Deployment Brief:
Explicit Proxy Access Method
Version 6.9.x/Doc Revision: 03/24/17
Blue Coat Web Security Service/Page 2
Page 3
Copyrights
Copyright © 2017 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and
the Blue Coat logo are trademarks or registered trademarks of Symantec Corp. or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only
and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are
disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS,
REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE
EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL
NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING,
PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS
DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
Symantec Corporation
350 Ellis Street
Mountain View, CA 94043
www.symantec.com
Page 5
Web Security Service Access Method: Explicit Proxy
The Blue Coat Web Security Service solutions provide real-time protection against web-borne threats. As a cloud-based
product, the Web Security Service leverages Blue Coat's proven security technology as well as the WebPulse™ cloud community of over 75 million users.
With extensive web application controls and detailed reporting features, IT administrators can use the Web Security Service
to create and enforce granular policies that are instantly applied to all covered users, including fixed locations and roaming
users.
This document describes how to set up explicit proxy connections to the Web Security Service for security scanning and
policy checks on web-bound traffic.
This document contains topics collected from the Web Security Service online documentation. For the complete doc set,
see:
https://bto.bluecoat.com/documentation/All-Documents/Web Security Service
Table Of Contents
Copyrights
3
Web Security Service Access Method: Explicit Proxy
5
Table Of Contents
About the Explicit Proxy Access Method
5
7
Access From the Corporate Network
7
Access From Remote Users
8
Plan The Explicit Proxy Access Method
10
Select an Explicit Proxy Method
11
Pre-Deployment: Select Authentication Method
11
Automatic
11
Manual
11
Publish PAC File With WPAD
Next Step
Edit Browser to Explicitly Proxy
12
12
13
Edit Safari Proxy Setting
14
Verify Firewall Setting
14
Next Step
Edit Chrome Browser Proxy Setting
Verify Firewall Setting
Next Step
14
15
15
15
Blue Coat Web Security Service/Page 6
Edit IE Browser Proxy Setting
Verify Firewall Setting
Next Step
Edit Firefox Browser Proxy Setting
Verify Firewall Setting
Next Step
16
16
16
17
17
17
Prevent IP/Subnet From Routing to the Web Security Service
18
Add an Explicit Proxy Location
20
Verify Service Connectivity to Locations
22
All Locations
22
Additional Step For Remote Users
22
Windows
23
Mac
24
Verify Client Protection
Reference: Required Locations, Ports, and Protocols
Blue Coat Resource
24
26
26
Access Methods
26
Authentication
27
Cloud-to-Premises DLP
27
Reference: Sample PAC File for Explicit Proxy
28
About the Explicit Proxy Access Method/Page 7
About the Explicit Proxy Access Method
A proxy auto-config (PAC) file is a JavaScript that enables web browser requests from within a company firewall to bypass
the proxy server based on the IP address of the computer being used to access internal websites. Computers inside the
firewall are given access to sites on the corporate intranet without being routed through the Blue Coat Web Security Service. Requests for external websites or requests made by company-owned computers using an external IP address are
routed through the service. PAC files might also direct the web browser request to a specific proxy. The Web Security Service might restrict access based on the rules and restrictions governing web access.
Tips
n
To provide user identities or provide a backup to proxy forwarding, you can deploy trans-proxy, or Explicit Proxy
Over IPsec.
n
The Roaming Captive Portal feature allows you to authenticate explicitly proxied users
Access From the Corporate Network
Data Flow
A—All requests for external web content from IP addresses behind the firewall route through the Web Security Service.
B—The PAC file might include a list of sites (destinations by IP addresses) that bypass the Web Security Service.
C—The PAC file script identifies the internal IP address based on the RFC 1918 standard. Direct access to the internal
URL is granted.
Blue Coat Web Security Service/Page 8
Access From Remote Users
Data Flow—Split VPN
A—The PAC file script identifies the internal IP address based on the RFC 1918 standard. Direct access to the internal URL
is granted internal access through the firewall on the VPN connection.
B—All requests for external web content route directly through the Web Security Service (with the exception of bypassed IP
addresses listed in the PAC file).
