HTTPS Tunnels can be used to communicate between network locations with restricted
connectivity – usually being locations behind NATs, firewalls, or proxy servers. Restricted
connectivity is usually the result of blocked TCP/IP ports, blocked traffic initiated
from outside the network, or from the blocking of most network protocols is how a
network can be locked down to secure it against internal and external threats.
Similar to a global trusted list, domain tunneling allows administrators to maintain
a list of trusted sites.
To set up domain tunneling:
-
Go to HTTPS > HTTPS Decryption > Tunneling.
-
Enter the domain name match to be added.
-
Select to match by a string (exact name) or to match by an entire domain. (An asterisk
will appear next to tunnels made through entire domains.)
-
If you have a previously created file with approved entries already included, click
Choose File, select the file you want to add, then click Import.
The Tunneled Domains you add will appear in the Tunneled Domains box.
-
Click Save.
Tunneled Domains
Obsolete tunnels can be deleted by highlighting the tunnelled domain and clicking
Remove, or clear the entire list by clicking Remove all. You can also save your list of tunnelled domains by clicking Export and saving the list to a secure location.
Exceptions to the Tunneled Domains
Exceptions can be listed as well. All domains in the exception list will be decrypted.