy as exactly the opposite of explicit proxy. The goal of setting up
t r a n s p a r e n t proxy is to redirect all of the desired traffic to the Blue Coat SG, w i t h o u t the client's
k n o w l e d g e or consent. Regardless of the solution that y o u choose for explicit proxy, the client's
user agent k n o w s that it is s e n d i n g the connection requests to a proxy server. However, in a
t r a n s p a r e n t proxy scenario, the client's user agent believes that it is talking to the remote server
directly, w i t h o u t intermediaries.
Layer 4 Switches
Switching technology has evolved from the Data Link Layer to cover up to the Application Layer.
In general, most Layer 4 switches are capable of h a n d l i n g up to Layer 7 a n d d o w n to Layer 2.
Most Layer 4 switches offer a very useful set of a d d e d functions, such as:
• A d v a n c e d load balancing
a Most available
D Round-robin
199
Blue Coat Educational Services — BCCPA Course v 1.7.1
• A d v a n c e d Fault Tolerance a n d R e d u n d a n c y
A Layer 4 switch can also c h a n g e t h e w a y a particular request looks like; for instance, it can
c h a n g e a direct H T T P G E T request to a proxy-style H T T P G E T request as s h o w n in Figure A-7
below.
You can see that the client u s e r a g e n t is not a w a r e that the connection will go via proxy server. The
ability of a Layer 4 switch (also k n o w n as a content switch) to c h a n g e HTTP requests allows it to
be compatible w i t h a n y proxy a n d not j u s t the m o r e a d v a n c e d ones like Blue Coat SG.
200
Appendix A: Deployment Planning
WCCP Version 1
In W C C P version 1, the WCCP-configured h o m e router transparently redirects TCP port 80
packets to a m a x i m u m of 32 Blue Coat SG appliances. (A Blue Coat SG is seen as a cache in W C C P
protocol.)
Each applicable client IP packet received by the h o m e router is transparently redirected to a cache.
A Blue Coat SG from the g r o u p is selected to define the h o m e r o u t e r ' s redirection h a s h table for all
caches. All caches periodically c o m m u n i c a t e w i t h the h o m e router to verify W C C P protocol
synchronization a n d Blue Coat SG availability within the service g r o u p . In return, the h o m e router
r e s p o n d s to each cache w i t h information as to which Blue Coat SG appliances are available in the
service g r o u p .
WCCP Version 2
For Cisco routers using W C C P version 2, m i n i m u m IOS releases are 12.0(3)T a n d 12.0(4). Release
12.0(5) a n d later releases s u p p o r t W C C P versions 1 a n d 2. Ensure that y o u use the correct IOS
software for the router a n d that y o u have a match b e t w e e n the Blue Coat SG configuration W C C P
version n u m b e r and router protocol version number.
201
Blue Coat Educational Services — BCCPA Course v 1.7.1
In the configuration s h o w n in Figure A-8 above, the Blue Coat SG receives all o u t b o u n d traffic a n d
can inspect it. If the traffic matches a n y of the criteria set forth by the administrators, the Blue Coat
SG further inspects the traffic a n d can a p p l y a n y desired rule or action (allow, block, redirect,
cache, etc.).
202
Appendix B: Conditional Probability — Bayes Theorem
You can d e t e r m i n e the probability of a future event based on k n o w l e d g e that a different event
already occurred. We can a p p l y this theory to content filtering. Suppose that y o u w a n t y o u r
s y s t e m to recognize n e w a n d uncategorized text d o c u m e n t s (past events), based on the probability
of certain events (prior probabilities). For example, y o u w a n t the device to recognize w h e n a p a g e
contains A d u l t / M a t u r e content.
The device cannot d e t e r m i n e that a text p a g e contains a certain type of content, w i t h o u t having
s o m e point of reference. No device can ever " k n o w " that a p a g e contains A d u l t / M a t u r e content
p e r se; however, it is possible for the device to d e t e r m i n e the probability that a p a g e contains
A d u l t / M a t u r e content, by c o m p a r i n g that probability to the probability that it contains s o m e
other t y p e of content — for example, N e w s / M e d i a content.
Bayes Theorem
Let us consider a set of m u t u a l l y exclusive events {A A , A . . . A } a n d define, u s i n g P(A¡), the
h 2 3 N
value of i.
r N
P(B) £ P ( A ¡ ) P ( B | A ¡ )
Vi = i
The formula (a) states that an event is the s u m of the probabilities of combined events. To better
u n d e r s t a n d the formula (a), we s h o u l d use a real-life example. In the state of California the
registered voters are d i v i d e d according to the table below
3
Table 18.1: Registered voters in California
Democrats 43 p e r c e n t —P(D)=0.43
Republicans 34 p e r c e n t — P ( R ) = 0 . 3 4
Other 23 p e r c e n t — P ( O ) = 0 . 2 3
a . D a t a t r o m S t a t e o t C a l i f o r n i a R e g i s t r a r o t V o t e r s ( A p r i l ¿006)
203
Blue Coat Educational Services — BCCPA Course v 1.7.1
The formula (b) tells us that the bill can pass b u t by a n a r r o w margin.
T h e next step is to try to d e t e r m i n e the probability of the event P(Ai | B). This probability can be
expressed u s i n g the formula (c) below:
P ( A i l B ) . s * ™
If y o u use the v a l u e of P(B) from the formula (a) a n d substitute in it the formula (c), y o u obtain the
Bayes theorem, s h o w n b e l o w in formula (d):
P A P B A
PCMB)- < i> < l i>
f N ^
£P(Ai)P(B|Ai)
Vi = 1
U s i n g the e x a m p l e of the voters in California, the formula (d) allows us to calculate, k n o w i n g that
the bill w a s a p p r o v e d , the probability that a p e r s o n of a given p a r t y v o t e d for the bill. A p p l y i n g
the n u m b e r s listed a b o v e a n d the result of the formula (b) to formula (d), we obtain:
So, k n o w i n g that t h e bill passed, the probability that a voter w a s a Democrat is 48 percent.
You define the categories a s the m u t u a l l y exclusive events { A A , A . . . A ) . For example, y o u can 1t 2 3 n
You can define the a p p e a r a n c e of a w o r d as event B; for instance P(B) could be the probability of
finding the w o r d "sex." So y o u can say:
„,„ , ,„ „ P(Pornography)P(Sex|Pornography)
s V
P(Pornography|Sex) = P(Sex)
204
Appendix B: Conditional Probability — Bayes Theorem
Obviously, y o u c a n n o t create these formulae manually. You need to create a tool that can
automatically calculate all of the different probabilities; ultimately, this will p r o v i d e y o u w i t h an
accurate P(B | A ) . To achieve this result, y o u m u s t s u b m i t a series of d o c u m e n t s belonging to
2
D y n a m i c Real-Time Rating (DRTR) technology uses a two-step approach. The first step is to
recognize the l a n g u a g e of the Web site. This is i m p o r t a n t because the same w o r d m a y exist in
m o r e than one l a n g u a g e b u t have different m e a n i n g s in the different languages. For instance the
w o r d burro has the s a m e spelling both in Italian a n d Spanish; h o w e v e r it m e a n s butter in Italian,
while it m e a n s donkey in Spanish! The s y s t e m needs to correctly d e t e r m i n e the l a n g u a g e before it
can a p p l y a n y statistical analysis on the w o r d s .
You can see an e x a m p l e in Figure B-l from the site h t t p : / / w w w . j a l . c o . j p :
?® 16 0.00052
M 2 0.00236
DRTR a d o p t s the s a m e a p p r o a c h for the categorization of a Web site. The result that DRTR
p r o d u c e s for the site h t t p : / / w w w . j a l . c o . j p is s h o w n in Figure B-2:
You can see h o w there are three tokens that refer to the travel category a n d one that refers to
Political/Activist G r o u p s category:
205
Blue Coat Educational Services — BCCPA Course v 1.7.1
1 .There are actually many more t o k e n s used f o r b o t h language and category; this a p p e n d i x
o n l y shows a f e w relevant one as an e x a m p l e .
206
Blue Coat Certified
Labs
version 1.7.2
Blue Coat Educational Services — BCCPA Course v 1.7.2
Contact Information
training@bluecoat.com
www.bluecoat.com
Copyright© 1999-2006 Blue Coat Systems, Inc. All rights reserved w o r l d w i d e . No part of this d o c u m e n t may be
reproduced by any m e a n s nor modified, decompiled, disassembled, published or distributed, in w h o l e or in part, or
translated to any electronic m e d i u m or other means w i t h o u t the written consent of Blue Coat Systems, Inc. All right, title
and interest in and to the Software and documentation are and shall remain the exclusive property of Blue Coat Systems,
Inc. and its licensors. Blue Coat SG™, Blue Coat AV™, Blue Coat RA™, Blue Coat WebFilter™. Blue Coat Director™, Blue
Coat Reporter™, ProxySG™, Proxy AV™, CacheOS™, SGOS™. Spyware Interceptor™, Scope™ are trademarks of Blue
Coat Systems, Inc. and CacheFlow®, Blue Coat®, Accelerating The Internet®, WinProxy®, A c c e s s N o w ® , Ositis®,
Powering Internet Management®, and The Ultimate Internet Sharing Solution® are registered trademarks of Blue Coat
Systems, Inc. All other trademarks contained in this d o c u m e n t and in the Software are the property of their respective
owners.
BLUE COAT SYSTEMS, INC. DISCLAIMS ALL WARRANTIES, CONDITIONS OR OTHER TERMS, EXPRESS OR
IMPLIED, STATUTORY OR OTHERWISE, ON SOFTWARE A N D DOCUMENTATION FURNISHED HEREUNDER
I N C L U D I N G W I T H O U T LIMITATION THE WARRANTIES OF DESIGN, MERCHANTABILITY OR FITNESS FOR A
PARTICULAR PURPOSE A N D NONINFRINGEMENT. IN NO EVENT SHALL BLUE COAT SYSTEMS, INC., ITS
SUPPLIERS OR ITS LICENSORS BE LIABLE FOR A N Y DAMAGES. WHETHER ARISING IN TORT. CONTRACT OR
A N Y OTHER LEGAL THEORY EVEN IF BLUE COAT SYSTEMS, INC. H A S BEEN ADVISED OF THE POSSIBILITY OF
SUCH D A M A G E S .
Ü
Third Party Copyright Notices
Blue Coat Systems, Inc. utilizes third party software from various sources. Portions of this software are copyrighted by their respective
owners as indicated in the copyright notices below.
The following lists the copyright notices for:
BPF
Copyright (c) 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996
The Regents of the University of California. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that: (1) source code distributions
retain the above copyright notice and this paragraph in its entirety, (2) distributions including binary code include the above copyright notice
and this paragraph in its entirety in the documentation or other materials provided with the distribution, and (3) all advertising materials
mentioning features or use of this software display the following acknowledgement:
This product includes software developed by the University of California, Lawrence Berkeley Laboratory and its contributors.
Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software
without specific prior written permission. THIS SOFTWARE IS PROVIDED "AS IS" AND WITHOUT ANY EXPRESS OR IMPLIED
WARRANTIES. INCLUDING. WITHOUT LIMITATION. THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE.
DES
Software DES functions written 12 Dec 1986 by Phil Karn, KA9Q; large sections adapted from the 1977 public-domain program by Jim
Glllogly.
