0% found this document useful (0 votes)
50 views5 pages

SWG Deployment Methodologies en

The document discusses four common methods for deploying secure web gateways: inline, explicit, transparent, and SPAN port. Inline deployment provides the highest security but is a single point of failure. Explicit deployment allows flexibility but requires client configuration. Transparent deployment monitors all traffic but can impact performance.

Uploaded by

raul.epifanio
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views5 pages

SWG Deployment Methodologies en

The document discusses four common methods for deploying secure web gateways: inline, explicit, transparent, and SPAN port. Inline deployment provides the highest security but is a single point of failure. Explicit deployment allows flexibility but requires client configuration. Transparent deployment monitors all traffic but can impact performance.

Uploaded by

raul.epifanio
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

SECURE WEB GATEWAY

WHITEPAPER
DEPLOYMENT METHODOLOGIES
In today’s complex network architectures it seems there are limitless ways to deploy networking equipment.
This may be the case for some networking gear, but for web gateways there are only a few proven deployment
methodologies that are effective and provide complete security.
In this article, we’ll talk about the four most common types of web gateway network deployments. Sometimes
referred to as forward proxies, these devices are used to secure web access for an organization’s internal end-
users. The four commonly used deployment scenarios for web gateways are inline, explicit, transparent and SPAN
port. Each one of these deployments has its advantages and disadvantages.

Inline Deployment Inline Deployment Advantages


Inline deployment is the simplest and easiest to describe. Smaller The upside of an inline methodology is the ease of deployment and
deployments, such as a branch office, will typically use an inline the guaranteed assurance that all web traffic will be re-routed to flow
deployment due to the ease of deployment and the absolute security through the gateway. There is no chance of a user bypassing the
level it provides. controls set by the administrator as long as the device is inline and is the
only path available to the Internet. All Internet bound HTTP traffic will be
With an inline deployment, the web gateway is placed directly in the
processed and handled by the web gateway. Another advantage is the
path of all network traffic going to and from the Internet (Figure 1). If you
ability to monitor all ports for call home traffic generated by malware and
choose an inline deployment, make sure your web gateway is capable
botnets on infected computers. This awareness allows for remediation of
of bypassing network traffic that you don’t want processed by the web
infected systems lowering the risks of web access for an organization.
gateway. In many instances, you can choose to either “proxy” (re-route)
or“bypass” a specific protocol. If you “proxy” the protocol, it means the
web gateway will terminate the traffic from the client to the server locally, Inline Deployment Disadvantages
and re-establish a new connection acting as the client to the server to The disadvantage of an inline deployment is a single point of failure. Even
get the requested information. with technologies like “fail to wire”, which allows all traffic to flow through
when a device fails, many organizations are uncomfortable with a single
device in the data stream to the Internet. Although unlikely, a partial failure
of the device could result in a small outage. For a small organization or a
Clients Switch Secure Web Gateway
branch office a short disruption may not be an urgent concern, but for a
larger organization Internet access can be mission critical.
Figure 1 - Inline Deployment
Another disadvantage (really a side effect of this being the most secure
deployment methodology), is that with inline deployment there is the
necessity to manage all the protocols proxied by the web gateway.
Because the web gateway is inline, all other protocols (FTP, CIFS, etc)
that will need to be proxied or bypassed by the web gateway. The IT
SECURE WEB GATEWAY admin will need to administer this list and the handling of each protocol
DEPLOYMENT METHODOLOGIES used by the organization. This adds the highest level of security for an
©
BLUE COAT SYSTEMS, INC organization.
1
WHITEPAPER
Explicit Deployment Explicit Mode Disadvantages
Explicit deployment is commonly used when a web gateway is deployed The disadvantage of explicit mode deployment involves IT administrative
in a larger network, and the design of the network requires there to be overhead as each client station needs a configuration change in order
no single point of failure. Explicit deployment allows the web gateway to work properly. While there is some reduction in this overhead with
to be located on the network in any location that is accessible by all PAC and WPAD, any error in configuration of an end-user system will
users and the device itself has access to the Internet (Figure 2). Explicit result in a helpdesk call and require a sysadmin to rectify the situation.
deployment uses an explicit definition in a web browser. To facilitate this Explicit mode deployment also relies heavily on a properly configured
kind of deployment an administrator can distribute PAC or WPAD files network and firewall. Any hole in the network or firewall can be exploited
for the explicit proxy setup in end-user browsers. by a knowledgeable end-user to bypass the web gateway as discussed
earlier. Also, for call home traffic analysis port monitoring needs to be
done by a network device with access to all egress point network traffic.
The explicit mode web gateway can detect and block call home traffic
only for protocols defined and managed, such as HTTP and HTTPS.
Clients Switch
or Router

