BCWSSExplicit
BCWSSExplicit
Connectivity:
Explicit Proxy and SEP Client
Revision: NOV.07.2020
Symantec Web Security Service/Page 2
Page 3
Copyrights
Broadcom, the pulse logo, Connecting everything, and Symantec are among the trademarks of Broadcom. The term “Broadcom”
refers to Broadcom Inc. and/or its subsidiaries.
The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. For more information, please visit www.broadcom.com.
Broadcom reserves the right to make changes without further notice to any products or data herein to improve reliability, function,
or design. Information furnished by Broadcom is believed to be accurate and reliable. However, Broadcom does not assume any
liability arising out of the application or use of this information, nor the application or use of any product or circuit described herein,
neither does it convey any license under its patent rights nor the rights of others.
WSS Access Method: Explicit Proxy/Page 5
With extensive web application controls and detailed reporting features, IT administrators can use the Web Security Service to
create and enforce granular policies that are applied to all covered users, including fixed locations and roaming users.
This document describes how to use the PAC File Management Service (PFMS) to set up explicit proxy connections to the
WSS for security scanning and policy checks on web-bound traffic. It includes how to implement the WSS and Symantec
Endpoint Protection (SEP) solution.
Symantec Web Security Service/Page 6
Table Of Contents
A PAC file is a JavaScript that automates which proxies web browsers communicate through to reach the internet.
n Requests for external websites or requests made by company-owned computers using an external IP address are routed
through the service.
n Computers inside the firewall are given access to sites on the corporate intranet without routing through WSS.
The Explicit Proxy connectivity method protects endpoints at a fixed location (clients reside behind a single-IP egress device) or
roaming clients.
Connectivity: About Explicit Proxy/Page 9
1—For various locations, the Admin generates a PAC file in the WSS portal, possibly providing custom
bypassing of specific servers. The PAC files are installed on client browsers, either through your IT
infrastructure or to Symantec Endpoint Protection (SEP) agents.
2—The PFMS manages the created PAC files, which are available for updating. Amazon Web Services
(AWS) stores the PAC files; AWS provides the automatic health checks and failover infrastructure.
Note: PAC file edits might experience up to a one minute delay for world-
wide propagation.
3—By default, the PAC file script identifies the internal IP address based on the RFC 1918 standard.
Direct access to the internal URL is granted.
4—Location 1's PAC file instructs the browser to bypass WSS for Office 365 requests.
5—For other locations, the PAC files proxies all internet-bound traffic through the nearest WSS
datacenter.
Symantec Web Security Service/Page 10
n You require Client IP-based policy, as addresses are not visible to WSS.
You can also create PAC files for roaming endpoints. For example, you plan to integrate the Symantec Endpoint Protection
(SEP) with the WSS. You want a separate PAC file to be used only for the SEP agent connections.
Technical Requirements
n Know the single static public egress IP address.
n Browsers and operating systems are able to accept and use PAC files.
n Firewall rules:
o If your firewall allows white-listing by DNS, white-list pfms.wss.symantec.com; this is the preferred method.
o If your firewall does not allow white-listing by DNS, allow the following static IP address: 34.120.17.44
(November 7, 2020).
If you employed the PFMS before November 7, 2020, the following IP addresses were used. Firewall rules for
these IP addresses can remain in place in the near-term as a precaution for failover or fallback. A follow up
announcement will be made after the existing IPs have been fully decommissioned.
o 35.155.165.94
o 35.162.233.131
o 52.21.20.251
o 52.54.167.220
o 199.247.42.187
o 199.19.250.187
n The PFMS supports existing, supported authentication methods (Auth Connector, SAML, Captive Portal).
Technical Limitations
n Use Firefox 57.0.2+; older versions of Firefox may not apply PAC file correctly. This is third-party limitation with the
Firefox browser.
n Internet Explorer versions 11, Edge, and newer might cache old PAC file execution results for a particular host. If this
occurs, restart Internet Explorer.
Connectivity: About Explicit Proxy/Page 13
n If the browser does not accept cookies or PAC files, supportability becomes difficult.
n If the user agent is unable to process the PAC file, there will be no protection or exceptions.
To demonstrate the PAC File Management feature, the following steps create a new PAC file and designate its use for the SEP
test Explicit Proxy location (previously entered on the Connectivity > Locations page).
