Blue Coat® Systems ProxySG® Appliance 5.4.x Upgrade/Downgrade Feature Change Reference Version SGOS 5.4.x Blue Coat SGOS 5.4.x Upgrade/Downgrade Feature Change Reference Contact Information Americas: Blue Coat Systems Inc. 410 North Mary Ave Sunnyvale, CA 94085-4121 Rest of the World: Blue Coat Systems International SARL 3a Route des Arsenaux 1700 Fribourg, Switzerland http://www.bluecoat.com/support/contactsupport http://www.bluecoat.com For concerns or feedback about the documentation: documentation@bluecoat.com Copyright© 1999-2011 Blue Coat Systems, Inc. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified, decompiled, disassembled, published or distributed, in whole or in part, or translated to any electronic medium or other means without the written consent of Blue Coat Systems, Inc. All right, title and interest in and to the Software and documentation are and shall remain the exclusive property of Blue Coat Systems, Inc. and its licensors. ProxyAV™, ProxyOne™, CacheOS™, SGOS™, SG™, Spyware Interceptor™, Scope™, ProxyRA Connector™, ProxyRA Manager™, Remote Access™ and MACH5™ are trademarks of Blue Coat Systems, Inc. and CacheFlow®, Blue Coat®, Accelerating The Internet®, ProxySG®, WinProxy®, PacketShaper®, PacketShaper Xpress®, PolicyCenter®, PacketWise®, AccessNow®, Ositis®, Powering Internet Management®, The Ultimate Internet Sharing Solution®, Cerberian®, Permeo®, Permeo Technologies, Inc.®, and the Cerberian and Permeo logos are registered trademarks of Blue Coat Systems, Inc. All other trademarks contained in this document and in the Software are the property of their respective owners. BLUE COAT SYSTEMS, INC. AND BLUE COAT SYSTEMS INTERNATIONAL SARL (COLLECTIVELY “BLUE COAT”) DISCLAIM ALL WARRANTIES, CONDITIONS OR OTHER TERMS, EXPRESS OR IMPLIED, STATUTORY OR OTHERWISE, ON SOFTWARE AND DOCUMENTATION FURNISHED HEREUNDER INCLUDING WITHOUT LIMITATION THE WARRANTIES OF DESIGN, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL BLUE COAT, ITS SUPPLIERS OR ITS LICENSORS BE LIABLE FOR ANY DAMAGES, WHETHER ARISING IN TORT, CONTRACT OR ANY OTHER LEGAL THEORY EVEN IF BLUE COAT SYSTEMS, INC. HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. America’s: Blue Coat Systems, Inc. 410 N. Mary Ave. Sunnyvale, CA 94085 Document Number: 231-03034 Document Revision: SGOS 5.4.3—07/2011 ii Rest of the World: Blue Coat Systems International SARL 3a Route des Arsenaux 1700 Fribourg, Switzerland Contents Chapter 1: Before You Start About the Document Organization.................................................................................................. 7 Related Blue Coat Documentation ................................................................................................... 8 Chapter 2: Deprecation Notices Deprecation Notices ........................................................................................................................... 9 About CPL Deprecations............................................................................................................. 9 CPL Deprecations in SGOS 5.4 ................................................................................................... 9 Command Deprecation ............................................................................................................... 9 ............................................................................................................................................................. 10 Chapter 3: Feature-Specific Upgrade Behavior Access Logging.................................................................................................................................. 15 ADN .................................................................................................................................................... 17 New System Defaults................................................................................................................. 17 Upgrading Using the Breadth-First Approach ...................................................................... 19 Upgrading Using the Rolling Approach................................................................................. 21 Open ADN and Closed ADN ................................................................................................... 23 Byte Caching ............................................................................................................................... 25 DSCP ............................................................................................................................................ 26 TCP Window Size....................................................................................................................... 26 Archiving/Storage............................................................................................................................ 27 Attack Detection................................................................................................................................ 27 Licensing ............................................................................................................................................ 27 Registering a License ................................................................................................................. 27 User License Limits .................................................................................................................... 28 Networking........................................................................................................................................ 28 CIFS .............................................................................................................................................. 29 Trusted Destination IP............................................................................................................... 30 WCCP........................................................................................................................................... 31 Adapters ...................................................................................................................................... 33 Software Bridging....................................................................................................................... 33 Hardware Bridging .................................................................................................................... 35 Reflect Client IP .......................................................................................................................... 36 Management Services....................................................................................................................... 36 Browser Configuration Instruction Page ................................................................................ 36 New Landing Page..................................................................................................................... 37 iii Blue Coat SGOS 5.4.x Upgrade/Downgrade Feature Change Reference SNMP Console............................................................................................................................ 37 Proxy Services ................................................................................................................................... 37 Accessing Proxy Settings .......................................................................................................... 38 Bypass Lists................................................................................................................................. 38 Restricted Intercept .................................................................................................................... 39 New Services............................................................................................................................... 39 Other Services Framework Changes ....................................................................................... 40 Upgrade/Rollback Behavior .................................................................................................... 40 ProxyClient And Client Manager................................................................................................... 43 SSL....................................................................................................................................................... 43 CA Certificate Lists .................................................................................................................... 44 Device Profiles ............................................................................................................................ 44 SSL-Verify Server ....................................................................................................................... 45 SSL Detection .............................................................................................................................. 45 Instant Messaging............................................................................................................................. 45 Streaming Media............................................................................................................................... 46 New Syntax for Caching Objects ............................................................................................. 46 WM-HTTP Streaming Media Proxy ........................................................................................ 46 WM-RTSP Streaming Media Proxy ......................................................................................... 47 Content Filtering ............................................................................................................................... 47 Blue Coat DRTR ......................................................................................................................... 47 SmartFilter Database Selection................................................................................................. 48 Authentication................................................................................................................................... 48 LDAP............................................................................................................................................ 49 Encrypted Passwords ................................................................................................................ 49 Hexadecimal Encoding in Policy Substitution Realm .......................................................... 50 Authorization and Proxy-Authorization HTTP Headers Are Writable ............................ 50 SSH Console................................................................................................................................ 50 Certificate Realms ...................................................................................................................... 51 SiteMinder ................................................................................................................................... 51 User Management ...................................................................................................................... 52 Permitted Errors, Guest Authentication, and Default Groups............................................ 53 Configuration Options .............................................................................................................. 53 New Realms ................................................................................................................................ 54 RADIUS Realms ......................................................................................................................... 55 COREid Authentication ............................................................................................................ 55 IWA Realms ................................................................................................................................ 55 Upgrading the BCAAA Authentication Service.................................................................... 56 BCAAA Upgrade/Downgrade Process.................................................................................. 57 Kerberos Constrained Delegation............................................................................................ 59 iv Contents Web Content Scanning (ICAP) ....................................................................................................... 60 Cache-Hit Behavior.................................................................................................................... 60 Cached Objects ........................................................................................................................... 60 Secure ICAP ................................................................................................................................ 62 ICAP Feedback ........................................................................................................................... 63 ICAP Scanning............................................................................................................................ 64 Forwarding and SOCKS Gateways................................................................................................ 65 Health Checks ................................................................................................................................... 66 HTTP Proxy ....................................................................................................................................... 69 Policy/VPM....................................................................................................................................... 69 QoS ............................................................................................................................................... 