Go to the table of contents Go to the previous page Go to the next page View or print as PDF
v7.8.3 Release Notes for Websense® Content Gateway : New in Websense Content Gateway v7.8.3
New in Websense Content Gateway v7.8.3
Topic 60096 | Web Security Gateway and Gateway Anywhere | 20-May-2014
 
Security
In some previous versions, a vulnerability in OpenSSL could allow a remote attacker to expose sensitive data, possibly including user authentication credentials and secret keys, due to incorrect memory handling in the TLS heartbeat extension. Version 7.8.3 of Websense Content Gateway does not contain the vulnerability (known as CVE-2014-0160 or Heartbleed).
Data Security analysis of web GET requests
Work has begun on a new feature so that the policy engine in Content Gateway can analyse both GET and POST requests for data. This enhances the ability to identify and block outbound malware communication. This feature will be completed in a future release.
 
Delay scanning data file updates
Content Gateway analysis uses a set of data files which are updated regularly by Websense Security Labs and made available on the Websense download server. Updates to these data files are independent of Websense Master Database updates. A data file check is done every 15 minutes, by default, and new data files are automatically downloaded for immediate use by the analytics.
A new feature, typically used for a backup system, has been added that allows you to configure a delay for the download of a new set of data files.
To use the new feature, navigate to the new "Scanning Data Files Update" section on the Scanning tab of the Configure >My Proxy >Subscription page. Then, select a Delay time from the drop-down list provided, keeping in mind that the longer the delay, the higher the security risk. Restart Content Gateway for the new delay time to take effect. Subsequent downloads will be held for that length of time.
When a delay time is in place, there may be up to 2 sets of data files present on the Content Gateway machine.
1.
2.
Once the delay period is met, the delayed database will be moved to the current set of files and the delay period will be applied to the next download.
Note that one of the available Delay time options is Suspend updates. It is not recommended that this option be used for an extended period of time. When Delay time is set to Suspend updates, a critical alarm is signaled as a reminder that updates have been suspended. The alarm is meant as a reminder to reset the Delay time value so we recommend you do not clear the alarm until you have changed the delay setting.
IP Spoofing available for explicit proxy
A new configuration option is now available allowing the use of IP Spoofing with explicit proxy.
Disabled by default, when IP spoofing is enabled, the proxy will use:
*
*
Navigate to Configure > Networking > ARM and locate the IP Spoofing section. Click Enabled under "IP Spoofing in Explicit Proxy Mode" to enable the option.
Range-based IP spoofing is also supported for explicit proxy. However, when Range-based IP spoofing is enabled, IP spoofing for transparent proxy is automatically enabled. Disable IP spoofing for transparent proxy if you don't want to use it.
Captive Portal
A new authentication method, Captive Portal, has been added to Content Gateway. Captive Portal may be especially helpful in handling mobile and other personal devices brought in to your Web Security Gateway networks.
Used with rule-based authentication, this feature:
*
*
*
*
*
*
When adding an authentication rule (see Rule-Based Authentication in Content Gateway Help for details), a new option is provided. Navigate to Configure > Security > Access Control > Authentication Rules and click Enable next to Captive Portal to select the feature. Users who match the rule are redirected to the new web portal authentication page.
*
*
Note that when Content Gateway receives an unauthenticated POST request from a user who matches a Captive Portal rule, it redirects the user to the web portal authentication page and does not record the POST data. After successful authentication, the original POST data must be input again.
 
Note 
When a rule is added with the Captive Portal option enabled, users are reminded that they can customize the pre-defined web portal page. Go to the new Captive Portal Page Customization tab of Configure > Security > Access Control. Edit the text and HTML to suit your needs. For example, you may want to include your company logo in place of the Websense logo.
The form must be a valid HTML document, defined with valid HTML syntax.
The following variables are used in the document to ensure that it is delivered to the users properly. It is recommended that you do not change their placement or usage.
*
*
*
*
When you have entered all of the syntax, click Preview to preview the page you have created. When you are happy with the way the portal page looks, click Apply to save the content to a file. If you want to return to the default, pre-defined portal page syntax, click Restore to Default Page.
The customized Captive Portal page is saved to auth_form.html, which is stored in /opt/WCG/config. In addition, css and image files can be used to define the portal page. These must be stored in /opt/WCG/config/ui_files (css files) and /opt/WCG/config/ui_files/images (image files), by default. Add a variable to records.config to use a different name for the saved Captive Portal page or store the css and image files in a different directory.
 
If you wish to use your company logo:
*
*
 
Note 
Domain list limit is now configurable
A domain list must be added on the Configure > Security > Access Control > Domains page of Content Gateway manager before authentication rules can be configured for rule-based authentication.
Currently, there is a default limit of 50 domains that can be added to this page. If you would like to change that limit, a new variable has been added to the Authentication basic realm section of the records.config file, located in /opt/WCG/config, by default.
 
Specifies the maximum number of domains that can be added or joined on Configure > Security > Access Control > Domains
 
Compressed file analysis
If user traffic passes through Websense Content Gateway, requested files are analyzed to define their type when all of the following are true:
1. A user requests a URL in a permitted category.
2. File type blocking is enabled for the category in the active category filter.
3. There is no file extension match in a blocked file type
A new feature has been added that will analyze the contents of a compressed file, if compressed files are permitted and a compressed file is selected for download. For example, if compressed files are permitted, but executable files are blocked, when a user attempts to download a compressed file, the contained files are analyzed. If the compressed file contains an executable file, the download is blocked based on the executable file type. Or if the compressed file contains a file that is determined to be malicious, the download is blocked.
 
Note 
New charts for network interface statistics
New charts have been added to the Content Gateway manager that will provide details about packets (including dropped packets and error packets), memory usage, and bandwidth.
Navigate to Monitor >Performance to view charts that show:
*
*
*
*
Click on a graph to view the daily, weekly, monthly, and yearly on a single screen.
Platform Support
Note 
Content Gateway runs on 64-bit platforms only.
 
Important 
See Upgrading Websense Web Security solutions to find your upgrade procedure, which includes operating system upgrade instructions.
Content Gateway is certified on:
*
*
*
*
Content Gateway is supported on:
*
*
*
*
*
*
Only kernels listed above are certified or supported. Visit www.redhat.com for kernel information. To display the kernel version installed on your system, enter the command:
/bin/uname -r
Websense, Inc. provides "best effort" support for the version of Red Hat Enterprise Linux and CentOS listed above. Under "best effort" support, Websense Technical Support makes a best effort to troubleshoot cases in standard fashion until the issue is deemed a Red Hat Enterprise Linux- or CentOS-specific issue, at which point you must contact Red Hat directly for assistance.
Websense recommends that the Red Hat Enterprise Linux version that will host Content Gateway be updated to the latest patch before running the version 7.8.3 Content Gateway installer.
Websense also recommends that Red Hat Enterprise Linux systems that host Content Gateway be registered with Red Hat Network and kept up-to-date with the latest security patches.
 
Important 
 
Important 
For a complete description of platform requirements, see Hardware requirements and Operating system and software requirements.

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
v7.8.3 Release Notes for Websense® Content Gateway : New in Websense Content Gateway v7.8.3
Copyright 2016 Forcepoint LLC. All rights reserved.