2. Click New File. The portal switches to the PAC File Editor.
c. Include WSS Bypass adds any IP addresses or domains that were previously added to the portal bypass lists
(Connectivity > Bypassed Traffic). You can click the expander to view those entries; however, you cannot edit
those entries here.
Symantec Web Security Service/Page 14
d. Include Office 365 Bypass adds all of the currently known Microsoft Office web application domains.
3. Click Save.
The portal generates an explicit PAC File URL. You can copy this URL and use it for an explicit proxy configuration to
guarantee that this PAC is used. For example, you can send this to the Admin who is configuring the SEP clients to direct
traffic to WSS.
b. Select a Location that is to connect through this PAC file. This example selects a previously added Explicit
Proxy Location created to test SEP integration.
Tip: You can have more than one location that uses the same PAC file. For more
information about the Roaming Endpoints, see "About the Roaming Location" on
page 17.
5. Click the PAC Files link (or the Up arrow icon next to the PAC file name). The portal now displays the newly-created
PAC file.
Symantec Web Security Service/Page 16
n Full custom PAC File URL—The connection always uses the parameters in this PAC file.
n Locations—The WSS checks to see if the Location has an assigned PAC file. If yes, the connection proceeds with those
parameters.
n Default PAC File—If no Location is assigned to the connection, WSS uses the default PAC file
(http://portal.threatpulse.com:8080/pac).
Note: The default PAC file behavior is fail open. If for some reason the client cannot
connect to WSS, it falls back and goes DIRECT.
n If you configure a connection to use the PAC File URL only up to the customer ID portion (see screenshot), then WSS
follows the Locations/Default hierarchy described in the previous two bullets.
Connectivity: About Explicit Proxy/Page 17
After the traffic reaches the WSS, your configured Authentication method is triggered (Identity > Auth Connector > Roaming
Captive Portal option or Identity > SAML).
Edit
During the creation phase or any time after, you can Edit a PAC file to change the parameters. Be advised that this requires a
moderate knowledge of network connections.
Note: PAC file edits might experience up to a one minute delay for world-wide propagation.
Duplicate
You can Duplicate an existing PAC file and modify it for another purpose. For example, you want to test a configuration update
before implementing it.
Import
If you have created PAC files in text files, you can Import them for use in WSS.
Symantec Web Security Service/Page 18
Troubleshooting
n Verify the browser can download the PAC file.
n Confirm provided PAC file is the correct one for the situation (Location, Roaming).
Tip: Currently, this is intended for backward compatibility and will be deprecated in a future
service update. The best practice is to create a custom PAC file with the PFMS.
Technical Requirements
n Verify that firewall port 8080 is open.
Warning: If you continue to use the default PAC file and for some reason WSS is not
accessible—for example, firewall issue on 8080, mis-configured URL, deleted PAC file),
fail open occurs and the connection goes direct.
Apple Safari
1. Select Apple menu > System Preferences.
3. Select an option:
4. Click Advanced. Enter the address of your PAC file in the Address field. For example,
https://portal.threatpulse.com/pac.
b. Enter the Web Security Service PAC file location in the Address
field: https://portal.threatpulse.com/pac.
Google Chrome
1. In the top-right corner of the browser, select the wrench .
2. From the drop-down list, select Options. The browser displays the Google Chrome Options dialog.
3. In the Network section, click Change proxy settings. The browser displays the Internet Properties dialog.
5. In the Local Area Network (LAN) Settings section, click LAN settings. The Local Area Network (LAN) Settings dialog
displays.
b. Enter the Web Security Service PAC file location in the Address field: https://portal.threatpulse.com/pac.
3. If you are using a VPN connection, click Add to set up the connection wizard. If you are using a LAN connection, click
LAN settings
b. Enter the Web Security Service PAC file location in the Address field: https://portal.threatpulse.com/pac.
Mozilla Firefox
1. Select Tools > Options. The browser displays the Options dialog.
b. Enter the WSS PAC file location in the Address field: https://portal.threatpulse.com/pac.
Next Step
n Proceed to "Prevent IP/Subnet From Routing to the Web Security Service" on page 55.
Symantec Web Security Service/Page 22
Tip: Currently, this is intended for backward compatibility and will be deprecated in a future
service update. Symantec strongly encourages you to create a custom PAC file with the PFMS.
Technical Requirements
n Verify that firewall port 8080 is open.
Warning: If you continue to use the default PAC file and for some reason the WSS is not
accessible—for example, firewall issue on 8080, mis-configured URL, deleted PAC file),
fail open occurs and the connection goes direct.