EXPAT
Copyright (c) 1998, 1999, 2000 Thai Open Source Software Center Ltd.
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the
"Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish,
distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the
following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT
LIMITED TO THE WARRANTIES OF MERCHANTABILITY. FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN
NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY,
WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE. ARISING FROM, OUT OF OR IN CONNECTION WITH THE
SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
Finjan Software
Copyright (c) 2003 Finjan Software, Inc. All rights reserved.
Flowerfire
Copyright (c) 1996-2002 Greg Ferrar
ISODE
ISODE 8.0 NOTICE
Acquisition, use, and distribution of this module and related materials are subject to the restrictions of a license agreement. Consult the
Preface in the User's Manual for the full terms of this agreement.
4BSD/ISODE SMP NOTICE
Acquisition, use, and distribution of this module and related materials are subject to the restrictions given in the file SMP-READ-ME.
UNIX is a registered trademark in the US and other countries, licensed exclusively through X/Open Company Ltd.
MD5
RSA Data Security, Inc. MD5 Message-Digest Algorithm
Copyright (c) 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved.
License to copy and use this software is granted provided that it is identified as the "RSA Data Security, Inc. MD5 Message-Digest
Algorithm" in all material mentioning or referencing this software or this function.
License is also granted to make and use derivative works provided that such works are Identified as "derived from the RSA Data Security,
Inc. MD5 Message-Digest Algorithm" in all material mentioning or referencing the derived work.
RSA Data Security, Inc. makes no representations concerning either the merchantability of this software or the suitability of this software for
any particular purpose. It is provided "as is" without express or implied warranty of any kind.
THE BEER-WARE LICENSE" (Revision 42):
<phk@FreeBSD.org <mailto:phk@FreeBSD.org» wrote this file. As long as you retain this notice you can do whatever you want with this
stuff. If we meet some day, and you think this stuff is worth it, you can buy me a beer in return. Poul-Henning Kamp
Microsoft Windows Media Streaming
Copyright (c) 2003 Microsoft Corporation. All rights reserved.
OpenLDAP
Copyright (c) 1999-2001 The OpenLDAP Foundation, Redwood City, California, USA. All Rights Reserved. Permission to copy and
distribute verbatim copies of this document is granted.
http://www.openldap.org/software/release/Ucense.html
The OpenLDAP Public License Version 2.7, 7 September 2001
Redistribution and use of this software and associated documentation ("Software"), with or without modification, are permitted provided
that the following conditions are met:
1. Redistributions of source code must retain copyright statements and notices,
2. Redistributions In binary form must reproduce applicable copyright statements and notices, this list of conditions, and the following
disclaimer In the documentation and/or other materials provided with the distribution, and
3. Redistributions must contain a verbatim copy of this document.
Blue Coat Educational Services — BCCPA Course v 1.7.2
The OpenLDAP Foundation may revise this license from time to time. Each revision is distinguished by a version number. You may use this
Software under terms of this license revision or under the terms of any subsequent revision of the license.
THIS SOFTWARE IS PROVIDED BY THE OPENLDAP FOUNDATION AND ITS CONTRIBUTORS "AS IS" AND ANY EXPRESSED OR
IMPLIED WARRANTIES. INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OPENLDAP FOUNDATION, ITS CONTRIBUTORS, OR
THE AUTHOR(S) OR OWNER(S) OF THE SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSS OF USE, DATA. OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The names of the authors and copyright holders must not be used in advertising or otherwise to promote the sale, use or other dealing in this
Software without specific, written prior permission. Title to copyright in this Software shall at all times remain with copyright holders.
OpenLDAP Is a registered trademark of the OpenLDAP Foundation.
OpenSSH
Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland. All rights reserved
This file Is part of the OpenSSH software.
The licences which components of this software fall under are as follows. First, we will summarize and say that all components are under a
BSD licence, or a licence more free than that.
OpenSSH contains no GPL code.
1) As far as I am concerned, the code I have written for this software can be used freely for any purpose. Any derived versions of this
software must be clearly marked as such, and If the derived work is incompatible with the protocol description In the RFC file, it must be
called by a name other than "ssh" or "Secure Shell".
[Tatu continues]
However, I am not implying to give any licenses to any patents or copyrights held by third parties, and the software includes parts that are
not under my direct control. As far as I know, all Included source code is used in accordance with the relevant license agreements and can be
used freely for any purpose (the GNU license being the most restrictive); see below for details.
[However, none of that term Is relevant at this point in time. All of these restrictively licenced software components which he talks about
have been removed from OpenSSH, i.e.,
- RSA is no longer Included, found in the OpenSSL library
- IDEA is no longer Included, its use is deprecated
- DES is now external, In the OpenSSL library
- GMP is no longer used, and instead we call BN code from OpenSSL
- Zlib is now external. In a library
- The make-ssh-known-hosts script is no longer included
- TSS has been removed
- MD5 is now external, in the OpenSSL library
- RC4 support has been replaced with ARC4 support from OpenSSL
- Blowfish Is now external, in the OpenSSL library
[The licence continues]
Note that any information and cryptographic algorithms used In this software are publicly available on the Internet and at any major
bookstore, scientific library, and patent office worldwide. More information can be found e.g. at "http://www.cs.hut.fi/crypto".
The legal status of this program is some combination of all these permissions and restrictions. Use only at your own responsibility. You will
be responsible for any legal consequences yourself; I am not making any claims whether possessing or using this Is legal or not in your
country, and I am not taking any responsibility on your behalf.
NO WARRANTY
BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT
PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR
OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED.
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE
PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. IN NO
EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER
PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY
TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR
LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
2) The 32-bit CRC compensation attack detector in deattack.c was contributed by CORE SDI S.A. under a BSD-style license.
Cryptographic attack detector for ssh - source code
Copyright (c) 1998 CORE SDI S.A., Buenos Aires, Argentina. All rights reserved. Redistribution and use in source and binary forms, with or
without modification, are permitted provided that this copyright notice is retained. THIS SOFTWARE IS PROVIDED "AS IS" AND ANY
EXPRESS OR IMPLIED WARRANTIES ARE DISCLAIMED. IN NO EVENT SHALL CORE SDI S.A. BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL. EXEMPLARY OR CONSEQUENTIAL DAMAGES RESULTING FROM THE USE OR MISUSE OF
THIS SOFTWARE.
Ariel Futoransky <futo@core-sdi.com> <http://www.core-sdi.com>
3) ssh-keygen was contributed by David Mazleres under a BSD-style license.
Copyright 1995,1996 by David Mazleres <dm@lcs.mit.edu>. Modification and redistribution in source and binary forms is permitted
provided that due credit is given to the author and the OpenBSD project by leaving this copyright notice intact.
4) The Rijndael implementation by Vincent Rijmen, Antoon Bosselaers and Paulo Barreto Is In the public domain and distributed with the
following license:
aversion 3.0 (December 2000)
Optimised ANSI C code for the Rijndael cipher (now AES)
@author Vincent Rijmen <vincent.rijmen@esat.kuleuven.ac.be>
iv
Third Party Copyright Notices
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are
met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this
software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT. STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE. EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
6) Remaining components of the software are provided under a standard 2-term BSD licence with the following names as copyright holders:
Markus Friedl
Theo de Raadt
Niels Provos
Dug Song
Aaron Campbell
Damien Miller
Kevin Steves
Daniel Kouril
Wesley Griffin
Per Allansson
Nils Nordman
Simon Wilkinson
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are
met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR'' AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING. BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO. PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY.
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
OpenSSL
Copyright (c) 1995-1998 Eric Young (eava'f ryptsoft.com). All rights reserved.
http://www.openssl.org/about/
http://www.openssl.org/about/
OpenSSL is based on the excellent SSLeay library developed by Eric A. Young <iTmilto:eay(g'cryptsofl.coin> and Tim I. Hudson
<mailto:tih@iTyptsoft.com>.
The OpenSSL toolkit is licensed under a Apache-style license which basically means that you are free to get and use it for commercial and
non-commercial purposes.
This package is an SSL implementation written by Eric Young (cay#cryptsofLromV The implementation was written so as to conform with
Netscapes SSL.
This library is free for commercial and non-commercial use as long as the following conditions are adhered to. The following conditions
apply to all code found in this distribution, be it the RC4, RSA, lhash. DES, etc., code; not just the SSL code. The SSL documentation included
with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tih'?frypisoft.corri).
Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. If this package is used in a product,
Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program
startup or in documentation (online or textual) provided with the package.
V
Blue Coat Educational Services — BCCPA Course v 1.7.2
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are
met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
3. A l l advertising materials mentioning features or use of this software must display the following acknowledgement: "This product includes
cryptographic software written by Eric Young (eay@cryptsoft.com)" The word 'cryptographic' can be left out if the routines from the library
being used are not cryptographic related:-).
4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an
acknowledgement: "This product Includes software written by Tim Hudson (tjh@cryptsoft.com)"
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
LIMITED TO. THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL.
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The license and distribution terms for any publicly available version or derivative of this code cannot be changed, i.e. this code cannot
simply be copied and put under another distribution license [including the GNU Public License.]
Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved.
Redistribution and use In source and binary forms, with or without modification, are permitted provided that the following conditions are
met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
3. A l l advertising materials mentioning features or use of this software must display the following acknowledgment:
"This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit, (http://www.openssl.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software
without prior written permission. For written permission, please contact openssl-core@openssl.org.
5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written
permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment: "This product includes software developed by the
OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)"
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT "AS IS" AND ANY EXPRESSED OR IMPLIED WARRANTIES. INCLUDING,
BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO. PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product Includes software written by Tim
Hudson (tjh@cryptsoft.com).
PCRE
Copyright (c) 1997-2001 University of Cambridge
University of Cambridge Computing Service, Cambridge, England. Phone: +44 1223 334714.
Written by: Philip Hazel <phlO@cam.ac.uk>
Permission is granted to anyone to use this software for any purpose on any computer system, and to redistribute it freely, subject to the
following restrictions:
1. This software is distributed In the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
2. Regular expression support is provided by the PCRE library package, which is open source software, written by Philip Hazel, and
copyright by the University of Cambridge, England.
ftp://ftp.csx.cam.ac.uk/pub/software/programmlng/pcre/
PHAOS SSLava and SSLavaThin
Copyright (c) 1996-2003 Phaos Technology Corporation. All Rights Reserved.
The software contains commercially valuable proprietary products of Phaos which have been secretly developed by Phaos. the design and
development of which have involved expenditure of substantial amounts of money and the use of skilled development experts over
substantial periods of time. The software and any portions or copies thereof shall at all times remain the property of Phaos.
PHAOS MAKES NO WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION THE IMPLIED WARRANTY OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, REGARDING THE SOFTWARE, OR ITS USE AND OPERATION
ALONE OR IN COMBINATION WITH ANY OTHER SOFTWARE.
PHAOS SHALL NOT BE LIABLE TO THE OTHER OR ANY OTHER PERSON CLAIMING DAMAGES AS A RESULT OF THE USE OF
ANY PRODUCT OR SOFTWARE FOR ANY DAMAGES WHATSOEVER. IN NO EVENT WILL PHAOS BE LIABLE FOR SPECIAL,
INCIDENTAL OR CONSEQUENTIAL DAMAGES, EVEN IF ADVISED OF THE POSSIBLITY OF SUCH DAMAGES.
