01.01.2013 Views

Web Gateway 7.1.5 Product Guide - McAfee

Web Gateway 7.1.5 Product Guide - McAfee

Web Gateway 7.1.5 Product Guide - McAfee

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Block untrusted certificate authorities<br />

<strong>Web</strong> filtering<br />

SSL scanning 6<br />

SSL.Server.FirstKnownCAIsTrusted equals false –> Block <br />

The rule blocks a certificate chain if the first known CA that was found is not trusted. The settings<br />

in the property specify a list for the module that checks the certificate authorities.<br />

The action settings specify a message to the requesting user.<br />

Verify Common Name (proxy setup)<br />

This nested rule set verifies set the common name in a certificate. It applies only to requests sent in<br />

non-transparent mode.<br />

Nested library rule set — Verify Common Name (proxy setup)<br />

Criteria — Connection.SSL.TransparentCNHandling equals false<br />

Cycle — Requests (and IM)<br />

The rule criteria specifies that the rule set applies if a request is received through a connection used in<br />

SSL-secured communication and verification of the common name is not performed in transparent<br />

mode.<br />

The rule set contains the following rules:<br />

Allow matching hostname<br />

URL.Host equals Certificate.SSL.CN –> Stop Rule Set<br />

The rule allows a request if the URL of the requested host is the same as the common name in the<br />

certificate.<br />

Allow wildcard certificates<br />

Certificate.SSL.CN.HasWildcards equals true AND<br />

URL.Host matches.Certificate.SSL.CN.ToRegex(Certificate.SSL.CN) –> Stop Rule Set<br />

The rule allows requests to hosts sending certificates that have wildcards in their common names<br />

matching the URLs of the hosts. To verify that a common name containing wildcards matches a<br />

host, this name is converted into a regular expression.<br />

Allow alternative common names<br />

URL.Host is in list Certificate.SSL.AlternativeCNs –> Stop Rule Set<br />

The rule allows requests to hosts with alternative common names in their certificates and the host<br />

matches at least one of them.<br />

Block incident<br />

Always –> Block <br />

If any of the rules for allowing matching common names applies, processing of the rule set stops<br />

and this rule is not processed. Otherwise, requests are blocked by this rule due to a common name<br />

mismatch. The action settings specify a message to the requesting user.<br />

<strong>McAfee</strong> <strong>Web</strong> <strong>Gateway</strong> <strong>7.1.5</strong> <strong>Product</strong> <strong>Guide</strong> 219

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!