Procedure
DHCP Method
1. Before retrieving the first page, the web browser sends the local DHCP server a DHCPINFORM query.
2. The web browser uses the URL returned from the server to locate the PAC file.
3. If the DHCP server does not return the location of the PAC file, the DNS method is used.
DNS Method
1. Change the name of the PAC file located on the web server from proxy.pac to wpad.dat.
2. The web browser searches the web server for the PAC file using URLs until the proxy configuration file is found in the
domain of the client. The URL format is http://wpad.x.x.com/wpad.dat. WPAD.dat is the name for the PAC file and x
is a part of the domain name.
Connectivity: Publish PAC File With WPAD/Page 23
See "Prevent IP/Subnet From Routing to the Web Security Service" on page 55.
Next Step
n Proceed to "Prevent IP/Subnet From Routing to the Web Security Service" on page 55.
Symantec Web Security Service/Page 24
WSS provides four SEP methods. This topic provides conceptual information to help you determine which is the most
appropriate for your network, then provides links to topics that provide best practices and recommended values for configuring a
VPN tunnel.
n If you need to understand the methods before deciding, continue reading the following concept sections.
n If you know what deployment you require, select a link to the configuration topic.
Based on the predefined configuration, the WSS proxy redirects, allows, or blocks the traffic.
o Detects, identifies, blocks, and remediates threats and other security risks on the client
device.
n SEP provides tamper-proof settings. It also installs the WSS certificate on the endpoint (if
selected by policy). The client-side control, when allowed by a SEP Manager administrator, can
help IT to troubleshoot issues.
1—The Admin uses the WSS portal to create custom a PAC file —possibly providing custom bypassing
of specific servers—and associates it with an Explicit Proxy Location.
2—The Admin accesses the SEP Manager and configures Web Traffic Redirection (WTR), which
includes adding the generated PAC file.
3—SEP Manager distributes the security policy, including the PAC file URL, to the SEP endpoints. The
SEP agent receives the security policy and configures the proxy settings for system and browsers.
4—The PAC file proxies all internet-bound traffic to the nearest WSS for web use and security policy
processing.
Connectivity: About Symantec Endpoint Protection/Page 27
n Your network egress is not a static IP address or it requires traversing NAT devices.
Used in conjunction with the PFMS, the SEP client can dynamically update the PAC file on the
endpoint’s browser. This feature also allows you to maintain more than one PAC file; for example, for
various locations, groups, and so on.
If the seamless identification is disabled or fails for any reason, user identity is not automatically
provided. Authentication reverts to a backup method configured for that location (Captive Portal if
enabled or Roaming Captive Portal).
Connection Methods
n WSS-SEP-WTR—Leverage the WSS PFMS with the SEP Web Traffic Redirection (WTR)
option in SEP Manager.
n WSS-SEP-NTR—Embeds and deploys selective WSS Agent technology into SEP. This yields
the benefits of the full Network Traffic Redirection (NTR) and captures non-proxy applications.
You can select what is captured by the agent. This method is beneficial if SEP clients frequently
change from one network to another. The tunnel method provides heightened security by
encrypting traffic between the endpoint and the data center.
Authentication Support
n Auth Connector—It is possible that client systems can belong to different Active Directory
domains or even different forests, which means WSS cannot discern the proper group.
Therefore, the Auth Connector is required for group-based policies.
n See "Connectivity: About Symantec Endpoint Protection" on page 24 for more information about the solution.
Technical Requirements
n Admin access to an WSS account.
n Captive Portal—Employees must log in to the Captive or Roaming Captive Portal. This method requires the on-premises
Auth Connector integration.
n You must backup the client proxy settings because the new SEP install erases them (Symantec is investigating this
issue). Restore the settings after installing SEP.
n Supported browsers:
o Apple Safari
o Google Chrome
o Microsoft Edge
o Mozilla Firefox
n If you plan to use the PAC File Management Service (PFMS) in conjunction with SEP clients, you must run
Norton LiveUpdate on the client to obtain the required certificate.
https://support.norton.com/sp/en/us/home/current/solutions/kb20080520094501EN_EndUserProfile_en_us
ISSUE: If you encounter issues with Live Update, download the SSL Intercept cert from the WSS portal and manually
install it on the test machine(s).
n https://portal.threatpulse.com/docs/am/Solutions/ManagePolicy/SSL/ssl_chrome_cert_ta.htm
n https://portal.threatpulse.com/docs/am/Solutions/ManagePolicy/SSL/ssl_ie_cert_ta.htm
Connectivity: WSS-SEP with Captive Portal/Page 31
Technical Limitation
n Some browsers do not support proxy settings change in already running sessions. Changing a policy state
(enabled/disabled) requires browser restarts.
