cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
jebeling
Employee
Employee
Report Inappropriate Content
Message 1 of 8

How can I apply UCE policy to traffic directed to an on Premise Proxy?

Jump to solution

I've got an existing on premise infrastructure with physical or virtual proxies that are currently authenticating client web traffic. I want to reduce my on premise infrastructure and utilize all the wonderful benefits of UCE, scalability, ease of management, common policy, DLP, RBI, Shadow IT, etc without drastically changing my current setup and configuration. How do I accomplish this?

Was my reply helpful?

If this information was helpful in any way or answered your question, will you please select Accept as a Solution and/or Kudo my reply so we can help other community participants?
4 Solutions

Accepted Solutions
jebeling
Employee
Employee
Report Inappropriate Content
Message 2 of 8

Re: How can I apply UCE policy to traffic directed to an on Premise Proxy?

Jump to solution

This is possible using the next hop proxy function on MWG or your existing proxy, enabling IP authentication in UCE for the public source addresses the local proxy will NAT to. If you want to pass the authentication from the proxy to UCE for user based policy decisions, you can do this by inserting user and group information into the headers passed from MWG, for instructions on setting up UCE to utilize these headers, please see here: https://community.mcafee.com/t5/MVISION-Unified-Cloud-Edge-UCE/How-Can-I-Scope-UCE-Policy-Based-on-R...

UCENext.PNG

 

Was my reply helpful?

If this information was helpful in any way or answered your question, will you please select Accept as a Solution and/or Kudo my reply so we can help other community participants?

View solution in original post

jebeling
Employee
Employee
Report Inappropriate Content
Message 3 of 8

Re: How can I apply UCE policy to traffic directed to an on Premise Proxy?

Jump to solution

Here is how you configure UCE for IP based authentication

Update: IP Authentication Setup is not required if you are running MWG 11.0 or later and you enable use of Secure Connection in your NHP config.

Set up IP based authentication in UCE by going to Configuration (gear in upper right of MVC console) > Infrastructure > Web Gateway Setup > Configure Locations > New Location or same place and edit an existing location. Add the public egress ips to IP Range Mapping for your proxies that will use next hop to UCE. For example public egress 1.2.3.4/32. 

Location.PNG

Save and Publish

Here is how you would do the proxy piece on MWG: 

Import the Next Hop Proxy ruleset from the library. Place it after authentication if you want to pass authentication information. 

Unlock the rule view.

Configure your Next hop proxy list to point to c<customerid>.wgcs.mcafee-cloud.com on port 8080 or 80.

Optionally add events to populate headers with Username and optionally user groups.

Add criteria to the ruleset or the rules to specify which traffic you want to direct to the cloud. In the example below I am "next hopping" to UCE all traffic originally directed to MWG on port 9091.

 

NextHopUCE.PNG

 

Was my reply helpful?

If this information was helpful in any way or answered your question, will you please select Accept as a Solution and/or Kudo my reply so we can help other community participants?

View solution in original post

jebeling
Employee
Employee
Report Inappropriate Content
Message 6 of 8

Re: How can I apply UCE policy to traffic directed to an on Premise Proxy?

Jump to solution

Note that when using the Remote Browser Isolation (RBI) function of UCE via Next Hop Proxy you must implement NHP for not only the isolated sites and categories, but also the domain rbi.mcafee-cloud.com and you must authenticate the requests for that domain and inject the authentication headers. 

Updated 5/26/22: Authentication header insertion is not necessary if running MWG 11.0 or later and you enable use of Secure Channel in your Next Hop Proxy configuration (uses port 8081). If 8081 is not accessible it will default to the configured port 8080 in example below)  If you want to use secure channel you must now configure use of port 8081 instead of port 8080.  Shown below is incorrect. Official Documentation Here  Also note that the official documentation is currently missing a few steps. If next hop proxy is implemented after HTTPS Inspection you must make sure that if Certificate Verification is enabled, add your SSE/UCE CA and the generic cloud service certificates from the bundle to the trusted certificate authorities list on SWG (even if you are using your SWG certificate in the cloud, it will not automatically be accepted by SWG as a valid signing authority). Also missing is that UCE Hybrid configuration must have the customer ID and shared secret configured! If this is not done, there will be no valid authentication headers. 

nhp secure.png

For example you might want to NHP uncategorized sites so you would have as a criteria for NHP to UCE. List.OfCategories.IsEmpty(URL.Categories) equals true OR URL.Host matches *.rbi.mcafee-cloud.com. 

