Go to the table of contents Go to the previous page Go to the next page
Upgrading Content Gateway to v8.5.x
Upgrading Content Gateway to v8.5.x
Deployment and Installation Center | Forcepoint Web Security
This section provides upgrade instructions for software-based Content Gateway installations.
 
Note 
Perform an upgrade by running the Content Gateway installer on a machine with a previous version of Content Gateway installed. The installer detects the presence of Content Gateway and upgrades it to the current version.
Versions supported for direct upgrade to v8.5.x
Direct upgrade is supported from v8.1.x, v8.2.x, v8.3.x, and v8.4.x to Content Gateway v8.5, from v8.2, v8.3, v8.4 and v8.5 to Content Gateway v8.5.3, or from v8.4, v8.5, and v8.5.3 to Content Gateway v8.5.4. Upgrades from earlier versions require intermediate upgrades:
v7.0/7.1 > v7.5 > v7.6 > v7.7 > v7.8.4 > v8.4.x>v8.5.x
 
Important 
To perform an intermediate upgrade, download the installer package for that version from the Downloads site at forcepoint.com.
System requirements
Before upgrading Content Gateway, make sure the host machine meets the system requirement outlined in Content Gateway, including hardware specifications, operating system, and browser.
Upgrading distributed components
Content Gateway is the web proxy component of Forcepoint Web Security. Several Forcepoint Web Security components must be upgraded prior to upgrading Content Gateway. Distributed components must be upgraded in a particular order. See Upgrading Web Protection Solutions.
Preparing to upgrade
Before upgrading Content Gateway, be aware of the following.
*
*
*
*
During upgrade, the Cache TTL value is retained from the Transparent Proxy Authentication tab unless the value on the Global Authentication Options tab is not the default. In this case, the customized value is used.
*
*
 
*
Must not be part of a software RAID
*
In addition, to support transparent proxy deployments:
 
Upgrading Content Gateway
Content Gateway runs on web protection full policy source, user directory and filtering, and filtering only appliances (all of which should already have been upgraded at this point).
Content Gateway is supported on Red Hat Enterprise Linux machines. See the Certified Product Matrix for a list of supported operating systems.
IContent Gateway upgrade instructions
This section describes upgrading Content Gateway on your Red Hat Enterprise Linux host.
 
Important 
At the beginning of the upgrade procedure, the installer checks to see if the partition that hosts /opt has enough space to hold a copy of the existing Content Gateway log files (copied to /opt/WCG_tmp/logs). If there's not enough space, the installer prints an error message and quits.
In this situation, if you want to retain the log files you must copy the contents of /opt/WCG/logs to a location that has enough space, and then delete the log files in /opt/WCG/logs.
When the upgrade is complete, move the files from the temporary location back to /opt/WCG/logs and delete the files in the temporary location.
 
Note 
If you have multiple Content Gateway instances deployed in a cluster, you do not have to disable clustering or VIP (if used). As each member of the cluster is upgraded it will rejoin the cluster.
 
1.
a.
b.
Navigate to the Configure > My Proxy > Basic page.
c.
Disable Web DLP.
When the upgrade is complete:
d.
Return to the Configure > My Proxy > Basic page.
e.
Enable the new Web DLP option.
f.
g.
Navigate to the Configure > Security > Web DLP page and confirm that automatic registration was successful. If it was not, confirm that the Data module of management console is running as expected.
2.
su root
3.
For example, if you are running IPTables:
a.
At a command prompt, enter service iptables status to determine if the firewall is running.
b.
c.
 
Important 
4.
Use the Downloads tab of the My Account page at forcepoint.com to download the Content Gateway version 8.5.x installer, and save it to a temporary directory. For example, place it in:
/tmp/cg_v85
5.
cd /tmp/cg_v85
tar -xvzf <installer tar archive>
 
Important 
6.
7.
./wcg_install.sh
Respond to the prompts.
Content Gateway is installed and runs as root.
 