Best Practice
n Keep SEP clients updated to the latest versions; the updates provide critical fixes and performance enhancements.
n Consult the welcome letter you receive from Symantec regarding how to access the SEP Manager.
3. Click Add an Integrations Policy. The SEP Manager displays the Integrations Policy dialog.
c. In the PAC Auto Configuration (PAC) File URL field, enter the URL obtained from the WSS.
d. Click OK.
Tip: If you click Mixed Control under Client User Interface Control Settings and then click
Customize, no option exists in the client user interface settings to configure WSS Traffic
Redirection.
1. In the SEP Manager, select Clients. There are three sub-categories: Default Group, Computers, and Users.
On the integration policy created in Step 3 (Policy > Integrations), the interface displays a gold padlock icon.
Connectivity: WSS-SEP with Captive Portal/Page 35
The gold padlock icon enables or disables the end user ability to turn on or off the WSS redirection settings. By default, the
policy is locked, which means users cannot disable the service. Click the padlock (which switches to an unlocked icon) to
allow users to disable connection to the service on their systems.
You can review all enable/disable activities on the Monitors > Logs SEP Manager page.
The next time SEP connects to the management server, it receives the instruction. If you change policy and re-enable it, the
same occurs. Upon the next management server connection, the client receives the policy.
Symantec Web Security Service/Page 36
n See "Connectivity: About Symantec Endpoint Protection" on page 24 for more information about the solution.
Technical Requirements
n SEP 14.2+ is required for this feature.
n Requires an Explicit Proxy Location defined in Connectivity > PAC Files. The examples in this procedure use a location
named PAC-SA.
n Authentication method—
The Seamless Identification feature securely transfers the logged-in user ID and device information to WSS, thus
Captive Portal is not required. However, you can enable Captive Portal or Roaming Captive Portal for backup
authentication method should it become disabled or fail for any reason. This method supplies only the individual user
information. To perform group-based policy, the Auth Connector is still required.
n Verify that your WSS portal is not configured to bypass client-id.wss.symantec.com or any domains that could
contain client-id.wss.symantec.com.
n If you plan to use the PAC File Management Service (PFMS) in conjunction with SEP clients, you must run
Norton LiveUpdate on the client to obtain the required certificate.
https://support.norton.com/sp/en/us/home/current/solutions/kb20080520094501EN_EndUserProfile_en_us
ISSUE: If you encounter issues with Live Update, download the SSL Intercept cert from the WSS portal and manually
install it on the test machine(s).
n https://portal.threatpulse.com/docs/am/Solutions/ManagePolicy/SSL/ssl_chrome_cert_ta.htm
n https://portal.threatpulse.com/docs/am/Solutions/ManagePolicy/SSL/ssl_ie_cert_ta.htm
n Supported browsers:
o Apple Safari
o Google Chrome
o Microsoft Edge
o Mozilla Firefox
Connectivity: WSS-SEP-WTR With Seamless Identification/Page 37
Technical Limitations
n WSS-SEP does not support remote logins if:
o The client is not in the domain tied with the Auth Connector;
Best Practice
n Keep SEP clients updated to the latest versions, which provide critical fixes and performance enhancements.
n Consult the welcome letter you receive from Symantec regarding how to access the SEP Manager.
e. Click Save.
2. Click New File. The portal switches to the PAC File Editor.
Connectivity: WSS-SEP-WTR With Seamless Identification/Page 39
c. Include WSS Bypass adds any IP addresses or domains that were previously added to the portal bypass lists.
You can click the expander to view those entries; however, you cannot edit those entries here.
d. Include Office 365 Bypass adds all of the currently known Microsoft Office web application domains.
3. Click Save.
The portal generates an explicit PAC File URL. Copy this URL (click the Copy icon at the right-side of the field), as it is
required during the SEP integration step.
Tip: You can have more than one location that uses the same PAC file.
a. Select a Location that is to connect through this PAC file. This example selects a previously added Explicit Proxy
Location (named PAC-SA) created to test SEP integration.