 

Was my reply helpful?

If this information was helpful in any way or answered your question, will you please select Accept as a Solution and/or Kudo my reply so we can help other community participants?

View solution in original post

jebeling
Employee
Employee
Report Inappropriate Content
Message 8 of 8

Re: How can I apply UCE policy to traffic directed to an on Premise Proxy?

Jump to solution

IMPORTANT NOTE. The domain recently changed for bootstrap.rbi.mcafee-cloud.com. It now is bootstrap.rbi.skyhigh.cloud. Please update any proxy and firewall rules accordingly. You should be able to simply add the new hostname or domain wherever you have the old one.(bootstrap.rbi.mcafee-cloud.com). At a minimum, allow websockets for this domain or host and next hop proxy this domain or host.

Was my reply helpful?

If this information was helpful in any way or answered your question, will you please select Accept as a Solution and/or Kudo my reply so we can help other community participants?

View solution in original post

7 Replies
jebeling
Employee
Employee
Report Inappropriate Content
Message 2 of 8

Re: How can I apply UCE policy to traffic directed to an on Premise Proxy?

Jump to solution

This is possible using the next hop proxy function on MWG or your existing proxy, enabling IP authentication in UCE for the public source addresses the local proxy will NAT to. If you want to pass the authentication from the proxy to UCE for user based policy decisions, you can do this by inserting user and group information into the headers passed from MWG, for instructions on setting up UCE to utilize these headers, please see here: https://community.mcafee.com/t5/MVISION-Unified-Cloud-Edge-UCE/How-Can-I-Scope-UCE-Policy-Based-on-R...

UCENext.PNG

 

Was my reply helpful?

If this information was helpful in any way or answered your question, will you please select Accept as a Solution and/or Kudo my reply so we can help other community participants?
jebeling
Employee
Employee
Report Inappropriate Content
Message 3 of 8

Re: How can I apply UCE policy to traffic directed to an on Premise Proxy?

Jump to solution

Here is how you configure UCE for IP based authentication

Update: IP Authentication Setup is not required if you are running MWG 11.0 or later and you enable use of Secure Connection in your NHP config.

Set up IP based authentication in UCE by going to Configuration (gear in upper right of MVC console) > Infrastructure > Web Gateway Setup > Configure Locations > New Location or same place and edit an existing location. Add the public egress ips to IP Range Mapping for your proxies that will use next hop to UCE. For example public egress 1.2.3.4/32. 

Location.PNG

Save and Publish

Here is how you would do the proxy piece on MWG: 

Import the Next Hop Proxy ruleset from the library. Place it after authentication if you want to pass authentication information. 

Unlock the rule view.

Configure your Next hop proxy list to point to c<customerid>.wgcs.mcafee-cloud.com on port 8080 or 80.

Optionally add events to populate headers with Username and optionally user groups.

Add criteria to the ruleset or the rules to specify which traffic you want to direct to the cloud. In the example below I am "next hopping" to UCE all traffic originally directed to MWG on port 9091.

 

NextHopUCE.PNG

 

Was my reply helpful?

If this information was helpful in any way or answered your question, will you please select Accept as a Solution and/or Kudo my reply so we can help other community participants?
evocke
Employee
Employee
Report Inappropriate Content
Message 4 of 8

Re: How can I apply UCE policy to traffic directed to an on Premise Proxy?

Jump to solution

Hi Jeff,

in this use case with IP based authentication to UCE, Next Hop Host from WMG could also be simply the  domain wgcs.mcafee-cloud.com.