69 Revocation Checks on Certificates........................................................................................... 70 Content-Type Matching ............................................................................................................ 71 File Extension Objects................................................................................................................ 71 SSL Forward Proxy Object Renamed ...................................................................................... 71 Proxy Forwarding ...................................................................................................................... 72 Authentication ............................................................................................................................ 72 New User Login Address Object ............................................................................................. 72 Statistics.............................................................................................................................................. 73 Upgrade.............................................................................................................................................. 73 Chapter 4: FIPS Upgrade Information Configuration Files ........................................................................................................................... 75 Signed Archive Configurations ...................................................................................................... 75 DRTR Connections ........................................................................................................................... 76 SSL....................................................................................................................................................... 76 v Blue Coat SGOS 5.4.x Upgrade/Downgrade Feature Change Reference vi Chapter 1: Before You Start This document describes how upgrading to, or downgrading from, this release impacts existing features. It also describes important upgrade and downgrade rules. Blue Coat® strongly recommends that you read this document before attempting to upgrade to SGOS 5.4 from previous SGOS operating systems. Before upgrading, you should refer to the following documents: ❐ Blue Coat Upgrade/Downgrade Guide ❐ Blue Coat SGOS 5.4.x Release Notes These documents are available here: https://bto.bluecoat.com/documentation/pubs/view/SGOS%205.4.x Existing features and policies might not perform as with previous versions, and upgrading to this version might require some additional configuration tuning. About the Document Organization This document is organized for easy reference and is divided into the following sections and chapters: Table 1–1 Document Organization Chapter Title Description Chapter 1 – Upgrading Overview This chapter discusses SGOS 5.x upgrades, related Blue Coat documentation, and documentation organization and conventions. Chapter 2 – Upgrade Behavior, General This chapter discusses general upgrade issues, including the required upgrade path and licensing. Chapter 3 – Upgrade Behavior, Specifics This chapter identifies new behaviors in SGOS 5.x and discusses any upgrade/downgrade issues. Chapter 4 – FIPS Upgrade Information This chapter includes information pertaining to Federal Information Processing Standards (FIPS) implementations. It covers upgrade/downgrade issues related to FIPS mode. 7 Blue Coat SGOS 5.4.x Upgrade/Downgrade Feature Change Reference Related Blue Coat Documentation ❐ Blue Coat SGOS 5.4.x Upgrade/Downgrade Feature Change Reference ❐ Blue Coat ProxySG QSG ❐ The 11-volume Blue Coat ProxySG Configuration and Management Guide Suite includes the following documents: • Volume 1: Getting Started • Volume 2: Proxies and Proxy Services • Volume 3: Web Communication Proxies • Volume 4: Securing the Blue Coat ProxySG Appliance • Volume 5: Advanced Networking • Volume 6: The Visual Policy Manager and Advanced Policy • Volume 7: Managing Content • Volume 8: Access Logging • Volume 9: Managing the Blue Coat ProxySG Appliance • Volume 10: Content Policy Language Guide • Volume 11: Command Line Interface Reference Document Conventions The following section lists the typographical and Command Line Interface (CLI) syntax conventions used in this manual. Table 1–2 Typographic Conventions Conventions Definition Italics The first use of a new or Blue Coat-proprietary term. Courier font Command-line interface text that appears on your administrator workstation. Courier Italics A command-line variable that is to be substituted with a literal name or value pertaining to the appropriate facet of your network system. Courier Boldface Text that must be entered as shown. { } One of the parameters enclosed within the braces must be supplied. [ ] Encompasses one or more optional parameters. | This pipe character delineates options in a mandatory or optional list. For example: configure {terminal | network url} 8 Chapter 2: Deprecation Notices This chapter discusses configuration option and CPL deprecations in SGOS 5.4.x. Topics in this Chapter This chapter includes information about the following topics: ❐ "Deprecation Notices" on page 9 Deprecation Notices This section discusses deprecations in SGOS 5.4: ❐ "About CPL Deprecations" on page 9 ❐ "CPL Deprecations in SGOS 5.4" on page 9 ❐ "Command Deprecation" on page 9 About CPL Deprecations Deprecation warnings are issued for CPL syntax that will abandoned in the next major SGOS release. CPL Deprecations in SGOS 5.4 This section discusses CPL commands that are deprecated in SGOS 5.4. will not be supported in the next major SGOS release. ❐ icp ❐ socks.allow_compression and socks_gateway.request_compression SOCKS compression is deprecated. Refer to Volume 5: Advanced Networking for instructions on how to configure and use the new Application Delivery Network features. ❐ Use of ttl(0) is deprecated. Instead, use 'ttl( auto )' ❐ patience_page; use one of the following: • response.icap_feedback.interactive( patience_page[, • response.icap_feedback.interactive( no ) ❐ force_patience_page has been replaced by response.icap_feedback.force_interactive ❐ category.dynamic.mode delay] ) has been replaced by webpulse.categorize.mode Command Deprecation show ip-rts table is no longer available. 9 Blue Coat SGOS 5.4.x Upgrade/Downgrade Feature Change Reference Note: If the latest release does boot successfully, the ProxySG appliance might attempt to boot to an earlier image. This can lead to a downgrade without warning. 10 Chapter 3: Feature-Specific Upgrade Behavior This chapter provides critical information about how specific features are affected by upgrading to or downgrading from SGOS 5.4 and provides actions administrators must or are recommended to take as a result of upgrading. If a specific feature is not mentioned, there are no known upgrade or downgrade issues. This chapter assumes you are upgrading to SGOS 5.4 from a supported direct-upgrade version. SGOS 5.4.x supports direct upgrade from the latest available releases of SGOS 4.x, 5.2.x, and 5.3.x. At the time of this writing, those releases are 4.3.x, 5.2.5.x, and 5.3.2.x. For information about upgrades and downgrades for MACH5 and Proxy Editions, see the Blue Coat SGOS 5.4.x Upgrade/Downgrade Feature Change Reference. The upgrade and downgrade information is organized by component. Table 3–1 Feature/ Component Upgrade Impact by SGOS version See Upgrade impact for SGOS Version 4.3.x 5.2.5.x 5.3.2.x Access Logging "Access Logging" on page 15 x x Application Delivery Network (ADN) "New System Defaults" on page 17 x x x • "Upgrading Using the Breadth-First Approach" on page 19 x x x x x x • "Upgrading Using the Rolling Approach" on page 21 "Open ADN and Closed ADN" on page 23 Archiving/ Storage "Byte Caching" on page 25 x "DSCP" on page 26 x "TCP Window Size" on page 26 x "Archiving/Storage" on page 27 x x x 11 Blue Coat SGOS 5.4.x Upgrade/Downgrade Feature Change Reference Feature/ Component See Upgrade impact for SGOS Version 4.3.x Authentication Content Filtering 12 5.2.5.x 5.3.2.x • "LDAP" on page 49 x x x • "Encrypted Passwords" on page 49 x x x • "Hexadecimal Encoding in Policy Substitution Realm" on page 50 x x x • "Authorization and Proxy-Authorization HTTP Headers Are Writable" on page 50 x x x • "SSH Console" on page 50 x x • "Certificate Realms" on page 51 x x • "SiteMinder" on page 51 x x • "User Management" on page 52 x x • "Permitted Errors, Guest Authentication, and Default Groups" on page 53 x • "Configuration Options" on page 53 x x • "New Realms" on page 54 x x • "RADIUS Realms" on page 55 x x • "COREid Authentication" on page 55 x x • "Upgrading the BCAAA Authentication Service" on page 56 x x x • "Kerberos Constrained Delegation" on page 59 x x x • "Blue Coat DRTR" on page 47 x x x • "SmartFilter Database Selection" on page 48 x x Chapter 3: Feature-Specific Upgrade Behavior Feature/ Component See Upgrade impact for SGOS Version 4.3.x 5.2.5.x 5.3.2.x Forwarding/ SOCKS Gateways "Forwarding and SOCKS Gateways" on page 65 x x Health Checks "Health Checks" on page 66 x x HTTP "HTTP Proxy" on page 69 ICAP • "Cache-Hit Behavior" on page 60 x • "Cached Objects" on page 60 x • "Secure ICAP" on page 62 x x • "ICAP Feedback" on page 63 x x • "ICAP Scanning" on page 64 x x Instant Messaging "Instant Messaging" on page 45 x x Licensing/ Upgrading "Registering a License" on page 27 x "User License Limits" on page 28 x x • "Browser Configuration Instruction Page" on page 36 x x x • "New Landing Page" on page 37 x x x • "SNMP Console" on page 37 x x • "CIFS" on page 29 x x Management Services Networking Downgrade Impact x x 13 Blue Coat SGOS 5.4.x Upgrade/Downgrade Feature Change Reference Feature/ Component See Upgrade impact for SGOS Version 4.3.x Policy 5.2.5.x • "Trusted Destination IP" on page 30 x x • "WCCP" on page 31 x x x • "WCCP and Packet Forwarding and Packet Return" on page 31 x x x • "Adapters" on page 33 x x • "Software Bridging" on page 33 x • "Hardware Bridging" on page 35 x x • "Reflect Client IP" on page 36 x x • "QoS" on page 69 x x • "Revocation Checks on Certificates" on page 70 x x • "Content-Type Matching" on page 71 x x • "File Extension Objects" on page 71 x x • "SSL Forward Proxy Object Renamed" on page 71 x x • "Proxy Forwarding" on page 72 ProxyClient 14 5.3.2.x x x • "Authentication" on page 72 x x • "New User Login Address Object" on page 72 x x "ProxyClient And Client Manager" on page 43 x x Chapter 3: Feature-Specific Upgrade Behavior Feature/ Component See Upgrade impact for SGOS Version 4.3.x Proxy Services 5.2.5.x 5.3.2.x • "Accessing Proxy Settings" on page 38 x • "Bypass Lists" on page 38 x • "Restricted Intercept" on page 39 x • "New Services" on page 39 x x x • "Other Services Framework Changes" on page 40 x x x • "CA Certificate Lists" on page 44 x x • "Device Profiles" on page 44 x x • "SSL-Verify Server" on page 45 x x • "SSL Detection" on page 45 x x Statistics "Statistics" on page 73 x Streaming Media • "New Syntax for Caching Objects" on page 46 x x • "WM-HTTP Streaming Media Proxy" on page 46 x x • "WM-RTSP Streaming Media Proxy" on page 47 x x SSL Access Logging Impact: 5.4.3.2, 5.4.3.3 Upgrades This change impacts LDAPv2 users. In SGOS5.4.3.3 and later, the cs-username field of the access log reports firstname%20lastname, instead of firstname.lastname as in pervious releases. To revert to the prior behavior (firstname.lastname), enter the following CLI command: #(config) security legacy-relative-usernames enable Impact: 4.3.x, 5.2.x Upgrades 15 Blue Coat SGOS 5.4.x Upgrade/Downgrade Feature Change Reference In SGOS 5.2.2, a new field has been added to the default streaming log format: s-session-id. This field can be used to identify playspurts from the same client session and is supported for all streaming protocols: 16 ❐ Windows Media over RTSP ❐ Real Media over RTSP ❐ QuickTime over RTSP Chapter 3: Feature-Specific Upgrade Behavior ❐ MMS ❐ HTTP Upon upgrade, the default streaming log format changes to the new log format. If you have modified the default streaming log format prior to upgrade, those changes will be preserved. Related Documentation Volume 8: Access Logging ADN Impact: 5.2.x and 5.3.x Upgrades The Application Delivery Network (ADN) is aimed at enhancing the experience of users in WAN environments. Blue Coat offers two approaches to upgrading and securing your network and if you have SGOS 5.1.3.3 or later, both approaches allow you to keep the network in operation during the upgrade. Note: If you are configuring a new ADN installation, you do not need to worry about keeping a network in operation and secure; no live traffic is going through the ADN nodes. You can choose either approach discussed below or you can create your own custom approach. ❐ Breadth-first: This is the operation-centric approach, where each operation is done on each ADN node before the next operation is started. For more information, see "Upgrading Using the Breadth-First Approach" on page 19. ❐ Rolling: This is the device-centric configuration, where a set of operations is done to a specific device before you move to the next device. The rolling approach works best when there's a clear separation of roles; for example, you have dedicated managers, concentrators, and branches. You don't have ADN nodes that function as both managers and concentrators. The recommended upgrade order for the rolling approach is to upgrade the ADN managers first, then the concentrators, and the branches last. This method allows a staged deployment. For more information, see "Upgrading Using the Rolling Approach" on page 21. New System Defaults Impact: All Upgrades If you upgraded from SGOS 5.1.4 or earlier—where secure ADN was not supported—you must manually enable secure ADN post-upgrade. The backwards-compatible ADN manager runs on the existing plain ADN manager port. This manager can handle ADN nodes running SGOS 5.4.x, SGOS 5.3.x, SGOS 5.2.x, SGOS 5.1.4, and SGOS 5.1.3. SGOS 5.4 introduces the Open ADN feature. After you upgrade, your existing settings will be in Closed ADN mode. For more information, see"Open ADN and Closed ADN" on page 23. 