Tip: The Roaming Endpoints option applies the PAC file to all remote client (non-
corporate network) connections.
5. Click the PAC Files link (or the Up arrow icon next to the PAC file name). The portal now displays the newly-created
PAC file.
3. Double-click Network Traffic Redirection policy. The SEP Manager displays the Network Traffic Redirection dialog.
Tip: The gold padlock icon enables or disables the end user ability to turn on or off
the WSS Redirection settings. By default, the policy is locked, which means users
cannot disable the service. Click the padlock (which switches to an unlocked icon)
to allow users to disable connection to the service on their systems. You can review
all enable/disable activities on the Monitors > Logs SEP Manager page.
c. In the Proxy auto-configuration (PAC) file URL field, enter the URL obtained from the WSS (in Sub-Step 3.3
above).
d. In the Network Integration Token field, enter the token that you created in Step 2.
e. (Optional) Select Allow direct traffic when network protection is not available to allow the request to go
continue should the PFMS not be reachable. This option lowers security.
f. Click OK.
Symantec Web Security Service/Page 42
Additional Support
n Refer to the Symantec SEP documentation.
Connectivity: WSS-SEP-NTR With Seamless Identification/Page 43
n See "Connectivity: About Symantec Endpoint Protection" on page 24 for more information about the solution.
Technical Requirements
n SEP 14.3-RU1 is required for this feature.
n Authentication method—
The Seamless Identification feature securely transfers the logged-in user ID and device information to WSS, thus
Captive Portal is not required. However, you can enable Captive Portal or Roaming Captive Portal for backup
authentication method should Seamless Identification become disabled or fail for any reason. This method supplies only
the individual user information. To perform group-based policy, the Auth Connector is still required.
n Verify that your WSS portal is not configured to bypass client-id.wss.symantec.com or any domains that could
contain client-id.wss.symantec.com.
Technical Limitation
n WSS-SEP does not support remote logins if:
o The client is not in the domain tied with the Auth Connector;
Best Practice
n Keep SEP clients updated to the latest versions, which provide critical fixes and performance enhancements.
n Consult the welcome letter you received from Symantec regarding how to access the SEP Manager.
e. Click Save.
3. Double-click Network Traffic Redirection policy. The SEP Manager displays the Network Traffic Redirection dialog.
Tip: The gold padlock icon enables or disables the end user ability to turn the WSS
Redirection settings on or off. By default, the policy is locked, which means users
cannot disable the service. Click the padlock (which switches to an unlocked icon)
to allow users to disable the connection to the service on their systems. You can
review all enable/disable activities on the Monitors > Logs SEP Manager page.
c. In the Network Integration Token field, enter the token that you created in Step 2.
d. Click OK.
Symantec Web Security Service/Page 46
Additional Support
n Refer to the Symantec SEP documentation.
Connectivity: WSS-SEP-NTR With Seamless Identification/Page 47
n See "Connectivity: About Symantec Endpoint Protection" on page 24 for more information about the solution.
Technical Requirements
n SEP 14.2+ is required for this feature.
n Authentication method.
o Allow saml.threatpulse.net:8443.
o IdP NOTE—As the client to SAML IdP traffic cannot route through WSS because, you must add an entry to the
PAC file to make the IdP traffic go direct.
o The default SAML method is Cookie. CORS-issues are mitigated because the procedure includes
generating and providing an integration token, which is included in the HTTP header.
n https://knowledge.broadcom.com/external/article?legacyId=TECH252765
n If you plan to use the PAC File Management Service (PFMS) in conjunction with SEP clients, you must run
Norton LiveUpdate on the client to obtain the required certificate.
https://support.norton.com/sp/en/us/home/current/solutions/kb20080520094501EN_EndUserProfile_en_us
ISSUE: If you encounter issues with Live Update, download the SSL Intercept cert from the WSS portal and manually
install it on the test machine(s).
n http://portal.threatpulse.com/docs/sol/Solutions/ManagePolicy/SSL/ssl_chrome_cert_ta.htm
n http://portal.threatpulse.com/docs/sol/Solutions/ManagePolicy/SSL/ssl_ie_cert_ta.htm
n Supported browsers:
o Apple Safari
o Google Chrome
o Microsoft Edge
Symantec Web Security Service/Page 48
o Mozilla Firefox
Technical Limitations
n Some browsers do not support proxy settings change in already running sessions. Changing a policy state
(enabled/disabled) requires browser restarts.
