This article describes McAfee Maintained Subscribed Lists and how to use them to allow Citrix and Webex through the SSL Scanner on the McAfee Web Gateway . This is done through bypassing the IP address ranges used by Webex and Citrix for their SSL connections. This guide will focus on adding a McAfee Maintained Subscribed List to bypass these applications from the SSL Scanner.
Although this topic will cover Citrix and Webex, there are many other McAfee Maintained Subscribed Lists that can be useful for your policy. Examples include:
The list creation instructions covered below will also apply to these lists above.
The MWG is an HTTP proxy and inspects HTTP/HTTPS based traffic. Some applications will encrypt their proprietary protocol traffic with SSL. When the SSL Scanner is enabled, the MWG opens up the SSL tunnel to look at the traffic inside. Instead of finding normal HTTP traffic, it finds non-HTTP traffic, which causes the MWG to reset the connection. To prevent this from happening, we will want to bypass this traffic from the SSL Scanner using McAfee Maintained Subscribed Lists.
This is a list which is maintained off box from the Web Gateway by McAfee. This feature is meant to reduce administrative overhead for ever-changing web applications. McAfee maintains these lists for you and your MWG appliance can update them automatically on a specified schedule.
The maintained lists in this example will include a variety of IP addresses for a specific application that you can use in your ruleset as criteria for bypassing from the SSL Scanner. This is a benefit for administrators so they do not need to monitor and maintain changes to the WebEx or Citrix IP ranges used for their products.
Another example is the "Trusted Certificate Authorities" maintained list. As new Authorities become certified and trusted, the MWG automatically adapts and administrators do not need manually add anything.
Note: This example shows how to add a list for WebEx, you can substitute this list for the application of your choice.
Follow along with the screenshots below the instructions.
Note: If the list is not populated, see the troubleshooting section further below.
We will use the list as criteria to bypass from the SSL Scanner.
Follow along with the screenshot
Test out the application to verify the rule is working correctly.
Note: This ruleset specifically bypasses these IP ranges from the SSL Scanner ONLY. If you have any other rules below your SSL Scanner which may block these ranges. You should change the rule to a Stop Cycle Action.
You will want to take a network capture while reproducing the issue. Send this capture in to support along with a feedback. Include the client IP that you tested with when reproducing the issue. Instructions for the capture can be found at:
https://kc.mcafee.com/corporate/index?page=content&id=KB75056
Feedback can be generated from Troubleshooting > Feedback > Create Feedback File.
You can contact Technical Support to suggest additions to a Subscribed List.
This list is handled by the same update process as your URL filter and AV DAT updates. As such, the maintained lists will use update proxy settings if there are any defined. Its best to start troubleshooting by examining the update.log file. The update.log file is located under Troubleshooting > Log Files > update. Look for any error message related to updating the maintained list.
If you cannot determine the source of the issue from the update logs, generate a feedback and take a packet capture while reproducing the issue. Lastly, contact technical support with this data.
Note: You’ll want to filter the capture for port 443 to minimize the size of the capture. (Troubleshooting > Packet Tracing) You can use these command line parameters to capture this content:
-s 0 -i any port 443
Office 365 now available in the subscribed list section. 🙂
Great
Vendors are now putting their Citrix servers in public clouds which means that we will have to whitelist large IP ranges for their Citrix-based application. These IP ranges may contain other applications and/or web sites resulting in loss of visibility and control.
I'd like to have better options than to simply whitelist IP ranges.
Will there be any subscription list for Team Viewer Application? As checked I dint find any list.
Hi, somehow the maintained list doesn't match the request. I've used the Fedora Mirrors maintained list (URL.Host matches in list) which contains http://www.nic.funet.fi/pub/mirrors/fedora.redhat.com/pub/epel* but when client request following the rule doesn't match - http://www.nic.funet.fi/pub/mirrors/fedora.redhat.com/pub/epel/7/x86_64/repodata/af6e3d1652aeedb485a...
Any Idea what might be wrong?
Thanks.
Br. Ales
If we use our own citrix server, how can we detect them?
Corporate Headquarters
6220 America Center Drive
San Jose, CA 95002 USA