Post Installation Steps

End User Configuration

After installing Ericom Shield Server, the system is ready to use. In order to start browsing securely using Ericom Shield, the Browsing Traffic should be sent to a proxy server.

If a proxy server is already in use (for caching or content filtering purpose), this proxy should be configured to work with Ericom Shield.

Alternatively, the browser will be configured to use the Ericom Shield built-in Proxy.

Integrate with Existing Proxy

When an organization already has a proxy server, the existing proxy server should be configured to connect to the Ericom Shield ICAP server. The ICAP Server is running on the Ericom Shield Server and is listening on port 1344. Configure the exiting server to connect to the Ericom Shield ICAP server on port 1344 using the <ProxyHostname>.

There may also be a need to import the certificates detailed below into the existing proxy server to allow support for HTTPS navigation.

Proxy Configuration

There are several options to configure the proxy to connect to the ICAP server. It can be done at the single user level or at the group policy level to affect all users. Available options are detailed hereunder:

Set the Proxy Using Group Policy

  1. Open Group Policy Management Console - Press the Windows logo key + R to open the RUN dialog box. Type gpmc.msc in the text box, and then click OK or press ENTER.
  2. Find an existing or create a new GPO to contain the proxy settings (more information can be found here ). Ensure that the GPO is associated with the domain, site, or organizational unit whose users you want affected by the policy.
New GPO
  1. If a new policy was created, provide a name for the policy. The Group Policy Management Editor opens, displaying the current content of the policy object. In the right pane under the Settings tab | User Configuration right click and select <Edit>.
Edit GPO
  1. Expand the User Configuration | Preferences | Windows Settings | Registry
  2. Create a new registry item: right click on <Registry> and create a New | Registry Item
New Registry Item
  1. In the dialog, under the Key Path click on < ... > and go to HKCU\Software\Microsoft\Windows\CurrentVersion\InternetSettings\ProxyEnable

    Create a new Value Name: ProxyEnable

    Value type: REG_DWORD

    Value data: 00000001

Registry Properties
  1. Create a second registry item with the following values:

    Value Name: ProxyServer

    Value type: REG_SZ

    Value data: proxyname:port

Proxy Server

Note

Replace proxyname:port with the <DNS>:<PORT> of your Shield server, e.g. shield.company.local:3128 The DNS name should be the clustered address name for the Shield Proxies if Kerberos authentication is also being used.

  1. Create a third registry item with the following values:

    Value Name: ProxyOverride

    Value type: REG_SZ

    Value data: <local addresses>

Note

Replace <local addresses> with any local address on your network that you wish to exclude, e.g. 192.168.0*;domain.com

Proxy Override

Note

More information can be found here

Set the Proxy Using PAC File with Group Policy

  1. Open Group Policy Management Console.
  2. Find an existing or create a new GPO to contain the proxy settings. Ensure that the GPO is associated with the domain, site, or organizational unit whose users you want affected by the policy.
New GPO

The Group Policy Management Editor opens, displaying the current content of the policy object. In the right pane under the Settings tab | User Configuration right click and select <Edit>.

Edit GPO
  1. Expand the User Configuration | Preferences | Windows Settings | Registry.
  2. Create a new registry item: right click on <Registry> and create a New | Registry Item
New Registry Item
  1. In the dialog, under the Key Path click on < ... > and go to HKCU\Software\Microsoft\Windows\CurrentVersion\InternetSettings\ProxyEnable

    Create a new Value Name: AutoConfigURL

    Value type: REG_SZ

    Value data: <your pac file>

Note

Replace <your pac file> with the location of your file, for example: if you would like to use the Ericom Shield environment to host your PAC file, enter the address as… http://ProxyHostname/default.pac

PAC Registry

Configure Firefox To Use Shield Proxy Using PAC File

Since Firefox settings are separated and are not affected by the Windows system definitions, using the proxy defined in the PAC file does not affect it automatically. To configure Firefox to use the proxy defined in the PAC file (after defining the GPO for it), follow these steps:

