Create a custom Service element for redirecting traffic
Before you can redirect traffic to a proxy service, you must create a custom Service element. Create separate elements for each protocol.
For more details about the product and how to configure features, click Help or press F1.
Steps
TCP Service Properties dialog box
Use this dialog box to configure a custom TCP Service element.
Option | Definition |
---|---|
General tab | |
Protocol | Displays the protocol. |
Name | The name of the element. |
Comment (Optional) |
A comment for your own reference. |
Dst. Ports
(Optional) |
Specifies the destination port or port range. To match a single port, enter it in the first field and leave the other field empty. To enter a range, enter a value in both fields.
(Either source or destination port is mandatory.) |
Src. Ports
(Optional) |
Specifies the source port or port range. To match a single port, enter it in the first field and leave the other field empty. To enter a range, enter a value in both fields.
(Either source or destination port is mandatory.) |
Protocol | Shows the assigned protocol. Click Select to select a Protocol Agent. |
Category (Optional) |
Includes the element in predefined categories. Click Select to select a category. |
Option | Definition |
---|---|
Protocol Parameters tab, common options | |
Reset | Discards the changes and reverts to the previously saved default settings. Not available for all protocols. |
Option | Definition |
---|---|
Protocol Parameters tab, when Protocol is DNS or SSM DNS Proxy (TCP) | |
Enforce DNS protocol usage |
|
Deny DDNS updates |
|
Deny DNS zone transfers |
|
Enforce SafeSearch |
|
Option | Definition |
---|---|
Protocol Parameters tab, when Protocol is FTP or SSM FTP Proxy | |
Allow related connections |
|
Allow active mode |
|
Allow passive mode |
|
Control data inspection mode
(Firewall only) |
|
Highest allowed source port for Active data connection or Lowest allowed source port for Active data connection (Firewall only) |
Enter a port value to limit the range of allowed source ports for active data connections on the server. Value 0 for the lowest port means that the server always uses the port number immediately preceding the destination port. If the server uses a standard port, both the lowest and highest port number must be 0. |
Redirect to Proxy Server
(Firewall only) |
Select the Proxy Server to which the connections are redirected. (Optional if the NGFW Engine version is 6.4 or higher) Specify the IP Address Translation Range (IPv4 only) and the Port Translation Range for the redirection. To specify a single IP address, enter the same IP address in both fields. Note: This option is not supported for SSM Proxies.
|
Option | Definition |
---|---|
Protocol Parameters tab, when Protocol is HTTP or HTTPS | |
Logging of Accessed URLs |
|
Optimized server stream fingerprinting |
|
Enforce SafeSearch |
|
HTTPS decryption and inspection
(HTTPS only) |
Controls whether to decrypt HTTPS traffic.
|
HTTPS Inspection Exceptions
(HTTPS only) |
Specifies the HTTPS Inspection Exceptions according to which traffic is decrypted and inspected or
allowed to pass without decryption. Click Select to select an HTTP Inspection Exceptions element. |
(Firewall only) | |
Redirect to Proxy Server
(Firewall only) |
Select the Proxy Server to which the connections are redirected. (Optional if the NGFW Engine version is 6.4 or higher) Specify the IP Address Translation Range (IPv4 only) and the Port Translation Range for the redirection. To specify a single IP address, enter the same IP address in both fields. Note: This option is not supported for SSM Proxies.
|
Option | Definition |
---|---|
Protocol Parameters tab, when Protocol is HTTP with SSM HTTP Proxy | |
Logging of Accessed URLs |
|
Optimized server stream fingerprinting |
|
Redirect to Proxy Server | This option is not supported for SSM Proxies. |
Enforce SafeSearch |
|
Enforce Strict Headers | When selected, the proxy blocks HTTP requests and responses that do not comply with the HTTP protocol standards. |
Log URLs | When selected, the proxy logs the URLs in HTTP requests. |
Request Validation | When selected, the proxy validates HTTP requests. Selecting this option enables options in the following sections:
|
URL Control Options section | Specifies options for validation of URLs. |
Disallow Unicode in URL Paths | When selected, unicode-encoded text is not allowed in URL paths. |
Disallow Unicode URL Queries | When selected, unicode-encoded text is not allowed in query strings in URLs. |
Enforce Strict URL Paths | When selected, the proxy blocks URL paths that contain characters that are not allowed by the HTTP protocol standards. |
Enforce Strict URL Queries | When selected, the proxy blocks queries that contain characters that are not allowed by the HTTP protocol standards. |
URL Normalization Validation | Specifies how URL normalization is applied to HTTP requests.
|
Maximum URL Length | Specifies the maximum number of characters allowed in URLs. |
Require HTTP Version | When selected, the proxy requires the HTTP request to include an HTTP version string. Selecting this
option enables the following options:
|
Allow HTTP version 1.0 | When selected, the proxy allows HTTP requests that specify HTTP version 1.0 as the version string. |
Allow HTTP version 1.1 | When selected, the proxy allows HTTP requests that specify HTTP version 1.1 as the version string. |
URL Matches section | Specifies rules for allowing or denying matching URLs. |
Allow or Deny Specified URL Matches | Specifies whether matching URLs are allowed or denied.
|
URL Match List | Specifies the criteria for matching URLs. |
Match Type | Specifies how the proxy matches the match criteria in the URL.
|
Match Parameter | Specifies the part of the URL where the proxy checks for the match criteria.