RealSystem
The RealNetworks® RealProxy™ Server is included under license from RealNetworks, Inc. Copyright 1996-1999, RealNetworks, Inc. All
rights reserved.
SNMP
Copyright (C) 1992-2001 by SNMP Research, Incorporated.
This software is furnished under a license and may be used and copied only in accordance with the terms of such license and with the
Inclusion of the above copyright notice. This software or any other copies thereof may not be provided or otherwise made available to any
other person. No title to and ownership of the software is hereby transferred. The information in this software is subject to change without
notice and should not be construed as a commitment by SNMP Research, Incorporated.
vi
Third Party Copyright Notices
vii
Blue Coat Educational Services — BCCPA Course v 1.7.2
INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. Except as contained in this notice, the name of a copyright
holder shall not be used in advertising or otherwise to promote the sale, use or other dealings in this Software without prior written
authorization of the copyright holder.
Copyright (C) The Internet Society (1999). All Rights Reserved.
This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or
assist in its implementation may be prepared, copied, published and distributed, in whole or in part, without restriction of any kind,
provided that the above copyright notice and this paragraph are included on all such copies and derivative works. However, this document
itself may not be modified in any way, such as by removing the copyright notice or references to the Internet Society or other Internet
organizations, except as needed for the purpose of developing Internet standards in which case the procedures for copyrights defined in the
Internet Standards process must be followed, or as required to translate it into languages other than English.
The limited permissions granted above are perpetual and will not be revoked by the Internet Society or its successors or assigns.
This document and the information contained herein is provided on an "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY
WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES
OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Table of Contents
Configuring Services 19
HTTP Compression 27
Configuration Archive 49
ix
Blue Coat Educational Services — BCCPA Course v 1.7.2
X
Blue Coat SG Initial Configuration
This lab w a l k s y o u t h r o u g h the steps required to configure a Blue Coat® SG™ appliance that has
never been configured or that has been r e t u r n e d to its factory defaults.
Objectives
• Assigning a n e t w o r k a d d r e s s to the Blue Coat SG.
Scenario
Your first task as a s y s t e m administrator is to m a k e the Blue Coat SG accessible on the network,
regardless of w h e t h e r the appliance is just o u t of the box or restored to factory default settings.
Note: The screen c a p t u r e s are taken from a Blue Coat SG 400, r u n n i n g SGOS 4.2.3.1
• PuTTY 0.57 or h i g h e r
• Firefox® 2.0.02 or higher
All three applications are available on the Internet. Alternatively, y o u can use any other software
y o u m a y be familiar w i t h . (For example, y o u can use HyperTerminal® instead of Tera Term Pro.)
Steps
You can access y o u r Blue Coat SG using three different m e t h o d s . The procedure for configuring
y o u r appliance d e p e n d s on y o u r access m e t h o d . Each p r o c e d u r e is outline separately:
1
Blue Coat Educational Services — BCCPA Course v 1.7.2
1. Launch Putty a n d refer to the Serial Console Access section of the S t u d e n t Reference sheet for
the IP Address a n d port number for y o u r t e r m i n a l server settings. Your configuration s h o u l d
look similar to the screen c a p t u r e below.
2. Click Open.
3. You s h o u l d n o w see a blank screen. This is normal. Press the Enter key three times a n d the
w e l c o m e screen a p p e a r s . If y o u have p r e s s e d t h e Enter key three times a n d do not see t h e
w e l c o m e p r o m p t , contact y o u r instructor.
4. Follow the steps for the "Using t h e Serial Cable" p r o c e d u r e in t h e following section, starting
from Step 4.
2
Blue Coat SG Initial Configuration
1. L a u n c h Tera Term Pro from the Start m e n u . From the initial configuration screen select the
Serial option a n d the a p p r o p r i a t e serial port from the Port: d r o p - d o w n m e n u (typically COM1).
Click OK.
3. Press the Enter key three times to activate the Initial Setup Console wizard. A welcome
message a p p e a r s in the serial w i n d o w .
Note: If at a n y time y o u m a k e a mistake a n d w a n t to exit the Initial Setup Console, press the
Esc key. This will let y o u exit the Initial Setup Console w i z a r d w i t h o u t saving any of
the changes y o u m a d e . See the topic Restarting the Initial Setup Console in the
A d d i t i o n a l Reading section that follows this lab.
3
Blue Coat Educational Services — BCCPA Course v 1.7.2
Note: If the desired response is w i t h i n the s q u a r e brackets in the Setup Console, it is the
default response, a n d pressing the Enter key will invoke it. To a n s w e r Y e s / N o
questions, press the Y or N key.
4
Blue Coat SG Initial Configuration
WARNING: If y o u secure the serial port, the Blue Coat SG asks y o u for a password every time
y o u access the serial console. This increases security, but be aware that if y o u lose
your password, y o u w i l l be unable to access the serial console. If that occurs, y o u
may n e e d to R M A the Blue Coat SG to Blue Coat.
9. T h e system asks if you want to set up an access control list. For the prompt Would you l i k e
t o r e s t r i c t a c c e s s t o a n a u t h o r i z e d w o r k s t a t i o n ? Y/N [Yes], type N and
press the Enter key.
If you configure the access control list, you limit administrative access to clients whose IP
addresses you select. In practice, this is a good idea because it increases security. However,
you will not configure the access control list during training.
10. The system asks if you want to set up the forwarding host. For the prompt Would you l i k e
to s e t up t h e f o r w a r d i n g h o s t now? Y/N [No], type N and press the Enter key.
11. You have completed the initial setup. The Blue Coat SG will be available to the network in
about 10 seconds. You should see a screen similar to the one shown below. You can press the
Enter key three times to activate the serial console. Or access the URL indicated in the message
to access the M a n a g e m e n t Console.
5
Blue Coat Educational Services — BCCPA Course v 1.7.2
Using a W e b Browser
Before accepting this certificate, vou should examine this sites cerbhcate careFullv. Hie you
willing to to accept this certificate for the purpose of identifying the Web site 172.2.15.20!?
j Examine Certificate... j
3. The b r o w s e r displays the Proxy SG Initial Configuration screen. You need to confirm the identity
of y o u r Blue Coat SG. Also verify the serial n u m b e r a n d t h e m o d e l of the unit.
6
Blue Coat SG Initial Configuration
4. Locate the Network Parameters dialog box in the Web browser and enter the IP Address, Subnet
Mask, Gateway, and DNS Server values. Your instructor should have given you the appropriate
parameters.
7
Blue Coat Educational Services — BCCPA Course v 1.7.2
8
Blue Coat SG Initial Configuration
7. You need to define the Default Policy for Proxied Services. Select Allow, as s h o w n in the screen
capture below.
The system asks if y o u w a n t to secure the serial port. Do not enable the Secure Serial Port
option.
11. You have successfully configured y o u r Blue Coat SG. The final screen s h o w s the connection
p a r a m e t e r s that y o u need to connect to Blue Coat SG:
9
Blue Coat Educational Services — BCCPA Course v 1.7.2
O Serial Number
• Model
O MAC address
O Software
10
Blue Coat SG Initial Configuration
4. You s h o u l d n o w see a w e l c o m e screen similar to the one s h o w n in the screen capture below.
Verify that y o u h a v e the correct version of the SGOS installed.
11
Blue Coat Educational Services — BCCPA Course v 1.7.2
12
Upgrading Blue Coat SG OS
Objective
U p g r a d i n g (or d o w n g r a d i n g ) the OS version on the Blue Coat SG.
Scenario
You h a v e m u l t i p l e Blue Coat SGs in y o u r organization. You h a v e been given the assignment of
u p g r a d i n g to the latest version of the Blue Coat SG o p e r a t i n g system. You w a n t to d o w n l o a d the
OS i m a g e to a Web server local to y o u r organization a n d then u p g r a d e the different Blue Coat SGs.
Note: The u s e of Director is not discussed in this lab; however, if y o u have m o r e t h a n 4 Blue
Coat SG appliances, y o u s h o u l d u s e Director for this procedure.
Steps
1. Before u p g r a d i n g , check the current version r u n n i n g on y o u r Blue Coat SG. Launch Putty a n d
refer to the Serial Console Access section of the Student Reference sheet for the IP Address a n d
port number for y o u r t e r m i n a l server settings. Your configuration s h o u l d look similar to the
screen c a p t u r e below.
2. Click Open.
3. You s h o u l d n o w see a blank screen. This is normal. Press the Enter key three times a n d the
w e l c o m e screen a p p e a r s . If y o u h a v e pressed the Enter key three times a n d do not see the
w e l c o m e p r o m p t , contact y o u r instructor.
13
Blue Coat Educational Services — BCCPA Course v 1.7.2
>en
>password:****
>show ver
M a k e note of the current version.
7. T h r o u g h the M a n a g e m e n t Console, select Maintenance > Upgrade a n d then enter the URL y o u r
Instructor gives y o u for the i m a g e to be d o w n l o a d e d a n d press the Download b u t t o n .
9. After rebooting, verify y o u are at a later version t h r o u g h the CLI as described in Step 5 above.
14
Upgrading Blue Coat SG OS
2. Fill out the request information on the p a g e s h o w n in the screen capture above a n d then click
the SUBMIT b u t t o n . M a k e sure that y o u h a v e entered the correct e-mail address.
Note: The s y s t e m asks y o u for the Blue Coat SG serial number. You can copy a n d paste the
serial n u m b e r from the h o m e p a g e of the M a n a g e m e n t Console.
Important: You cannot p e r f o r m this step d u r i n g the lab session because the serial n u m b e r s
are tied to specific e-mail addresses.
4. D o w n l o a d the file from the link that y o u received. The link is similar to
http://www.bluecoat.com/[...]/2xx.chk.
15
Blue Coat Educational Services — BCCPA Course v 1.7.2
Additional Tasks
• 8 d a t a bits, parity n o n e
• 1 s t o p bit
• no flow control
16
Upgrading Blue Coat SG OS
1. O p e n PuTTY. T y p e the IP address of the Blue C o a t SG in the Host Name (or IP address) f i e l d a n d
select SSH as the Protocol o p t i o n . C l i c k Open.
17
Blue Coat Educational Services — BCCPA Course v 1.7.2
6. Press Ctrl+Z, then press Ctrl+Z again. Type r e s t a r t u p g r a d e . The Blue Coat S G executes
the SGOS i m a g e y o u chose. You n o w can r e t u r n to t h e serial console or close t h e w i n d o w .
18
Configuring Services
Objective
Setting a service to allow H T T P traffic to be intercepted on port 8072.
Scenario
The Services feature in the Blue Coat® SG™ M a n a g e m e n t Console allows y o u to create services to
detect certain protocols. T h e Blue Coat SG can detect s o m e k n o w n protocols a n d — d e p e n d i n g on
y o u r policy — intercept or b y p a s s traffic that uses those protocols.
Steps
The lab is p e r f o r m e d in four stages:
1. Setting the default proxy policy to Allow.
2. In the Default Proxy Policy section, m a k e sure that the Allow option is selected. Click Apply if y o u
n e e d e d to c h a n g e the policy.