Best Practice
n Keep SEP clients updated to the latest versions, which provide critical fixes and performance enhancements.
n Consult the welcome letter you receive from Symantec regarding how to access the SEP Manager.
c. Copy the token to a local text file or email if another admin is to configure SEP Manager. (Click the copy icon at
the end of the field.)
Tip: Enter Comments to help future admins understand the token's role when
viewed in the portal.
d. Click Save.
2. Click New File. The portal switches to the PAC File Editor.
Symantec Web Security Service/Page 50
c. Include WSS Bypass adds any IP addresses or domains that were previously added to the portal bypass lists.
You can click the expander to view those entries; however, you cannot edit those entries here.
d. Include Office 365 Bypass adds all of the currently known Microsoft Office web application domains.
3. Click Save.
The portal generates an explicit PAC File URL. Copy this URL (click the Copy icon at the right-side of the field), as it is
required during the SEP Manager integration step.
b. Click Save.
5. Click the PAC Files link (or the Up arrow icon next to the PAC file name). The portal now displays the newly-created
PAC file.
3. Click Add an Integrations Policy. The SEP Manager displays the Integrations Policy dialog.
b. In the PAC Auto Configuration (PAC) File URL field, enter the URL obtained from the WSS (in Sub-Step 3.3
above; screenshot example format is not valid).
c. In the WSS Integration Token field, enter the token that you created in Step 2.
e. Click OK.
Tip: The gold padlock icon enables or disables the end user ability to turn on or off the WSS
Redirection settings. By default, the policy is locked, which means users cannot disable
the service. Click the padlock (which switches to an unlocked icon) to allow users to
disable connection to the service on their systems. You can review all enable/disable
activities on the Monitors > Logs SEP Manager page.
n Disabled—All web browser traffic uses the Symantec WSS PAC file URL. This option might be used
during troubleshooting scenarios.
n Enabled—The recommended setting. All web browser traffic visits a locally cached PAC file.
Tip: In any Browser Settings dialog, the PAC File displays the local proxy
URL; not the WSS-generated PAC File URL.
d. Click OK.
Additional Support
n Refer to the Symantec SEP documentation.
Prevent IP/Subnet From Routing to the Web Security Service/Page 55
Some IP addresses or subnets do not require WSS processing. For example, you want to exclude test networks. Configure the
service to ignore these connections.
Notes
n WSS allows an unlimited number of bypassed IP addresses/subnets.
n Each time that a WSS Agent reconnects to WSS (for example, a user who takes a laptop off campus and connects
through a non-corporate network), the client checks against any updates to the list.
a. Enter an IP/Subnet.
c. (Optional) Click the + icon to add another row for another entry.
The new entries display in the tab view. You can edit or delete any entry from here.
1. Navigate to the Policy > Bypassed Traffic > Bypassed IPs/Subnets tab.
2. Click Add. The service displays the Add Bypass IP Address/Subnet dialog.
a. Click Browse. The service displays the File Upload dialog. Navigate to the file location and Open it.
b. Click Import.
All of the new entries display in the tab view. You can edit or delete any entry from here.
Add an Explicit Proxy Location/Page 57
a. Name the location. For example, use the fixed geographical location or organization name.
a. Select the Estimated User range that will be sending web requests through this gateway interface. Symantec
uses this information to ensure proper resources.
5. Click Save.
Symantec Resource
support.broadcom.com Provides knowledge base articles and support information.
Connectivity Methods
Method Port(s) Protocol Resolves To
35.245.151.224
IP addresses for administration of your 34.82.146.64
WSS policy and configuration.
Partner Portal Functionality
35.245.151.231
34.82.146.71
UDP4500 if
firewall is
behind a NAT.
TCP 8084* * Use when the forwarding host is configured for local
SSL interception.
Symantec Web Security Service/Page 60
o By IP Address: 34.120.17.44
o 35.155.165.94
o 35.162.233.131
o 52.21.20.251
o 52.54.167.220
Default PAC
file: TCP 8080 o 199.247.42.187
o 199.19.250.187
portal.threatpulse.com
portal.threatpulse.com
35.245.151.229
34.82.146.69
Authentication
Auth Method Port(s) Protocol Resolves To
35.245.151.226
34.82.146.65
portal.threatpulse.com:
TCP 88 Kerberos
49152-65535 TCP Open when Auth Connector is installed on a new Windows Server
2012 Member rather than a Domain Controller.