  • Place the shield.cfg file in the root of the Firefox directory. E.g.:

    C:\Program Files\Mozilla Firefox\shield.cfg

  • Place the autoconfig.js file in the defaultspref sub-directory. E.g.:

    C:\Program Files\Mozilla Firefox\defaults\pref\autoconfig.js

  • In autoconfig.js add these lines:

    pref(“general.config.obscure_value”, 0); pref(“general.config.filename”, “shield.cfg”);

  • In shield.cfg add this line:

    lockPref(“network.proxy.autoconfig_url”, “http://ProxyHostname/default.pac”); lockPref(“network.proxy.type”, 2); lockPref(“network.proxy.no_proxies_on”, “localhost, 127.0.0.1”);

Note

These files should be ANSI encoded. Please change the path of the PAC file to use local PAC file. In addition, specify the internal addresses to be excluded.

Set the Proxy at the Browser

Select your browser of choice and define the Proxy Settings to use the <ProxyHostname> and port 3128.

Set the Proxy Using PAC File

It is possible to set the proxy to use a Proxy Auto-Config (PAC) file. Ericom Shield comes with a default PAC file that can be used out of the box. To use the default PAC file, use the following path: <http://ProxyHostname/default.pac>. For more information, select the browser of choice.

Changes can be made to the default PAC file as needed, once the changes have been made, upload the new PAC file using the Administration Console (Settings | PAC File section).

Select your browser of choice and define the Proxy Settings to use the PAC file.

Certificate Configuration

In order for Shield to handle HTTPS domains, the following certificate needs to be imported into the client machine (Local Computer). This can be done via Group Policy or manually. Download the Ericom Shield Certificate in one of the following ways:

  1. Download from here
  2. Open a Shield browser and go to here
  3. Open a browser and go to: <http://<ProxyHostname>/install-certificate>

Install Certificate Using Group Policy

  1. Open Group Policy Management Console.
  2. Find an existing or create a new GPO to contain the certificate settings. Ensure that the GPO is associated with the domain, site, or organizational unit whose users you want affected by the policy.
New GPO
  1. In the right pane under the Settings tab | Computer Configuration click <Edit>.
Edit Certificate GPO
  1. The Group Policy Management Editor opens, displaying the current content of the policy object.

In the navigation pane, open Computer Configuration | Policies | Windows Settings | Security Settings | Public Key Policies | Trusted Root Certification Authorities. Right click and select <import>.

Import Certificate
  1. Select the Shield certificate file and import it.
Certificate
  1. After importing the certificate, right click the GPO and select “enforce”.

  2. Link between the computer and the certificate:

    • Under Domain Computers, create a GPO to represent the computer that will be connected to.
    • Right click this GPO and select <Link an Existing GPO> and select the certificate GPO.

Note

More information can be found here

Configure Firefox To Use Shield Certificate

Since Firefox settings are not affected by the Windows system definitions, the certificate that is defined in the GPO does not affect. To solve this, Firefox should be configured to trust certificates in the Windows certificate store. Once the GPO is defined for the Shield Certificate, follow these steps (skip first 2 items if files already exist in the system):

  • Place the shield.cfg file in the root of the Firefox directory. E.g.:

    C:Program FilesMozilla Firefoxshield.cfg

  • Place the autoconfig.js file in the defaultspref sub-directory. E.g.:

    C:Program FilesMozilla Firefoxdefaultsprefautoconfig.js

  • In autoconfig.js add these lines:

    pref(“general.config.obscure_value”, 0); pref(“general.config.filename”, “shield.cfg”);

  • In shield.cfg add this line:

    pref(“security.enterprise_roots.enabled”, true);

Note

These files should be ANSI encoded.

Install the Certificate at the Browser

External Syslog

Ericom Shield can be configured to send all Shield log messages to an external Syslog Server.

Define the External Syslog server details in the Admin | Settings | Logs section. More details here.