19
Blue Coat Educational Services — BCCPA Course v 1.7.2
3. Click OK.
4. Click the Apply b u t t o n in the M a n a g e m e n t Console.
20
Configuring Services
3. N o t e the results: You s h o u l d be able to access the site t h r o u g h the Blue Coat SG.
3. Verify that the On column is set to Yes on the H T T P Port 8080 row. Click Apply.
21
Blue Coat Educational Services — BCCPA Course v 1.7.2
22
Explicit Proxy Configuration and Testing
Objectives
• Configuring y o u r b r o w s e r to use proxy traffic via the ProxySG
Scenario
In this exercise, y o u will configure y o u r Firefox b r o w s e r to access the Web via the ProxySG. You
will c o m p a r e the b r o w s e r request based on w h e t h e r it is using a proxy (in explicit mode) or not.
Steps
1. First configure Firefox to not go t h r o u g h a proxy by selecting Tools > Options > Advanced in
the m e n u bar.
2. Click on the Network tab then the Settings button in the Connections section. The Connection
Settings dialog box a p p e a r s
23
Blue Coat Educational Services — BCCPA Course v 1.7.2
6. Stop the c a p t u r e a n d note the Ethereal packet capture such as circled in the screen capture
below:
24
Explicit Proxy Configuration and Testing
7. Configure Firefox to access the Web via the Blue Coat SG on p o r t 8080 a n d a d d y o u r Blue Coat
SG's IP address to the No Proxy For dialog box. Click OK.
9. Access www.google.com.
10. Stop the c a p t u r e a n d note the Ethereal packet capture this time as it goes t h r o u g h the proxy.
The difference is circled in the screen capture below.
Note: The definition of explicit proxy is exactly w h a t is stated in Step 15. The destination IP
a d d r e s s for the browser HTTP request is the IP a d d r e s s of the proxy a n d not the one of
the OCS.
25
Blue Coat Educational Services — BCCPA Course v 1.7.2
12. You m a y also w a n t to see the differences in the Ethereal c a p t u r e m e t h o d s based on different
filter o p t i o n s . The table below s h o w s s o m e of the w i d e l y u s e d filter options in Ethereal packet
capture
Filter O p t i o n Effect
http.request.method == "GET" C a p t u r e packets w i t h a "GET" request in
them.
tcp.port == 80 C a p t u r e packets w i t h destination TCP
port 80
ip.addr == a.b.c.d C a p t u r e packets w i t h IP a d d r e s s a.b.c.d
ip.addr == a.b.c.d && Capture packets w i t h IP a d d r e s s a.b.c.d
http.request.method == "GET" a n d a GET request.
26
HTTP Compression
Objective
Configuring the Blue Coat® SG™ to enable HTTP client-side a n d server-side compression
Scenario
Browsers a n d Web servers can negotiate the d a t a format for the content delivery. Pages can be s e n t
from the Web server to the b r o w s e r in plain ASCII text or in c o m p r e s s e d format (typically g z i p or
deflate). The Blue Coat SG can retrieve c o m p r e s s e d or u n c o m p r e s s e d content a n d serve it
c o m p r e s s e d or u n c o m p r e s s e d ; a n y combination is acceptable.
In this lab y o u configure the Blue Coat SG to retrieve content from an OCS a n d deliver it to the
client c o m p r e s s e d , if the client s u p p o r t s compression, even w h e n the OCS does and does not
s u p p o r t compression.
• D o w n l o a d a n d install Ethereal® vO.10.10 from the local website to analyze packet capture
statistics.
Steps
Configuring y o u r Blue Coat SG to s u p p o r t HTTP compression is d o n e in t w o steps:
• Client side compression
27
Blue Coat Educational Services — BCCPA Course v 1.7.2
Client-Side Compression
1. T h r o u g h the M a n a g e m e n t Console, select Configuration > Policy > Visual Policy Manager, a n d
then click the Launch button.
2. From the Visual Policy M a n a g e r (VPM) m e n u bar, select Policy > Add Web Content Layer The
A d d N e w Layer dialog box a p p e a r s .
3. In t h e A d d N e w Layer dialog box, t y p e Client Side Compression in the the Layer Name d i a l o g
box a n d then click OK. In the VPM, t h e layer w i t h a n e w e m p t y rule appears.
4. Right-click in the Action field of the n e w rule a n d select Set from the d r o p - d o w n m e n u . T h e
Set Action Object dialog box a p p e a r s .
5. In the Set Action Object dialog box, click the New b u t t o n a n d t h e n select Set Client HTTP
Compression from the d r o p - d o w n m e n u . The A d d Client H T T P Compression Object dialog
box a p p e a r s as s h o w n in the screen c a p t u r e below.
x
TP -> 1
>! In >i" ?" n L H t i ' 'i"in £J R
Name: rciientHTTPCompressionl | ;
[ OK | | Cencel | | Help |
6. Accept the default values a n d click OK. T h e n click OK on the Set Action Object dialog box. The
V P M s h o u l d look like the screen c a p t u r e below.
Server-Side Compression
1. Configure y o u r Internet Explorer® b r o w s e r to point t o w a r d s y o u r proxy a n d m a k e s u r e that
the H T T P 1.1 option is not enabled in y o u r browser settings.
28
HTTP Compression
4. Notice the response from the OCS, in particular the lack of an Accept Encoding h e a d e r in the
client request.
5. From the Visual Policy M a n a g e r (VPM) m e n u bar, select Policy > Add Web Content Layer The
A d d N e w Layer dialog box a p p e a r s .
6. In the A d d N e w Layer dialog box, type Server Side Compression in the the Layer Name dialog
box a n d then click OK. In the VPM, the layer w i t h a n e w e m p t y rule appears.
7. Right-click in the Action field of the default rule a n d then select Set from the d r o p - d o w n m e n u .
The Set Action Object dialog box a p p e a r s .
8. In the Set Action Object dialog box, click the New b u t t o n a n d then select Set Server HTTP
Compression from the d r o p - d o w n m e n u . The A d d Server H T T P Compression Object dialog
box a p p e a r s .
29
Blue Coat Educational Services — BCCPA Course v 1.7.2
9. Select the Always request HTTP Compression option in t h e A d d Server HTTP Compression
Object dialog box. M a k e s u r e that y o u uncheck the Include unsupported client compression types
box.
10. Click OK a n d OK a g a i n on the Set Action Object d i a l o g box. The V P M s h o u l d look like the
screen capture below.
16. Stop the packet c a p t u r e in Ethereal. Notice that the Blue Coat SG gets c o m p r e s s e d d a t a from
www.microsoft.com, d e c o m p r e s s e s the d a t a a n d serves only u n c o m p r e s s e d d a t a to the client.
ffl
Frame 35 (1514 bytes on w i r e , 1514 byres c a p t u r e d )
SI E t h e r n e t I I , S r c : 0 0 : 1 4 : 6 a : 5 0 : f 2 : f f , D s t : 00:d0:83:04:aa:d8
IB i n t e r n e t P r o t o c o l , s r c Addr: 207.68.173.76 (207.68.173.76), Dst Addr : 172 . 2.15. 201 (172. 2.15. 201)
SiTransmission c o n t r o l P r o t o c o l , s r c p o r t : h t t p ( 8 0 ) , Dst P o r t : 1248 (1248), s e q : 1, Ack: 537, L e n : 1448
B Hypertext T r a n s f e r p r o t o c o l
IB H T T P / 1 . 1 200 O K \ r \ n
Date: Mon, 02 Oct 2006 19:15:26 GMT\r\n
server: M i c r o s o f t - n s / 6 . 0 \ r \ n
P3P: CP="BUS CUR CONO FIN IVDO ONL OUR PHY SAMO T E L o " \ r \ n
s : appB32\r\n
x-Powered-By: A S P . N E T \ r \ n
X - A s p N e t - V e r s i o n : 2. 0. 50727\r\n
pragma: n o - c a c h e \ r \ n
cache-control: no-cache\r\n
content-Type: text/html; charset=utf-8\r\n
cache-control: private\r\n
c o n t e n t - l e n g t h : 11873\r\n
connection: K e e p - A l i v e \ r \ n
f content-Encoding: gzipV"\n ^
V
* - W i - - '
content-encoded e n t i t y body ( g z i p )
m Line-based text data: text/html
30
HTTP Compression
17. O p e n the M a n a g e m e n t Console a n d select Statistics tab > HTTP/FTP History > Server Comp.
Gain tab. You can review a report that s h o w s the effect of compression, from the server point
of view.
Policy Clean-up
1. To set the policy back to dafault for the next lab, right-click each layer a n d select Delete from
the d r o p d o w n m e n u .
31
Blue Coat Educational Services — BCCPA Course v 1.7.2
32
Authentication Configuration — IWA
Objective
Configuring an authentication realm for IWA (Integrated W i n d o w s Authentication).
Scenario
In this exercise, y o u will create a n e w IWA authentication realm so that y o u can create policies for
i n d i v i d u a l users a n d g r o u p s . This also allows y o u to generate reports based on user n a m e s a n d
not s i m p l y IP a d d r e s s e s or workstation h o s t n a m e s .
Once y o u h a v e identified a suitable machine, y o u can launch the BCAAA installation. You
will navigate t h r o u g h a series of screens:
a. On the Welcome screen, click Next to begin the installation.
b. Select the location w h e r e y o u w a n t to place the files n e e d e d for BCAAA to run. Either
select the default or pick a different p a t h on y o u r system, a n d then click Next.
c. Select a p o r t n u m b e r w h e r e y o u w a n t B C A A A to listen for the incoming connection.
The default v a l u e is 16101; however, y o u can c h a n g e it as long as y o u m a k e sure that this
c h a n g e is reflected in the configuration of the IWA realm in the Blue Coat SG. Click Next.
d. Set the n u m b e r of threads. You can h a v e up to 99 threads listening for a connection on
any m a c h i n e . H o w e v e r , the r e c o m m e n d e d n u m b e r is t w o . Click Next.
Note: You can install multiple BCAA agents on separate machines of y o u foresee m a n y
connections to BCAAA.
e. B C A A A m a y require an SSL connection from the Blue Coat SG. Enter the Certificate
Subject. You can leave the default v a l u e (blank), w h i c h assumes the machine n a m e as
the value. Click Next.
f. You are n o w a s k e d to save the certificate. Accept the default value of no. Click Next.
g. As an option, y o u m a y require SSL connections between BCAAA a n d the Blue Coat
SG. You do not n e e d to enforce it. You also do not need to obtain a valid certificate to
connect. Click Next.
h. The installation p r o g r a m n o w s h o w s y o u a s u m m a r y of the options that y o u have
selected. If y o u are satisfied, complete the installation. Otherwise, go back a n d change
the options y o u need.
33
Blue Coat Educational Services — BCCPA Course v 1.7.2
Steps
1. T h r o u g h the M a n a g e m e n t Console, select Configuration > Authentication > IWA a n d then click the
IWA Realms tab. Click the New button.
• Port: 16101
3. Click OK.
34
Authentication Configuration — IWA
6. Select the IWA General tab. Verify that y o u r settings look the s a m e as those in the screen c a p t u r e
below a n d t h e n click Apply.
The configuration is n o w complete. The n e w realm is available to the Blue Coat SG to create
policies.
Note: Creating a realm d o e s not force the users to authenticate n o r initiate the logging and
reporting by u s e r n a m e . You need to create an a p p r o p r i a t e policy to configure the
Blue Coat SG to request users to authenticate.
35
Blue Coat Educational Services — BCCPA Course v 1.7.2
4. In t h e Visual Policy Manager, select Policy > Add Web Access Layer. The Add Layer dialog box
appears.
