Full web proxy
SIA Proxy can act as a SWG that performs URL filtering and anti-malware scanning in your current network configuration. This occurs when SIA Proxy is configured to scan all web traffic. You can configure SIA Proxy as a full web proxy with one of these methods:
-
Proxy chaining. Directs all HTTP and HTTPS traffic from your organization's on-premises proxy to SIA Proxy. For more information, see Proxy chaining.
-
Configure browser or system proxy settings. You can modify the browser or system proxy settings to connect a user’s browser or device to SIA Proxy. For more information, see Configure the proxy in browsers.
-
ETP Client. When you configure the client as a local web proxy on the device or you configure it to perform transparent traffic interception, all HTTP and HTTPS traffic is forwarded to SIA Proxy. For more information, see About ETP Client.
-
Security Connector as an HTTP Forwarder. With Security Connector version 2.7.5 or later, you can configure Security Connector as a proxy within your network that forwards traffic to SIA Proxy. You can configure it as an explicit proxy that forwards web traffic from enterprise devices or as a transparent proxy that forwards traffic directly from the router. For more information, see Configure HTTP Forwarder.
-
IPsec tunnels. Uses IPsec tunnels to direct traffic from an office branch to SIA Proxy. For more information, see Set up IPsec tunnels.
After enabling the proxy in a policy, you select the Full Proxy as the Operating Mode access control setting. This setting configures the default behavior for traffic. Unless otherwise specified in SIA policy with a bypass or block action, traffic is directed to the full web proxy. You can also select Full Proxy as the mode for mobile traffic.
You can further use these features to secure website access and prevent users from accessing malicious content:
-
Decrypt TLS traffic with trusted certificate. SIA Proxy uses a MITM CA TLS certificate to generate and sign origin certificates for HTTP or HTTPS websites. You need to generate an Akamai certificate or upload a certificate signed by your company's CA. For enterprise client computers to accept and trust these certificates, the trusted MITM CA root certificate needs to be deployed on all enterprise devices and TLS clients. For more information, see SIA Proxy MITM certificate.
-
User Authentication. You can define the users or user groups that can access websites or web applications after they authenticate. You can require that users authenticate before accessing a website or web application, or you can make authentication optional. Optional authentication may be a useful recovery mode for users who are unable to authenticate. For more information, see User authentication and group policies.
-
Inline payload analysis Allows SIA to scan files or website content before end users see the downloaded content. In SIA, this action is available for files that do not exceed 5 MB. For more information, see Inline payload analysis.
-
Static malware analysis for large files. Allows SIA to scan files that are 5 MB to 2 GB in size. SIA scans these files after they are downloaded. If SIA detects malware, a threat event is reported. In the SIA threat event on the Threat Events report, you can download a deep scan report in PDF format that includes more detailed information. To use this feature, in a policy, you need to enable Inline Payload Analysis and select the Allow and Scan option for large files. For more information, see Static malware analysis of large files.
-
Dynamic malware analysis in a Sandbox environment. Scans files in a secure sandbox environment that's isolated from your network. In this environment, file are executed and analyzed to determine whether malicious code or activity is detected. This feature:
-
Analyzes files that are 5 MB to 100 MB in size.
-
Automatically scans files offline (after they are downloaded).
-
Publishes a deep scan report in SIA when it detects a threat. You can download the report in PDF format from the corresponding event in SIA.
To use this feature, in a policy, you need to enable Inline Payload Analysis, select the Allow and Scan option for large files, and enable Dynamic Analysis. This feature is available to organizations that are licensed for Advanced Sandbox. For more information, see Dynamic malware analysis.
-
To implement authentication, you need to also set up:
-
Identity providers. A service that creates, manages, and saves user and group identity information for authentication. You can create an IdP or integrate a third-party IdP such as Okta, Microsoft Azure AD, and AD FS. In an IdP configuration, you can enable MFA, define session settings, design the login page, and more. For more information on IdPs, see About identity providers.
-
Directories. A service that your enterprise uses to manage users and user groups. You need to associate a directory to an IdP. These directory services are supported:
- Active Directory
- Lightweight Directory Access Protocol
- Active Directory Lightweight Directory Services
SIA also offers Cloud Directory, an internal directory that you can use for testing purposes until an IdP is fully deployed. For more information, see About directories.