17 Blue Coat SGOS 5.4.x Upgrade/Downgrade Feature Change Reference ❐ Security settings: • Authentication and authorization are disabled until a valid profile is selected. • ADN routing and tunnel connection requests are unauthenticated. • All ADN protocol messaging and compressed application data are transferred in plaintext. • SSL Device Profile: None. The device profile must be configured on the ADN managers before any outbound connections can be set to a secure mode on any ADN node. The profile also must be configured on all concentrators before securing any outbound tunnel connections. • Authorization: Disabled. Authorization can be enabled only if Validate ADN Peer IDs is enabled in the selected device profile (Configuration > ADN > General > Device Security). • Manager Listening Mode: Plain-Only. The Manager Listening Mode on the ADN managers can be set to Secureif all ADN nodes secure their routing connections. only • Tunnel listening mode: Plain-Only. Tunnel listening mode on a concentrator can be set to Secure-only if all branches connect to the concentrator through secure connections. • ❐ Manager settings: • 18 Secure-outbound: None. Pending-peers: Enabled Chapter 3: Feature-Specific Upgrade Behavior Upgrading Using the Breadth-First Approach If you upgrade from SGOS 4.3.x, the settings are as described above. From an ADN perspective, SGOS 4.3.x upgrades are treated as a new installation. The breadth-first approach requires that you do certain operations on each node before moving to the next node. Note: When upgrading to SGOS 5.4.x, backward compatibility is guaranteed only for devices running SGOS 5.2.x. Downgrading to SGOS 5.1.x is not supported. The overview for configuration is as follows: 1. Upgrade all ADN nodes to the latest SGOS release, including the latest patch version. 2. On each ADN node, configure the device authentication profile. Security parameters switch to authentication defaults after the device is configured with the device authentication profile: a. Device-auth-profile: Set to the desired profile. b. Authorization: Enabled c. Manager-listening-mode: Both. d. Tunnel-listening-mode: Both. e. Secure-outbound: Secure-Proxies. Note: If you are upgrading a network with live ADN traffic, reset secureoutbound to None to avoid potential ADN service outages. Otherwise, continue with the procedures below. For more information, refer to “Device Authentication” and “Configuring an Application Delivery Network” in Volume 5: Advanced Networking. 3. Pre-configure the approved-peers list on each ADN manager if you use a Closed ADN network. If a backup manager exists, the backup manager should be added to the approved-peers list on the ADN manager; in that case, the ADN manager should be added to the approved-peers list on the backup manager. 19 Blue Coat SGOS 5.4.x Upgrade/Downgrade Feature Change Reference 4. Enable outbound security on each ADN node: a. Secure-outbound: This setting can be configured to Routing-only, Secureproxies, or All. When routing connection security is enabled, each node reconnects to the ADN managers using the secure protocol. • If the secure-outbound option is set to Secure-proxies, all future outbound secure-proxy connections are secured. • If Secure-outbound is set to All, all future outbound connections are secured. Existing non-secure-proxy connections are upgraded to secure mode automatically. This is the most secure mode, allowing all ADN plain listeners to be disabled. Configure secure-outbound to at least Routing-only. If the routing managers are also branch nodes, configure secure-outbound to Secure-proxies or All. 5. Tighten up security by shutting down any unneeded plain (unsecured) listeners on each node: a. Manager-listening-mode: Configure this setting to Secure-only on each ADN manager. This setting can be selected only if the secure-outbound option is anything other than None on the ADN nodes. Note that you cannot select this option if you have ProxyClients on the network. b. Tunnel-listening-mode: configure tunnel listening mode to Secure-only on each node. Tunnel listening mode can be set to Secure-only on each node if no other ADN branches or ProxyClients attempt to connect to this concentrator through plain (unsecured) tunnel connections. For more information, refer to “Configuring an Application Delivery Network” in Volume 6: VPM and Advanced Policy Tasks. 20 Chapter 3: Feature-Specific Upgrade Behavior Upgrading Using the Rolling Approach If you upgrade from SGOS 4.3.x, the settings are as described in the previous section. From an ADN perspective, SGOS 4.3.x upgrades are treated as a new installation. The rolling approach requires that you complete all pertinent operations on each node before configuring the next node. Note: When upgrading to SGOS 5.3.x, backward compatibility is guaranteed only for devices running SGOS 5.2.x. Downgrading to SGOS 5.1.x is not supported. ADN Manager Upgrade Complete each step below for the ADN manager and backup ADN manager: 1. Upgrade the appliances to the latest release of SGOS, including the most recent patch version. 2. Configure the device authentication profile. Security parameters switch to authentication defaults after the device is configured with the device authentication profile: • Device-auth-profile: Set to the desired profile. • Authorization: Enabled. • Manager-listening-mode: Both. • Tunnel-listening-mode: Both. • Secure-outbound: Secure-Proxies. Note: If you are upgrading a network with live ADN traffic, reset secureoutbound to None to avoid potential ADN service outages. For more information, refer to “Device Authentication” and “Configuring an Application Delivery Network” in Volume 4: Securing the Blue Coat ProxySG Appliance. 3. Configure the Manager-listening-mode to Secure-only. Note: Do not do this step until all nodes have been upgraded and the secure-outbound option has been set to secure routing connections. If you attempt to do this step before configuring all other nodes, the nodes fail to connect to the secure manager port. 21 Blue Coat SGOS 5.4.x Upgrade/Downgrade Feature Change Reference This setting can be selected only if the secure-outbound option is anything other than None on the ADN nodes. Note that you cannot select this option if you have ProxyClients on the network. 4. Configure the approved-peers list, if authorization is enabled, to avoid potential temporary ADN service outage on a node. For more information, refer to “Configuring an Application Delivery Network” in Volume 6: The Visual Policy Manager and Advanced Policy. ADN Node Upgrade Avoid making changes to ADN configuration on any ADN nodes until both managers have been upgraded and configured. Note: The recommended approach to upgrading the ADN nodes is to configure all concentrators first, followed by the branch appliances. The overview for upgrading one ADN node is as follows: 1. Upgrade the appliance to the latest version of SGOS, including all patch releases. 2. Bring up the ADN node and complete basic ADN configuration. For more information, refer to Volume 5: Advanced Networking. 3. Configure the device authentication profile. Security parameters switch to authentication defaults after the device is configured with the device authentication profile: • Device-auth-profile: Set to the desired profile. • Authorization: Enabled. • Manager-listening-mode: Both. • Tunnel-listening-mode: Both. • Secure-outbound: Secure-Proxies. Note: If you are upgrading a network with live ADN traffic, reset secureoutbound to None to avoid potential ADN service outages. For more information, refer to Volume 4: Securing the Blue Coat ProxySG Appliance. 22 Chapter 3: Feature-Specific Upgrade Behavior Enabling the Secure-Outbound Security Option This setting can be configured to Routing-only, Secure-proxies, or All. ❐ When routing connection security is enabled, each node reconnects to the ADN managers using the secure protocol. ❐ If the secure-outbound option is set to Secure-proxies, all future outbound secure-proxy connections are secured. ❐ If Secure-outbound is set to All, all future outbound connections are secured. Existing non-secure-proxy connections are upgraded to secure mode automatically. This is the most secure mode, allowing all ADN plain listeners to be disabled. Setting Tunnel Listening Mode to Secure-Only The tunnel listening mode can be set to secure-only if no other ADN branches or ProxyClients attempt to connect to this concentrator through plain (unsecured) tunnel connections. For more information, refer to “Configuring an Application Delivery Network” in Volume 5: Advanced Networking. Open ADN and Closed ADN Impact: 5.2.x and 5.3.x Upgrades After upgrading to SGOS 5.4, the ADN manager and backup manager, if any, have new configuration options that enable you to configure new types of ADN networks referred to as Open ADN and Closed ADN. A brief description follows: ❐ Open — An ADN peer is allowed to form a tunnel connection with any other ADN peer. Open ADN works with transparent tunnels only. Open ADN is further divided into managed and unmanaged, as follows: ❐ • Open, managed ADN is an ADN in which there is a primary ADN manager and optionally a backup ADN manager. • Open, unmanaged ADN is an ADN in which there is no ADN manager Closed — (Consistent with earlier versions of SGOS.) ADN nodes can establish accelerated tunnel connections only with peers in its ADN. In this configuration, you must configure a Primary ADN manager and, optionally, a Backup ADN Manger to manage ADN membership. The ADN manager(s) can be ADN nodes or they can be dedicated ProxySG appliances. In a closed ADN every ADN peer must connect to the ADN manager(s) in order to become part of the ADN. 23 Blue Coat SGOS 5.4.x Upgrade/Downgrade Feature Change Reference Following is a brief discussion of how to locate these options on your ADN managers: 1. Log in to the primary ADN manager or backup ADN manager’s Management Console as an administrator. 2. Click Configuration > ADN > General. Notice that in the Primary ADN Manager and Backup ADN Manager sections, you now have the option to select None. Selecting None for primary and backup ADN networks enables an Open, unmanaged ADN network. Note there are many deployments—including ProxyClient deployments and any deployment that requires explicit tunnels—that cannot be used in an Open, unmanaged, ADN network. 3. Click Configuration > ADN > Manager. Notice the check box Allow transparent connections only within this managed network. This option—which is available only on the primary and backup ADN manager—determines whether or not the ADN network is Open or Closed, as follows: • Selecting the check box means you are configuring a Closed ADN network. • Clearing the check box means you are configuring an Open, managed ADN network. Information for Upgrading From Any SGOS Version Because all SGOS versions after 5.1.1 support an ADN manager and backup manager, after you upgrade, these settings are preserved and you have a managed ADN network (upon upgrade). Note: If you upgrade an unconfigured ProxySG to SGOS 5.4—in particular, if its ADN managers are unconfigured—after upgrading, they default to None. All network traffic bypasses ADN on this ProxySG in this case. To avoid this situation, make sure you configure a primary ADN manager and, optionally, a backup ADN manager on every peer before you upgrade it. Information for Upgrading from SGOS 4.3.x Because SGOS 5.1.3 and earlier (including all SGOS 4.x releases) do not support secure ADN, the configuration options related to authenticated peers do not exist. After upgrading, these peers cannot be part of a secure ADN network until you upgrade them to SGOS 5.1.4 or later. You can then configure them as part of a Closed ADN network if you wish. 24 Chapter 3: Feature-Specific Upgrade Behavior Downgrading an ADN Network To downgrade your network, reverse the steps you did to upgrade. Note that any attempt to enable tunnel security on a down-versioned branch fails and the connection is closed. Policy ❐ To support Application Delivery Networks (ADN): adn.server.optimize(yes|no|byte_cache|compress) adn.server.optimize[optimization-settings](yes|no) adn.server.optimize.inbound(yes|no|byte_cache|compress) adn.server.optimize.inbound[optimization-settings](yes|no) adn.server.optimize.outbound(yes|no|byte_cache|compress) adn.server.optimize.outbound[optimization-settings](yes|no) adn.connection.dscp(dscp_value) The following CPL syntax is being deprecated in favor of the ADN tunnel properties: socks.allow_compression(yes|no) socks_gateway.request_compression(yes|no|default) You can use the deprecated syntax, but you will receive a warning. Note: If you use SOCKS compression, convert the configuration from SOCKS to ADN. At this point the improved compression and much more flexible ADN policy becomes available. Related Documentation For more information about configuring ADN networks, see Chapter 2, Configuring an Application Delivery Network, in Volume 5: Advanced Networking. Byte Caching Impact: 5.2.x Upgrades Starting with SGOS 5.3, the byte cache is not cleared when the software or hardware is reset; it has a persistent byte cache. Blue Coat recommends that before downgrading to SGOS 5.2.x, you should clear the byte cache with the clear-cache byte-cache CLI command. If you do not clear the byte cache, this, the persistent byte cache will be preserved after downgrading. Because 5.3 and later do not support the byte cache protocol used in earlier SGOS versions, ProxySG devices running 5.3 or later that connect to ProxySGs running 5.2 or 5.1 will be limited to gzip