Data Flow—Full VPN
C—All requests for external web content route back into the corporate firewall and then up to the Web Security Service
through the gateway configuration.
D—The PAC file script identifies the internal IP address based on the RFC 1918 standard. Direct access to the internal URL
is granted internal access through the firewall on the VPN connection.
Challenge-based Authentication (Captive Portal)
To provide user authentication for this method and also make user names available in reports and for custom policy creations, enable the Captive Portal option during configuration. When enabled, Captive Portal displays a challenge dialog to
users each time that they begin a new browser session (or 24 hours after the previous successful entry).
Why Select This Method?
n
Easy to deploy for demonstration or testing purposes.
n
Faster access for internal users to internal URLs.
About the Explicit Proxy Access Method/Page 9
n
Reduces traffic to the Web Security Service by allowing web requests to internal IP addresses to go directly to the
website.
What Are the Limitations of This Method?
n
Using PAC files with an IPsec split-tunnel configuration might allow requests for non-corporate sites to bypass the
Web Security Service.
n
Clients using IPsec with a full tunnel configuration might be allowed to bypass the Web Security Service because
all traffic is routed through an external VPN.
n
Client IP addresses are not visible to the Web Security Service.
Blue Coat Web Security Service/Page 10
Plan The Explicit Proxy Access Method
Complete the forms in the following sheet (one per location).
Information
Network
Comments
Values
PAC file deployment 5 Manual Browser Configuration
method:
5 WPAD Standard 8080
IP address range or subnet alllowed to bypass
proxy server:
Proxy server location:
Firewall port to open: 8080
Web Security Service PAC file URL
Point all browsers to https://portal.threatpulse.com/pac
this URL:
Internal Web
Address
Are all web requests 5 Yes
routed through the proxy
5 No
server?
VPN Tunnel Type
IPsec tunnel con5 Full Tunnel
figuration installed on the
5 Split Tunnel
client system. Blue Coat
recommends full tunnel if
your VPN is not compatible with the Web
Security Service.
Captive Portal
Enable challenge-based 5 Yes
auth?
5 No
Select an Explicit Proxy Method/Page 11
Select an Explicit Proxy Method
The following methods are available to explicitly proxy clients to the Web Security Service.
Pre-Deployment: Select Authentication Method
Before configuring the explicit proxy method, Blue Coat recommends deploying a user authentication method if the purpose is for production rather than perform a quick proof of concept or demonstration. If your solution requires Captive
Portal, an authentication method is required.
If you are not familiar with Web Security Service authentication, consult the documentation topics in the WebGuide.
Automatic
Use the Web Proxy Auto-Discovery (WPAD) protocol.
Manual
Manually configure a web browser's proxy setting to point to the Blue Coat Proxy Automatic Configuration (PAC) file.
Blue Coat Web Security Service/Page 12
Publish PAC File With WPAD
Enforce the use of a Proxy Automatic Configuration (PAC) file without manual web browser configuration by using the Web
Proxy Auto-Discovery (WPAD) protocol. WPAD offers two options to publish the location of the PAC file: Dynamic Host
Configuration Protocol (DHCP) and Domain Name System (DNS).
Tips
n
Verify that firewall port 8080 is open.
n
See here for an example PAC file.
DHCP Method
1. Before retrieving the first page, the web browser sends the local DHCP server a DHCPINFORM query.
2. The web browser uses the URL returned from the server to locate the PAC file.
3. If the DHCP server does not return the location of the PAC file, the DNS method is used.
DNS Method
1. Change the name of the PAC file located on the web server from proxy.pac to wpad.dat.
2. The web browser searches the web server for the PAC file using URLs based using the format
http://wpad.x.x.com/wpad.dat, until the proxy configuration file is found in the domain of the client. WPAD.dat is
the name for the PAC file and x is a part of the domain name.
Next Step
Proceed to "Prevent IP/Subnet From Routing to the Web Security Service" on page 18.
Edit Browser to Explicitly Proxy/Page 13
Edit Browser to Explicitly Proxy
Manually configure web browsers on client systems or a demonstration client to point to the location of the Blue Coat
Proxy Automatic Configuration (PAC), which provides the route to the Web Security Service.