Note 
8.
Error: Content Gateway v8.5.x on x86_64 requires several packages that are not present on your system.
Please install the following packages: <list of packages>
If you are connected to a yum repository you can install these packages with the following command:
yum install <list of packages>
See the Technical Library (support.forcepooint.com/Documentation) for information about the software requirements for x86_64 installation.
To make it easier to install the needed packages, the Content Gateway distribution includes a Linux "rpm" containing the needed packages. To install its contents, ensure that the operating system has access to the Red Hat Linux distribution library (for example the DVD), and enter:
yum install wcg_deps-1-0.noarch.rpm
Upon successful completion, a list of updated packages displays and then the word "Complete!".
Here is an example of a system resource warning:
Warning: Content Gateway requires at least 6 gigabytes of RAM.
Do you wish to continue [y/n]?
Enter n to end the installation and return to the system prompt.
Enter y to continue the upgrade. You should not install or upgrade on a system that does not meet the minimum requirements. If you choose to run Content Gateway after receiving a system resource warning, performance and stability may be affected.
9.
Read the subscription agreement. At the prompt, enter y to accept the agreement and continue the upgrade, or n to cancel.
Do you accept the above agreement [y/n]? y
10.
WCG version 8.1.n-nnnn was found.
Do you want to replace it with version 8.5.x-nnnn [y/n]? y
11.
Stopping Content Gateway processes...done
Copying settings from /opt/WCG to /root/WCG/OldVersions/8.1.0-1418-PreUpgrade/...done
Zipping configuration archive...done
Moving log files from /opt/WCG/logs to /opt/WCG_tmp/logs/...done
12.
Previous installation selections </root/WCG/Current/WCGinstall.cfg> found.
Use previous installation selections [y/n]?
Enter y to use previous installation selections.
Enter n to revert to default values, and receive all installation questions and answer them again.
13.
If you answered y at Step 11, then you can also leave proxy settings at their current values or revert to default values (which perform a fresh install!).
Restore settings after install [y/n]?
Enter y to keep the proxy settings as they are.
Enter n to restore default settings for the proxy.
Caution: If you answer n (no), the current installation of Content Gateway is removed, and a fresh install of 8.2.x begins. See Installation Instructions: Forcepoint Web Security for a detailed description of the installation procedure. This is not an upgrade, but rather a fresh install.
14.
*COMPLETED* Content Gateway 8.5.x-nnnn installation.
A log file of this installation process has been written to
/root/WCG/Current/WCGinstall.log
For full operating information, see the Content Gateway Help system.
Follow these steps to start the Content Gateway management interface (Content Gateway Manager):
------------------------------------------------------------
1. Start a browser.
2. Enter the IP address of the Content Gateway server, followed by a colon and the management interface port (8081 for this installation). For example: https://11.222.33.44:8081.
3. Log on using username admin and the password you chose earlier.
A copy of the CA public key used by the Manager is located in /root/WCG/.
15.
If you chose to revert to default proxy settings, be sure to configure any custom options.
16.
/opt/WCG/WCGAdmin status
All services should be running. These include:
*
*
*
*
 