Is there any reason to use the qualified tenant cxxxxxxxxxx.wgcs.mcafee-cloud.com.

jebeling
Employee
Employee
Report Inappropriate Content
Message 5 of 8

Re: How can I apply UCE policy to traffic directed to an on Premise Proxy?

Jump to solution

It doesn't matter at present, but the prefix doesn't hurt and may matter in the future.

Was my reply helpful?

If this information was helpful in any way or answered your question, will you please select Accept as a Solution and/or Kudo my reply so we can help other community participants?
jebeling
Employee
Employee
Report Inappropriate Content
Message 6 of 8

Re: How can I apply UCE policy to traffic directed to an on Premise Proxy?

Jump to solution

Note that when using the Remote Browser Isolation (RBI) function of UCE via Next Hop Proxy you must implement NHP for not only the isolated sites and categories, but also the domain rbi.mcafee-cloud.com and you must authenticate the requests for that domain and inject the authentication headers. 

Updated 5/26/22: Authentication header insertion is not necessary if running MWG 11.0 or later and you enable use of Secure Channel in your Next Hop Proxy configuration (uses port 8081). If 8081 is not accessible it will default to the configured port 8080 in example below)  If you want to use secure channel you must now configure use of port 8081 instead of port 8080.  Shown below is incorrect. Official Documentation Here  Also note that the official documentation is currently missing a few steps. If next hop proxy is implemented after HTTPS Inspection you must make sure that if Certificate Verification is enabled, add your SSE/UCE CA and the generic cloud service certificates from the bundle to the trusted certificate authorities list on SWG (even if you are using your SWG certificate in the cloud, it will not automatically be accepted by SWG as a valid signing authority). Also missing is that UCE Hybrid configuration must have the customer ID and shared secret configured! If this is not done, there will be no valid authentication headers. 

nhp secure.png

For example you might want to NHP uncategorized sites so you would have as a criteria for NHP to UCE. List.OfCategories.IsEmpty(URL.Categories) equals true OR URL.Host matches *.rbi.mcafee-cloud.com. 

 

Was my reply helpful?

If this information was helpful in any way or answered your question, will you please select Accept as a Solution and/or Kudo my reply so we can help other community participants?
jebeling
Employee
Employee
Report Inappropriate Content
Message 7 of 8

Re: How can I apply UCE policy to traffic directed to an on Premise Proxy?

Jump to solution

Also websockets must be enabled for at least bootstrap.rbi.mcafee-cloud.com and  you need to trust the CA you are using in the cloud, on MWG.

 

 

Was my reply helpful?

If this information was helpful in any way or answered your question, will you please select Accept as a Solution and/or Kudo my reply so we can help other community participants?
jebeling
Employee
Employee
Report Inappropriate Content
Message 8 of 8

Re: How can I apply UCE policy to traffic directed to an on Premise Proxy?

Jump to solution

IMPORTANT NOTE. The domain recently changed for bootstrap.rbi.mcafee-cloud.com. It now is bootstrap.rbi.skyhigh.cloud. Please update any proxy and firewall rules accordingly. You should be able to simply add the new hostname or domain wherever you have the old one.(bootstrap.rbi.mcafee-cloud.com). At a minimum, allow websockets for this domain or host and next hop proxy this domain or host.

Was my reply helpful?

If this information was helpful in any way or answered your question, will you please select Accept as a Solution and/or Kudo my reply so we can help other community participants?
You Deserve an Award
Don't forget, when your helpful posts earn a kudos or get accepted as a solution you can unlock perks and badges. Those aren't the only badges, either. How many can you collect? Click here to learn more.

Community Help Hub

    New to the forums or need help finding your way around the forums? There's a whole hub of community resources to help you.

  • Find Forum FAQs
  • Learn How to Earn Badges
  • Ask for Help
Go to Community Help

Join the Community

    Thousands of customers use our Community for peer-to-peer and expert product support. Enjoy these benefits with a free membership:

  • Get helpful solutions from product experts.
  • Stay connected to product conversations that matter to you.
  • Participate in product groups led by employees.
Join the Community
Join the Community