Go to the table of contents Go to the previous page Go to the next page View or print as PDF
v7.8.1 Release Notes for Websense® Content Gateway : New in Websense Content Gateway v7.8.1
New in Websense Content Gateway v7.8.1
Topic 60073 / Updated: 21-October-2013
*
*
*
*
*
*
*
*
*
*
*
*
*
ThreatScope™
ThreatScope is a Websense-hosted sandbox that provides enhanced detection of 0-day threats.
Suspicious downloads that fit the Websense Security Labs profile are uploaded to a cloud-hosted sandbox for activation and analysis. ThreatScope observes the behavior of the payload and compiles an extensive report. If the file is found to be malicious, an alert message is sent to the Web Security administrator with information about the threat and links to the ThreatScope report and an Investigative Report generated from your log records. Websense updates the Master Database, ACE analytic databases, and other security components. The next time someone in the organization tries to access the site, they and the organization are protected.
ThreatScope is a premium option for Web Security Gateway Anywhere subscribers.
This feature is described in detail in the version 7.8.1 Web Security Release Notes.
64-bit Content Gateway
Content Gateway version 7.8.1 is now full 64-bit and is offered only as 64-bit.
 
Important 
Content Gateway is certified on:
*
*
*
*
Content Gateway is supported on:
*
*
*
*
*
Only kernels listed above are certified or supported. Visit www.redhat.com for kernel information. To display the kernel version installed on your system, enter the command:
/bin/uname -r
Websense, Inc. provides "best effort" support for the version of Red Hat Enterprise Linux and CentOS listed above. Under "best effort" support, Websense Technical Support makes a best effort to troubleshoot cases in standard fashion until the issue is deemed a Red Hat Enterprise Linux- or CentOS-specific issue, at which point you must contact Red Hat directly for assistance.
Websense recommends that the Red Hat Enterprise Linux version that will host Content Gateway be updated to the latest patch before running the version 7.8.1 Content Gateway installer.
Websense also recommends that Red Hat Enterprise Linux systems that host Content Gateway be registered with Red Hat Network and kept up-to-date with the latest security patches.
 
Important 
 
Important 
For a complete description of platform requirements, see Hardware requirements and Operating system and software requirements.
SSL
Support for SSL (HTTPS) decryption, analysis, and re-encryption has been re-engineered for version 7.8.1.
SSL support is now part of the core Content Gateway proxy.
Rearchitected support:
*
*
*
*The total proxy concurrent connection limit (HTTP + HTTPS) is determined by the value of Throttling Net Connections (default 45,000) set in the Content Gateway manager on the Configure > Networking > Connection Management > Throttling page.
In addition to the high-level enhancements, SSL support:
*
*
*
*
*
What is SSL support?
SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are the most common protocols for secure transmission of data on the Internet. They rely on data encryption and a system of trusted certificates issued by certificate authorities (CAs) that are recognized by clients and servers. SSL/TLS requests made in a browser are identified by the "https" string that leads the URL.
When the HTTPS protocol is enabled in the Content Gateway manager, HTTPS (SSL/TLS) traffic is decrypted, analyzed, and re-encrypted before it is sent to its destination. ACE real-time analytics are used to inspect content and protect against malicious and undesirable data flow, in the same way that ACE is applied to HTTP traffic.
SSL support:
*
*
*
*
*
*
Support for TLSv1.1 and TLSv1.2
Version 7.8.1 supports TLSv1.1 and v1.2.
Enabling and disabling TLSv1.1 and/or v1.2 is done by changing the value of records.config variables.
Inbound support (client to proxy) is enabled by default.
Outbound support (proxy to origin server) is disabled by default.
To enable TLSv1.1 support on the proxy to origin server connection, set the following variable to 1. Set it to 0 to disable it (default). "client" in the variable name refers to Content Gateway's role in the connection (client to the origin server).
proxy.config.ssl.client.TLSv11 INT 1
To enable TLSv1.2 support on the proxy to origin server connection, set the following variable to 1. Set it to 0 to disable it (default). "client" in the variable name refers to Content Gateway's role in the connection (client to the origin server).
proxy.config.ssl.client.TLSv12 INT 1
To enable TLSv1.1 support on the client to proxy connection (enabled by default), set the following variable to 1. Set it to 0 to disable support. "server" in the variable name refers to Content Gateway's role in the connection (server to the client).
proxy.config.ssl.server.TLSv11 INT 1
To enable TLSv1.2 support on the client to proxy connection (enabled by default), set the following variable to 1. Set it to 0 to disable support. "server" in the variable name refers to Content Gateway's role in the connection.
proxy.config.ssl.server.TLSv12 INT 1
To set the value of a variable:
*
If Content Gateway is on a Websense appliance, use the Administration > Toolbox > Command Line Utility.
*
If Content Gateway is installed on a standalone server, edit /opt/WCG/config/records.config. To apply the changes, run the following command from the Content Gateway bin directory (/opt/WCG/bin/):
./content_line -x
Changes from past versions
Although SSL support is functionally unchanged from prior versions, users of past releases will be interested in this summary of infrastructure changes. For a description of how version 7.7.x SSL Manager configuration is handled by the upgrade process to version 7.8.1, see On upgrade, below.
*
*
The /opt/WCG/sxsuite directory and its contents are removed. Notably, this includes sxsuite/inbound*.log and outbound*.log.
*
Transaction logging is sent to extended.log or squid.log when the logging subsystem is configured for "Log Transactions and Errors" or "Log Transactions Only". Otherwise, logging is sent to content_gateway.out.
*
The SSL SQLite3 configuration database is renamed new_scip3.db and is located in /opt/WCG/config.
*
The code for customized Certificate Failure and Connect Error pages has been changed to improve security by including the session ID. If those pages are customized in your deployment (Configure > SSL > Customization), you will have to reapply your customizations.
*
The Default cipher setting uses all available ciphers except eNULL, the ADH suite, and the EXP suite. EXP suite is added to the exclusion set in version 7.8.1.
*
*
*
On the Configure > Protocols > HTTPS page, SSL Outbound Port is no longer needed and has been removed.
*
On the Configure > SSL > Decryption / Encryption Inbound and Outbound pages, Credential Forwarding and VIA Header are no longer needed and have been removed.
On upgrade
When you upgrade from version 7.7.x to 7.8.1, most of your SSL configuration settings are saved and applied to the upgraded version of Content Gateway.
It is very important that you read and follow the step-by-step upgrade instructions. Doing so helps ensure a smooth upgrade process and maximizes retention of data.
Please note the following details.
*
*
*
*
*
*
*
*
*
SSL inbound*.log and outbound*.log files are deleted. After upgrade, transaction logging is sent to extended.log or squid.log when the logging subsystem is configured for "Log Transactions and Errors" or "Log Transactions Only". Otherwise, logging is sent to content_gateway.out.
User authentication
Rule-based authentication
Credential caching
 