compression only. Related Documentation Volume 5: Advanced Networking 25 Blue Coat SGOS 5.4.x Upgrade/Downgrade Feature Change Reference DSCP Impact: 5.2.x and 5.3.x Upgrades On a new or upgraded system, the Differentiated Services Code Point (DSCP) values that network devices use to identify traffic to be handled with higher or lower priority, is not changed. On an ADN network, per-hop behavior for an ADN packet cannot be set separately. However, DSCP behavior changes when both the branch and data center nodes are upgraded; the adn.connection.dscp property then takes effect and controls the DSCP value sent and received in the ADN tunnel. When both the branch and data center nodes are upgraded, the server.connection.dscp setting (which is set on the branch) is enforced on the data center node. The values for adn.connection.dscp and server.connection.dscp are configurable. Downgrade Behavior The adn.connection.dscp property is ignored. Related Documentation Volume 6: The Visual Policy Manager and Advanced Policy Volume 10: Content Policy Language Guide TCP Window Size Impact: 5.2.x Upgrades SGOS 5.3 and later offer a new option for ADN Tunnel TCP Window Size: Automatically adjusted. The ADN window size is adjusted in the Configuration > ADN > Tunneling > Network tab. The existing ADN window size setting is preserved upon upgrading to 5.3 or later, as follows: ❐ If the window size was set to the default value (64K) in a pre-5.3 version, the Automatically adjusted setting will be selected after upgrading to 5.3 or later. ❐ If the window size was manually set to a different value in a pre-5.3 version, this value will be entered into the Manual override field. Related Documentation ❐ 26 Volume 5: Advanced Networking Chapter 3: Feature-Specific Upgrade Behavior Archiving/Storage Impact: 4.3.x, 5.2.x Upgrades Starting with SGOS 5.3, you can create a signed archive. A signed archive is one that is cryptographically signed with a key known only to the signing entity—the digital signature guarantees the integrity of the content and the identity of the originating device. You can then use a trusted CA Certificate List (CCL) to verify the authenticity of the archive. On an upgrade to SGOS 5.3 or later, new archive configuration options will be available, but will be disabled by default. These options are available in the Configuration > General > Archive tab. When downgrading to a pre-5.3 version, the signed archive configuration will be disabled, and the system will default to the original archive format. If a protocol other than TFTP or FTP was configured for archiving the configuration, the protocol will default to FTP. Signed configurations cannot be directly loaded by the downgraded system. However, it would be possible to extract the configuration.txt file from the signed archive and attempt to load that configuration. Related Documentation Volume 1: Getting Started Attack Detection After upgrading to SGOS 5.x from 4.x, the Attack Detection connection limit counts connections in all TCP states. In SGOS 4.x, the Attack Detection connection limit only counts established connections. In SGOS 5.x connections in all TCP states are counted. After upgrading, clients that used to work fine might now hit the Attack Detection connection limit. Therefore, before upgrading plan for the correct Attack Detection connection limit. Licensing Registering a License Impact: 4.3.x Upgrades The licensing register-hardware command and the License Warning tab attempt to request the software license as well as the hardware license after successful hardware registration. Similarly, the licensing request-key and corresponding Maintenance > Licensing > Install > Request key attempt to register the hardware before requesting the license key if the hardware has not already been registered. 27 Blue Coat SGOS 5.4.x Upgrade/Downgrade Feature Change Reference User License Limits Impact: 4.3.x Upgrades Starting with SGOS 5.2.x, the number of users is enforced through model licensing. If you have more connections than your license permits, you can determine the overflow behavior. Connections beyond the limits can be bypassed, queued (waiting for a connection to drop off), or the licensed-user limit can be ignored. The default value is none. Downgrade Behavior On a downgrade to a version earlier than SGOS 5.2.x, the licensed-user limit overflow option is not available. Related Documentation Volume 2: Proxies and Proxy Services Networking Refer to the following sections for upgrade/downgrade issues related to items on the Configuration > Network page: 28 ❐ "CIFS" on page 29 ❐ "Trusted Destination IP" on page 30 ❐ "WCCP" on page 31 ❐ "Adapters" on page 33 ❐ "Software Bridging" on page 33 ❐ "Hardware Bridging" on page 35 Chapter 3: Feature-Specific Upgrade Behavior CIFS This section discusses the new the CIFS proxy and its enhancements. ❐ "Introducing the CIFS Proxy" ❐ "Overlapping Opens" ❐ "Browsing Performance" Introducing the CIFS Proxy Impact: All 4.x Upgrades The CIFS proxy enables the ProxySG to improve performance, reduce bandwidth, and apply basic policy checks to clients using the CIFS protocol. This solution is designed for branch office deployments because network administrators can consolidate their Windows file servers (at the core office) instead of spreading them across the network. Systems that are upgraded from versions of SGOS that do not have a CIFS proxy behave the same as new systems in that they receive a default set of CIFS services and settings. Existing services listening on the default CIFS TCP ports are not overwritten. Downgrading to SGOS 4.x has no effect on the box, except that the CIFS proxy is not available. The next time the upgrade is done, the settings from the previous upgrade still exist. Related Documentation Volume 2: Proxies and Proxy Services Overlapping Opens Impact: All Upgrades For applications such as Microsoft Word and Microsoft Excel, the ProxySG now improves access times when these applications open the same file multiple times, even if the end user opens the file only once (a type of file contention referred to as "overlapping opens"). Browsing Performance Impact: All Upgrades Two new CIFS proxy options improve the user's experience when browsing remote folders in Windows Explorer: ❐ Remote Storage Optimization: Enabled by default. When enabled, Windows Explorer modifies the icons of uncached folders on remote servers, indicating to users that the contents of the folder have not yet been cached by the Proxy SG. See Figure 3–1. 29 Blue Coat SGOS 5.4.x Upgrade/Downgrade Feature Change Reference Uncached Data Cached Data (no icon) Figure 3–1 ❐ CIFS Remote Storage Optimization Explorer Icon Suppress Folder Customization: Disabled by default. When a remote folder is customized (for example, the style of icon and the display of folder contents as icons or thumbnails), Windows Explorer checks for desktop.ini file inside the folder to determine how to display its contents. On slow links, however, the extra transactions required by this check result in sluggish performance. To speed the display of remote folders, enable Suppress Folder Customization to skip the extra transactions and always display remote folders in the default view. Trusted Destination IP Impact: 4.3.x Upgrades If, in your environment, a client can provide a destination IP address that the ProxySG appliance cannot determine or if the ProxySG determines an incorrect IP address, you can tell the ProxySG appliance to trust the client-provided IP address and not perform a DNS lookup. This can improve performance (but potentially cause a security concern). This setting can be configured in the Configuration > Proxy Settings > General tab. Downgrade Behavior On a downgrade to versions earlier than SGOS 5.2.x, the trusted destination IP address option is not available. Related Documentation Volume 2: Proxies and Proxy Services 30 Chapter 3: Feature-Specific Upgrade Behavior WCCP This section discusses the following topics: ❐ ❐ ❐ "WCCP and Interface Configuration" on page 31 "WCCP and Service Passwords" on page 31 "WCCP and Packet Forwarding and Packet Return" on page 31 WCCP and Interface Configuration Impact: Downgrades from 5.4 There are no upgrade issues for this feature. If you downgrade to an SGOS version earlier than 5.4, there are no issues if the WCCP configuration has defined its interfaces with physical interfaces in the form: Interface adapter:interface For example, Interface 0:0 However, there are downgrade issues if you defined VLAN interfaces in the form: Interface adapter:interface.vlan_id If you configure WCCP with virtual interfaces, after downgrading, WCCP is disabled due to errors in parsing the WCCP configuration. All references to VLAN interfaces will need to be removed from the WCCP configuration and it will need to be reinstalled. This will interrupt WCCP functionality but if the WCCP configuration is moving from a VLAN deployment to a non-VLAN deployment, there is no guarantee that the WCCP router is configured to support the non-VLAN deployment. In most cases, reconfiguration will be required on the WCCP router after downgrading. WCCP and Service Passwords Impact: Downgrades from 5.4 There are no upgrade issues for this feature. In SGOS 5.4 and later, WCCP service passwords are encrypted. If you configure a WCCP service in SGOS 5.4 or later and downgrade to SGOS 5.3 or earlier, the WCCP service is invalid because the password is encrypted. To avoid this issue, remove the WCCP service password before you downgrade. WCCP and Packet Forwarding and Packet Return Impact: All Upgrades SGOS 5.4 and later enable you to configure WCCP options using the Management Console: Configuration > Network > WCCP. On-line help is available to assist you with WCCP configuration options. 31 Blue Coat SGOS 5.4.x Upgrade/Downgrade Feature Change Reference In addition, SGOS 5.4 and later support the following combinations of packet forwarding and return options: Packet forwarding Packet return GRE GRE L2 GRE L2 L2 Note: SGOS versions before 5.4 only. If L2 redirection was used in earlier SGOS releases to forward packets from the router to the ProxySG, the ProxySG did not always treat those packets as arriving by WCCP, so static and dynamic bypass never attempted to use WCCP packet return. In those configurations, IP Forwarding had to be enabled so packets were properly returned to the router. Otherwise, the traffic was dropped. In SGOS 5.4 and later, this is no longer the case. WCCP packet return is always used to return bypassed traffic received by WCCP, and so it is not necessary to enable IP Forwarding. To view your choices in the SGOS 5.4 or later Management Console, click Configuration > Network > WCCP, select the Enable WCCP check box, and click New. In the New Service dialog, notice that if you select GRE for Forwarding Type, the Returning Type is assumed to be GRE also. However, if you choose L2 for Forwarding Type, you can choose either L2 or GRE for Returning Type. Downgrade Behavior Downgrades: After upgrading from an earlier SGOS version to SGOS 5.4, you have the option of choosing L2 packet forwarding and GRE packet return. This combination should resolve issues related to certain routers that did not support L2 packet return. The combination of L2 packet forwarding and GRE packet return is not supported in SGOS versions earlier than 5.4; in addition, the returning-type command used in the inline command that configures the ProxySG on downgrade is also not supported. Both cases result in an invalid WCCP configuration after downgrading. To avoid problems, do any of the following: 32 ❐ If you configured WCCP in the Management Console, before downgrading, set Forwarding Type and Returning Type to the same value. This causes the returning-type command to be omitted from the inline command and enables you to use the downgraded WCCP configuration. ❐ If you configured WCCP settings using the CLI, remove the returning-type commands from the inline command; otherwise, after downgrading, your WCCP configuration will not be accepted because returning-type is not supported in SGOS versions earlier than 5.4. Chapter 3: Feature-Specific Upgrade Behavior Adapters Impact: 4.3.x, 5.2.x Upgrades Any IP addresses assigned to network interfaces or VLANs while in SGOS 5.3 or later will be lost upon downgrading to earlier versions. This is not an issue when upgrading. Software Bridging Impact: 4.3.x Upgrades Changes to bridging in SGOS 5.4 or later include: ❐ Bridges are not configured during initial configuration of the system. ❐ A bridge is now considered to be a set of assigned interfaces and does not have an IP address. All interface configuration is done using the #(config) interface command. ❐ Interfaces are no longer identified by ports. ❐ Interface configuration is no longer done in the bridge editing submode. Upgrade Behavior The bridge-related settings have been migrated from previous SGOS releases to SGOS 5.4 or later. The behavior changes include: ❐ IP address, subnet: These have been moved to the lowest numbered interface attached to the bridge. ❐ mtu-size: On upgrade, mtu-size from an SGOS 4.3.x bridge is reflected to all the interfaces that belong to the bridge on SGOS 5.1.3 or later. ❐ accept-inbound. On upgrade, accept inbound settings from an SGOS 4.3.x bridge are reflected to all the interfaces that belong to the bridge on SGOS 5.1.3 or later. In SGOS 5.x, it has been renamed reject-inbound. ❐ speed: Speed is upgraded for both software and hardware bridges. For hardware bridges, the speed from the first port of a hardware bridge on SGOS 4.3.x is copied onto both interfaces belonging to the hardware bridge on SGOS 5.1.3 or later for a software bridge, speed is copied over from each port of a software bridge on SGOS 4.3.x to the corresponding interface of the software bridge on SGOS 5.1.3 or later. ❐ half-duplex/full-duplex: Duplex (half-duplex/full-duplex) is upgraded for both software and hardware bridges.For hardware bridges, the duplex from the first port of a hardware bridge on SGOS 4.3.x is copied onto both interfaces belonging to the hardware bridge on SGOS 5.1.3. For a software bridge, duplex is copied over from each port of a software bridge on SGOS 4.3.x to the corresponding interface of the software bridge on SGOS 5.1.3 or later. 