WebEx
WebEx does not support HTTPS connections through a proxy. Use one of the following bypass methods.
PAC file entry: |
if (shExpMatch(url, "*.webex.com/*")) { return "DIRECT"; } |
Static bypass rule: | This method requires creation of several bypass rules, one for each current IP address range. For each IP address range: |
Rule Type: Bypass | |
Source IP: (empty) | |
Destination IP: <IP address range> | |
The list of IP addresses for Cisco Unified MeetingPlace version 8.5 is: | |
64.68.96.0/19 (CIDR) or 64.68.96.0 - 64.68.127.255 (net range) | |
66.114.160.0/20 (CIDR) or 66.114.160.0 - 66.114.175.255 (net range) | |
66.163.32.0/20 (CIDR) or 66.163.32.0 - 66.163.47.255 (net range) | |
209.197.192.0/19 (CIDR) or 209.197.192.0 - 209.197.223.255 (net range) | |
208.8.81.0/24 (CIDR) or 208.8.81.0 - 208.8.81.255 (net range) | |
210.4.192.0/20 (CIDR) or 210.4.192.0 - 210.4.207.255 (net range) | |
62.109.192.0/18 (CIDR) or 62.109.192.0 - 62.109.255.255 (net range) | |
173.243.0.0/20 (CIDR) or 173.243.0.0 - 173.243.15.255 (net range) | |
114.29.192.0/19 (CIDR) or 114.29.192.0 - 114.29.223.255 (net range) | |
More more information, see below. | |
SSL incident rule: |
Add: URL *.webex.com TUNNEL |
Troubleshooting: If after adding a bypass, the connection still fails, in some cases the WebEx site responds with an IP address or a domain name that doesn’t match *.webex.com. You can work around the problem by examining the inbound_access.log to find the unresolved connection and then add the IP address or domain name as an exception using the option employed above.
Note: When Content Gateway is on an appliance, this procedure requires the assistance of Technical Support.