Connection Settings
Select how GFI WebMonitor is configured within your network and configure the connection between your internal network and the Internet through the GFI WebMonitor server.
NOTE
This feature is not available for GFI WebMonitor installed as a plug-in for Microsoft Forefront TMGMicrosoft Forefront Threat Management Gateway. A Microsoft product that provides firewall and web proxy services. It also enables administrators to manage Internet access through policies. It is the successor of the Microsoft ISA Server and is part of the Microsoft Forefront line of business security software..
To configure connection settings:
- Go to Settings > Core Settings > Connection Settings.
- In the Network Mode area, select one of the following options:
Mode | Description |
---|---|
Simple Proxy mode | Routes client HTTPHypertext Transfer Protocol. traffic through GFI WebMonitor and non-HTTP traffic through a separate router. This setup requires an Internet facing router with port blocking and traffic forwarding capabilities. |
Gateway mode | Choose this mode if installing GFI WebMonitor on a server that is configured as an Internet gateway. All outbound and inbound client traffic (HTTP and non-HTTP) is routed through GFI WebMonitor. When GFI WebMonitor is deployed in this mode, you can enable Transparent Proxy, eliminating the need to set client browser settings to point to a specific proxy. For more information refer to Configuring Transparent Proxy. |
In parallel with Microsoft Forefront TMG |
When installing GFI WebMonitor it can be configured to operate in parallel to Microsoft Forefront TMG. ] Use this setup to keep Microsoft Forefront TMG as a firewall and use the same machine to perform web filtering by GFI WebMonitor. This setup also provides an alternative when it is not possible to add another dedicated machine in the network just for GFI WebMonitor. |
As Plug-in for Microsoft Forefront TMG | GFI WebMonitor 10 SR1 and later editions can be installed as a plug-in for Microsoft Forefront TMG. Use this setup when you want to keep the Microsoft Forefront TMG Server as the primary proxy server and use only the filtering capabilities of GFI WebMonitor. GFI WebMonitor features are not available when installing in this mode. |
Option | Description |
---|---|
Listen on all network interfaces | Configure GFI WebMonitor to listen for incoming HTTP and HTTPSHypertext Transfer Protocol over Secure Socket Layer (SSL). requests on all available network interface cards. |
Proxy ServerA server or software application that receives requests from client machines and responds according to filtering policies configured in GFI WebMonitor. |
In the Proxy Server field, enter the IP address of the computer where GFI WebMonitor is installed. |
Port |
In the Port field, enter the port number used by GFI WebMonitor to listen to traffic (Default is 8080). |
Use WPAD |
[Optional] Enable Use WPADWeb Proxy AutoDiscovery protocol. if you want to use Web Proxy Auto-Discovery to enable client computers to automatically detect the GFI WebMonitor server. |
Repeat WPAD detection | Click to enable GFI WebMonitor to search for available WPAD servers on your network. |
Proxy Authentication | Configure the authentication method used when client machines are validated when accessing the Internet. |
Chained Proxy | Connecting several proxy servers together to obtain greater anonymity. These servers act together as one proxy server to process web requests. |
Option | Description |
---|---|
Internal Network card | Select a network card from the available drop-down list. GFI WebMonitor listens for incoming HTTP and HTTPS requests on the selected network card. |
IP Address | If the chosen network adapter has multiple IP addresses, select the IP address you want to use from the list. |
Use WPAD |
[Optional] Enable Use WPAD if you want to use Web Proxy Auto-Discovery to enable client computers to automatically detect the GFI WebMonitor server. |
Repeat WPAD detection | Click to enable GFI WebMonitor to search for available WPAD servers on your network. |
Proxy Authentication | Configure the authentication method used when client machines are validated when accessing the Internet. |
Chained Proxy | Connecting several proxy servers together to obtain greater anonymity. These servers act together as one proxy server to process web requests. |
- Click Next.
See also: