Installation guide

IP addresses for which SSL decryption is not performed. See the chapter titled
Scanning and SSL Bypass Options in TRITON - Web Security Help for information
about enabling the SSL inspection bypass feature.
Handling special cases
Any Websense Content Gateway deployment must be able to handle Web site requests
and applications that are not compatible with the proxy or that should bypass the
proxy. For example, requests for data from some internal, trusted sites could be
configured to bypass the proxy, for system performance reasons. In explicit proxy
deployments, a PAC file can be used to list the traffic that is allowed to bypass proxy
inspection. In transparent proxy deployments, the proxy must be installed in a way
that allows static bypass. See the “Static bypass rules” section, in the chapter titled
Transparent Proxy Caching and ARM, in the Websense Content Gateway Online
Help.
The deployment should also be able to manage situations in which key fobs or tokens
are used to access the network and for cases of highly coupled client/server Web
applications. The type of proxy deployment determines how these situations are
handled.
Explicit and transparent proxy
deployments
Websense Content Gateway provides the following proxy deployment options:
Explicit proxy deployment, where the users client software is configured to send
requests directly to Websense Content Gateway
Transparent proxy deployment, where user requests are automatically redirected to a
Websense Content Gateway proxy, typically by a switch or router, on the way to their
eventual destination
Details about configuring explicit and transparent proxy options in Websense Content
Gateway can be found in Websense Content Gateway Online Help, in the chapters
titled Explicit Proxy Caching and Transparent Proxy Caching and ARM, respectively.
Explicit proxy deployment
Use of Websense Content Gateway in an explicit proxy deployment is an easy way to
handle Web requests from users. This type of deployment is recommended for simple
networks with a small number of users. Explicit proxy is also used effectively when
proxy settings can be applied by group policy. It requires minimal network
configuration, which can be an advantage for troubleshooting efforts.