18.07.2013 Views

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

HTTP/HTTPS considerations<br />

Chapter 9: Configuring Proxies<br />

Notes on selected proxy configurations<br />

The HTTP and HTTPS proxies allow you to configure Web access (including<br />

authentication) for trusted and untrusted users. You can configure header<br />

filtering, URL controls, MIME/virus/spyware filtering, and types <strong>of</strong> Web content<br />

(objects) that will be denied on a per-rule basis using Application Defenses.<br />

Additionally, using HTTPS you can also configure SSL decryption and<br />

clientless VPN services. For more information on the HTTP/HTTPS proxies,<br />

see Chapter 13. For information on creating Application Defenses for the<br />

HTTP/HTTPS proxies, see “Creating Web or Secure Web Application<br />

Defenses” on page 156.<br />

Note: If your site requires caching services, you can use the Web proxy server.<br />

The Web proxy server is implemented using Squid, open source s<strong>of</strong>tware that<br />

provides proxying and caching capabilities. The Web proxy server is described in<br />

Chapter 13.<br />

ICA proxy considerations<br />

The ICA proxy allows you to use the Citrix Independent Computing<br />

Architecture (ICA) protocol to allow remote clients to access applications within<br />

a Citrix server farm. You may locate these applications either by configuring<br />

your client directly, or by pointing it to a master browser. A master browser is a<br />

Citrix server that is configured to be responsible for tracking the ICA functions<br />

that are available for clients to access, such as applications or other Citrix<br />

servers (known as member browsers).<br />

For information on configuring the ICA proxy, see “Configuring proxies” on<br />

page 266<br />

You can configure advanced parameters (such as timeout properties) for the<br />

ICA proxy on a per rule basis using Application Defenses. For information on<br />

creating Application Defenses for the ICA proxy, see “Creating Citrix<br />

Application Defenses” on page 185.<br />

Note: Refer to your Citrix documentation for information on configuring your<br />

master browser and member browsers.<br />

259

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!