Other NIC options
In addition to configuring monitoring options, you can also determine other NIC behaviors:
- Under Blocking, make sure that the appropriate NIC is listed in the Blocking NIC field. If you are configuring multiple NICs, the settings for each NIC should show the same value in this field. In other words, only one NIC is used for blocking.
- If you are running Forcepoint URL Filtering in Stand-Alone mode, Filter and log HTTP requests is selected, and cannot be changed.
- If you have Forcepoint Web Security, or if Forcepoint URL Filtering is integrated with a third-party product, use the Integrations options to indicate how this Network
Agent should treat HTTP requests. Options that do not apply to your environment are disabled.
- Select Log HTTP requests to make Network Agent responsible for generating all HTTP-related Internet activity log records.
When this option is selected, only the log records that Network Agent creates are forwarded to Log Server for inclusion in the Log Database.
- Select Filter all requests not sent over HTTP ports to use Network Agent to manage only those requests not sent through the integration product.
- Select Log HTTP requests to make Network Agent responsible for generating all HTTP-related Internet activity log records.
- Under Protocol Management, indicate whether Network Agent should use this NIC to manage non-HTTP protocols:
- Check Filter non-HTTP protocol requests to activate Network Agent protocol management. See Managing access to categories, protocols, and cloud apps and Protocol-based policy enforcement for more information.
- Check Measure bandwidth usage by protocol to activate the Bandwidth Optimizer feature. Network Agent uses this NIC to track network bandwidth usage by each protocol or application. See Using Bandwidth Optimizer to manage bandwidth for more information.