Important 
Rule-based authentication
Proxy user authentication now includes a more flexible, expanded, and reorganized rule-based model that supports rules for:
*
*
Rule match is based on:
*
*
*
 
Note 
Users of the pre-existing Multiple Realm Authentication feature should think of rule-based authentication as:
*
*
*
*
Users of rule-based authentication should understand that the authentication method (IWA, Legacy NTLM, LDAP) has the same features, requirements, and limitations as the same method used standalone. Read the documentation for each authentication method in Content Gateway Help before specifying the method with a domain.
Rule-based authentication structure and logic
Structure:
*
*
IWA, Legacy NTLM, and LDAP are supported. RADIUS is not supported.
*
*
The Domains list is created and maintained on the Configure > Security > Access Control > Domains tab.
*
The Domains list is stored in auth_domains.config.
*
*
*
*
*
Authentication rules are defined on the Configure > Security > Access Control > Authentication Rules tab. Rules are stored in auth_rules.config.
 
Note 
Credential caching configuration is performed on the Configure > Security > Access Control > Global Configuration Options tab. On that page you specify IP address caching, cookie caching, or both. The setting applies to both transparent proxy and explicit proxy traffic. When both IP address caching and cookie caching are specified, the IP addresses that cookie caching is applied to must be specified.
Logic:
*
One or more rules are defined for client/domain(s) pairs (Configure > Security > Access Control > Authentication Rules).
*
*
*
*
*
*
 
Important 
*
*
*
*
*
*
Rule-based authentication configuration summary
1.
 
