Configuration lists

Lists of items for configuring Web Gateway provide an overview and guidance on how to use them. Some items, such as IP addresses and ports, are used for configuring the appliance system that a web security policy is run on, others, such as properties and actions, are used for configuring this policy.

System configuration

The following list is important for system configuration:

  • List of open ports — Several network ports must be open on the firewall if one exists in a configuration to enable communication between Web Gateway and update servers or databases outside the local network.

Policy configuration

The following lists are important for policy configuration:

  • List of actions — Actions are configured in web security rules to protect your network against threats arising from the web.
  • List of block reason IDs — Block reason IDs are configured in block messages to identify the reasons why user requests for web access were blocked.
  • List of error IDs — Error IDs are configured in the criteria of web security rules to identify errors when measures are taken for handling them.
  • List of events — Events are configured in web security rules to let activities happen in addition to the execution of rule actions.
  • List of incident IDs — Incident IDs are configured in the criteria of web security rules to identify incidents when measures are taken for handling them.
  • List of operators — Operators are configured in the criteria of web security rules to create meaningful connections between properties and their values on one side and operands on the other.
  • List of properties — Properties are configured in the criteria of web security rules and evaluated in rule processing to determine whether criteria matches and rules apply.
  • List of statistics counters — Statistics counters are configured in the events of web security rules to record the execution of rule actions.