33 Blue Coat SGOS 5.4.x Upgrade/Downgrade Feature Change Reference ❐ link-autosense: Link-autosense is upgraded for both software and hardware bridges. For hardware bridges, the link-autosense, if set on the first port of a hardware bridge on SGOS 4.3.x, is reflected onto both interfaces belonging to the hardware bridge on SGOS 5.1.3 or later. For software bridges, linkautosense, if set for a particular port of a software bridge on SGOS 4.3.x, is reflected to the corresponding interface of the software bridge on SGOS 5.1.3 or later. ❐ static-fwtable-entry: Static forwarding entries are migrated from each of the individual ports on SGOS 4.3.x to the corresponding interfaces on SGOS 5.1.3 or later. ❐ instructions (PAC Files): For hardware bridges, instructions from an SGOS 4.3.x bridge are automatically upgraded onto the first interface of the hardware bridge in SGOS 5.1.3. For software bridges, instructions from an SGOS 4.3.x bridge are upgraded onto an interface with an IP address that belongs to that bridge in SGOS 5.1.3 or later. If a software bridge was created in SGOS 4.2, that software bridge remains after an upgrade; the interfaces are attached to this software bridge on a best-effort basis. For example, if the bridge configuration is: bridge "bg0" ❐ interface 0:0 ❐ interface 3:0 0:0 is not part of a hardware bridge, while 3:0 is part of a hardware bridge In this case, 3:0 is reassigned to the hardware bridge, and bridge "bg0" is left with one interface. If both interfaces are part of a hardware bridge, software bridge bg0 remains with no interface assigned to it. 34 Chapter 3: Feature-Specific Upgrade Behavior Downgrade Behavior ❐ For downgrades to SGOS 4.3.x, previously existing SGOS 4.3.x settings are preserved; if the system was a new SGOS 5.x installation before the downgrade, the defaults are used. ❐ For downgrades to SGOS 5.2/5.3 settings are preserved, except for the programmable bridge functionality described in "Hardware Bridging" below. Related Documentation ❐ Volume 1: Getting Started Hardware Bridging Impact: All Upgrades Blue Coat offers two types of programmable bridge cards, some sold as hardware bridges others as regular Network Interface Cards (NICs). For SGOS 4.2.3 or later and SGOS 5.x upgrades, software bridges can be lost if they were created on a programmable card prior to upgrade. Cards that were sold as bridges remain hardware bridges on upgrade and are configured to fail open. Cards that were sold as NICs might have had software bridges configured; if so, that configuration is lost on an upgrade. You can recreate software bridges by either setting one of the pre-configured bridges to fail open or fail closed or by creating a software bridge and attaching the interfaces. Note that you must disable the automatically created hardware bridge before creating the software bridge. Downgrade Behavior Downgrade behavior depends upon the type of programmable card you originally purchased. Regardless of configuration, the card returns to its original sold-as configuration (either a bridge or a NIC). Related Documentation ❐ The option card instructions that shipped with your option card. 35 Blue Coat SGOS 5.4.x Upgrade/Downgrade Feature Change Reference Reflect Client IP Impact: 4.3.x, 5.2.x Upgrades After upgrading to 5.3 or later, the reflect client IP system setting will be disabled unless all of the proxy services have enabled the Reflect Client IP setting. This setting can be enabled in the Configuration > Proxy Settings > General tab. Upon upgrading to 5.3 or later, policy will be created for the services that have client IP reflection enabled. For example, if the HTTP and FTP proxies have client IP reflection enabled, the following policy is created: define condition __ReflectClientIPUpgrade service.name="HTTP" service.name="FTP" end condition __ReflectClientIPUpgrade <Proxy> condition= __ReflectClientIPUpgrade reflect_ip(client) ; Rule 1 Management Services The ProxySG ships with management services (consoles) that are designed to manage communication with the ProxySG. This section discusses the following topics: ❐ ❐ ❐ "Browser Configuration Instruction Page" on page 36 "New Landing Page" on page 37 "SNMP Console" on page 37 Browser Configuration Instruction Page Impact: All Upgrades After upgrading to SGOS 5.4, the Browser Configuration page (which provided instructions on how to configure clients to explicitly proxy traffic to the ProxySG) is no longer available. To configure an explicit proxy, you must perform one of the following tasks: ❐ Manually configure each user’s browser to use the ProxySG’s IP address in the proxy server configuration. If you choose this option, you can skip the remainder of this section. ❐ Use a Proxy Auto-Configuration (PAC) file to allow access to the Management Console. Two PAC files ship with the ProxySG: • Default PAC file: http[s]://sg_host-name-or-ip:8082/proxy_pac_file • Accelerated PAC file: http[s]://sg_host-name-or-ip:8082/ accelerated_pac_base.pac Only the accelerated_pac_base.pac file can be edited. Any text editor can be used to edit and customize the accelerated PAC file to meet your needs. After editing the file, you can load a PAC file only using the inline-acceleratedpac CLI command. 36 Chapter 3: Feature-Specific Upgrade Behavior Deprecated CLI command: SGOS#(config interface interface_number) instructions {accelerated-pac | default-pac | proxy} New Landing Page Impact: All Upgrades When you first log in to the Management Console, a new page Statistics > Summary displays. The Summary page visually demonstrates the overall performance and efficiency of your network; it displays the role of the ProxySG in boosting the performance of traffic within your network using its acceleration, optimization, policy control, and caching techniques. This page, designed for SGOS 5.4, is discussed in more detail in the on-line help provided with it. If you roll back from SGOS 5.4 to an earlier version, this page does not display; the system defaults to the previous landing page. SNMP Console Impact: 4.3.x, 5.2.x Upgrades SGOS 5.3 offers a console service for SNMP in the Configuration > Services > Management Services tab. When upgrading a default SNMP service will be created in the services framework, with a listener on the standard SNMP port (161). If SNMP was enabled at the time of upgrade, the listener will be enabled. When downgrading to a pre-5.3 version, the ProxySG will revert to using the old SNMP configuration (the one that was used before SGOS 5.3). The services framework will produce three debug exceptions which will generate event log entries, but not cause any operational problems. Related Documentation Volume 2: Proxies and Proxy Services Proxy Services Blue Coat has two types of services: proxy services, used to communicate with other systems and management services, used to communicate with the ProxySG. Proxy services define the ports and addresses where a ProxySG listens for incoming requests. The following topics in this section discuss changes in SGOS 5.4 to the Configuration > Services > Proxy Services > Proxy Services tab: ❐ ❐ ❐ ❐ ❐ ❐ "Accessing Proxy Settings" on page 38 "Bypass Lists" on page 38 "Restricted Intercept" on page 39 "New Services" on page 39 "Other Services Framework Changes" on page 40 "Upgrade/Rollback Behavior" on page 40 37 Blue Coat SGOS 5.4.x Upgrade/Downgrade Feature Change Reference Accessing Proxy Settings Impact: 4.3.x Upgrades Starting in SGOS 5.1, the Configuration > Services module was reworked for increased functionality, and proxy settings have moved from the Services tab to the Proxy Settings tab. Bypass Lists Impact: 4.3.x Upgrades If you upgrade to SGOS 5.x from SGOS 4.3.x, entries from the central and local bypass lists are migrated to the static bypass list. Because the static bypass list does not support listing gateways, any central or local bypass entries that included a gateway are converted to static route entries in the static route table. The converted static route entries are appended after the existing static route entries. Duplicate static route entries are silently ignored. All traffic leaving the ProxySG appliance is affected by the static route entries created from the SGOS 4.3.x bypass lists, not just traffic that matches that particular bypass list entry. Several parameters of bypass lists are renamed in SGOS 5.x: ❐ ❐ is now server-threshold. This contains the maximum number of client entries for a particular server before all client entries are collapsed into a wildcard entry that bypasses all clients going to that particular server. The default value remains at 16; the range is 1 to 256. server_bypass_threshold max_dynamic_bypass_entry is now max-entries. This defaults to 10000; the valid range is 100 to 50000. ❐ dynamic_timeout is now timeout. This defaults to 60 minutes and has a range between 1 and 86400 minutes. Downgrade Behavior SOGS 5.x settings are not copied back to SGOS 4.3.x on a downgrade. Previously existing SGOS 4.3.x settings will be used, or default settings are used if no previous SGOS 4.3.x configuration exists. CLI commands that are no longer used in SGOS 5.x include: # show bypass-list #(config) bypass-list central-path url #(config) bypass-list local-path url #(config) bypass-list no central-path #(config) bypass-list no local-path #(config) bypass-list no notify #(config) bypass-list no subscribe #(config) bypass-list notify #(config) bypass-list poll-now #(config) bypass-list subscribe #(config) inline bypass-list central eof-marker #(config) inline bypass-list local eof-marker #(config) load bypass-list central #(config) load bypass-list local 38 Chapter 3: Feature-Specific Upgrade Behavior Related Documentation Volume 1: Getting Started, Chapter 3 Restricted Intercept Impact: 4.3.x Upgrades With SGOS 5.2.x, a new tab has been added to the Configuration > Services menu. Restricted Intercept allows you to create a list of IP addresses that are intercepted, while allowing all other IP addresses to be bypassed. The Restricted Intercept List is useful in a rollout, prior to full production, where you only want to intercept a subset of the clients. After you are in full production mode, you can disable the Restricted Intercept List. The Restricted Intercept List is also useful when troubleshooting an issue, because you can reduce the set of systems that are intercepted. On a downgrade to SGOS 5.2 or earlier versions, the restricted intercept list is not available. Related Documentation ❐ Volume 1: Getting Started ❐ Volume 6: The Visual Policy Manager and Advanced Policy ❐ Volume 10: Content Policy Language Guide New Services The following new services are available in SGOS 5.4 and later: ❐ There are new options for HTTP services, Explicit HTTP, External HTTP, and Internal HTTP. Explicit HTTP and External HTTP are available under the Standard node while Internal HTTP is available under the Intranet node. Older SGOS versions have one service, named HTTP, that has multiple listeners. For upgrade/downgrade behavior, see "Upgrade/Downgrade Impact of HTTP Proxy Services" on page 42. ❐ The VNC and Citrix-ICA service now include additional ports in their definitions. ❐ The Shell service has been consolidated into the Remote Login/Shell service. ❐ There is a new service in the Encrypted service group called Other SSL. 39 Blue Coat SGOS 5.4.x Upgrade/Downgrade Feature Change Reference Note: The preceding proxy service changes are not made as part of your upgrade. After you upgrade, the services are the same as they were in the earlier SGOS version. To use the new services after you upgrade, see "Upgrade/Downgrade Impact of HTTP Proxy Services" on page 42. Be aware that creating the new services can have downgrade impacts that are discussed in "Upgrade/Rollback Behavior" on page 40. Other Services Framework Changes This section discusses other changes to the services framework: ❐ Reverse-proxy is removed from the list of pre-created service groups under Configuration > Services > Proxy Services> Proxy Services. When upgrading to 5.4, if the Reverse-proxy service group is empty, it is deleted from the service group listing. If Reverse-proxy service group is not empty, the Reverse-proxy service group remains. However, it is listed under the Custom service groups list in the Management Console. When downgrading from 5.4, the Reverse-proxy service group should display in the predefined service group list. ❐ You can select from a list to intercept/bypass traffic at the service level. With this change you can now intercept/bypass at the service group level, listener level and at the service level. ❐ All proxy services can be temporarily disabled by clicking Configuration > Services > Proxy Services > Proxy Services and selecting the Temporarily bypass all proxy services check box. This causes transparent proxy connections to be bypassed and all explicit proxy connections to be rejected. The equivalent CLI command follows: #(config proxy-services) force-bypass enable Note that this option changes the bypass statement to red, to highlight its use. This feature is intended as panic button and should be used only as an interim solution while application-breaking problems are repaired. Note: Downgrading to a version that does not support force bypass while running in bypass mode will result in restoration of proxy services. Upgrade/Rollback Behavior This section discusses the upgrade/rollback impact of changes to the services framework: ❐ ❐ ❐ 40 "Upgrade Behavior for 4.3.x Upgrades" on page 41 "General Services Framework Upgrade/Rollback Impact" on page 