Important 
To finish the upgrade, be sure to perform the post-upgrade instructions at the end of this document.
Post-upgrade activities
After you have finished upgrading components, refer to the following to ensure that your Content Gateway upgrade is complete.
1.
2.
Register Content Gateway nodes in Forcepoint Security Manager on the Web > Settings > Content Gateway Access page.
Registered nodes add a link to the Content Gateway manager logon portal and provide a visual system health indicator: a green check mark or a red X.
3.
Configure Content Gateway system alerts on the Settings > Alerts > System page in the Security Manager.
This subset of Content Gateway system alerts can be configured to be sent to administrators, in addition to being displayed in the Content Gateway manager.
4.
a.
b.
5.
If you use proxy user authentication, review the settings on the Global Authentication Options page (Configure > Security > Access Control > Global Configuration Options).
6.
If you use IWA user authentication, confirm that the AD domain is still joined. Go to Monitor > Security > Integrated Windows Authentication. If it is not joined, rejoin the domain. Go to Configure > Security > Access Control > Integrated Windows Authentication.
7.
a.
Check the Domains page.
*
*
b.
*
Go to the Authentication Rules page and enter the editor.
*
*
*
Important: The Rule-Based Authentication feature is very rich and can satisfy many user authentication requirements. To make best use of it, please refer to Rule-Based Authentication.
8.
a.
b.
*
Go to Configure > My Proxy > Basic, ensure that Web DLP: Integrated on-box is enabled, and click Apply.
*
Next to Integrated on-box, click the Not registered link. This opens the Configure > Security > Web DLP registration screen.
*
*
*
Click Register. If registration is successful, a message confirms the result and prompts you to restart Content Gateway. If registration fails, an error message indicates the cause of failure. Correct the problem and perform the registration process again.
9.
a.
b.
Select the Data tab and navigate to the Settings > Deployment > Modules page.
c.
d.
Click Deploy.
10.
11.
12.
*
Send authentication to parent proxy, configured on the Configure > My > Proxy > Basic > General page
*
X-Forwarded-For, enabled on the Configure > Perotocols > HTTP > Privacy
In both cases, header values are forwarded only to a configured parent proxy.
If you are upgrading from v8.1 to v8.5, enabled either of these settings in your previous version, and are expecting header values to be forwarded for all outbound requests, add the appropriate variable to your records.config file (in the /opt/WCG/config directory, by default).
*
CONFIG proxy.config.http.insert_xua_to_external INT
*
CONFIG proxy.config.http.insert_xff_to_external INT 1
13.
proxy.config.ssl.server.cipherlist
proxy.config.ssl.client.cipherlist
you need to reconfigure the custom settings because these variables were replaced in v8.2.
*
*
The non-default cipherlist being used prior to the upgrade are saved as a comment in records.config, where it can be used for reference. Default values for the new variables are put into place during the upgrade and can be reconfigured after the upgrade is complete.
See Content Gateway Manager Help for more information on how these new variables now work with proxy.config.ssl.server.cipherlist_option and proxy.config.ssl.client.cipherlist_option to create cipher lists.
14.
The Tunnel Skype option on the Configure > Protocols > HTTPS page of Content Gateway Manager was removed in v8.3. Variables stored in the records.config file that apply to Skype are removed during upgrades from v8.1 and v8.2.
15.
The settings on the Configure > Networking > Connection Management > Low Memory Mode page of Content Gateway manager was removed in v8.3. Corresponding variables stored in the records.config file are removed by upgrades from v8.1 and v8.2.
16.
If LOW encryption cipher suites was previously selected on the Configure > SSL > Decryption/Encryption > Inbound or Outbound pages of Content Gateway manager, upgrades from v8.1 or v8.2 will change the setting to MEDIUM. LOW is no longer a valid option on those pages.
The corresponding records.config variables are also updated by the upgrade.
17.
During upgrades from v8.1 or v8.2, the Enable the certificate verification engine on the Configure > SSL > Validation > General page of Content Gateway manager will be changed to ON for any customer who does not already have the feature enabled.
18.
The Content Gateway Manager was changed to reflect these improvements.
*
The Network Address Translation (NAT) section of the Configure > Networking > ARM > General page has been renamed to Redirection Rules to better reflect the contents of the table.
*
To facilitate interception and redirection of traffic:
*
*
*
*
*
*
Be inserted after Forecepoint rules.
*
*
*
netcontrol.sh -r
For some customers, the GRE Packet Return Method (GRE return) may not be as expected. In all cases, GRE return, as documented by Cisco (see this site), is fully functional. However, tunneling back through a router (enhanced GRE tunnel return) now requires a specific kernel module. Contact Forcepoint Technical Support to enable this functionality.
To provide more appropriate statistical data for the new ARM, the Bypass Statistics now provide information for:
*
*
*
*
19.
proxy.config.http.connect_attempts_max_retries
proxy.config.http.connect_attempts_max_retries_dead_server
20.
After upgrading from v8.1, v8.2, or v8.3, when the initial CA tree update occurs, CAs in the customer deployment but not in the 8.4 CA db, any CA that is no longer a root CA, and CAs that are no longer trusted are converted to a private CA. This process also removes expired CAs.
After the initial update, review the CA tree on the Configure > SSL > Certificates page of Content Gateway manager and remove any certificates that are no longer trusted or may be revoked.
21.
On upgrade, this feature is disabled by default. To add the rule and not forward traffic that is neither HTTP, HTPTS, nor FTP, add the following to records.config ((located in /opt/WCG/config, by default):
CONFIG proxy.config.arm.forward_unwanted_traffic INT 0
After this entry is added and Content Gateway is restarted, an IPTables rule is added and traffic that is neither HTTP, HTTPS, nor FTP will not be forwarded.
22.
For customers who have purchased the v8.5 Protected Cloud Apps feature, the setting for Parent Proxy on the Configure > Content Routing > Hierarchies page of Content Gateway Manager will be enabled. If you previously enabled and configured Parent Proxy and later disabled the option, the configured settings will be used and should be updated as necessary.
23.
With v8.5, the option of TLSv1 on the Configure > SSL > Decryption/Encryption page (Inbound and Outbound tabs) and on the Configure > Security > FIPS page of Content Gateway Manager is no longer a default selection. Options for TLSv1.1 and TLSv1.2 are added and enabled by default.
During upgrade, if HTTPS (SSL) was enabled on the Configure > My Proxy > Basic > General page of Content Gateway Manager prior to upgrade, the SSL settings are not changed.
IF HTTPS (SSL) is enabled after the upgrade, the settings will be handled like a fresh installation of the product and TLSv1.1 and TSLv1.2 will be enabled by default. TLSv1 will not be enabled.
24.
A new variable has been added in v8.5.3 that will disable the automatic adding of new certificates to the certificate database. Upgrades to v8.5.3 will add this new parameter to records.config, set to use the default functionality.
To disable the default functionality edit the following in records.config (located in /opt/WCG/config, by default)
CONFIG proxy.config.ssl.cert.verify.add_cert_to_database INT 0
Reset the value to 1 to restore the default functionality.
25.
26.
Open Content Gateway manager and navigate to Configure > Security > Access Control and select Global Authentication Options. A new Redirect Options section contains the Redirect Hostname entry field as well as the option to Redirect for HTTPS Authentication.
Disabled by default, click Enabled to direct all HTTPS requests to authenticate over HTTPS.
Changing the manager options also resets a new records.config variable.
proxy.config.auth.ssl_auth_url
27.
28.
This rule is also added when upgrading to v8.5.4.
Note: SOCKS traffic from the ip range included in the rule will be routed through a SOCKS server .
29.
proxy.config.ssl.server.cipherlist_suffix
proxy.config.ssl.client.cipherlist_suffix
See Content Gateway Manager Help for more information on how these variables work.
30.
The Session Cache section, previously available on Configure > SSL > Decryption / Encryption > Outbound have been removed in v8.5.4 to avoid Content Gateway restarts. Upgrades to v8.5.4 will automatically disable these options if they had been previously enabled.
 
 

Go to the table of contents Go to the previous page Go to the next page
Upgrading Content Gateway to v8.5.x
Copyright 2023 Forcepoint. All rights reserved.