Transparent Deployment
Secure Web Gateway
Transparent deployment allows a web gateway to be deployed in
any network location that has connectivity, similarly to explicit mode
Figure 2 - Explicit Deployment
Client has an explicitly defined proxy in its settings for the web browser
deployment (Figure 3), reducing the need for a configuration change
to the network to implement. In addition, there is no administrative
When using explicit deployment it is extremely important to have the overhead to configure end-user systems, since the routing of HTTP
firewall properly configured to prevent users from bypassing the proxy. and HTTPS traffic is typically done by the router or other network
The firewall needs to be configured to allow only the proxy to talk device. Transparent deployment is often used when an organization is
through the firewall using HTTP and HTTPS. All other hosts/IP addresses too large for an inline deployment and does not want the added work
should be denied. In addition, all other ports need to be locked down to and overhead needed for an explicit deployment. Most transparent
prevent end-users from setting up their own proxy internally that tries to deployments rely on web Caching Communications Protocol (WCCP), a
access the Internet via HTTP on a port other than the commonly used protocol supported by many network devices. Alternatively transparent
ones (80 and 443). deployment can be achieved using Policy Based Routing (PBR).

Explicit Mode Advantages


The main advantages of deploying a web gateway in explicit mode Web traffic

include narrowing the amount of traffic processed by the web gateway Clients Switch
or Router
(you can limit traffic to only HTTP based traffic), and the ability to more
easily implement redundancy for web gateways in your environment.
Explicit mode deployment for an environment without an existing web Secure Web Gateway

gateway is also less disruptive to the network. The web gateway can be
SECURE WEB GATEWAY placed anywhere in the network that is accessible by all end-users as
Figure 3 - Transparent Deployment
Router and SWG use WCCP for communications
DEPLOYMENT METHODOLOGIES long as the web gateway is able to reach the Internet.
©
BLUE COAT SYSTEMS, INC
2
WHITEPAPER
Transparent Deployment Advantages SPAN Port Advantages
The main advantages of deploying a web gateway in transparent mode SPAN port deployments are advantageous for large scale deployments
include narrowing the amount of traffic processed by the proxy, and because the monitoring mode typically uses fewer resources than
the ability to more easily implement redundancy of the web gateway. In inline, explicit or transparent, which all must actively process traffic. A
addition, transparent deployment does not require changes to end-user SPAN port deployment is useful if you think your hardware might be
systems. undersized for your needs. Finally, port monitoring to passively detect
call home attempts on most ports and network traffic is available with
this deployment method.
Transparent Deployment Disadvantages
Transparent deployment does depend on the availability of either
SPAN Port Disadvantages
WCCP or PBR, and support for these by the web gateway, typically
available only on more sophisticated web gateways. Configuration can A SPAN port deployment on a switch does not see all the traffic.
be trickier as there needs to be compatibility of supported versions of Corrupt network packets, packets below minimum size, and layer 1
WCCP between the router and the web gateway. More in-depth network and 2 errors are usually dropped by the switch. In addition, it’s possible
expertise is required to implement and deploy a transparent mode a SPAN port can introduce network delays. The software architecture
deployment, which may not be a problem in larger organizations but of low-end switches introduces delay by copying the spanned packets.
could be an issue for smaller organizations. Also, if the data is being aggregated through a gigabit fiber optic
port, a delay is introduced as the signal is converted from electrical to
optical. Any network delay can be critical since TCP resets are used to
SPAN Port Deployment
implement policy.
The last deployment methodology is the SPAN (Switched Port
SPAN ports also have an issue when there is an overload of traffic.
Analyzer) port deployment. Sometimes this method is called TCP Reset
Typically the port will drop packets and result in some data loss. In a
deployment, as it relies on TCP resets to implement the policy of the
high network load situation most web gateways connected to a SPAN
web gateway. A web gateway is deployed by attaching it to a SPAN
port will not be able to respond quickly enough to keep malware from
port on a switch (Figure 4). Unlike the other three deployment methods,
spreading across a corporate network.
which process the web traffic and implement policies based on the
network response the web gateway issues, a web gateway deployed
on a SPAN port implements policies by issuing a TCP reset to the client
system to prevent completing a download of offending content.