-
Identity connectors. An identity connector is a virtual appliance that you download in SIA and deploy behind the firewall in your data centers or hybrid cloud environments. You associate an identity connector to a directory. It allows SIA to synchronize with your directory service inside your data center. For more information, see About identity connectors.
SIA includes reports where you can view detailed information about traffic, such as:
-
DNS Activity. Shows data on DNS traffic that's directed to SIA or SIA Proxy. This report allows you to:
-
Investigate suspicious activity.
-
Review requests made to a specific domain.
-
Check activity from a specific client internal IP address or machine name.
-
Troubleshoot a failed request based on connection ID or client request ID.
-
-
Proxy Activity. Shows the traffic that's directed to SIA Proxy. This report can show the requested domain, internal IP address of the user's machine, the username of the user who made the request, the action that was applied to traffic, and more.
These reports are available to super administrators and users who are assigned the etpRestrictedPageViewRole role permission. For more information, see Secure Internet Access Enterprise roles.
Request Flow
These sections describe the flow of a request in a specific full web proxy configuration:
-
IPsec Tunnels (beta)
Proxy chaining
This graphic shows the flow of a request when proxy chaining is configured in a network that's enabled for authentication and dynamic malware analysis. For more information about proxy chaining, see Set up proxy chaining.
In this graphic:
-
All DNS, HTTP, and HTTPS requests are forwarded from the user's device to the on-premises proxy.
-
As a result of a proxy chaining configuration, the on-premises proxy forwards requests to SIA Proxy. If enabled to do so, the on-premises proxy adds the X-Forwarded-For header to identify the client IP address on the corporate network.
-
DNS requests are forwarded to SIA DNS server. Information about the domain and the HTTP or HTTPS request is recorded in SIA. If you select to trust the X-Forwarded-For header, SIA Proxy can identify the client IP address. The client IP address is included in the reported threat events.
-
If authentication is required or optional in the associated policy, the user is prompted to authenticate based on the IdP configuration. The request proceeds as long as authentication is successful. Authentication requires that you configure the X-Forwarded-For header.
-
Based on the policy, an action is applied to traffic. If the traffic is allowed, the request is directed to the origin and the user is granted access. Otherwise, it's blocked and an error page is shown to the user.
If the bypass action is configured, the request bypasses TLS MITM decryption and it's sent directly to the origin IP address or the destination web server.
-
If the request is allowed and you enabled payload analysis for large files, you can scan website content after it's downloaded by your browser. If your organization is licensed for Advanced Sandbox and you also enabled Dynamic Analysis, this content is directed to a secure sandbox environment.
Configured system or browser proxy settings
You can provide the hostname of SIA Proxy in the browser or system proxy settings to forward traffic from a user’s browser or device. For more information, see Configure the proxy in browsers.
-
As a result of the browser proxy setting configuration, all HTTP and HTTPS requests are forwarded from the user's device to SIA Proxy. DNS requests are forwarded to SIA DNS servers.
-
If authentication is required or optional in the associated policy, the user is prompted to authenticate based on the IdP configuration. The request proceeds as long as authentication is successful.
-
Based on the policy, an action is applied to traffic. If the traffic is allowed, the request is directed to the origin and the user is granted access. Otherwise, it is blocked and an error page is shown to the user.
ETP Client with an on-premises proxy
This graphic shows the flow of a request when ETP Client forwards requests to an on-premises proxy. In this scenario, the on-premises proxy forwards requests to SIA Proxy. For more information, see ETP Client for web traffic.
If your network has an existing on-premises proxy, you can configure that ETP Client does not override these settings. ETP Client detects that the on-premises proxy is chained to SIA Proxy and in turn, the client avoids intercepting web traffic. If ETP Client detects that the on-premises proxy forwards traffic to SIA Proxy, the client shows a protected status.
In this graphic:
-
Requests from the users in the corporate network are forwarded to the on-premises proxy. Off-network requests are directed to SIA Proxy. As configured in the network, all requests are sent to the on-premises proxy.
-
As a result of the proxy chaining configuration, the on-premises proxy forwards traffic to SIA Proxy. DNS requests are forwarded to SIA DNS. SIA Proxy performs TLS MITM decryption.
-
If authentication is required or optional in the associated policy, the user is prompted to authenticate based on the IdP configuration. The request proceeds as long as authentication is successful.
