Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Configuring proxy chaining with the Forcepoint cloud service
Configuring proxy chaining with the Forcepoint cloud service
Configuring proxy chaining | Forcepoint Web Security Cloud
Proxy chaining involves connecting two (or more) proxies together, with one proxy forwarding traffic to another. This configuration may be used if you have an existing proxy in your network that you wish to connect to Forcepoint Web Security Cloud. In this scenario, you can leave users' browser settings unchanged and configure your existing proxy to forward all HTTP, HTTPS, and FTP requests to Forcepoint Web Security Cloud.
*
This is ideal, because the Forcepoint Web Security Cloud PAC file changes automatically based on your policy settings.
*
In this case, you may have to make manual changes to your proxy configuration when your policy settings change.
Forcepoint Web Security Cloud has been tested with a number of commercially available proxies in chained proxy configuration. This document provides basic configuration instructions for the following third-party proxies, which have been tested and validated for use with the service:
*
*
*
 
Note 
Disclaimer:
The information contained in this document is for informational purposes only, and proprietary to Forcepoint LLC unless otherwise noted. While Forcepoint has taken the greatest care to ensure the accuracy of all information in this document, Forcepoint is not liable for any inaccuracies or reliance on the information provided.

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Configuring proxy chaining with the Forcepoint cloud service
Copyright 2022 Forcepoint. All rights reserved.