Extended IP addresses and listeners for ep.threatpulse.net
search cancel

Extended IP addresses and listeners for ep.threatpulse.net

book

Article ID: 386655

calendar_today

Updated On:

Products

Cloud Secure Web Gateway - Cloud SWG

Issue/Introduction

Customers needing more IP addresses and listeners for ep.threatpulse.net

Environment

WSSA 9.7.1

 

Resolution

  • The "low-range" of these endpoints (ep1.threatpulse.net through ep9.threatpulse.net - including ep.threatpuse.net, which overlaps with ep1.threatpulse.net) will ALWAYS be intercepted by active WSS Agents.
    • These are the currently-deployed endpoints, and they are hard-coded as "always intercept" by IP Address
    • They will be intercepted even if the agent is in intercept-only mode
    • They cannot be bypassed by adding to the ATM bypass list
  • The "high-range" of these endpoints (ep10.threatpulse.net through ep32.threatpulse.net) will be treated by WSS Agents according to their ATM configuration
    • If the agent is selective intercept, the traffic to those addresses will not be intercepted
      • If those addresses are added to the "Always Intercept" ATM list, they will be intercepted
    • If the agent is in transparent web intercept or CFS, it will be intercepted
      • Since this is proxy traffic, it will be intercepted regardless of port - via the "Proxy in the Cloud" interception
    • If those addresses are bypassed, they will be bypassed and exempted from "Proxy in the Cloud" interception.
  • In other words, the general rule of thumb is the IP addresses for the low-range epX.threatpulse.net endpoints will always be intercepted regardless of ATM configuration, the high-range epX.threatpulse.net endpoints will be treated according to ATM configuration.

    The above statements are based off the underlying IP addresses - so as it pertains to ep-all.threatpulse.net and ep-roundrobin.threatpulse.net, the low-range addresses will still be always intercepted, and the high-range addresses will honor ATM policy.