-
Based on the policy, an action is applied to traffic. If the traffic is allowed, the request is directed to the origin and the user is granted access. Otherwise, it is blocked and an error page is shown to the user.
If the bypass action is configured, the request bypasses TLS MITM decryption and it's sent directly to the origin IP address or the destination web server.
-
If the request is allowed and you enabled payload analysis for large files, you can scan website content after it's downloaded by your browser. If your organization is licensed for Advanced Sandbox and you also enabled Dynamic Analysis, this content is directed to a secure sandbox environment.
ETP Client with no on-premises proxy
This graphic shows the flow of a request when the ETP Client machine is configured as a local web proxy or as a transparent proxy where transparent traffic interception is enabled. When this configuration is in place, web requests are directed from ETP Client to SIA Proxy for analysis. For more information, see ETP Client for web traffic.
In this graphic:
-
Regardless if a user is on or off the corporate network, this applies:
-
All DNS requests are directed from ETP Client to SIA DNS.
-
All HTTP and HTTPS requests are directed from ETP Client to SIA Proxy.
-
-
Depending on the request, this applies:
-
ETP Client forwards web requests to SIA Proxy where the proxy performs TLS MITM decryption.
-
ETP Client forwards internal requests to the internal network based on Local Bypass Settings or an exception list. Internal requests bypass SIA Proxy and are forwarded to their destination.
-
-
If authentication is required or optional in the associated policy, the user is prompted to authenticate based on the IdP configuration. The request proceeds as long as authentication is successful.
-
Based on the policy, an action is applied to traffic. If the traffic is allowed, the request is directed to the origin and the user is granted access. Otherwise, it is blocked and an error page is shown to the user.
If the bypass action is configured, the request bypasses TLS MITM decryption and it's sent directly to the origin IP address or the destination web server.
-
If the request is allowed and you enabled payload analysis for large files, you can scan website content after it's downloaded by your browser. If your organization is licensed for Advanced Sandbox and you also enabled Dynamic Analysis, this content is directed to a secure sandbox environment.
HTTP Forwarder as an explicit proxy
You can configure HTTP Forwarder as an explicit proxy. For this configuration, you use a proxy auto-configuration (PAC) file or modify the system or browser proxy settings of the user’s device to forward traffic to HTTP Forwarder. Traffic is then forwarded to SIA Proxy where its is scanned for malware.
In this graphic:
- Traffic is forwarded from end user devices to Security Connector as an HTTP Forwarder. An administrator configures device operating systems or browsers to send traffic to HTTP Forwarder through a PAC file or a device management solution. The IP address and port of HTTP forwarder is configured on the OS or browser proxy settings.
- HTTP Forwarder accepts traffic from the port that was set up in the Security Console console. Traffic from other ports is dropped.
- Traffic is then directed to SIA Proxy where it’s scanned for malware.
HTTP Forwarder as a transparent proxy
You can configure HTTP Forwarder as a transparent proxy. For this configuration, the policy-based routing (PBR) rules on the router are modified to forward traffic to HTTP Forwarder. Unlike an explicit proxy configuration, this configuration does not require your organization to modify settings on user devices.
In this graphic:
- User traffic is directed to the router.
- An administrator configures policy-based routing rules on the router to direct traffic to HTTP Forwarder. HTTP Forwarder receives traffic on the port that’s configured in SIA policy.
- HTTP Forwarder directs traffic to SIA Proxy where it’s scanned for malware.
IPsec Tunnels
You can configure IPsec tunnels to direct traffic from your office branch to SIA Proxy. This method uses an organization's SD-WAN solution to create these tunnels. For more information, see Set up IPsec tunnels.
In this graphic:
-
An SD-WAN appliance forwards traffic from the organization’s branch. Traffic from branches that are configured as known locations in SIA are forwarded and accepted by SIA.
The SD-WAN Orchestrator or the portal used to manage the SD-WAN solution is where an administrator configures the primary and secondary tunnels that send and receive traffic. The secondary tunnel serves as a backup tunnel in case of failure. An SIA administrator configures specific settings in SIA to establish communication with the IPsec tunnel.
-
The IPsec tunnels that are created direct traffic to SIA Proxy.
-
SIA Proxy inspects traffic and handles it based on SIA policy. If traffic is allowed, it is directed to the origin.
Updated almost 2 years ago