Reset Search
 

 

Article

KB9232 - How proxy logic is applied with VPN tunneling

« Go Back

Information

 
Last Modified Date11/28/2018 3:18 AM
Synopsis

This article provides details on how the proxy logic is handled with VPN tunneling and various proxy configurations on the client and PCS server.

Problem or Goal

How does the PCS device apply proxy logic to the client PC and how does this differ if a proxy is already configured on the client PC prior to connecting with the VPN? 

Cause
Solution

An external proxy is a proxy that exists between the client machine and the PCS device and is set in the browser.  There are a few ways to configure a proxy within the browser so that it will work to proxy connections when establishing a secure session with the PCS device.

Sample network drawing
Screenshot_001

Supported external proxy configurations

Proxy options for Internet Explorer:

  • Manual proxy configuration OR
  • Automatic proxy configuration URL (proxy.pac and wpad.dat)

Proxy options for Firefox and Mozilla:

  • Manual proxy configuration OR
  • Automatic proxy configuration URL (proxy.pac and wpad.dat)

Proxy options for Safari:

  • FTP, Web, Secure Web, Streaming, SOCKS, or Gopher proxies (manual proxies) OR
  • Automatic proxy configuration URL (proxy.pac and wpad.dat)

note: IMPORTANT: "Automatically detect" settings in Internet Explorer and "Auto-detect proxy settings for this network" in Firefox options ARE NOT supported with VPN tunneling.  VPN tunneling only supports the use of a PAC file URL or manually defined proxy server.
 

 

PAC modifications

  • To insure that clients configured with a proxy auto configuration URL in the browser that should take priority over the proxy configuration in the VPN connection profile, select the option to "Preserve client proxy settings" in the VPN connection profile.
  • For clients that have a PAC file URL configured in the browser but also require different proxy configuration after connecting to the VPN, a different PAC file URL should be specified in the VPN connection profile.
  • When a client connects with VPN tunneling with both client and server proxy configuration, the proxy logic is merged to a file called instantproxy.pac and is saved locally on the client PC and used for the VPN tunneling session.
  • The merged instantproxy.pac file URL on the client PC is referenced with a loopback address, dedicated port and a pointer to the instantproxy.pac file as per the example below:.
     
http://127.0.0.1:34841/instantproxy.pac
 
  • When the user disconnects from VPN tunneling, the original proxy configuration is restored on the client PC.  

Table showing instantproxy.pac file entries:

 
Are connections to the
PCS device proxied?
Split Tunneling Option
Proxy statement added 
to the instantproxy.pac file
YesDisabled
function FindProxyForURL(url, host) {   
    if (expMatch(“IVEhost”, host)   
        return “PROXY external_proxy”;       
    else return “DIRECT”; } }

 
NoDisabled
function FindProxyForURL(url, host) {
      return “DIRECT”;
}

 
YesEnabled
function FindProxyForURL(url, host) {
      if (expMatch(“IVEhost”, host)
            return “PROXY external_proxy”;
      else if (isInNet(“split tunnel policy”)
            return “DIRECT”;
      else return “PROXY external_proxy”;
}

 
NoEnabled
function FindProxyForURL(url, host) {
      if (expMatch(“IVEhost”, host)
            return “DIRECT”;
      else if (isInNet(“split tunnel policy”)
            return “DIRECT”;
      else return “PROXY external_proxy”;
}

 
YesDisabled with access to local subnet
function FindProxyForURL(url, host) {
      if (expMatch(“IVEhost”, host)
            return “PROXY external_proxy”;
      else if (isInNet(“local subnet”)
            return “PROXY external_proxy”;
      else return “DIRECT”;
}
NoDisabled  with access to local subnet
function FindProxyForURL(url, host) {
      if (expMatch(“IVEhost”, host)
            return “DIRECT”;
      else if (isInNet(“local subnet”)
            return “PROXY external_proxy”;
      else return “DIRECT”;
}
Related Links
Attachment 1 
Created ByData Deployment

Feedback

 

Was this article helpful?


   

Feedback

Please tell us how we can make this article more useful.

Characters Remaining: 255