MyWebsense Login
Buy & Renew
English (US)
English (US)
English (AU)
English (India)
English (UK)
Español (LatAm)
Français
Italiano
Português (Brasil)
Deutsch
日本語
中文 (simplified)
台灣 (traditional)
Русский
Türkçe
한국어
Products
Products
TRITON
®
APX
› TRITON APX Enterprise Core
› TRITON AP-WEB
› TRITON AP-DATA
› TRITON AP-EMAIL
› TRITON AP-ENDPOINT
TRITON RiskVision
Web Filter & Security
Free Trials and Demos
Product Expansion Options
Cloud & Hybrid Modules
DLP Module
Sandbox Module
Email Encryption Module
Image Analysis Module
TRITON AP-MOBILE
Technology Overview
TRITON Architecture
› Advanced Classification Engine
› Master Database
› Threatseeker Intelligence Cloud
Deployment Options
› Software
› Appliance
› Hybrid
› Cloud
Solutions
Advanced Persistent Threat Protection
Cloud Network Security
Corporate Email Phishing
Data Theft Prevention
Financial Services
Insider Threat
Mobile Workforce Security
Services
Free Trials and Demos
Contact Us
Find a Websense Partner
Implement
Implementation Support
Managed Deployment
Assess & Design
Technical Security Assessment
Cybersecurity Intelligence (CSI)
Free Analysis Tool: ACE Insight
Training and Certification
Customer Certifications
Partner Certifications
Support
Resources
Upgrade to 7.8
Upgrade to 8.0
Technical Library
Online Tools
Product Lifecycles
Supported Configurations
Contact Support
Support Webinars
Downloads
Product Installers
Product Upgrades
Hotfixes and Service Packs
MyWebsense
Access MyWebsense
Register
Stay Informed
Subscribe to Tech Alerts
View Support Videos
Visit Customer Forums
Resources
By Type
Analyst Reports
Brochures
Case Studies
Community
Datasheets
Free Trials and Demos
Infographics
Videos
Webcasts
Whitepapers
Featured
Websense Threat Report
Websense Security Predictions
The Forrester Wave™: SaaS Web Content Security, Q2 2015
Gartner 2015 Magic Quadrant For Secure Web Gateways
Gartner 2015 DLP Report
2015 Industry Drill-Down Report - Financial Services
Security Labs
Security Labs Blog
Security Labs Twitter Feed
Partners
Log In
Request a Login
Global Partner Program
Triton Security Alliance & OEM Partners
Find a Partner
Find a Distributor
Company
About Us
History
Executive Team
Offices
Office of the CSO
Executive Briefing Center
Triton Advisory Board
Customer Advocacy Board
Careers
News & Views
News
Blogs
› Insights
› Security Labs
Accolades
Support
Overview
Solution Center
Technical Library
Forums
Tools & Policies
Contact Support
Transparent Proxy and ARM
Transparent Proxy and ARM
Help | Content Gateway | Version 7.7.3
The transparent proxy option enables Content Gateway to respond to client Internet requests without requiring users to reconfigure their browsers. It does this by redirecting the request flow to the proxy after the traffic has been intercepted, typically by a Layer 4 (L4) switch or router.
In a transparent proxy deployment:
1.
The proxy intercepts client requests to origin servers via a switch or router. See
Transparent interception strategies
.
2.
The Adaptive Redirection Module (ARM) changes the destination IP address of an incoming packet to the proxy's IP address and the destination port to the proxy port, if different. (The ARM is always enabled.)
3.
The proxy receives and begins processing the intercepted client requests. If a request is a cache hit, the proxy serves the requested object. If a request is a miss, the proxy retrieves the object from the origin server and serves it to the client.
4.
On the way back to the client, the ARM changes the source IP address to the origin server IP address and the source port to the origin server port.
Important
For transparent proxy configurations with multiple interfaces or gateways, Content Gateway must have proper routes to clients and the Internet in the operating system's routing table.
For HTTP, the proxy can identify problem clients and servers, and the ARM can disable interception for those clients and servers, passing their traffic directly to the origin server. You can also create ARM static bypass rules to exempt clients and servers from being redirected to the proxy. See
Interception bypass
.
Related topics:
Transparent interception strategies
Interception bypass
Connection load shedding
Reducing DNS lookups
IP spoofing
Print
Email
Font Size:
A
A
Search
All
Technical Library
Article Rating:
Do you have any additional feedback?
Email:
close
Related Articles
Transparent interception strategies
Transparent interception with WCCP v2 devices
Enabling WCCP in Content Gateway Manager
Transparent interception with a Layer 4 switch
Quick Links
Technical Library
Site lookup tool
Hotfixes and downloads
Certified Product Matrix
Support Videos
Support Webinars
Suggest a Feature
Service Requests
Open a New Case
Manage My Cases
How are we doing?
Provide us feedback on your experience with the Service Request portal.
provide feedback >
Transparent Proxy and ARM
Careers
Contact Us
News & Views
Site Map
Legal Information
Privacy Policy
©2015 Websense, Inc. All Rights Reserved.