Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Watchguard XTM22  HTTP Proxy

Posted on 2011-02-27
7
Medium Priority
?
1,649 Views
Last Modified: 2012-05-11
Hello Experts - is the HTTP proxy in the Watchguard XTM 22  transparent or do you have to configure it in Internet Explorer ?

0
Comment
Question by:Brett4567
  • 4
  • 3
7 Comments
 
LVL 13

Expert Comment

by:NarendraG
ID: 34994739
you don't have to do anything on IE side.


Just add Http-proxy policy in policy manager and configure it however you want.

it is a policy for restricting websites,content types,Traffic management and scheduling the traffic.

g
0
 
LVL 13

Expert Comment

by:NarendraG
ID: 34994757
0
 

Author Comment

by:Brett4567
ID: 35000762
We do wish to restrict web browsing at work  and have been through the article but the sites are not being blocked. Will have to check settings again








0
Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

 

Author Comment

by:Brett4567
ID: 35024554
have not had time yet
0
 
LVL 13

Expert Comment

by:NarendraG
ID: 35035226
if you want restrict web browsing then web blocker  is the best way to do it.






0
 

Author Comment

by:Brett4567
ID: 35039797
we have a web blocker subscription - is it hard to set up ?
0
 
LVL 13

Accepted Solution

by:
NarendraG earned 2000 total points
ID: 35053330
it is very simple process and easy to configure.

first ypou have to run wsm setup file on the machine where you wanted to install webbloker database .
Select Web blocker option from installation menu  continue and finish the setup.
Go to policy manager

Click->setup->action->web blocker

add you ip address of we blocker database system IP Address

now can configure policy however you want.

Good Luck


weblker.JPG
0

Featured Post

Ready for your healthcare security check-up?

In the past few years, healthcare organizations have become a prime target for advanced attacks. Does your organization have what it needs to defend itself? Schedule your healthcare security check-up today and download our free Healthcare Security Resource Kit today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
Video by: ITPro.TV
In this episode Don builds upon the troubleshooting techniques by demonstrating how to properly monitor a vSphere deployment to detect problems before they occur. He begins the show using tools found within the vSphere suite as ends the show demonst…
This lesson discusses how to use a Mainform + Subforms in Microsoft Access to find and enter data for payments on orders. The sample data comes from a custom shop that builds and sells movable storage structures that are delivered to your property. …
Suggested Courses

916 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question