The Security Proxy Server provides token-based access control and encrypted network traffic to and from user workstations.
After the Preliminary steps are completed, use this panel to import the settings from the Security Proxy Server to the Management and Security Server
After the Security Proxy is installed, configured, and started, import the Security Proxy settings to the Administrative Server.
In the Administrative Console, open> .
Enter theof the computer on which you installed the Security Proxy Server.
The Security Proxy Server must be running when you import the settings.
The name you enter must match the common name on the security proxy certificate if client verification of server identity is enabled (the default setting).
The Administrative Server verifies the security proxy server identity by comparing the common name on the proxy certificate to the name of the server itself. If the names do not match—for instance, you enter servername and the server certificate common name is servername.example.com—you may be able to import the certificate, but session connections through the proxy will fail when the client attempts to verify the server identity.
The Security Proxy server must trust the Administrative Server certificate. (See Preliminary Steps.)
Enter the. You can check the Security Proxy Monitor port number in the Security Proxy Wizard ( ).
Enter a name that clients would recognize. If a single proxy server name is always used, leave this field blank.
In some cases, clients may need to access the security proxy using a different name than the one used to import the security proxy settings. For example, as administrator, your computer may access the Security Proxy through an internal network, but your end users may access the Security Proxy from outside the firewall and use a different proxy name. In this case, enter the name that the clients use in this field.
When both names are entered, the Administrative Server uses the first name to contact the Security Proxy and import its settings and certificate, and then displays the second name in the table on thepanel and in the Terminal Session tool. Emulator sessions use the second name to contact the proxy. If any end users contact the Security Proxy using both proxy names, import the Security Proxy settings twice, and define separate sessions for each proxy name.
Click. After the Security Proxy settings are imported, the Security Proxy server is listed in the table with its details:
When you use theto set up or change a Security Proxy, you can export information and certificates directly to the Administrative Server over an HTTP connection. This information is not encrypted.
CAUTION:By default, the administrative server supports only HTTPS. To export information and certificates to the administrative server, you need to first enable HTTP connection on the server. Contact Support for assistance.
To use the automatic export in the Security Proxy Wizard, you must check this box.
If you change settings on the Security Proxy, you must re-import them to the Management and Security Server.
When you upgrade, open the , review the status of your Security Proxy servers, and click Save. This action synchronizes the Security Proxy server with the Management and Security Server.