5. Click OK to accept the default Web Access Layer n a m e .
6. Right-click in the Source field of the n e w l a y e r ' s default rule a n d t h e n click Set from the
d r o p - d o w n m e n u . T h e Set Source Object dialog box a p p e a r s .
7. In the Set Source Object dialog box, click New a n d then select User from the d r o p - d o w n m e n u .
The A d d User Object dialog box a p p e a r s .
36
Authentication Configuration — IWA
In the A d d User Object dialog box, select the realm Blue_CoatJWA from the Authentication
Realm d r o p - d o w n m e n u .
Note: If a list of users a p p e a r s similar to the screen shot below, y o u r IWA realm
configurations are correct a n d the lab is complete. You can n o w proceed to the ' Policy
C l e a n - u p " section.
37
Blue Coat Educational Services — BCCPA Course v 1.7.2
Note: If the realm w a s not set up correctly, the process times out.
Policy Clean-up
1. To set the policy back to default for the next lab, t h r o u g h the M a n a g e m e n t Console, select
Policy > Visual Policy Manager and click Launch.
2. Right-click each Policy layer tab a n d select Delete from the d r o p d o w n m e n u . Click the Install
Policy b u t t o n to accept the n e w policy.
38
Authentication Configuration — LDAP
Objective
Configuring an authentication realm for LDAP™.
Scenario
A u t h e n t i c a t i o n is one of the m o s t complex but important aspects of policy. In this exercise, y o u
will create a n e w Lightweight Directory Access Protocol (LDAP) authentication realm so policy
can be w r i t t e n to m a k e use of it.
Steps
T h r o u g h the M a n a g e m e n t Console, select Configuration > Authentication > LDAP > LDAP
Realms. Click the New button. An A d d LDAP Realm w i n d o w a p p e a r s .
39
Blue Coat Educational Services — BCCPA Course v 1.7.2
2. I n t h e A d d L D A P R e a l m d i a l o g b o x u s i n g these p a r a m e t e r s :
a. Realm name: Blue_Coat_LDAP
b. Type of LDAP Server: Microsoft Active Directory
c Primary server host: 172.16.90.110
d. Port: 389
e. User attribute type: sAMAccountName
40
Authentication Configuration — LDAP
6. T h e A d d L D A P Base D N d i a l o g b o x appears.
8. Click OK.
41
Blue Coat Educational Services — BCCPA Course v 1.7.2
10. To give the Blue Coat SG the capability to search the directory, y o u n o w m u s t s u p p l y a
u s e r n a m e a n d p a s s w o r d of a u s e r w i t h i n the L D A P server that has the a p p r o p r i a t e
credentials. To do this, select t h e LDAP Search & Groups tab, a n d then type the following
information into the a p p r o p r i a t e fields as s h o w n in the screen c a p t u r e below:
a. Anonymous Search: U n c h e c k e d
b. Search User DN: cn=bcadmin, cn=users, dc=sunnyvale, dc=training, dc=bluecoat,
dc=com
Note: Creating a realm d o e s not force the users to authenticate nor initiate the logging a n d
reporting by u s e r n a m e . You need to create an a p p r o p r i a t e policy to configure the
Blue Coat SG to request users to authenticate.
2. In the Visual Policy Manager, select Policy > Add Web Access Layer and accept the default
name.
42
Authentication Configuration — LDAP
5. In the Add User Object d i a l o g box, select the r e a l m AD-LDAP f r o m the Authentication Realm
drop-down menu.
43
Blue Coat Educational Services — BCCPA Course v 1.7.2
6. Click the Browse b u t t o n . If the realm w a s set up correctly, a list of users a p p e a r s . If the realm
w a s not set up correctly, the process times out.
7. W h e n y o u are successful, click Cancel, Cancel a n d Cancel to get y o u back to Visual Policy
Manager. Exit Visual Policy M a n a g e r w i t h o u t installing the policy or accepting a n y changes
m a d e to the policy. If y o u are not successful, the b r o w s e r w i n d o w will h a n g .
44
Creating Basic Policy
Objective
• I m p l e m e n t i n g a basic policy using an authentication realm
Scenario
You w a n t to create a very basic policy to test that t h e Blue Coat SG is configured correctly a n d that
the authentication realms are w o r k i n g as expected.
• This lab also a s s u m e s that y o u r default policy is already set to Allow. This s h o u l d be the case if
y o u r class is following the exercises in order.
Steps
1. T h r o u g h the M a n a g e m e n t Console, select Configuration > Policy > Visual Policy Manager, a n d then
click the Launch button.
2. From the Visual Policy M a n a g e r (VPM) m e n u bar, select Policy > Add Web Authentication
Layer. The A d d N e w Layer dialog box a p p e a r s .
3. In the A d d N e w Layer dialog box, accept the default n a m e a n d then click OK. In the VPM, the
layer w i t h a n e w e m p t y rule a p p e a r s .
4. Right-click in the Action field of the n e w rule a n d select Set from the d r o p - d o w n m e n u . The
Set Action Object dialog box a p p e a r s .
5. In the Set Action Object dialog box, click the New button a n d then select Force Authenticate
from the d r o p - d o w n m e n u . The A d d Force Authenticate Object dialog box appears.
6. In the A d d Force A u t h e n t i c a t e Object dialog box, type Blue_coat_IWA in the Name field.
45
Blue Coat Educational Services — BCCPA Course v 1.7.2
Click OK a n d t h e n click OK in the Set Action Object dialog box. The V P M s h o u l d look like the
screen c a p t u r e below:
9. From V P M m e n u bar, select Policy>Add Web Access Layer from the d r o p - d o w n m e n u . The
A d d N e w Layer dialog box a p p e a r s .
10. In the A d d N e w Layer dialog box, accept t h e default n a m e a n d then click OK. The layer w i t h a
n e w e m p t y rule a p p e a r s in the VPM.
11. Right-click in the Destination field of the n e w rule a n d then select Set from the d r o p - d o w n
m e n u . The A d d Destination Object dialog box a p p e a r s .
12. In the A d d Destination Object dialog box, click the New button a n d then select Destination
Host/Port from the d r o p - d o w n m e n u . The A d d Destination H o s t / P o r t Object dialog box
appears.
14. Click OK in the Set Destination Object d i a l o g box. The V P M s h o u l d look like the screen
c a p t u r e below.
46
Creating Basic Policy
Policy Clean-up
1. To set the policy back to dafault for the next lab, right-click each layer a n d select Delete from
the d r o p d o w n m e n u . Click the Install Policy b u t t o n to accept the n e w policy.
47
Blue Coat Educational Services — BCCPA Course v 1.7.2
48
Configuration Archive
Objective
Backing up Blue Coat SG configurations.
Scenario
Before m a k i n g changes to the Blue Coat SG, it is a g o o d idea to back up the current configuration
in case y o u need to revert quickly to the last k n o w n w o r k i n g state. The M a n a g e m e n t Console
offers an easy-to-use feature that allows y o u to view the current Blue Coat SG configuration a n d
load a previously saved configuration.
Steps
1. T h r o u g h the M a n a g e m e n t Console, select Configuration > General > Archive. The Archive
Configuration dialog box a p p e a r s in the M a n a g e m e n t Console w i n d o w .
Note: This will not allow y o u to install the configurations on a n o t h e r Blue Coat SG because
of s o m e h a s h e d p a s s w o r d values. However, it will allow y o u to completely restore the
configuration for y o u r system.
2. In the View Current Configuration section, select Configuration - expanded from the View File
d r o p - d o w n m e n u , a n d then click the View button.
49
Blue Coat Educational Services — BCCPA Course v 1.7.2
A n e w W e b b r o w s e r w i n d o w a p p e a r s c o n t a i n i n g t h e c o n f i g u r a t i o n text.
50
Content Filtering — Configuration
Objective
Installing a content-filtering database.
Scenario
Blue Coat SG s u p p o r t s several content-filtering databases. They are Blue Coat Web Filter, S m a r t
Filter, SurfControl, Websense, a n d W e b w a s h e r a n d several others.
The c o m p a n i e s ' software differs in cost, n u m b e r of URLs the database can contain, frequency of
d a t a b a s e u p d a t e s , n u m b e r of categories, accuracy in category assignments, technology u s e d to
categorize the database, a n d w h e t h e r Web sites can be assigned to multiple categories.
Once y o u h a v e chosen a content-filtering vendor, y o u provide y o u r subscription credentials to the
Blue Coat SG, a n d it d o w n l o a d s the database. You also m a y set up the Blue Coat SG to check for
u p d a t e s a n d d o w n l o a d t h e m a s they become available.
51
Blue Coat Educational Services — BCCPA Course v 1.7.2
Steps
1. P r o v i d e the Blue Coat SG w i t h a p a t h to d o w n l o a d Blue Coat Web Filter software. T h r o u g h the
M a n a g e m e n t Console, select Configuration > Content Filtering > Blue Coat. The Blue Coat Web
Filter w i n d o w displays in the M a n a g e m e n t Console.
52
Content Filtering — Configuration
6. Activate the d a t a b a s e within the Blue Coat SG by selecting Configuration > Content Filtering >
General. In the Providers section, click in the check box next to Blue Coat Web Filter.
53
Blue Coat Educational Services — BCCPA Course v 1.7.2
54
Content Filtering — Policy
Objectives
• Blocking a URL category w i t h content filtering.
• Creating y o u r o w n c u s t o m category.
Scenario
Once content-filtering software has been installed on the Blue Coat SG, y o u can write policies to
use the d a t a b a s e to prevent clients on y o u r n e t w o r k from accessing certain types of Web site
content. You also can create y o u r o w n c u s t o m d a t a b a s e categories, allowing y o u to write policies
for different servers on y o u r network, p a r t n e r sites, or a p p r o v e d leisure sites.
Steps
55
Blue Coat Educational Services — BCCPA Course v 1.7.2
T h r o u g h the M a n a g e m e n t Console, select Configuration > Policy > Visual Policy Manager a n d then
click the Launch b u t t o n . (If the V P M is a l r e a d y open, close a n d then relaunch it.)
In Visual Policy Manager, select Policy > Add Web Access Layer. In t h e A d d N e w Layer dialog
box, give the layer a n a m e that m a k e s sense to y o u . (In the screen captures below, the layer is
n a m e d URL Filter.)
5. Right-click the Destination field of the n e w rule, a n d then click Set in the d r o p - d o w n m e n u .
The Set Destination Object dialog box a p p e a r s .
6. Click the New b u t t o n a n d then select Request URL Category from the d r o p - d o w n m e n u . The
A d d Request URL C a t e g o r y Object dialog box a p p e a r s .
56
Content Filtering — Policy
In the A d d Request URL Catagory Object box, type Travel in the Name field. In the Categories
w i n d o w , click on the plus sign next to Blue Coat to display the list of categories.
Note: A category object d o e s n ' t h a v e to belong to just one category. You can create
categories to create a c u s t o m category g r o u p . Keep this in m i n d w h e n y o u create
category objects a n d choose n a m e s carefully.
Click the check box next to Travel, a n d t h e n click OK. The n e w Travel object appears in the Set
Destination Object dialog box
9. Click OK.
57
Blue Coat Educational Services — BCCPA Course v 1.7.2
10. Your policy s h o u l d look like the screen c a p t u r e below. In t h e VPM, click the Install Policy
button.