41 "Upgrade/Downgrade Impact of HTTP Proxy Services" on page 42 Chapter 3: Feature-Specific Upgrade Behavior Upgrade Behavior for 4.3.x Upgrades Impact: 4.3.x Upgrades Starting in SGOS 5.1, the services framework (the infrastructure used to manage proxy services) has been improved to, among other things, support multiple listeners and ports for each service. Changes in services include: ❐ Multiple listeners per service: A proxy service is comprised of one or more listeners. Each listener can be configured to intercept a particular destination IP subnet and port range. This provides considerable power in intercepting specific application data streams and protocols on the network. ❐ Port ranges: A listener can now contain a port range. Since a service can have multiple listeners, many port ranges can be used for a particular service. ❐ Subnet ranges: A listener can match: • All traffic • Only traffic that is not destined to the SG appliance (Transparent) • Traffic specifically destined to the SG appliance (Explicit) • Traffic destined to a particular IP address or subnet ❐ Default service: The default service matches all TCP traffic not otherwise matched by other service listeners. This provides the option to intercept all TCP traffic on the network so it can be accelerated and controlled by enforcing company policy on the traffic. ❐ Service names in policy: Each proxy service now requires a name. This name can contain spaces and can be used as a token in policy. This provides an easy mechanism to identify particular traffic flows in policy. ❐ Static bypass: The static bypass is now configured under the Proxy Services and bypasses both TCP and UDP traffic. ❐ Separation of console and proxy services: The management and proxy services are now configured using different commands. • To configure a management service from the CLI, use the managementservices command. • To configure a proxy service from the CLI, use the proxy-services command. The services have separate Management Console pages (Configuration > Services > Proxy Services, Configuration > Services > Management Services). General Services Framework Upgrade/Rollback Impact Impact: 4.3.x Upgrades On upgrade to 5.4, the old services configuration is upgraded to the new service framework. The new services name contains the old services type and generates a name with one of the following formats: 41 Blue Coat SGOS 5.4.x Upgrade/Downgrade Feature Change Reference ❐ If more than one service with identical properties exists, one service is created with multiple listeners when upgraded. For example, Yahoo IM has two service ports in SGOS 4.2, one on 5050 and one on 5101. Instead of creating two services, one service is created with two listeners. ❐ If multiple proxies of the same type exist, the upgrade uses the format proxy_name-number. For example, if you had two HTTP services, the new names are HTTP-1 and HTTP-2. ❐ On upgrade, only new SGOS 5.x services are added. Services that were purposefully deleted in SGOS 4.3.x are not re-added in the upgrade. Most attributes directly translate to the new services framework. The exceptions are: ❐ The tunnel proxy attribute detect protocol is preserved on upgrade; the default behavior on a new system is disabled. ❐ The transparent and explicit attributes are removed. ❐ The send-client-ip attribute in SGOS 4.2 maps directly to reflect-client-ip in SGOS 5.x. Upgrade/Downgrade Impact of HTTP Proxy Services Impact: All Upgrades This section discusses the upgrade/downgrade impact of changes to HTTP proxy services. You can upgrade to SGOS 5.4 and downgrade without issues, provided you have only the HTTP proxy service. Be aware of the following: ❐ When you upgrade to SGOS 5.4 or later, the new services are not created. To create the new services after upgrading, you have the following options: • Recommended: • Delete the existing HTTP service. (Click Configuration > Proxy Services. In the right pane, under Standard, delete HTTP.) Failure to delete the services first results in errors such as Listener Conflict. • Import the new services. For more information, see Volume 2: Proxies and Proxy Services. • Use restore-defaults command. Be aware this command affects all SGOS services, not only Proxy Services. If you use the restore-defaults command after upgrading to SGOS 5.4— or if you import the new HTTP proxy services after you upgrade—and then downgrade to SGOS 5.3.x or 5.2.x, explicit proxy connections on port 80 are not properly directed to the Explicit HTTP service. Workaround: Delete the Internal HTTP service. For more information, see Volume 11: Command Line Interface Reference. 42 Chapter 3: Feature-Specific Upgrade Behavior Related Documentation Volume 2: Proxies and Proxy Services Volume 11: Command Line Interface Reference ProxyClient And Client Manager Impact: 4.3.x Upgrades In SGOS the ProxyClient was introduced. The ProxyClient enables users to benefit from accelerated application delivery directly to their desktops. This allows mobile users or users in small branch offices—where it might not be costjustifiable to deploy an acceleration gateway—to have improved networked application access. You can access the configuration options in the Configuration > ProxyClient tab. Impact: 5.2.x and 5.3.x Upgrades If the ProxyClient was configured before you upgraded, there is no impact. If you configure the ProxyClient after you upgrade, additional validation is performed to make sure you configure the options correctly. For more information, see Chapter 12, Accelerating and Controlling Micro-Branch and Mobile User Connections (ProxyClient), in Volume 5: Advanced Networking. If you downgrade SGOS after you have configured the ProxyClient, the configuration options revert to their earlier format. No configuration options are changed. To use the ProxyClient, one ProxySG appliance must be configured as the Client Manager. Upgrading the Client Manager to SGOS 5.4 does not upgrade installed clients. Upgrading the ADN manager or the ADN data center concentrators has no effect on clients as long as the client-related settings are not changed. When upgrading from SGOS 4.3.x, you must install the client license and configure the ADN Manager and Client Manager as discussed in the chapter on the ProxyClient in Volume 4: Securing the Blue Coat ProxySG Appliance. Related Documentation ❐ Volume 5: Advanced Networking ❐ Blue Coat ProxyClient Release Notes SSL The SSL module (Configuration > SSL) includes the following changes in default behavior: ❐ "CA Certificate Lists" on page 44 ❐ "Device Profiles" on page 44 ❐ "SSL-Verify Server" on page 45 ❐ "SSL Detection" on page 45 43 Blue Coat SGOS 5.4.x Upgrade/Downgrade Feature Change Reference CA Certificate Lists Impact: 4.3.x, 5.2.x Upgrades In SGOS 5.3.x, the SSL Proxy trusts all client Certificate Authority certificates in the CA Certificate List (CCL); previously, the default was to trust none. When upgrading from 4.2.x or 5.2.x, the default will be set to all, allowing policies that require client certificates to function properly after upgrade. If you upgrade from SGOS 5.2 to 5.3 or later, downgrade back to 5.2 and then modify CCLs, and then upgrade back to 5.3 or later, the changes made to CCLs in 5.2 will not be reflected. You will have to change the CCL configuration manually to reflect 5.2 changes. Related Documentation Volume 2: Proxies and Proxy Services Device Profiles Impact: 4.3.x, 5.2.x Upgrades Starting in SGOS 5.3.1, authentication realms use device profiles for managing the SSL connection instead of the SSL client. If a realm has the verify server flag set to off, a new SSL device profile, default-no-verify, will be created during the upgrade process. If the verify server flag is on, the default SSL device profile will be used. The components listed below now use the default SSL device profile for managing the SSL connection instead of using the SSL client. • Secure access log uploads • Secure image downloads • Secure URL database downloads • Secure heartbeats • Secure archives use the default device profile, but you can pick an alternate profile, if you prefer. • Authentication realms that speak SSL to the authentication servers use the default device profile. If you prefer, you can pick another profile. Deprecated CLI The following CLI commands are deprecated in realms with SSL support: ssl-verify-server ssl-verify-agent In 5.3.x or later, the following CLI command should be used: ssl-device-profile <profile-name> Related Documentation Volume 4: Securing the Blue Coat ProxySG Appliance, Appendix C 44 Chapter 3: Feature-Specific Upgrade Behavior SSL-Verify Server Impact: 4.3.x Upgrades In SGOS 5.2.x, server certificates are verified by default. The ssl-verify-server attribute under HTTP and the corresponding CLI and Management Console commands have been removed. If you are upgrading from SGOS 4.2.3 or later and have this flag set to no, policy is generated to restore pre-upgrade server certificate verification behavior. If the ssl-verify server attribute was set to yes in SGOS 4.2.3, no policy is generated. Generated policy is visible in the VPM as a new Server Certificate Validation object and negated version of Request Forwarded object. SSL Detection Impact: 4.3.x Upgrades Starting in SGOS 5.2.x, options to set the SSL protocol detection for HTTP CONNECT, SOCKS, and TCP Tunnels are no longer available. If these attributes were set to no in SGOS 4.3.x, policy is generated to maintain the pre-upgrade SSL detection behavior. If those attributes were set to yes in SGOS 4.3.x, no policy is generated. Generated policy is visible in the VPM as a new Disable SSL detection object. Note that this VPM object is meant to accommodate upgrade scenarios only. The preferred way to control SSL detection and protocol detection in general is by using the per-service attribute for protocol detection under Configuration > Services > Proxy Services. Related Documentation Volume 2: Proxies and Proxy Services Instant Messaging Impact: All Upgrades Instant Messaging support is configured in the Configuration > Proxy Settings > IM Proxies tab. In SGOS 5.3 and earlier, some unsupported IM traffic is denied, some tunneled and some correctly processed by policy. On upgrade to 5.4, by default, the ProxySG blocks connections for all unsupported Yahoo and MSN IM clients. The ProxySG also provides the option to tunnel all unsupported Yahoo and MSN IM clients. Refer to the SGOS 5.4 Release Notes for a list of currently supported IM versions. On downgrade, unsupported IM traffic might be denied, tunneled or partially processed by policy depending on the configurations in the downgraded SGOS version.You must manually edit or delete policy entries that contain the policy conditions new to SGOS 5.4. SGOS 5.4 also provides new options to support AIM 6.8 as an explicit proxy configuration. AIM 6.8 connections require a keyring and a signed certificate. The certificate must be installed on the ProxySG and is used by the AIM proxy service 45 Blue Coat SGOS 5.4.x Upgrade/Downgrade Feature Change Reference to communicate with the AIM client. The signed certificate on the AIM proxy must bear the same hostname that is on the Inbound SSL Device Profile; The AIM 6.8 client accepts certificates signed by rapidssl.com CA and Thawte. All SSL Layer policies can be applied to IM 6.8 traffic. VPM additions in the Action column of the Web Access Layer are: ❐ IM User Agent Unsupported ❐ Tunnel/Do Not Tunnel IM Traffic On downgrade, AIM 6.8 clients with an explicit proxy configuration that bear the hostname that was on the Inbound SSL Device Profile, will not be able to login. Without an explicit proxy configuration AIM 6.8 traffic will be treated in the same way as HTTPS traffic. Streaming Media Refer to the following sections for changes to Streaming Media in the Configuration > Proxy Settings tab: ❐ ❐ ❐ "New Syntax for Caching Objects" on page 46 "WM-HTTP Streaming Media Proxy" on page 46 "WM-RTSP Streaming Media Proxy" on page 47 New Syntax for Caching Objects Impact: 4.3.x, 5.2.x Upgrades Starting with SGOS 5.3 the mms://localhost/file.wmv syntax is no longer used for caching objects. This optimization was only useful on reverse proxies, when multiple hostnames or IP addresses in the request URL would all resolve to one of the ProxySG appliance’s IP addresses. Previously cached objects under mms://localhost/file.wmv are not usable. New client requests that would have previously used the cached copy now cause the appliance to fetch file.wmv and cache it mms://host_or_ip>/file.wmv, where host or ip is based on the server URL returned by policy; it might be the same as the client’s request URL. WM-HTTP Streaming Media Proxy Impact: 4.3.x, 5.2.x Upgrades Changes implemented in the wm-http streaming media proxy in 5.3 and later, may cause protocol dialect incompatibility issues if a ProxySG running 5.3 or later forwards traffic to a ProxySG running older SG versions, and the upstream SG has a non-default (0 is the default) max-fast-bandwidth configuration setting for Windows Media clients. In such a situation, client HTTP requests fail for live or video-on-demand streaming; this is not an issue for RTSP requests. There are several workarounds (in order of preference): 46 ❐ Upgrade the ProxySG running the older SG version to version 5.4. ❐ Reset max-fast-bandwidth to 0 on the upstream ProxySG running a pre-5.3 version. Chapter 3: Feature-Specific Upgrade Behavior ❐ Disable http-handoff on the upstream ProxySG running a pre-5.3 version. ❐ Disable http-handoff on the downstream ProxySG running version 5.4. WM-RTSP Streaming Media Proxy Impact: All Upgrades WM-RTSP has the option of fast-caching content from the streaming server. With fast-caching, the WM client can request the streaming server to deliver the streaming content at a rate faster than the streaming rate of the content. In the case of MBR VOD content, fast- caching content to the local cache of the Windows Media client impacts playback quality. To maintain smooth streaming of MBR VOD content, you might need to disable the fast-caching ability of the Windows Media client. By default, fast-caching is enabled on the ProxySG. The VPM or CPL to configure policy for disabling fast caching are: ❐ Disable Fast-Caching in Windows Media Client is streaming.fast_cache(no). ❐ Do No Disable Fast-Caching in Windows Media Client streaming.fast_cache(yes). ❐ The default value is Do No disable Fast-Caching in Windows Media Client or streaming.fast_cache(yes). mapped to CPL as is mapped to CPL as Related Documentation Volume 3: Web Communication Proxies Content Filtering This section contains information pertaining to the Configuration > Content Filtering tab. Blue Coat DRTR Impact: All Upgrades In SGOS 5.4, the name DRTR is replaced by WebPulse in the Management Console. The functionality is not changed, though there is a change in CPL Syntax. Deprecated CPL Syntax: category.dynamic.mode(none | realtime | background | default) Replacement CPL Syntax: webpulse.categorize.mode(none | realtime | background | default) Impact: 4.3.x, 5.2.x Upgrades Starting with SGOS 5.3, secure DRTR connections are available on the ProxySG. This feature is disabled on an upgrade from pre-5.3 versions. 