Basic chaining
In this case, Squid forwards requests to the cloud proxy but performs no authentication. End users can be authenticated using manual authentication only: prompting users for a user name and password the first time they access the Internet through a browser.
Configure Squid to forward requests to the cloud proxy as follows:
- Define one or more ACLs to identify sites that should be not be filtered through Forcepoint Web Security Cloud. These must include certain service-specific sites, and should
include any other sites that are not normally handled through the cloud service. You can identify these sites by examining the service-generated PAC file available at http://pac.webdefence.global.blackspider.com:8082/proxy.pac.You should also configure direct access to the cloud portal to allow the following:
- Correct display of block pages
- End-user self-registration
The roaming user home page, if used, should also be configured as an ACL.
The following sites must be included in the ACLs:acl WBSN dstdomain .mailcontrol.com acl WBSN dstdomain www.blackspider.com acl WBSN dstdomain webdefence.global.blackspider.com always_direct allow WBSN
- Force all other sites to use the cloud proxy as follows:
never_direct allow all
- Tell Squid the location of the upstream cloud proxy:
cache_peer webdefence.global.blackspider.com parent 8081 0 no-query default no-digest