58
Content Filtering — Policy
Create a n e w destination trigger in the A d d Request URL Category Object dialog box:
a. Right-click the Destination field of the n e w policy rule.
b. Select Set from the d r o p - d o w n m e n u .
c. In the Set Destination Object dialog box, click the New button, then select Request
URL Category from the d r o p - d o w n m e n u .
d. Type Custom Block in t h e Name field.
e. H i g h l i g h t Categories > Policy.
f. Click the Add b u t t o n
The Object N a m e dialog box a p p e a r s
4. N a m e the object by t y p i n g CustomBlock in the w i n d o w a n d then click OK. This step creates a
c u s t o m category. However, the category is empty. You will n o w associate d o m a i n s w i t h it.
5. In the A d d Category Object dialog box, highlight Categories > Policy > CustomBlock.
However, do not click the check box beside it. Click the Edit URLs button
59
Blue Coat Educational Services — BCCPA Course v 1.7.2
8. In the Add Request URL Category Object d i a l o g box, c l i c k in the check b o x beside the c a t e g o r y
n a m e CustomBlock.
9. C l i c k OK.
60
Content Filtering — Policy
10. In the Set Destination Object dialog box, highlight CustomBlock from the list of destination
objects.
61
Blue Coat Educational Services — BCCPA Course v 1.7.2
13. With y o u r browser explicitly proxied to y o u r Blue Coat SG on port 8080, test the n e w policy
by trying to access the Yahoo, Forbes, a n d Asterix sites. You s h o u l d see an Access Denied
m e s s a g e each time.
Policy Clean-up
1. To set the policy back to default for the next lab, t h r o u g h the M a n a g e m e n t Console, select
Policy > Visual Policy Manager and click Launch.
2. Right-click each Policy layer tab a n d select Delete from the d r o p d o w n m e n u . Click the Install
Policy b u t t o n to accept the n e w policy.
62
Using the Local Database
Objectives
• Creating a s h a r e d repository of m a n u a l l y categorized files to share a m o n g multiple Blue Coat
SG appliances
Scenario
Blue Coat SG offers a d m i n i s t r a t o r s the ability to easily define c u s t o m categories a n d then e n s u r e
they are automatically u p d a t e d from a local central server. The Blue Coat SG enables
a d m i n i s t r a t o r s to create their o w n category list, store it on a local server, a n d then periodically
d o w n l o a d the list if u p d a t e s occur. This exercise s h o w s h o w local database content filtering can be
i m p l e m e n t e d u s i n g the Blue Coat SG.
Steps
1. Create a text file w i t h the following syntax a n d t h e category names a n d URLs y o u w a n t to
h a v e in the list:
2. Use the FTP location on y o u r s t u d e n t h a n d out to post his file on the training room internal
Web site as s h o w n in the screen capture below:
On the Local Database tab in the Download section, type the adminitrator u s e r n a m e given to
y o u by then instructor. Click Change Password a n d use the p a s s w o r d given to y o u by y o u r
instructor.
63
Blue Coat Educational Services — BCCPA Course v 1.7.2
64
Using the Local Database
11. Launch the V P M a n d create a Web Access Layer with a rule to block the blacklist category of
y o u r local database. (If the V P M is already open, close a n d then re-launch it.)
12. Click the Install Policy button.
14. Test the policy by accessing the denied websites y o u defined in y o u r local database file.
Policy Clean-up
1. To set the policy back to dafault for the next lab, t h r o u g h the M a n a g e m e n t Console, select
Policy > Visual Policy Manager and click Launch.
2. Right-click each Policy layer tab a n d select Delete from the d r o p d o w n m e n u . Click the Install
Policy b u t t o n to accept the n e w policy.
65
Blue Coat Educational Services — BCCPA Course v 1.7.2
66
Managing Downloads — File Types and Exceptions
Files d o w n l o a d e d from the Internet or sent by e-mail can pose a h a z a r d to the enterprise. Files
m a y contain viruses or other m a l w a r e . In addition, allowing staff u n l i m i t e d ability to surf the
Internet d u r i n g w o r k i n g h o u r s can reduce productivity a n d expose e m p l o y e e s to materials that
they m a y find offensive.
The Blue Coat® SG™ enables y o u to block d o w n l o a d s of selected types of information based u p o n
various criteria s u c h as URL category, file MIME type, file extension a n d a p p a r e n t data type. The
Blue Coat® SG™ also enables y o u to create exceptions the d o w n l o a d limitations y o u h a v e set.
Objectives
Becoming familiar w i t h Web Access Layer policy in the Visual Policy M a n a g e r (VPM)
Scenario
In this lab, y o u create policy t h r o u g h the Blue Coat SG to keep users from d o w n l o a d i n g several
different types of information:
Steps
2. From the Visual Policy M a n a g e r (VPM) m e n u bar, select Policy > Add Web Access Layer. T h e
A d d N e w Layer dialog box a p p e a r s .
3. In the A d d N e w Layer dialog box, n a m e the layer Block Downloads Layer a n d click OK. The
n e w layer w i t h an e m p t y rule a p p e a r s in the VPM.
67
Blue Coat Educational Services — BCCPA Course v 1.7.2
6. Right-click the Destination field of the n e w rule a n d then select Set from the d r o p - d o w n m e n u .
The Set Destination Object dialog box a p p e a r s .
7. In the Set Destination Object dialog box, click New a n d then select HTTP MIME Types from the
d r o p - d o w n m e n u . The A d d H T T P MIME Type Object dialog box a p p e a r s .
68
Managing Downloads — File Types and Exceptions
8. In the A d d HTTP MIME Types Object dialog box, n a m e the object PDF_Files. Then scroll
d o w n the list of MIME t y p e s to find application/pdf a n d select it. Click OK.
9. Confirm the object n a m e in the Set Destination Object dialog box a n d then click OK.
11. Test the n e w rule by launching y o u r browser set to use y o u r Blue Coat SG as the proxy on port
8080 a n d accessing a site that offers PDF d o w n l o a d s . For Example:
h t t p : / / w w w . b l u e c o a t . c o m / r e s o u r c e s / d a t a s h e e t s . h t m l . W h e n y o u a t t e m p t to d o w n l o a d a
PDF file, y o u s h o u l d receive a m e s s a g e telling y o u that access is denied.
69
Blue Coat Educational Services — BCCPA Course v 1.7.2
2. Right-click in the Destination field of the n e w rule a n d t h e n select Set from the d r o p - d o w n
m e n u . The Set Destination Object dialog box a p p e a r s .
3. In the Set Destination Object dialog box, click the New b u t t o n a n d the select Combined
Destination Object... from the d r o p - d o w n m e n u . The Set C o m b i n e d Destination Object dialog
box a p p e a r s .
4. In the Set C o m b i n e d Destination Object dialog box, click New a n d then select HTTP MIME
Types from the d r o p - d o w n m e n u . T h e A d d H T T P MIME Types dialog box a p p e a r s .
70
Managing Downloads — File Types and Exceptions
6. Scroll d o w n the list of MIME types to find various c o m m o n MIME types. Select i m a g e MIME
types, s u c h as image/jpeg a n d then click OK.
71
Blue Coat Educational Services — BCCPA Course v 1.7.2
In the A d d C o m b i n e d Destination Object dialog box, click New a n d then select Request URL
Category... from the d r o p - d o w n m e n u . The A d d Request URL Category dialog box a p p e a r s .
9. In the dialog box Categories w i n d o w , type News/Media in the Name field. Click on the p l u s sign
next to Blue Coat to d i s p l a y the available categories. Scroll d o w n , select the News/Media
category, a n d t h e n click OK.
72
Managing Downloads — File Types and Exceptions
10. In the A d d C o m b i n e d Destination Object dialog box, a d d the object News/Media to the l o w e r
object box. Highlight the object a n d then click the b o t t o m Add » button.
11. Click OK a n d then click OK in the Set Destination Object dialog box.
Note: If y o u are not going to go further in this lab, please follow the Policy Clean-up
Procedure at the e n d of the lab.
2. In the Set Destination Object dialog box, click the New b u t t o n a n d the select Combined
Destination Object... from the d r o p - d o w n m e n u . T h e Set C o m b i n e d Destination Object dialog
box a p p e a r s .
73
Blue Coat Educational Services — BCCPA Course v 1.7.2
4. In the same Set Combined Destination Object d i a l o g b o x , c l i c k New a n d t h e n select Request URL
f r o m the d r o p d o w n m e n u . T h e A d d Request U R L Object d i a l o g b o x appears.
6. C l i c k the Close b u t t o n .
8. In the l o w e r At least one of these objects box, select the Negate check box.
74
Managing Downloads — File Types and Exceptions
9. In the Set Combined Destination Object dialog box, type PDF Download Exception in the Name
field.
10. The Add Combined Destination Object dialog box s h o u l d look like the screen c a p t u r e below.
1. In the VPM, position the cursor on Rule N o . 2 a n d click the Add Rule button.
2. Right-click in the Destination field of the n e w rule a n d then select Set from the d r o p - d o w n
m e n u . The Set Destination Object dialog box a p p e a r s .
3. In the Set Destination Object dialog box, click the New b u t t o n a n d the select Combined
Destination Object from the d r o p - d o w n m e n u . The Set C o m b i n e d Destination Object dialog
box a p p e a r s .
75
Blue Coat Educational Services — BCCPA Course v 1.7.2
In the Set D e s t i n a t i o n Object d i a l o g box, c l i c k New a n d the select Apparent Data Type f r o m the
drop-down menu.
76
Managing Downloads — File Types and Exceptions
7. C l i c k Install Policy.
Policy Clean-up
I. To set the p o l i c y b a c k to d e f a u l t f o r the n e x t lab, t h r o u g h the M a n a g e m e n t Console, select
Policy > Visual Policy Manager and c l i c k Launch.
77
Blue Coat Educational Services — BCCPA Course v 1.7.2
78
Managing Instant Messaging
The m o s t effective w a y to control IM traffic is t h r o u g h a proxy server. The Blue Coat® SG™
enables y o u to control AOL®, M S N ® a n d Yahoo!® IM c o m m u n i c a t i o n s based on:
• Users
• Groups
• File t y p e s a n d n a m e s
Objective
U s i n g rules w i t h i n the Web Access Layer to control usage of instant messaging (IM)
Scenario
Your task is to p r e v e n t the transmission of selected types of information to clients t h r o u g h Yahoo!
Messenger. You n e e d to block the following from IM transfer:
• All m e s s a g e s that contain the w o r d s "Project Paris," w h i c h is the internal code n a m e for an
u p c o m i n g secret merger
• All m e s s a g e s to a specific IM user
• Verify that y o u have G a i m IM client version 1.5.0 installed. (Gaim is an instant messaging
client that w o r k s on multiple platforms a n d s u p p o r t s m a n y IM systems, including Yahoo!,
AOL, a n d M S N .
• Verify that the default policy for the proxy is set to Allow.
Steps
Blocking instant m e s s a g i n g is performed in four stages:
79
Blue Coat Educational Services — BCCPA Course v 1.7.2
4. U s i n g the V i s u a l P o l i c y M a n a g e r ( V P M ) t o c o n t r o l I M t r a f f i c
80
Managing Instant Messaging
If y o u are t u n n e l i n g the traffic over HTTP or u s i n g explicit HTTP or SOCKS proxy, this s t e p is
not necessary.