47 Blue Coat SGOS 5.4.x Upgrade/Downgrade Feature Change Reference If secure DRTR connections was enabled in 5.3 and the device is then downgraded, the device will use unsecured DRTR connections in the downgraded version. Related Documentation Volume 7: Managing Content, Chapter 2 SmartFilter Database Selection Impact: 4.3.x, 5.2.x Upgrades Beginning with SGOS 5.3 offers two database editions for SmartFilter: XL and SL. The XL edition is the default, and is compatible with SmartFilter 4.2 or later. The XL edition provides a number of new categories, as well as some changes to existing categories that are not available in the SL edition. When you upgrade from pre-5.3 versions that only supported the SL database edition, the default changes to the XL database edition. To defer policy changes, re-select the SL edition database. When downgrading to 5.2.1 or earlier or 4.2.5 or earlier versions, the ProxySG will use the SL database. When downgrading to 5.2.2.5-5.2.2.7 or 4.2.6.1-4.2.6.2 (precisely), the ProxySG will use the XL database. Note that any time the database is changed — whether by user gesture or downgrade/upgrade — there will be no immediate change in behavior. When the database edition has been changed, the next subsequent download will always be a full-size download; incremental download between SL and XL editions is not possible. Related Documentation Volume 7: Managing Content, Chapter 2 Authentication Refer to the following sections for authentication-related upgrade/downgrade considerations in the Configuration > Authentication tab: ❐ ❐ ❐ ❐ ❐ ❐ ❐ ❐ ❐ ❐ ❐ ❐ 48 "LDAP" on page 49 "Encrypted Passwords" on page 49 "Hexadecimal Encoding in Policy Substitution Realm" on page 50 "Authorization and Proxy-Authorization HTTP Headers Are Writable" on page 50 "SSH Console" on page 50 "Certificate Realms" on page 51 "SiteMinder" on page 51 "User Management" on page 52 "Permitted Errors, Guest Authentication, and Default Groups" on page 53 "Configuration Options" on page 53 "New Realms" on page 54 "RADIUS Realms" on page 55 Chapter 3: Feature-Specific Upgrade Behavior ❐ ❐ ❐ ❐ "COREid Authentication" on page 55 "IWA Realms" on page 55 "Upgrading the BCAAA Authentication Service" on page 56 "Kerberos Constrained Delegation" on page 59 LDAP Impact: All Upgrades ❐ LDAP group check performance improvement: On upgrade to SGOS 5.4, existing realms will be set to use LDAP compares instead of LDAP searches, so that existing installations do not change. Newly created realms will be set to use LDAP searches because searches result in fewer queries to the LDAP server and therefore perform about the same, or faster, than compares. ❐ Processing LDAP Attributes Locally: When you downgrade to an earlier SGOS release, policy compilation errors will occur because the feature is engaged by writing policy that takes advantage of the new triggers or substitution variables. ❐ See "Configuration Options" on page 53 for CLI changes. Encrypted Passwords Impact: All Upgrades Although the format of encrypted passwords has changed in SGOS 5.3, the normal upgrade/downgrade process handles the encrypted passwords without a problem. However, if you save the configuration with the show conf command before upgrading to SGOS 5.3, and then later replay the saved configuration after upgrading, encrypted passwords in that saved configuration won’t work. Likewise, if you save the configuration in 5.3, downgrade to a pre-5.3 version, and replay the configuration, the encrypted passwords won’t work in the earlier version. To avoid this potential problem, Blue Coat recommends that you generate a new output after upgrading or downgrading. This is a recommended best practice, since a show conf generated on one version can have unexpected results when replayed on a different version. show conf 49 Blue Coat SGOS 5.4.x Upgrade/Downgrade Feature Change Reference Hexadecimal Encoding in Policy Substitution Realm Impact: All Upgrades In SGOS 5.4 or later, you can use a new CPL modifier that takes existing substitutions and encodes them in hexadecimal. (Configuration > Authentication > Policy Substitution.) The new modifier can be formatted in any of the following ways: variable_name:encode_hex(separator) variable_name:encode_hex Examples follow: Modifier string Value How it is evaluated $(session.username: encode_hex) *#911# 2A2439313124 0x$(session.username: encode_hex( 0x)) *#911# 0x2A 0x24 0x39 0x31 0x31 0x24 After downgrading from SGOS 5.4, the modifier does not exist. Authorization and Proxy-Authorization HTTP Headers Are Writable Impact: All Upgrades In SGOS versions earlier than 5.4, the Authorization and Proxy-Authorization HTTP headers were read-only for security reasons. Starting with SGOS 5.4, the headers are writable and Blue Coat has determined the security impact is minimal. You can also control the upstream authorization headers using server.authenticate.basic which allows substitutions for the username and password. SSH Console Impact: 4.3.x, 5.2.x Upgrades SGOS 5.3 generates SSH client keys that are different from those generated in earlier versions. For example, if you upgrade to 5.3, regenerate the SSH client keys, and then downgrade to a pre-5.3 version, the keys in the two versions will be different. This is only a problem if an SSH client had permanently added a client key to its local host key file. In this case, SSH clients who were connecting to a 5.2 system would need to remove and re-add the key when connecting to the 5.3 system (and vice versa). Related Documentation Volume 2: Proxies and Proxy Services 50 Chapter 3: Feature-Specific Upgrade Behavior Certificate Realms Impact: 4.3.x, 5.2.x Upgrades Beginning with SGOS 5.3, certificate realms configured with local authorization will have a default authorization user name of $(cs-username) to correspond to the relative user name they currently are using. Certificate realms configured with LDAP or no authorization will default to using the fully qualified domain name as the authorization user name. On an upgrade to SGOS 5.4, the substitutions for the Username Attribute, Container Attribute List, and Base DN will be merged into a Username Substitution and a Full Username Substitution. A best effort will be made to create new substitutions that mimic the old behavior. The original settings will be preserved, but unavailable on a new system. Downgrade Behavior A system that has a certificate realm configured for an earlier release, will revert to that earlier configuration on a downgrade. A certificate realm that was never configured on an earlier release will have default entries for the basic Username settings. Related Documentation Volume 4: Securing the Blue Coat ProxySG Appliance SiteMinder Impact: 4.3.x, 5.2.x Upgrades SGOS 5.3 and later include the ability to set the SiteMinder authorization realm and to determine the authorization username. After the upgrade, existing SiteMinder realms will default to authorizing against themselves and will use the fully qualified domain name as the authorization user name. When downgrading to a version earlier than SGOS 5.3, the new SiteMinder authorization configuration will be ignored and the SiteMinder realm will authorize against itself. Related Documentation Volume 4: Securing the Blue Coat ProxySG Appliance, Chapter 12 51 Blue Coat SGOS 5.4.x Upgrade/Downgrade Feature Change Reference User Management Impact: 4.3.x Upgrades Starting with SGOS 5.2, management of users who authenticate to the ProxySG appliance is enhanced. Previously, users were authenticated without a concept of logging in or logging out of the SG appliance. A user is considered logged in when first authenticated to the SG appliance, allowing different ways of managing users and controlling access to resources. A login is the combination of a unique IP address with a unique username in a unique realm. For a specific realm, a user is only considered to be logged in once from a given workstation, even if using multiple user agents. You can browse the users logged into the SG appliance. You can also filter the displayed users by username pattern, by IP address subnet, and by realm. Prior to SGOS 5.2, a single cache credentials value determined how long credentials, surrogate credentials (authentication cookie or IP address), and authorization data were trusted. With SGOS 5.2.1 and higher, three refresh times are available. Prior to SGOS 5.2, one-time passwords only could be used once; to mimic that behavior, set the credential refresh time for the realm to 1. Policy ❐ user.login.log_out(yes) ❐ user.login.log_out_other(yes) ❐ client.address.login.log_out_other(yes) ❐ user.login.count ❐ client.address.login.count ❐ user.login.time ❐ user.login.address ❐ authenticate.authorization_refresh_time(x) ❐ authenticate.credential_refresh_time(x) ❐ authenticate.surrogate_refresh_time(x) ❐ authenticate.credentials.address(x.x.x.x) Downgrade If the new features are specified in policy, the policy fails to compile on a downgrade. 52 Chapter 3: Feature-Specific Upgrade Behavior Permitted Errors, Guest Authentication, and Default Groups Impact: 4.2.x Upgrades Through policy, you can configure several new features in authentication: ❐ Attempt user authentication while permitting specific authentication or authorization errors. ❐ Allow a user to log in as a guest user. ❐ Set up default groups with any realm, allowing you to assign users to groups and use those groups in reporting and subsequent authorization decisions. Policy New policy gestures include: ❐ authenticate.tolerate_error ❐ authorize.tolerate_error ❐ user.authentication_error ❐ user.authorization_error ❐ authenticate.guest ❐ authorize.add_group ❐ user.is_guest Before SGOS 4.2, the "authenticated" condition evaluated to true only if both authentication and authorization succeeded. It now indicates whether the user is authenticated. If the authentication realm supports split authentication and authorization or is a valid authorization realm, it is possible for authentication to succeed and authorization to fail. Upon downgrade, if the new features are specified in policy, the policy fails to compile because those features do not exist in earlier versions. Configuration Options Impact: All Upgrades CLI Changes The CLI command spoof-authentication has been replaced with serverauthentication, for all authentication realms that support BASIC credentials. The functionality is unchanged; this command enables or disables the forwarding of BASIC credentials of the authenticated user to the origin content server or to the proxy for authentication. In the LDAP realm, the CLI command now is: SGOS#(config ldap realm_name) server-authentication{none| origin| proxy} Impact: 4.3.x Upgrades Starting in SGOS 5.2.x, a number of realm configuration options have been enhanced and reorganized. ❐ Cache Credentials has been replaced by separate refresh times that better manage how credentials, surrogate credentials, and authorization data is managed. 