System configuration

The system of a Web Gateway appliance is configured to support the filtering functions that protect your network against threats arising from the web.

When performing this configuration, you will be dealing with several concepts, functions, and processes.

  • Initial system settings — System configuration is in part performed during the initial setup of Web Gateway.

    Settings that are configured during this setup include the primary network interface, host name, root password, and others.

  • System settings — After the initial setup you can configure more system settings and also modify the initial settings.

    This includes configuring system settings for:

    • Network interfaces — Network interfaces are configured to enable processing of web traffic on a Web Gateway appliance, specifying the host name, gateways, use of the IPv4 or IPv6 protocol, and other settings.

      Note: Some of these settings are already configured during the initial setup.
    • ProxiesWeb Gateway can be configured to run as a proxy that intercepts web traffic and transmits it if this is allowed by the rules of your web security policy.

      Proxies can be configured in different ways regarding:

      • Network mode, which can be an explicit (also known as direct) proxy mode or a transparent mode
      • Network protocol, which can be, for example, HTTP, HTTPS, FTP, ICAP, or IFP, to enable the filtering of web traffic that is going on under any of these protocols
    • Cluster nodes — Instead of running a Web Gateway appliance in a standalone mode, you can run multiple appliances as nodes in a cluster.
    • These nodes are set up and administered using the Central Management functions of Web Gateway.
  • System files — These files contain particular parameters of the appliance system. They can be modified using the File Editor.

  • Update schedules — Updates are scheduled to ensure hat the latest available information is used by the filtering functions on Web Gateway.

System configuration can also include several other activities, such as bonding network interfaces or setting up IP addresses for static routes.