4. M a k e s u r e that the SOCKS proxy is also set to Intercept over port 1080. Highlight the service
p o r t for SOCKS. Select Intercept from the d r o p - d o w n m e n u a n d verify that the port is set to
1080.
5. Enter the screen n a m e a n d the p a s s w o r d that y o u r instructor assigned to you, a n d click Save.
81
Blue Coat Educational Services — BCCPA Course v 1.7.2
7. C l i c k Close.
a Port: E n t e r 1080
12. C l i c k Close.
82
Managing Instant Messaging
2. F r o m the V P M M e n u bar, select Policy a n d t h e n select Add Web Access Layer f r o m the
drop-down menu.
8. C l i c k OK.
83
Blue Coat Educational Services — BCCPA Course v 1.7.2
84
Managing Instant Messaging
7. C l i c k Install Policy.
3. In the Set Service Object d i a l o g box, c l i c k New a n d t h e n select IM File Transfer... f r o m the
drop-down menu.
85
Blue Coat Educational Services — BCCPA Course v 1.7.2
T h e V P M s h o u l d l o o k l i k e t h e screen c a p t u r e b e l o w .
86
Managing Instant Messaging
7. I n the G a i m I M w i n d o w , a t t e m p t t o v i o l a t e R u l e 3 b y s e n d i n g a n I M c o n t a i n i n g a n executable
file.
8. A t t e m p t t o v i o l a t e R u l e 4 b y s e n d i n g a n I M c o n t a i n i n g a n Excel f i l e t o y o u r b u d d y .
9. A t t e m p t t o c o n f i r m R u l e 5 b y s e n d i n g a n I M c o n t a i n i n g a f i l e o u t s i d e the p r o h i b i t e d size r a n g e
t o y o u r lab p a r t n e r . T h e c o m m u n i c a t i o n s h o u l d succeed.
87
Blue Coat Educational Services — BCCPA Course v 1.7.2
Y o u s h o u l d see s o m e t h i n g s i m i l a r t o t h e screen c a p t u r e b e l o w .
I n the A d d S e n d I M A l e r t Object d i a l o g b o x :
a. T y p e IM_Policy_Violation in the Name: field.
b. T y p e " T h e I M message y o u sent v i o l a t e s c o m p a n y p o l i c y . " i n the Alert Text: p a n e .
c. C l i c k OK.
4. For the o t h e r r u l e s in the IM_Access layer, r i g h t - c l i c k on the Action f i e l d , select Set >
IM_Policy_Violation f r o m the l i s t of Existing Action Objects.
88
Managing Instant Messaging
7. A t t e m p t s e n d i n g a message t o y o u r I M b u d d y . N o t i c e t h a t y o u are b l o c k e d a n d y o u s h o u l d
receive t h e f o l l o w i n g message.
89
Blue Coat Educational Services — BCCPA Course v 1.7.2
90
Managing Peer-to-Peer Traffic
Objective
Configuring y o u r Blue Coat® SG™ to transparently allow or block connections to P2P n e t w o r k s
Scenario
The u s e of peer-to-peer (P2P) clients to d o w n l o a d music a n d video files c o n s u m e s valuable
b a n d w i d t h on an organization's n e t w o r k a n d reduces productivity. P2P also opens the door for
m a l w a r e a n d raises a host of legal concerns s t e m m i n g from potential copyright infringement.
In this lab, y o u learn to:
• Configure the Blue Coat SG to intercept the P2P traffic a n d create a policy to allow P2P traffic
• Use the LimeWire P2P client to access the Internet t h r o u g h y o u r Blue Coat SG, connect to the
Gnutella P2P network, search for m o v i e titles, a n d check the statistics for the P2P traffic.
• Rewrite the policy to block P2P traffic and, use LimeWire to again connect to Gnutella a n d
search for different m o v i e titles.
This lab a s s u m e s that the internal s u b n e t is 172.16.90.x/24. The illustration below s h o w s the
n e t w o r k connectivity of the Blue Coat SG a n d the client.
91
Blue Coat Educational Services — BCCPA Course v 1.7.2
Steps
T h i s lab i s p e r f o r m e d i n f i v e stages:
1. C o n f i g u r i n g the B l u e C o a t SG to i n t e r c e p t P2P t r a f f i c
2. C r e a t i n g a p o l i c y to a l l o w P2P t r a f f i c
4. C r e a t i n g a p o l i c y to b l o c k P2P t r a f f i c
2. Set t h e I n t e r c e p t f u n c t i o n f o r H T T P :
a. T h r o u g h y o u r B l u e C o a t SG M a n a g e m e n t C o n s o l e , select Configuration > Services >
Proxy Services, a n d h i g h l i g h t HTTP.
92
Managing Peer-to-Peer Traffic
3. Set t h e I n t e r c e p t f u n c t i o n f o r D e f a u l t T C P T u n n e l p r o x y services:
a. T h r o u g h the M a n a g e m e n t C o n s o l e , select Configuration > Services > Proxy Services, a n d
t h e n h i g h l i g h t Default. Y o u m a y n e e d t o s c r o l l t o the b o t t o m o f the list.
T h e E d i t Service d i a l o g b o x appears.
I n t h e d i a l o g box:
a. M a k e sure t h a t the Detect P r o t o c o l check b o x is selected.
b. In t h e Listeners pane, select Intercept f r o m the Action d r o p - d o w n w i n d o w .
c. C l i c k OK.
5. I n the M a n a g e m e n t C o n s o l e , c l i c k Apply.
7. C l i c k Apply.
93
Blue Coat Educational Services — BCCPA Course v 1.7.2
94
Managing Peer-to-Peer Traffic
6. In the Add P2P Client Object dialog box, n a m e the object All P2P, m a k e sure that the All P2P
Clients option is selected, a n d then click OK.
7. In the Set Source Object dialog box m e n u , select All P2P a n d then click OK.
9. Click Install Policy. The Policy Installed dialog box a p p e a r s . Click OK.
2. D o w n l o a d a n d install the LimeWire P2P client from the local FTP server in the lab or directly
from this site: h t t p : / / w w w . l i m e w i r e . c o m / L i m e W i r e W i n B o t h .
95
Blue Coat Educational Services — BCCPA Course v 1.7.2
3. Launch LimeWire.
5. R e t u r n to the Statistics > P2P History > P2P Bytes tab. C h e c k the usage of the P2P traffic f o r the
Previous 24 hour period. Y o u n e e d to m o v e y o u r m o u s e o v e r the Previous 24 hour period section to
see the values.
3. C l i c k Install Policy.
96
Managing Peer-to-Peer Traffic
Conclusion
This lab d e m o n s t r a t e s the ability of the Blue Coat SG appliance to intercept P2P traffic.
Interception allows y o u to block or allow the traffic. This is useful in situations w h e r e y o u w a n t to
block clients from accessing P2P networks. Viewing statistics allows y o u to k n o w h o w m u c h P2P
traffic goes t h r o u g h the Blue Coat SG.
97
Blue Coat Educational Services — BCCPA Course v 1.7.2
98
Using Notification Objects
Objectives
• Creating a notification p a g e for users w h o are blocked from g a m b l i n g sites
• Creating a coaching page, w a r n i n g users that access to sites categorized as Web-based e-mail
is generally not allowed; however, users can continue a n d access the desired resource on the
Internet.
Scenario
It is i m p o r t a n t that u s e r s be told clearly w h y they are not allowed to access a given resource on the
Internet. A clear explanation reduces the likelihood that users will o p e n service requests with the
IT d e p a r t m e n t . W i t h o u t a p r o p e r explanation, users w h o c a n n o t access a certain site m a y think the
n e t w o r k is malfunctioning.
Blue Coat SG allows a c o m p a n y to r e m i n d each employee, every day, of the current AUP, before
the first Internet request is fulfilled.
Steps
This exercise is p e r f o r m e d in four stages:
1. Creating basic policies using the Visual Policy M a n a g e r (VPM).
2. From the m e n u bar in the Visual Policy M a n a g e r (VPM), select Policy a n d then Add Web Access
Layer from the d r o p - d o w n m e n u . In the A d d N e w Layer dialog box a p p e a r s , accept the default
name.
3. In the VPM, right-click in the Destination field a n d then select Set from the d r o p - d o w n m e n u .
The Set Destination Object dialog box a p p e a r s .
4. In the Set Destination Object dialog box, click the New b u t t o n a n d then select Request URL
Category from the d r o p - d o w n m e n u . The A d d Request URL Category Object dialog box
appears.
99
Blue Coat Educational Services — BCCPA Course v 1.7.2
6. Click the plus sign next to Blue Coat in o r d e r to display the available categories. Click in the
box next to Gambling a n d then click OK.
7. Click OK in t h e Set Destination Object dialog box. You h a v e just created a policy that blocks
e v e r y b o d y from accessing g a m b l i n g Web sites.
8. In the VPM, click the Add Rule b u t t o n . T h e n right-click in the Destination field a n d select Set
from the d r o p - d o w n m e n u . The Set Destination Object dialog box a p p e a r s .
9. In the Set Destination Object dialog box, click the New b u t t o n a n d t h e n select Request URL
Category from the d r o p - d o w n m e n u . The A d d Category Object dialog box a p p e a r s .
10. In the A d d Category Object dialog box, t y p e Email in the Name field.
11. Click the plus sign next to Blue Coat to display the available categories. Click in the box next to
Email a n d then click OK.
12. Click OK in the Set Destination Object dialog box. You h a v e just created a policy that blocks
e v e r y o n e from accessing e-mail Web sites.
13. In the V P M , position y o u r curser at Rule N o . 2 a n d click the Add Rule button. The n e w l y
created rule blocks e v e r y b o d y from all destinations. The resulting policy looks like the figure
s h o w n below.
100
Using Notification Objects
N o w that y o u have created the policies, y o u n e e d to set up the notification events accordingly. The
first policy is for y o u r splash page.
2. In the Set Action Object dialog box, click the New b u t t o n a n d then select Notify User from the
d r o p - d o w n m e n u . The A d d Notify U s e r Object dialog box a p p e a r s , as s h o w n in the screen
capture below
101
Blue Coat Educational Services — BCCPA Course v 1.7.2
102
Using Notification Objects
4. Click OK in the Set Action Object dialog box. The final policy in the V P M s h o u l d resemble the
screen capture below.
Below are screen captures of w h a t the b r o w s e r displays for each of the notification objects that y o u
h a v e j u s t created.
Notification Page
103
Blue Coat Educational Services — BCCPA Course v 1.7.2
Coaching Page
Splash Page
Policy Clean-up
1. T o set the p o l i c y back t o d a f a u l t f o r the next lab, t h r o u g h t h e M a n a g e m e n t C o n s o l e , select
Policy > Visual Policy Manager and c l i c k Launch.
104
Access Logging
Objectives
• Turning on access logging
Scenario
Access logs are r a w text files of client requests. They typically contain the time each request w a s
m a d e , client IP, URL requested, t y p e of content, cache results, server results, time taken to serve
the request, a n d object size. The logs also contain the r e q u e s t o r ' s u s e r n a m e a n d content category if
authentication or content filtering is enabled,.
A d m i n i s t r a t o r s use these logs to create reports s h o w i n g t o p Web users, peak traffic load, top URLs
visited, a n d as well as other useful information.
