ericom shield & websense forcepoint web security content ... · websense forcepoint safe visual...

2
Ericom Shield & Websense ForcePoint Web Security Content Gateway Websense ForcePoint Gateway can integrate with Ericom Shield in the Proxy Chain scenario. The joint solution described below refers to Websense ForcePoint Web Security Content Gateway 8.4. End -user requests website via Websense web proxy Websense evaluates the request and if allowed, forwards the request to Ericom Shield Ericom Shield navigates to the requested URL Ericom Shield opens the content in a disposable Linux container and sends a safe visual stream of pixels to the end-user browser Once the user ends the browsing session by closing the browser or tab the Linux container, with all web content, is destroyed Architecture Websense ForcePoint Safe visual stream Ericom Shield Data Flow No special configuration is required. Ericom Shield Configuration To confirm that ForcePoint is the first line of defense for inbound content, the user should visit a website that detects the perimeter address, (e.g. www.whatismyip.com) to verify that the inbound address matches that of the Websense ForcePoint Gateway. Testing Interconnectivity

Upload: others

Post on 18-May-2020

26 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Ericom Shield & Websense ForcePoint Web Security Content ... · Websense ForcePoint Safe visual stream Ericom Shield Data Flow No special configuration is required. Ericom Shield

Ericom Shield & Websense ForcePoint Web Security Content Gateway

Websense ForcePoint Gateway can integrate with Ericom Shield in the Proxy Chain scenario.The joint solution described below refers to Websense ForcePoint Web Security ContentGateway 8.4.

End-user requests website via Websense web proxy

Websense evaluates the request and if allowed, forwards the request to EricomShield

Ericom Shield navigates to the requested URL

Ericom Shield opens the content in a disposable Linux container and sends asafe visual stream of pixels to the end-user browser

Once the user ends the browsing session by closing the browser or tab theLinux container, with all web content, is destroyed

Architecture

Websense

ForcePoint

Safe visual

stream

Ericom Shield

Data Flow

No special configuration is required.

Ericom Shield Configuration

To confirm that ForcePoint is the first line of defense for inbound content, theuser should visit a website that detects the perimeter address, (e.g.www.whatismyip.com) to verify that the inbound address matches that of theWebsense ForcePoint Gateway.

Testing Interconnectivity

Page 2: Ericom Shield & Websense ForcePoint Web Security Content ... · Websense ForcePoint Safe visual stream Ericom Shield Data Flow No special configuration is required. Ericom Shield

Open the Configure tab, go to Protocols | HTTP . In the General tab enter the8080 port in the list of Tunnel Ports:

Websense ForcePoint Configuration

Go to Content Routing | Hierarchies, , enable the Parent Proxy and the No DNSand Just Forward to Parent. Add 2 rules:

Primary Destination = . (‘.’) parent proxy = ShieldServerIP: 3128 Go Direct = False

Primary Destination = websenseIP Go Direct = True

About Ericom Software Ericom Software provides simple, secure solutions for remote access, desktop virtualization (VDI) and web security, witha focus on application delivery, cloud enablement, and secure browsing. Since 1993, Ericom has been helping users to securelyaccess enterprise mission-critical applications running on a broad range of Microsoft Windows Terminal Servers, VirtualDesktops, legacy hosts, Linux and other systems. Ericom has offices in the United States, United Kingdom and EMEA. Ericomalso has an extensive network of distributors and partners throughout North America, Europe, APAC, and Africa. Our expandingcustomer base is more than 30 thousand strong, with over 10 million users.www.EricomShield.comCopyright© 2018 Ericom® Software.