Traffic Forwarding Options for Internet Access

Alternative methods that ensure internet traffic is directed to the Internet Access Gateway without installing the Secure Access Module

Note:

You can use PAC files and proxy chaining concurrently.

Option

When to Use

Pros

Cons

Proxy auto-configuration (PAC) files

When your organization already has a proxy configured and you support users that often work outside the network

You can configure and deploy PAC files to the Secure Access Module or the system proxy settings for traffic forwarding.

  • Easily deployed through Active Directory

  • Supported by major browsers

  • Works on internal and external networks

  • Users with admin rights can bypass using non-standard browsers

  • Users can bypass by manually changing to "no proxy"

Proxy chaining

When your organization already has a proxy configured and you do not need to support users that often work outside the network

  • Easy to set up

  • Multiple rules offer full redundancy

  • Supported by most web proxies

  • Users cannot bypass

  • Only internal network users are protected

Port forwarding

Not recommended due to the manual configuration involved

  • Easy to set up

  • Supported by major browsers

  • Users cannot bypass

  • Supports HTTP and HTTPS traffic

  • Requires manual changes if primary gateway is unavailable

  • Only internal network users are protected