|
URL | The matching criteria for the URL. |
Add | Adds a row to the table. |
Remove | Removes the selected row from the table. |
Commands section | Specifies the commands that the proxy allows in HTTP requests. |
Allowed HTTP Commands |
|
Content Control | Specifies options for allowing or denying content in HTTP requests. |
Deny SOAP | When selected, the proxy denies the use of simple object access protocol (SOAP) in HTTP requests. |
Option | Definition |
---|---|
Protocol Parameters tab, when Protocol is HTTP with SSM TCP Proxy or HTTPS with SSM TCP Proxy | |
Logging of Accessed URLs |
|
Optimized server stream fingerprinting |
|
Redirect to Proxy Server
(Firewall only) |
Select the Proxy Server to which the connections are redirected. (Optional if the NGFW Engine version is 6.4 or higher) Specify the IP Address Translation Range (IPv4 only) and the Port Translation Range for the redirection. To specify a single IP address, enter the same IP address in both fields. Note: This option is not supported for SSM Proxies.
|
Enforce SafeSearch |
|
HTTPS decryption and inspection
(HTTPS only) |
Controls whether to decrypt HTTPS traffic.
|
HTTPS Inspection Exceptions
(HTTPS only) |
Specifies the HTTPS Inspection Exceptions according to which traffic is decrypted and inspected or
allowed to pass without decryption. Click Select to select an HTTP Inspection Exceptions element. |
Option | Definition |
---|---|
Protocol Parameters tab, when Protocol is H232 | |
Allow related connections |
|
Allow special logical channels through (No NAT) |
|
Option | Definition |
---|---|
Protocol Parameters tab, when Protocol is IMAPS | |
IMAPS decryption and inspection | Controls whether to decrypt SSL/TLS encryption.
|
IMAPS Inspection Exceptions | Specifies the HTTPS Inspection Exceptions according to which traffic is decrypted and inspected or allowed to pass without decryption. Click Select to select an HTTP Inspection Exceptions element. |
Option | Definition |
---|---|
Protocol Parameters tab, when Protocol is MSRPC | |
Allow related connections |
|
Allow MS Exchange Remote administration service |
|
Allow MS Exchange user services |
|
Allow any UUID in endpoint mapping |
|
Allow other RPC traffic |
|
Option | Definition |
---|---|
Protocol Parameters tab, when Protocol is Oracle | |
Allow related connections |
|
Max. length allowed for one TNS packet | Enter the maximum amount of TCP payload data that each Oracle TNS packet is allowed to carry. |
Netmask for allowed server addresses | Enter a netmask for limiting the allowed traffic. The value 255.255.255.255 allows the database connection only to the address in which the Oracle Listener service is located. The value 0.0.0.0 allows database connections to all addresses. |
Set checksum to zero for modified TNS packets |
|
Option | Definition |
---|---|
Protocol Parameters tab, when Protocol is POP3S | |
POP3S decryption and inspection | Controls whether to decrypt SSL/TLS encryption.
|
POP3S Inspection Exceptions | Specifies the HTTPS Inspection Exceptions according to which traffic is decrypted and inspected or allowed to pass without decryption. Click Select to select an HTTP Inspection Exceptions element. |
Option | Definition |
---|---|
Protocol Parameters tab, when Protocol is Protocol Identification | |
SSL/TLS decryption and inspection | Controls whether to decrypt SSL/TLS encryption.
|
HTTPS Inspection Exceptions | Specifies the HTTPS Inspection Exceptions according to which traffic is decrypted and inspected or allowed to pass without decryption. |
Option | Definition |
---|---|
Protocol Parameters tab, when Protocol is RTSP | |
Allow related connections |
|
Option | Definition |
---|---|
Protocol Parameters tab, when Protocol is Shell | |
Allow related connections |
|
Option | Definition |
---|---|
Protocol Parameters tab, when Protocol is SIP | |
Allow related connections
(Firewall only) |
|
Enforce client side media |
|
Enforce server side media |
|
Maximum number of calls | The maximum number of calls allowed by the Access rule. If the value is 0, no limit is set for the number of calls. |
Option | Definition |
---|---|
Protocol Parameters tab, when Protocol is SMTP | |
Redirect to Proxy Server
(Firewall only) |
Select the Proxy Server to which the connections are redirected. (Optional if the NGFW Engine version is 6.4 or higher) Specify the IP Address Translation Range (IPv4 only) and the Port Translation Range for the redirection. To specify a single IP address, enter the same IP address in both fields. Note: This option is not supported for SSM Proxies.
|
Option | Definition |
---|---|
Protocol Parameters tab, when Protocol is SSH or SSH with SSM TCP Proxy | |
Make protocol validation |
|
Bytes allowed from client before Server ID | Amount of data that the client is allowed to send to the server before the server sends its own identification string. |
Bytes allowed from server before Client ID | Amount of data that the server can send to the client before the client sends its own identification string. |
Bytes allowed from server before Server ID | Amount of data that the server can send to the client before the server sends its own identification string. |
Option | Definition |
---|---|
Protocol Parameters tab, when Protocol is SunRPC | |
Learn RPC program number to port mapping for future RPC service matches | When selected, Protocol Agent is enabled. |
Option | Definition |
---|---|
Protocol Parameters tab, when Protocol is TCP Proxy | |
Abort on close | Timeout in seconds for aborting a connection counted from when one of the communicating parties initiates the connection closing. The connection is aborted by sending TCP Reset packets to the unresponsive endpoint. Setting this value to 0 disables this timeout (connections are left open). |
Idle timeout | Timeout in seconds for closing a connection after the latest transmission. Setting this value to 0 disables this timeout (connections are left open). |
Use proxy |
|