To configure specific, supported web browsers, navigate to the following topics:
n
"Edit Safari Proxy Setting" on page 14
n
"Edit Chrome Browser Proxy Setting" on page 15
n
"Edit IE Browser Proxy Setting" on page 16
n
"Edit Firefox Browser Proxy Setting" on page 17
Blue Coat Web Security Service/Page 14
Edit Safari Proxy Setting
Quickly connect to the Web Security Service by manually configuring the Safari browser to point to the Blue Coat Proxy
Automatic Configuration (PAC) file.
1. Select Apple menu > System Preferences.
2. Select the Internet and Network tab
3. Select an option:
n
If you are connected by cable to the network, select Ethernet.
n
If you are connected using WiFi, select the AirPort option.
4. Click Advanced. Enter the address of your PAC file in the Address field. For example,
https://portal.threatpulse.com/pac.
5. Click the Proxies tab.
a. Select Using a PAC file.
b. Enter the Web Security Service PAC file location in the Address
field: https://portal.threatpulse.com/pac.
6. Select Quit to exit System Preferences.
Verify Firewall Setting
The gateway firewall must allow port 8080. See "Reference: Required Locations, Ports, and Protocols" on page 26.
Next Step
n
Proceed to "Prevent IP/Subnet From Routing to the Web Security Service" on page 18.
Edit Chrome Browser Proxy Setting/Page 15
Edit Chrome Browser Proxy Setting
Quickly connect to the Web Security Service by manually configuring the Chrome browser to point to the Blue Coat Proxy
Automatic Configuration (PAC) file.
1. In the top-right corner of the browser, select the wrench .
2. From the drop-down list, select Options . The browser displays the Google Chrome Options dialog.
3. In the Network section, clickChange proxy settings. The browser displays the Internet Properties dialog.
4. Click the Connections tab.
5. In the Local Area Network (LAN) Settings section, click LAN settings. The Local Area Network (LAN) Settings
dialog displays.
a. In the Automatic configuration area, select Use automatic configuration script.
b. Enter the Web Security Service PAC file location in the Address
field: https://portal.threatpulse.com/pac.
6. Click OK and exit out of all open dialogs.
Verify Firewall Setting
The gateway firewall must allow port 8080. See "Reference: Required Locations, Ports, and Protocols" on page 26.
Next Step
n
Proceed to "Prevent IP/Subnet From Routing to the Web Security Service" on page 18.
Blue Coat Web Security Service/Page 16
Edit IE Browser Proxy Setting
Quickly connect to the Web Security Service by manually configuring the Internet Explorer browser to point to the Blue Coat
Proxy Automatic Configuration (PAC) file.
1. Select Tools > Internet Options.
2. Select the Connections tab.
3. If you are using a VPN connection, click Add to set up the connection wizard. If you are using a LAN connection,
click LAN settings
4. LAN settings dialog:
a. Select Automatically detect settings and Use automatic configuration script.
b. Enter the Web Security Service PAC file location in the Address
field: https://portal.threatpulse.com/pac.
5. Click OK and exit out of all open dialogs.
Verify Firewall Setting
The gateway firewall must allow port 8080. See "Reference: Required Locations, Ports, and Protocols" on page 26.
Next Step
n
Proceed to "Prevent IP/Subnet From Routing to the Web Security Service" on page 18.
Edit Firefox Browser Proxy Setting/Page 17
Edit Firefox Browser Proxy Setting
Quickly connect to the Web Security Service by manually configuring the Firefox browser to point to the Blue Coat Proxy
Automatic Configuration (PAC) file.
1. Select Tools > Options. The browser displays the Options dialog.
2. Select the Advanced > Network tab.
3. In the Connections area, click Settings.
4. Configure Connection Settings:
a. Select Automatic proxy configuration URL.
b. Enter the Web Security Service PAC file location in the Address
field: https://portal.threatpulse.com/pac.
5. Click OK and exit out of all open dialogs.
Verify Firewall Setting
The gateway firewall must allow port 8080. See "Reference: Required Locations, Ports, and Protocols" on page 26.
Next Step
n
Proceed to "Prevent IP/Subnet From Routing to the Web Security Service" on page 18.