Important 
2.
Configure Global authentication options (Configure > Security > Access Control > Global Authentication Options). See Credential caching.
3.
Create a Domains list (Configure > Security > Access Control > Domains).
*
*
4.
Create authentication rules (Configure > Security > Access Control > Authentication Rules).
5. Restart Content Gateway to make the new rules take effect.
For complete details, see Rule-Based Authentication in Content Gateway Help.
Rule-based authentication best practices
*
*
*
*
*
*
Note that users who are not joined to the first IWA domain in a list are prompted for credentials (basic authentication).
*
On upgrade
Multiple realm rules are converted to the new rule-based format. It's important to review and verify the configuration.
*
If it is a joined IWA domain, it remains joined.
After upgrade, review the Domain list and for every IWA domain, select and edit the entry to assign a unique Domain Identifier (this is not the domain name but rather an internal identifier used by Content Gateway; a name is automatically assigned to other domain/directory service types).
*
After upgrade, review the Authentication Rules list and verify that the:
*
*
If Cookie Mode Caching is specified in the multiple realm rule, the specified IP addresses are moved to the cookie caching list in the Caching Methods section of the Global Authentication Option page. Cache using Cookies only or Cache using both IP Addresses and Cookies should be enabled.
*
If Content Gateway is a transparent proxy, the v7.7.x Authentication Mode setting (IP address or Cookie mode) is retained from Transparent Proxy Authentication tab.
Credential caching
User authentication credential caching has been simplified and enhanced.
There is now one credential cache for both explicit and transparent proxy mode and one, global configuration for setting the caching method and Time-To-Live.
The redesigned Global Authentication Options page hosts:
*
The authentication Fail Open setting – This option is unchanged from previous releases.
*
Credential Caching options – These settings are global and apply to explicit and transparent proxy traffic.
Settings include:
*
*
Cache Time-To-Live, in minutes
*
 
*
Redirect Hostname (transparent proxy only) – This option is unchanged from prior versions.
Credential caching options apply to all clients whether Content Gateway is an explicit or transparent proxy. Settings support:
*
Caching using IP address only – Recommended when all clients have a unique IP address.
*
Caching using Cookie mode only – Recommended when all clients share IP addresses, as with multi-user hosts such as Citrix servers, or when traffic is NATed in a proxy chain or by a firewall.
*
Caching using both IP address and cookie mode – Recommended when the network has a mix of clients, some with unique IP addresses and some not. In this mode, cookie mode is used with specified IP addresses and ranges, the remainder are cached by IP address.
 
Note 
Credential caching applies to:
*
*
 
Note 
The LDAP purge cache on authentication failure causes the proxy to delete the authorization entry for the client from the LDAP cache if the LDAP user authorization fails.
The 7.8.1 Global Authentication Option screen:
 
Note 
On upgrade
*
*
*
*
*
Range-based IP spoofing
IP Spoofing is extended to support groupings of clients (IP addresses and IP address ranges) that are mapped to specified IP addresses for spoofing. This is called range-based IP spoofing.
Among other scenarios, range-based IP spoofing supports:
*
*
*
About IP Spoofing
IP Spoofing is supported with transparent proxy deployments only.
IP spoofing configures the proxy to use either the IP address of the client or a specified IP address (range-based IP spoofing) instead of the proxy IP address when communicating with the origin server. As a result, requests appear to come from the client or the specified IP address instead of the proxy.
IP spoofing is supported for HTTP and HTTPS traffic. When IP spoofing is enabled, it is applied to both protocols. It cannot be configured to apply to only one.
IP spoofing requires special return traffic routing configuration for all HTTP/S traffic (80 and 443) to deliver spoofed traffic back to the proxy for processing.
IP Spoofing does not support IPv6.
Range-based IP Spoofing is not supported on many older versions of Cisco IOS firmware. Update your Cisco device to the latest firmware.
\
Warning 
For complete information, see IP Spoofing in Content Gateway Help.
Policy Broker resiliency
Content Gateway receives several sets of important data from Web Security Policy Broker. One set of data includes the Web Security Scanning Options settings, including analytics settings, scanning exceptions, and SSL decryption bypass settings. In past releases, Content Gateway stored this information in memory only. If Policy Broker was unavailable when Content Gateway started or restarted, the Scanning Options settings could not be loaded or applied.
Content Gateway has been enhanced to keep a configuration file of Policy Broker data, including the Scanning Options settings. If Policy Broker becomes unavailable, Content Gateway continues to apply the most recent settings. If Content Gateway restarts and Policy Broker is unavailable, Content Gateway loads the locally stored settings until the connection with Policy Broker is restored and updates can be received. Whenever Policy Broker becomes unavailable after Content Gateway has started, an alarm is generated to inform the administrator.
If after Content Gateway is installed and started for the first time Policy Broker is not available, there are no pre-existing settings to load. An Alarm is generated to alert the administrator of the condition.
Filtering Service resiliency
Content Gateway works with Web Security Filtering Service to perform policy enforcement. If Filtering Service becomes unavailable, there can be substantial latency in traffic handling.
Content Gateway has been tuned to provide better performance when requests to Web Security Filtering Service timeout and when Filtering Service becomes unavailable.
Every request that Content Gateway sends to Filtering Service must be completed within the communication timeout period. If it is not, the request is either permitted or blocked based on the Action for Communication Errors setting on the Configure > My Proxy > Subscription  > Scanning page. When a communication timeout occurs, a dedicated monitor process continues to test the connection. If it fails 5 consecutive times, Filtering Service is marked down and the communication errors setting is applied until the monitor process detects that Filtering Service is responding.
Secured by RSA® authentication
TRITON Unified Security Center has been extended to support Secured by RSA authentication for TRITON administrators. See the v7.8.1 Release Notes for TRITON Unified Security Center.
Secured by RSA is a form of two-factor authentication that:
*
*
Can be made to apply to Content Gateway Manager by forcing administrators to log on to the TRITON console before accessing the Content Gateway manager through the Web Security manager.
*
*
For information about configuring two-factor authentication in the TRITON console, see Logging on with RSA SecurID authentication in TRITON console Help.
FIPS 140-2 mode
The openssl library used in FIPS 140-2 mode has been updated to 1.0.1e from 0.9.8r.
All of the cryptographic libraries used in Content Gateway version 7.8.1 have been submitted to the Cryptographic Module Validation Program (CMVP) for FIPS 140-2 certification. Visit the CMVP validation page for more information.
When Content Gateway is in FIPS 140-2 mode, cryptography within Content Gateway and on the HTTPS channel from the client to the proxy and from the proxy to the origin server, is performed with algorithms that conform to the FIPS 140-2 standard. However, where Content Gateway interfaces with some other Websense components there can be a FIPS 140-2 boundary.
*
*
*
*
*
 
