Configuring the proxy
This procedure explains how to set up a proxy connection when installing the BigFix server.
If you need to set up a proxy connection after the server installation, see Setting a proxy connection on the server.
- Specify if you want to connect to the internet through a
proxy.
Proxy usage [1] Use the proxy to access the internet [2] Do not use the proxy Choose one of the options above or press <Enter> to accept the default value: [2]
- Enter the proxy hostname or IP
address.
Proxy hostname Specify the hostname or the IP address of the Server that acts as a proxy:
- Specify, if required, the port number of your
proxy.
Proxy port Specify the port of the proxy or press <Enter> if this parameter is not required:
- You can accept the default proxy settings or, alternatively, you can assign different values.
Advanced proxy parameters The proxy will be configured using the following defaults: Proxy user: none Proxy password: none Proxy tunneling capability: let proxy decide Authentication method: all methods allowed by the proxy Proxy exception list: localhost,127.0.0.1 Use the proxy for downstream notification: false [1] Use the default values [2] Set advanced proxy parameters Choose one of the options above or press <Enter> to accept the default value: [1]
Note:- If you want to enable FIPS mode, ensure that the proxy configuration is set up to use an authentication method other than digest, negotiate or ntlm.
- If you specify to use the negotiate authentication method on a server or relay, different authentication methods might be used.
- The proxy configuration specified at installation time is saved in the server configuration file
BESServer.config
and it is used also at runtime.
- Specify the user name used to connect to the proxy, if required, or leave it empty. If you
specify a user name, you will also be prompted to enter its
password.
Proxy user Specify the proxy username or press <Enter> if no user is required:
- Specify the authentication method to be used for your
proxy.
Proxy authentication method The proxy authentication method can be one of the values listed below or a combination of them separated by a comma. Warning: If you want to enable FIPS compliant cryptography consider that digest, ntlm, and negotiate are not compatible with FIPS. basic digest ntlm negotiate Specify the proxy authentication method or press <Enter> if all methods allowed by the proxy can be used :
- Specify, if required, a proxy exception
list.
Proxy exception list Note: If the exception list field is kept empty, the communication to "localhost" and "127.0.0.1" will not pass through the proxy by default. If you specify something in the exception list field, ensure that you add also these two values, otherwise the proxy will be used to reach them. Specify the exception list using comma (,) to separate entries or press <Enter> to keep it empty:
- Specify if you want to enforce the proxy tunneling
capability.
Proxy tunneling capability Choose one of the following options: [1] Enforce proxy tunneling [2] Let proxy decide Choose one of the options above or press <Enter> to accept the default value: [2]
- Specify if you want to use the proxy also for downstream
notifications.
Enable the use of the proxy for downstream notification. If you specify true, the proxy is used by the BES server also for communicating with the relay. [1] True [2] False Choose one of the options above or press <Enter> to accept the default value: [2]
- Optionally, you can test if the connection to the proxy can be successfully
established.
Test the connection using the proxy If you want to enable FIPS 140-2 compliant cryptography, select "Test the connection using FIPS". Warning: There are some proxy authentication methods that are not compatible with FIPS. [1] Test the connection [2] Test the connection using FIPS [3] Do not test the connection Choose one of the options above or press <Enter> to accept the default value: [1]