Blue Coat Web Security Service/Page 18
Prevent IP/Subnet From Routing to the Web Security Service
Some source IP addresses or subnets do not require Blue Coat Web Security Service processing. For example, you want to
exclude test networks. Configure the service to ignore these connections.
Notes
n
The Web Security Service allows an unlimited number of bypassed IP addresses/subnets. The exception is Client
Connector, which only bypasses the first 256 entries.
n
The setting is global; that is, it applies to every location/client in your Web Security Service account.
n
Each time that a Unified Agent reconnects to the Web Security Service (for example, a user who takes a laptop off
campus and connects through a non-corporate network), the client checks against any updates to the list.
Manually Add IP Addresses
1. In Service Mode, select the Network > Bypassed Sites > Bypassed IP/Subnets tab.
2. Click Add Bypass IP(s). The service displays a dialog.
a. Enter an IP/Subnet.
b. (Optional) Enter a Comment.
c. (Optional) Click the + icon to add another row for another entry.
d. Click Add Bypass IP(s).
The new entries display in the tab view. You can edit or delete any entry from here.
Prevent IP/Subnet From Routing to the Web Security Service/Page 19
Import IP Address Entries From a Saved List
This procedure assumes that you have already created an accessible list (text file) of IP addresses to be bypassed. Each
entry in the file must be on its own line.
1. In Service Mode, select the Network > Bypassed Sites > Bypassed IP/Subnets tab.
2. Click Add Bypass IP(s). The service displays the Add Bypass IP Address/Subnet dialog.
3. Click Add Bypass IP(s). The portal displays a dialog.
a. Select Import From File.
b. Click Browse. The service displays the File Upload dialog. Navigate to the file location and Open it.
c. Click Add Bypass IP(s).
All of the new entries display in the tab view. You can edit or delete any entry from here.
Blue Coat Web Security Service/Page 20
Add an Explicit Proxy Location
When configuring Explicit Proxy as the access method, each gateway IP address defined in a PAC file requires an equivalent Blue Coat Web Security Service location configuration.
Furthermore, you have the option to require users to enter their network credentials for each browser-type session. This
allows for usernames and group information to be viewable in reports and available in custom policy choices
1. In Service Mode, select Network > Locations.
2. Click Add Location.
3. Complete the Location dialog.
a. Name the location. For example, use the fixed geographical location or organization name.
b. Select Explicit Proxy as the Access Method.
c. Enter the IP/Subnet that forwards web traffic to the Web Security Service.
d. This step is optional unless you are integrating SAML authentication. To require users to enter network
credentials at each browser-type session, select Captive Portal: Enable. This option requires deployment of
the Auth Connector application, which integrates with your Active Directory to provides username and group
information.
e. Select the Estimated User range that will be sending web requests through this gateway interface. Blue Coat
uses this information to ensure proper resources.
Add an Explicit Proxy Location/Page 21
f. Select a Time Zone, fill out location information, and (optional) enter comments.
g. Click Save.
Blue Coat Web Security Service/Page 22
Verify Service Connectivity to Locations
After configuring access to the Blue CoatWeb Security Service, verify that the service is receiving and processing content
requests.
All Locations
1. Click the Service link (upper-right corner).
2. Select Network > Locations.
3. Verify the status of each location.
Various icons represent the connection status.
Icon
Connection Status Description
The Web Security Service recognizes the location and accepts web traffic.
A location has been configured, but the Web Security Service cannot connect. Verify that the
web gateway device is properly configured to route traffic.
A previously successful web gateway to Web Security Service configuration is currently not
connected.
n
n
Firewall/VPN
n
Verify your firewall’s public gateway address.
n
Verify the Preshared Key (PSK) in the portal matches that of your firewall
configuration.
n
Verify that the server authentication mode is set to PSK.
Explicit Proxy
n
Verify the PAC file installation and deployment.
n
Verify that your network allows outbound requests on port 8080.
n
Do not attempt to use Explicit Proxy in conjunction with the Unified Agent– the
client will detect that a proxy is in effect, assume a man-in-the-middle attack, and
fail (open or closed depending on the settings).
n
Proxy Forwarding—Verify the gateway address in the forwarding host is correct.
n
Remote Users—Verify the Unified Agent/Client Connector installation. See the section
below for more information.