Switch
TAP

Clients SPAN Port

Secure Web Gateway

SECURE WEB GATEWAY


Figure 4 - SPAN Port Deployment
DEPLOYMENT METHODOLOGIES
©
BLUE COAT SYSTEMS, INC
3
WHITEPAPER
Recently a Network World article (Dec 7, 2009) discussed the TCP reset Conclusion
method used by web gateways to implement policy:
While there are four common deployment methodologies to choose from
Too clever by half, perhaps –TCP RESET has several drawbacks. when implementing a secure web gateway, there are really only three
First, a cyber attacker can cause a “self-inflicted DoS attack” by clear common choices for IT departments. The choice between inline,
flooding your network with thousands of offending packets. The TCP explicit and transparent, will have to be done based on the needs and
RESET gateway responds by issuing two TCP RESETs for every resources of the organization and the IT department. Even though SPAN
offending packet it sees. port deployment with TCP reset may seem like a reasonable solution,
there are sufficient drawbacks that a serious web gateway deployment
The TCP RESET approach is worthless against a cyber attacker who should avoid this methodology.
uses UDP to “phone home” the contents of your sensitive files.
The gateway has to be perfectly quick; it has to send the TCP RESET
packets before the client (victim) has processed the final packet of
malware.
Ergo – deep and thorough inspection of network traffic before it’s
allowed to flow to the client is the most effective way to stop malware.
...In other words, don’t just wave at the malware as it goes by.
–Barry Nance, Network World, Dec 7, 2009
Finally, a SPAN port deployment monitors traffic passively. A web
gateway with inline, explicit or transparent deployments will stop
network traffic allowing for real-time ratings, cloud intelligence requests
in hybrid web gateway architectures, data loss prevention checks on
out going traffic, re-writes of web request and response variables, deep
inspection of compressed archives and data transfers and optimization
of web content delivery via caching, stream splitting and bandwidth
management.

SECURE WEB GATEWAY


DEPLOYMENT METHODOLOGIES
©
BLUE COAT SYSTEMS, INC
4
WHITEPAPER
© 2016 Blue Coat Systems, Inc. All rights reserved. Blue Coat, the Blue
Coat logos, ProxySG, PacketShaper, CacheFlow, IntelligenceCenter,
CacheOS, CachePulse, Crossbeam, K9, the K9 logo, DRTR, MACH5,
PacketWise, Policycenter, ProxyAV, ProxyClient, SGOS, WebPulse,
Solera Networks, the Solera Networks logos, DeepSee, “See Everything.
Know Everything.”, “Security Empowers Business”, and BlueTouch are
registered trademarks or trademarks of Blue Coat Systems, Inc. or its
affiliates in the U.S. and certain other countries. This list may not be
complete, and the absence of a trademark from this list does not mean it
is not a trademark of Blue Coat or that Blue Coat has stopped using the
trademark. All other trademarks mentioned in this document owned by
third parties are the property of their respective owners. This document is
for informational purposes only. Blue Coat makes no warranties, express,
implied, or statutory, as to the information in this document. Blue Coat
products, technical services, and any other technical data referenced
in this document are subject to U.S. export control and sanctions laws,
regulations and requirements, and may be subject to export or import
regulations in other countries. You agree to comply strictly with these
laws, regulations and requirements, and acknowledge that you have the
Blue Coat Systems Inc. responsibility to obtain any licenses, permits or other approvals that may
www.bluecoat.com be required in order to export, re-export, transfer in country or import after
delivery to you.
Corporate Headquarters
v.WP-SWG-DEPLOYMENT-METHODOLOGIES-EN-v2c-0216
Sunnyvale, CA
+1.408.220.2200

EMEA Headquarters
Hampshire, UK
+44.1252.554600

APAC Headquarters
Singapore
+65.6826.7000
5

You might also like