Steps
1. T h r o u g h the M a n a g e m e n t Console, select Configuration > Access Logging > General. Notice
Access Logging is not enabled by default.
2. Click the check box next to Enable Access Logging near the t o p of the Default Logging tab.
5. T h r o u g h the M a n a g e m e n t Console, select Configuration > Access Logging > Logs > Upload
Client.
105
Blue Coat Educational Services — BCCPA Course v 1.7.2
a Host: 172.16.90.110
o Port: 21
• Username: bcadmin
106
Access Logging
14. T h r o u g h the M a n a g e m e n t Console, select Configuration > Access Logging > Logs > Upload
Client..
107
Blue Coat Educational Services — BCCPA Course v 1.7.2
18. T h r o u g h the M a n a g e m e n t Console, select Configuration > Access Logging > Logs > Upload
Schedule. In the Upload the log file: section, click t h e Upload Now b u t t o n .
19. Verify that y o u r log files are in y o u r FTP folder. You m a y n e e d to press F5 to refresh y o u r FTP
browser screen.
108
Creating Reporter Profiles and Generating Reports
Blue Coat® Reporter™ uses profiles to m a n a g e different types of log d a t a p r o d u c e d by the Blue
Coat® SG™. W h e n y o u create a profile, Reporter associates it w i t h a specific type of Blue Coat SG
log. Reporter then processes the log data into a d a t a b a s e that is tied to that profile. The format of
the log d a t a d e t e r m i n e s the database structure as well as the default reports that Reporter
generates from the database.
Objectives
• Becoming familiar w i t h creating profiles
Scenario
In this lab, y o u create t w o profiles in Reporter:
109
Blue Coat Educational Services — BCCPA Course v 1.7.2
Steps
Creating a v8 Profile
1. L o g o n t o R e p o r t e r b y l a u n c h i n g y o u r W e b b r o w s e r a n d n a v i g a t i n g t o http://127.0.0.1:8987.
110
Creating Reporter Profiles and Generating Reports
111
Blue Coat Educational Services — BCCPA Course v 1.7.2
Creating a v7 Profile
1. C l i c k Create New Profile. T h e N e w P r o f i l e w i z a r d a p p e a r s i n a n e w w i n d o w .
112
Creating Reporter Profiles and Generating Reports
113
Blue Coat Educational Services — BCCPA Course v 1.7.2
114
Creating Reporter Profiles and Generating Reports
115
Blue Coat Educational Services — BCCPA Course v 1.7.2
T h e c o m p l e t e r e p o r t a p p e a r s i n the b r o w s e r w i n d o w .
116
Creating Reporter Profiles and Generating Reports
2. Select a pre-defined report from the left navigation p a n e . The browser displays processing
status a n d then the c o m p l e t e d report.
3. Click on report elements in blue text. The b r o w s e r p a g e displays details a b o u t that report
element. You can u s e the Zoom Options tab to c h a n g e the default report v i e w y o u see w h e n y o u
click on a table item.
4. Click on the Filter link at the top of the report. Filter o p t i o n s a p p e a r in a p o p - u p w i n d o w . The
options are identical to those in the central frame of the Reports page w h e n y o u first access it.
5. In the p o p - u p w i n d o w , a p p l y a date filter or choose one or m o r e filter fields. Click the Save and
Close button to a p p l y the filter and close the p o p - u p w i n d o w . The report reloads in the
browser.
6. Click the Save link b e l o w the report title to save y o u r modified report.
117
Blue Coat Educational Services — BCCPA Course v 1.7.2
4. Y o u can c l i c k o n l i n k s w i t h i n the r e p o r t t o v i e w m o r e d e t a i l e d i n f o r m a t i o n a b o u t a r e p o r t
e l e m e n t a n d select Zoom Options, j u s t a s y o u d i d w i t h the v 8 p r o f i l e r e p o r t .
118
BlueCoat AV/Blue Coat SG Integration
Objectives
• Installing the BlueCoat AV
Scenario
Web v i r u s s c a n n i n g is the process of examining files to d e t e r m i n e if they are infected with an
Internet-based threat (virus, w o r m , Trojan, or s p y ware). BlueCoat AV appliances enable
organizations to scan for s u c h m a l w a r e entering their n e t w o r k s via:
119
Blue Coat Educational Services — BCCPA Course v 1.7.2
Steps
3. In the Add ICAP Service w i n d o w , t y p e Inbound for the ICAP service n a m e , then click OK. Click
the Apply b u t t o n in the M a n a g e m e n t Console.
4. T h r o u g h t h e Blue Coat SG M a n a g e m e n t Console, highlight the inbound ICAP service y o u just
defined, a n d t h e n click the Edit button. T h e Edit ICAP Service I n b o u n d dialog box a p p e a r s .
120
BlueCoat AV/Blue Coat SG Integration
5. In the Service URL field of the dialog box, enter the virus scan server's ICAP service p a t h
icap://<ICAPVirusScan Server's IP Address>/avscan. This is the IP a d d r e s s and service n a m e of
the BlueCoat AV appliance, w h i c h a p p e a r s on y o u r class h a n d o u t .
6. C h e c k t h e Enable box next to Patience page delay a n d t y p e 5 in the seconds dialog box.
7. In the ICAP v.1.0 Options section, click the Sense settings button. A dialog box a p p e a r s asking
y o u to confirm that y o u w a n t to retrieve settings from the ICAP server.
121
Blue Coat Educational Services — BCCPA Course v 1.7.2
9. Click Close.
10. Return to the Edit ICAP Service Inbound dialog box. U n d e r Health Check options, click the
Register b u t t o n . A dialog box a p p e a r s , a s k i n g y o u confirm that y o u w a n t to register the
service for health checks.
11. Click OK. A n e w dialog box a p p e a r s w h e n Blue Coat SG registers the settings.
12. Click OK on the dialog box, then click OK on the Edit ICAP Service I n b o u n d dialog box.
3. Right-click the Action field, then select Set from the d r o p - d o w n m e n u . The Set Action Object
dialog box a p p e a r s .
122
BlueCoat AV/Blue Coat SG Integration
4. Click the New button, then select Set ICAP Response Service from the d r o p - d o w n m e n u . The
A d d ICAP Response Service Object dialog box a p p e a r s
5. M a k e s u r e that the radio b u t t o n next to Use ICAP response service is selected. Select inbound
from the d r o p - d o w n m e n u .
6. In the Error handling section, m a k e sure that the radio button next to Deny the client request is
selected.
Note: Error handling options enable y o u to decide w h e t h e r the Blue Coat SG s h o u l d allow the
client to receive the object if the ICAP server is nonresponsive. If y o u choose the Deny
the client request option, the client does not receive a n y content. Blue Coat recommends
this option for optimum security. The second option is Continue without further ICAP
response processing. If this option is selected, the client receives the original,
u n s c a n n e d content.
123
Blue Coat Educational Services — BCCPA Course v 1.7.2
7. Click OK in the A d d ICAP R e s p o n s e Service Object a n d the Set Action Object dialog boxes.
8. In the VPM, click the Install Policy b u t t o n . You h a v e n o w e n a b l e d the BlueCoat AV or other
virus-scanner server to scan i n b o u n d files.
1. T h r o u g h the Blue Coat SG M a n a g e m e n t Console, select Configuration > External Services >
ICAP a n d t h e n click on the ICAP Patience Page tab.
124
BlueCoat AV/Blue Coat SG Integration
2. Click the link for eicar com.zip. Successful configuration of the Blue Coat SG a n d the BlueCoat
AV will p r o d u c e an error result from the BlueCoat AV
Policy Clean-up
1. To set the policy back to dafault for the next lab, t h r o u g h the M a n a g e m e n t Console, select
Policy > Visual Policy Manager and click Launch.
125
Blue Coat Educational Services — BCCPA Course v 1.7.2
2. Right-click each Policy layer tab a n d select Delete from the d r o p d o w n m e n u . Click the Install
Policy b u t t o n to accept the n e w policy.
Table 19.1:
126
Using Instant Support
Objective
U s i n g Blue Coat Instant S u p p o r t .
Scenario
Instant S u p p o r t is a self-help online tool that is continually being u p d a t e d by Blue Coat Systems®
s u p p o r t technicians. U n d e r s t a n d i n g h o w to use it can enable y o u to get instant a n s w e r s to y o u r
questions a b o u t Blue C o a t ' s p r o d u c t s .
Steps
1. Go to the Blue Coat Web site (http://www.bluecoat.com) a n d then click Instant Support in the u p p e r
right section of the p a g e .
127
Blue Coat Educational Services — BCCPA Course v 1.7.2
T h e b r o w s e r opens a separate W e l c o m e t o B l u e C o a t I n s t a n t S u p p o r t w i n d o w .
128
Using Instant Support
T h e b r o w s e r w i n d o w d i s p l a y s a page w i t h a t e x t b o x w h e r e y o u can t y p e i n a q u e s t i o n .
129
Blue Coat Educational Services — BCCPA Course v 1.7.2
5. Click the radio b u t t o n next to the option 08)You want instructions for configuring NTLM/IWA
Authentication on the ProxySG.
131
Blue Coat Educational Services — BCCPA Course v 1.7.2
132
Using Instant Support
133
Blue Coat Educational Services — BCCPA Course v 1.7.2
134
Review: Authentication
Objective
Testing y o u r u n d e r s t a n d i n g of authentication a n d time-based policies.
Scenario
In this exercise, y o u will i m p l e m e n t authentication according to the internal m e m o s a n d the
additional instructions below.
Internal Memo 1
Attention: A d m i n i s t r a t o r
From: H u m a n Resources
Priority: H i g h
Internal Memo 2
Attention: A d m i n i s t r a t o r
From: H u m a n Resources
Priority: L o w
Action: 1. D u e to the u n d e s i r e d lower morale after blocking n e w s resources, allow employees the
ability to access these sites d u r i n g their lunch break. Lunch is defined as M o n d a y
t h r o u g h Friday, 11 a.m. to 1 p.m.
Special Instructions
• A c o m b i n e d t i m e object is needed for this task.
135
Blue Coat Educational Services — BCCPA Course v 1.7.2
136
Review: Content Filtering
Objective
Testing y o u r u n d e r s t a n d i n g of policy a n d content filtering.
Scenario
In this exercise, y o u will i m p l e m e n t policy according to the internal m e m o s a n d the additional
instructions below.
Important: You need to reset y o u Blue Coat® SG™ to factory defaults before starting this
exercise. From the enable m o d e of the CLI, use the c o m m a n d :
SGOS4# r e s t o r e - d e f a u l t s f a c t o r y - d e f a u l t J
Internal Memo 1
Attention: A d m i n i s t r a t o r
From: H u m a n Resources
Priority: H i g h
Internal Memo 2
Attention: A d m i n i s t r a t o r
From: H u m a n Resources
Priority: L o w
• amazon.com
• casino.com
outpost.com
Additional Instructions
• Block all Web mail a t t a c h m e n t s a n d posting, but allow users to read their e-mail.
• A d d the m e s s a g e "<Client IP> a t t e m p t e d to reach <URL>" to the even log every time a u s e r s
tries to access a forbidden site.
Question
If rules blocked business sites a n d then search engines, w o u l d Yahoo!® be allowed or denied?
137
Blue Coat Educational Services — BCCPA Course v 1.7.2
138