Additional Step For Remote Users
To further verify that Unified Agent running on remote clients is communicating with the Web Security Service, click (or
double-click) the application icon in the menu bar and click Status.
Verify Service Connectivity to Locations/Page 23
Windows
If the system detects a corporate network that provides web access and security, the Unified Agent enters into passive
mode.
Blue Coat Web Security Service/Page 24
Mac
If the system detects a corporate network that provides web access and security, the Unified Agent enters into passive
mode.
Verify Client Protection
From a client system that has web access (or the specific test client if so configured), browse to the following site:
test.threatpulse.com
The test is successful if you see the following webpage.
Verify Service Connectivity to Locations/Page 25
Blue Coat Web Security Service/Page 26
Reference: Required Locations, Ports, and Protocols
Depending on your configured Blue Coat Web Security Service Access Methods, some ports, protocols, and locations
must be opened on your firewalls to allow connectivity to the various cloud service components and data centers.
Blue Coat Resource
bto.bluecoat.com
HTTPS/TCP 443
Support site links to support tools and documentation.
Access Methods
Access Method
Port(s)
Protocol
199.19.250.192
Web Security Service IP
addresses
Firewall/VPN (IPsec)
Resolves To
199.116.168.192
80/443
IPsec/ESP
UDP 500 (ISAKMP)
Proxy Forwarding
8080/8443
HTTP/HTTPS
8084*
Port 8080 to proxy.threatpulse.net
Port 8443 to proxy.threatpulse.net
*Port 8084 to proxy.threatpulse.net
*If this forwarding host is configured for
local SSL interception.
Explicit Proxy
To proxy.threatpulse.net
8080
https://portal.threatpulse.com/pac
Trans-Proxy
8080 (VPN Tunnel)
ep.threatpulse.net resolves to the following pseudo address.
199.19.250.205
Unified Agent
443
SSL
Port 443 to client.threatpulse.net
Port 443 to proxy.threatpulse.net
Port 443 to portal.threatpulse.net
(199.19.250.192)
MDM (registered iOS and
Android devices)
UDP 500 (ISAKMP)
Roaming Captive Portal
8080
UDP 4500 (NAT-T)
IPSec/ESP
Reference: Required Locations, Ports, and Protocols/Page 27
Authentication
Auth Method
Port(s)
Protocol
Resolves To
Auth Connector
443
SSL
to auth.threatpulse.net:
199.19.250.193
199.116.168.193
portal.threatpulse.net:
199.19.250.19
Additional Required
Information: Reference:
Authentication IP
Addresses.
Auth Connector to Active
Directory
SAML
139,445
TCP
389
LDAP
3268
ADSI LDAP
135
Location Services
88
Kerberos
8443
Explicit and IPSec
Cloud-to-Premises DLP
n
comm.threatpulse.com
Blue Coat Web Security Service/Page 28
Reference: Sample PAC File for Explicit Proxy
The following is sample text that makes up a Proxy Automatic Configuration (PAC) file from which Web browsers receive
routing instructions. The PAC file redirects all non-internal traffic to the Blue Coat Web Security Service.
function FindProxyForURL(url, host) {
// If URL has no dots in host name, send traffic direct.
if (isPlainHostName(host)) return "DIRECT";
// If specific URL needs to bypass proxy, send traffic direct.
if (shExpMatch(url,"*bluecoat.com*") ||
shExpMatch(url,"*cacheflow.com*"))
return "DIRECT";
// If IP address is internal send direct.
if (isInNet(host, "10.0.0.0", "255.0.0.0") ||
isInNet(host, "172.16.0.0", "255.240.0.0") ||
isInNet(host, "192.168.0.0", "255.255.0.0") ||
isInNet(host, "216.52.23.0", "255.255.255.0") ||
isInNet(host, "127.0.0.0", "255.255.255.0") ||
isInNet(host, "192.41.79.240", "255.255.255.255"))
return "DIRECT";
// All other traffic uses below proxies, in fail-over order.
return "PROXY proxy.threatpulse.net:8080; DIRECT";
return "PROXY 199.19.250.164:8080; DIRECT"; }
© Copyright 2026 Paperzz