Important 
For more information about FIPS 140-2 mode in Content Gateway, see FIPS 140-2 Mode.
Office 365
Support for cloud-hosted and on-premises Microsoft Office 365.
When there is access to the Microsoft cloud, documents are synchronized with Microsoft Office 365 in the cloud. When there is no access to the cloud, Microsoft Office 365 applications are available locally.
On-premises support includes:
*
*
*
*
On-premises Office 365 application support includes:
*
*
*
*
*
*
*
Cloud-hosted support includes:
*
*
*
*
Cloud hosted Office 365 application support includes:
*
*
WCCP
Synchronize in the Cluster
When several instances of Content Gateway are deployed in a cluster, use the Synchronize in the Cluster option to control whether the WCCP configuration is propagated around the cluster. (The value of Synchronize in the Cluster is always synchronized in the cluster.)
When this option is enabled, the WCCP configuration (stored in wccp.config) is synchronized in the cluster and configuration changes can be made on any node.
When this option is disabled, the WCCP configuration is not synchronized in the cluster and changes to the WCCP configuration must be made individually on each node. A common use case for this is to control which service groups are enabled/disabled on each node, and to use proportional load distribution with weight. An efficient way to set up WCCP in this scenario might be to enable Synchronize in the Cluster while establishing the basic WCCP configuration, and then disable it when you're ready to control service group enable/disable (or other WCCP configuration values) on each node.
If after being disabled this option is enabled, the configuration of the node on which it is enabled is used to synchronize all members of the cluster.
Use this option with caution: When Synchronize in the Cluster is disabled, you must visit each node in the cluster to examine and maintain your WCCP configuration. In addition to the added maintenance burden, it can make WCCP troubleshooting more difficult.
Lifts 7.7.x limits
When Synchronize in the Cluster is set to Disabled it effectively eliminates a limitation in which you cannot configure the following service group attributes separately for each node in the cluster:
*
Service group Status enabled/disabled
*
Service group Network Interface value (eth#)
*
Service group Weight (Advanced setting)
Japanese language embedded Help
Japanese language embedded Help is included in version 7.8.1. To select Japanese, go to Configure > My Proxy > UI Setup > General, locate the Default Help Language drop down list and select Japanese (the selection is presented in Japanese). The setting does not apply to all nodes in a cluster. Each node must be configured separately.
The setting does not apply to any TRITON manager embedded Help language options.
Performance graphs
Two new Content Gateway performance graphs that monitor DNS activity. In the Content Gateway manager go to Monitor > Performance > Overview.
*
DNS Lookup Latency shows the average time in milliseconds to fulfill a DNS request.
*
DNS Cache Usage shows the number of DNS requests handled by Content Gateway, including those served by the DNS cache.
Removed: Support for the Microsoft ISA plugin
With the transition to 64-bit Content Gateway, support for 32-bit Microsoft ISA server in a proxy chain is deprecated.
Content Gateway continues to support 64-bit Microsoft Forefront TMG.
For more information, see Chaining Content Gateway with other proxies.

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
v7.8.1 Release Notes for Websense® Content Gateway : New in Websense Content Gateway v7.8.1
Copyright 2016 Forcepoint LLC. All rights reserved.