Contents

Related Topics

About the HTTPS-Proxy

HTTPS (Hypertext Transfer Protocol over Secure Socket Layer, or HTTP over SSL) is a request/response protocol between clients and servers used for secure communications and transactions. You can use the HTTPS-proxy to secure a web server protected by your Firebox or Firebox, or to examine HTTPS traffic requested by clients on your network. By default, when an HTTPS client starts a request, it establishes a TCP (Transmission Control Protocol) connection on port 443. Most HTTPS servers listen for requests on port 443.

HTTPS is more secure than HTTP because HTTPS uses a digital certificate to encrypt and decrypt user page requests as well as the pages that are returned by the web server. Because HTTPS traffic is encrypted, the Firebox must decrypt it before it can be examined. After it examines the content, the Firebox encrypts the traffic with a certificate and sends it to the intended destination.

You can export the default certificate created by your Firebox for this feature, or import a certificate for the device to use instead. If you use the HTTPS-proxy to examine web traffic requested by users on your network, we recommend that you export the default certificate and distribute it to each user so that they do not receive browser warnings about untrusted certificates. If you use the HTTPS-proxy to secure a web server that accepts requests from an external network, we recommend that you import the current web server certificate for the same reason.

When an HTTPS client or server uses a port other than port 443 in your organization, you can use the TCP/UDP proxy to relay the traffic to the HTTPS-proxy. For information on the TCP/UDP proxy, see About the TCP-UDP-Proxy.

To add the HTTPS-proxy to your Firebox configuration, see Add a Proxy Policy to Your Configuration.

Which Proxy Action To Use

When you configure a Proxy policy, you must select a Proxy Action appropriate to the policy. For a policy which allows connections from your internal clients to the internet, use the Client proxy action. For a policy which allows connections to your internal servers from the internet, use the Server proxy action.

In Fireware v11.9.3 and higher, the new default predefined proxy actions have "Standard" appended to the proxy action name. These settings are updated from previous defaults to reflect the latest Internet network traffic trends.

In Fireware v11.12 and higher, the Web Setup Wizard and WSM Quick Setup Wizard automatically adds an HTTPS-proxy policy that uses the Default-HTTPS-Client proxy action. The Default-HTTPS-Client proxy action is based on the HTTPS-Client.Standard proxy action and enables subscription services that were licensed in the feature key when the setup wizard was run. If you add a new HTTPS-proxy policy, the Default-HTTPS-Client proxy action could be a better choice than the HTTPS-Client.Standard proxy action. For more information about the Default-HTTPS-Client proxy action, see Setup Wizard Default Policies and Settings.

Configure the HTTPS-Proxy

If you enable WebBlocker in an HTTPS proxy action, but do not enable content inspection, users do not see a deny message when content is denied by WebBlocker. For more information, see HTTPS-Proxy: WebBlocker.

See Also

About Proxy Policies and ALGs

Give Us Feedback     Get Support     All Product Documentation     Technical Search