Attempts to route CTC requests through a proxy using a PAC file, without changing the network route for ctc.threatpulse.com, can lead to issues. PAC files operate at the application layer, and WSSA lacks visibility into their changes or rules. This can cause various problems, as WSSA monitors traffic at the network layer.
Symantec Enterprise Agent
WSS Agent
SEP Tunnel Agent
PAC Files and Routing:
Split Tunnel VPN Example:
Network Layer Monitoring:
Routing Rule Implementation:
Programmatic Reconnect:
Best Practice:
Do not route ctc.threatpulse.com using a PAC file unless a corresponding network-layer routing rule for 130.211.30.2 is also set through the same path.