Additional Proxy Configuration > IP spoofing
|
|
IP spoofing is not supported with edge devices such as a Cisco ASA or PIX firewall. When this is attempted, requests made by Content Gateway using the client IP address are looped back to Content Gateway.
|
With IP spoofing enabled, traditional debugging tools such as traceroute and ping have limited utility.
|
1.
|
2.
|
3.
|
Click Apply.
|
4.
|
|
To create an entry that causes a set of IP addresses to appear to be coming from the proxy (as in ordinary forward proxy request handling), specify the desired client IP address range and then, in the Spoofed IP Address field, specify the proxy's Internet-facing IP address.
|
|
It is recommended that you create the smallest list that meets your needs. The list is traversed for every connection request. A very large list could contribute to latency. Use the performance charts (Monitor > Performance) to monitor proxy performance.
|
1.
|
2.
|
Under IP Spoofing, select Enabled. Basic IP spoofing must be enabled to enable range-based IP spoofing.
|
3.
|
4.
|
In the Client IP Addresses field, enter a comma separated list of individual IP addresses and/or IP address ranges.
|
5.
|
In the Specified IP Address field, enter a single IP address.
|
6.
|
Click Apply to add the entry to the table.
|
7.
|
To add a new row to the table, click Add Row.
|
8.
|
To put new entries into effect, click Apply and then restart Content Gateway.
|
2.
|
Click Apply.
|
Additional Proxy Configuration > IP spoofing
|