18.07.2013 Views

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Configuring proxies<br />

Configuring<br />

proxies<br />

Figure 8-6. Proxies<br />

window<br />

8-28 Configuring Proxies<br />

The pre-configured <strong>Sidewinder</strong> <strong>G2</strong> proxies consist <strong>of</strong> standard settings<br />

and require very little modification. For most proxies the only<br />

configuration decision to be made is whether to enable or disable<br />

each individual proxy. However, the Admin Console also provides the<br />

capability to modify and delete existing proxies, or to create entirely<br />

new proxies.<br />

Tip: You can configure advanced properties for most proxies on a per rule basis using<br />

Application Defenses. For information on configuring Application Defenses, see Chapter .<br />

For an overview <strong>of</strong> Application Defenses, see “Application Defenses” on page 4-14.<br />

Configuring proxy properties<br />

To configure properties for a proxy, start the Admin Console and<br />

select Services Configuration -> Proxies. A table appears in the upper<br />

portion <strong>of</strong> the window, listing the available proxies. (Use the scroll<br />

bar to browse the entire list <strong>of</strong> proxies.)<br />

About the Proxies window The main proxy window consists <strong>of</strong> a proxy table that lists all <strong>of</strong> the<br />

proxies that are currently available by row. Each row displays a<br />

summary <strong>of</strong> the current configuration for that proxy, as follows:<br />

Tip: You can configure advanced properties for most proxies on a per rule basis using<br />

Application Defenses. For information on configuring Application Defenses, see Chapter .<br />

For an overview <strong>of</strong> Application Defenses, see “Application Defenses” on page 4-14.<br />

Note: To enable or disable the Web proxy server, refer to “Configuring the Web proxy<br />

server” on page 12-12.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!