53 Blue Coat SGOS 5.4.x Upgrade/Downgrade Feature Change Reference • Credential Refresh • Surrogate Refresh • Authorization Refresh • Inactivity Timeout These settings are all initialized with the value from the original Cache Credentials setting. ❐ The global virtual URL has been replaced; each realm must set its virtual URL separately. ❐ The global setting to determine whether cookies used in authentication are persistent cookies or session cookies has been replaced. Each realm now manages this setting separately. CLI Changes ❐ In each realm, the CLI command cache-duration has been replaced with commands to set the refresh time for credentials, surrogates and authorization data. ❐ The majority of global transparent-proxy-auth commands (all except method) have been replaced with equivalent settings in each realm. Upgrade Behavior ❐ Each realm that does not have an existing virtual URL is set to the default virtual URL. ❐ Each realm’s cookie behavior (persistent or session cookies) is inherited from the old global option. Downgrade Behavior New settings are ignored and the Cache Credentials value is set to the Surrogate Refresh time. Related Documentation Volume 4: Securing the Blue Coat ProxySG Appliance New Realms Impact: 4.3.x Upgrades Beginning with SGOS 5.2.x, two new realms are supported: XML and Novell Single Sign-On (SSO). ❐ 54 Novell SSO—This realm is an authentication mechanism that provides single sign-on authentication for users who authenticate against a Novell eDirectory server. The mechanism uses the Novell eDirectory Network Address attribute to map the user's IP address to an LDAP Fully Qualified Domain Name (FQDN). Chapter 3: Feature-Specific Upgrade Behavior ❐ XML— This realm allows you to integrate SGOS with the authentication/ authorization protocol if you are using an authentication or authorization protocol that is not natively supported by Blue Coat. This realm requires that you create an XML realm responder to handle XML requests, which requires knowledge of the SOAP protocol. To this end, a SOAP appendix has been created in Volume 4: Securing the Blue Coat ProxySG Appliance. Downgrade Behavior The Novell SSO and the XML realms are supported in SGOS 4.2.4.x and later. If you downgrade to a version that does not support the realm, the realm and its settings are not available. Related Documentation Volume 4: Securing the Blue Coat ProxySG Appliance RADIUS Realms Impact: 4.3.x Upgrades In SGOS 5.2.2 and later, RADIUS realms can specify the character set to encode the user's credentials with when communicating with the RADIUS server. A character set is a Multipurpose Internet Mail Extension (MIME) charset name. Any of the standard charset names for encodings commonly supported by Web browsers can be used. The default is Unicode:UTF8. Downgrade Behavior If you downgrade to a previous release then the credentials are sent as UTF8 encoded. COREid Authentication Impact: 4.3.x, 5.2.x Upgrades In SGOS 5.3, the Oracle COREid 6.5 WebGate server software is upgraded to Oracle COREid 7.0. Because of the change in version, the single sign-on feature might stop working even if the IPValidation value in the WebGate configuration file (WebGateStatic.lst) is later set to false. The workaround is to uninstall and reinstall the Oracle COREid 7.0 WebGate software, and set IPValidation to false. Then restart the COREid Access server and the IIS server. IWA Realms Impact: All Upgrades In SGOS 5.4 and later, the Integrated Windows Authentication (IWA) realm replaces the (Windows NT LAN Manager (NTLM) realm. IWA is a Microsoftproprietary authentication suite that allows Windows clients (running on Windows 2000 and later) to automatically choose between using Kerberos and challenge/response authentication, as appropriate. 55 Blue Coat SGOS 5.4.x Upgrade/Downgrade Feature Change Reference When an IWA realm is used and a resource is requested by a client from the ProxySG, the appliance contacts the client's domain account to verify the client's identity and request an access token. The access token is generated by the domain controller (in case of IWA authentication) or a Kerberos server (in the case of Kerberos authentication) and passed to the ProxySG, which then validates the user’s credentials. In SGOS 5.4 and later, Kerberos authentication is supported for explicit proxy connections using Internet Explorer 7 and later and Firefox 2 and later. A sample procedure follows: 1. Click Configuration > Authentication > IWA > IWA Realms. 2. If you have not already done so, create an IWA realm. 3. Click Configuration > Authentication > IWA > IWA Servers. 4. Make sure the Allow Kerberos Credentials check box is selected. 5. Set up BCAAA to run as a domain user. 6. Set up your DNS servers to resolve a host name to the ProxySG’s primary IP address. 7. Use a command similar to the following to register the domain name of the ProxySG against the user running BCAAA: setspn -A http/sg_hostname BCAA_netbios_user_name 8. Configure the Internet Explorer or Firefox proxy server to connect to the host name of ProxySG (not its IP address). 9. Set up policy to authenticate with the IWA realm. Upgrading the BCAAA Authentication Service SGOS 5.4.x uses BCAAA version 130. Impact: All Upgrades The following list describes the platforms that BCAAA can run on to support the specified authentication method (these are not supported directory services): ❐ Integrated Windows Authentication: Windows® Server 2008 (32-bit and 64bit), Windows® Server 2003 (32-bit), and Windows® 2000 Server ❐ Oracle COREid version 6.5 and 7.0: Windows Server 2000 and 2003 (32-bit) ❐ CA eTrust SiteMinder version 5.5 and 6.0: Windows Server 2000 and 2003 (32bit) or Solaris 5.8 or 5.9 ❐ Windows SSO: Windows Server 2000, 2003 (32-bit), and Windows Server 2008 (32-bit and 64-bit) ❐ Novell SSO: Windows Server 2000, 2003 (32-bit), and Windows Server 2008 (32-bit and 64-bit) The only supported directory service operating systems for the preceding authentication methods are: ❐ 56 Windows Server 2000 Chapter 3: Feature-Specific Upgrade Behavior ❐ Windows Server 2003 ❐ Solaris 5.8 and 5.9 (SiteMinder and COREid only) Important: The BCAAA service cannot be installed on Windows NT or on Windows Vista. BCAAA is distributed as a zip file or UNIX shell script, to be installed on a Microsoft® Windows® system or a Solaris™ system. The zip file to download the BCAAA service is posted on the software download page at http://download.bluecoat.com/release/SGOS5_4/index.html. BCAAA Upgrade/Downgrade Process Before upgrading to, or downgrading from, SGOS 5.4.x, you must first install the BCAAA version required for the release you are migrating to. WARNING: If you do not install the compatible BCAAA version before upgrading or downgrading, authentication will fail and you will not be able to reach the BCAAA server to download a compatible version. Before upgrading or downgrading SGOS, complete the following steps: 1. Identify the BCAAA release required for the SGOS version you are migrating to. 2. Download and install the BCAAA installation package required for your release. Note: The BCAAA upgrade/downgrade process does not disable the BCAAA version required for the current SGOS release. For example, if you are running SGOS 5.4.2.2 with BCAAA version 130 and then install BCAAA version 120 so that you can downgrade to SGOS 4.2.10.1, SGOS 5.4.2.2 continues to use BCAAA version 130 until you have downgraded. 3. Upgrade or downgrade your SGOS image. To view the complete upgrade process, refer to the 5.4.x Upgrade/ Downgrade Guide available at https://bto.bluecoat.com/documentation/pubs/view/ SGOS%205.4.x. To download and install the BCAAA Service: 1. Navigate to the following BlueTouch Online page: 57 Blue Coat SGOS 5.4.x Upgrade/Downgrade Feature Change Reference https://bto.bluecoat.com/download/product/17 2. Click the BCAAA link for the SGOS release you want to upgrade to. 3. Review the download agreement. 4. To accept and continue, click I agree and wish to download this software. 5. Click Download Now and save the file. 6. Locate the saved BCAAA zip file. 7. Extract the files. 8. Double click the BCAAA .exe file. The BCAAA installation wizard displays. 9. Follow the steps in the installation wizard. Using Multiple Versions of the BCAAA Service You can run multiple versions of the BCAAA service. Depending on the versions of BCAAA that you want to run, you might have to install different versions of the service. Each version of the BCAAA service that you want to run must reside on your system. Note: You cannot use an older version or a newer version than your proxy expects. For example, you must install BCAAA version 120 for SGOS 4.2.3.x or higher and SGOS 5.2.1 or higher. Table 3–2 Supported Versions of the BCAAA Service 58 SGOS Version BCAAA Version Supported SGOS 3.2.6 Upgrade to BCAAA version 99 or higher SGOS 4.1.x Upgrade to BCAAA version 99 or higher SGOS 4.2 100 (Download from: http://download.bluecoat.com/release/SGOS4/index.html SGOS 4.2.2 110 (Download from http://download.bluecoat.com/release/SGOS4/index.html SGOS 4.2.x, where x>=3 120 Download from http://download.bluecoat.com/release/SGOS4/index.html SGOS 5.1.1 SGOS 5.1.2 100 (Download from http://download.bluecoat.com/release/SGOS5/index.html) SGOS 5.1.3 SGOS 5.1.4 110 (Download from http://download.bluecoat.com/release/SGOS5/index.html) SGOS 5.2.x 120 (Download from http://download.bluecoat.com/release/SGOS5_2/index.html) SGOS 5.3.x 120 (Download from http://download.bluecoat.com/release/SGOS5_3/index.html) Chapter 3: Feature-Specific Upgrade Behavior Table 3–2 Supported Versions of the BCAAA Service (Continued) SGOS Version BCAAA Version Supported SGOS 5.4.1 130 (Download from http://download.bluecoat.com/release/SGOS5_4/index.html) Install the lowest version of the BCAAA service first and the highest version of BCAAA last, allowing each version to uninstall the previous version. This leaves behind the bcaaa.ini and bcaaa-nn.exe files for each version. The BCAAA upgrade/downgrade process does not disable the BCAAA version required for the current SGOS release. For example, if you are running SGOS 5.4.2.2 with BCAAA version 130 and then install BCAAA version 120 so that you can downgrade to SGOS 4.2.10.1, SGOS 5.4.2.2 continues to use BCAAA version 130 until you have downgraded. This BCAAA installation process leaves behind the bcaaa.ini and bcaaa-nn.exe files for the version currently running. Notes ❐ Only one listening port is used, no matter how many versions you are running. The BCAAA service hands off the connection to the appropriate BCAAA version. ❐ Installation instructions for BCAAA are located in Volume 4: Securing the Blue Coat ProxySG Appliance, accessible through WebPower account access. ❐ The BCAAA service cannot be installed on Windows NT, Windows 2008, and Windows Vista. ❐ The firewall on Windows systems must be disabled for the BCAAA service to work. If the firewall is enabled, the SG appliance won't be able to connect to BCAAA. Related Documentation Volume 4: Securing the Blue Coat ProxySG Appliance Kerberos Constrained Delegation Impact: All Upgrades Kerberos constrained delegation is a new feature in SGOS 5.4. This feature enables you to allow users that have been authenticated by the ProxySG in any realm be reliably authenticated to an origin content server using Kerberos. An IWA realm must be created to handle the Kerberos constrained delegation, and the realm must be enabled using policy. To enable constrained delegation support, you must configure it in the same way as a new installation. Important: To use Kerberos constrained delegation, you must upgrade to BCAAA version 130 or later. For more information, see "Upgrading the BCAAA Authentication Service" on page 56. 59 Blue Coat SGOS 5.4.x Upgrade/Downgrade Feature Change Reference Any configured spoofing will continue to work on upgrades. While the configuration command has been renamed, the underlying registry value is unchanged. Downgrade Impact If the new policy (in CPL or the VPM) uses the new constrained delegation properties, spoofing property or Authorization Header rewrites, it will fail to compile on the downgraded version. These need to be removed before downgrading. Any configured spoofing will continue to work on downgrades. While the configuration command has been renamed, the underlying registry value is unchanged. Related Documentation Volume 4: Securing the Blue Coat ProxySG Appliance, Chapter 18. Web Content Scanning (ICAP) See the following sections for information related to changes to the Configuration > External Services page: ❐ ❐ ❐ ❐ ❐ "Cache-Hit Behavior" on page 60 "Cached Objects" on page 60 "Secure ICAP" on page 62 "ICAP Feedback" on page 63 "ICAP Scanning" on page 64 Cache-Hit Behavior The virus_detected policy condition now generates an event log for cache hits, cache misses, and non-cacheable objects when a virus is found. If this behavior is not needed in your environment, you can create an access-log facility to report the URL, client IP address, and the virus-detected fields. The s-action access-logging field identifies the type of action taken to process the request and can distinguish between cache hits and cache misses. Reporter can be used to generate various reports. Downgrade Behavior If you downgrade to a version lower than SGOS 5.2.x, the virus_detected policy condition is available for cache-miss transactions only. Related Documentation Volume 2: Proxies and Proxy Services Cached Objects Impact: All Upgrades 60 Chapter 3: Feature-Specific Upgrade Behavior Objects (except replacement objects from the ICAP server) that are cached under earlier SGOS releases SGOS 4.3.x, SGOS 5.2.x, and SGOS 5.3.x) remain usable on upgrade to SGOS 5.4. On a downgrade, objects cached under SGOS 5.3.x or later are not usable on earlier SGOS versions. Unusable objects are fetched again from the Origin Content Server (OCS.) Related Documentation Volume 2: Proxies and Proxy Services 61 Blue Coat SGOS 5.4.x Upgrade/Downgrade Feature Change Reference Secure ICAP Impact: 4.3.x, 5.2.x Upgrades SGOS 5.3 and later support secure ICAP connections. On upgrade from a pre-5.3 SGOS version: ❐ The settings for insecure scanning will be inherited. ❐ When upgrading the SG will inspect the service URL: icap://<ICAP serverIP>:<port>. ❐ If a port number is specified in the service URL, it will be stripped from the URL and saved in the registry as “port.” The service URL becomes: icap://<ICAP Service IP> ❐ If a port number is not present in the service URL, the value 1344 will be saved in the registry as “port.” Downgrade Behavior Before downgrading to a pre-5.3 SGOS version, it’s important to disable all secure ICAP settings: ❐ In the Edit ICAP Service dialog box, clear the check box This service supports secure ICAP connections. ❐ Remove all policy rules containing request.icap_service.secure_connection. The following problems will occur if you do not disable the secure ICAP settings: ❐ Policy compilation will fail if it contains the rule request.icap_service.secure_connection. You will need to manually fix this by deleting the rules. ❐ The ICAP service URL will contain the URL without the port number. This isn’t a problem if the default port (1344) is used. If a non-default port is used, you will need to manually re-enter the port number. Related Documentation Volume 7: Managing Content, Chapter 3 62 Chapter 3: Feature-Specific Upgrade Behavior ICAP Feedback Impact: 4.3.x Upgrades In SGOS 5.2.x and later, the ICAP Feedback tab allows you to select either patience pages or data trickling. Data trickling allows some or most of the HTTP object data to continue to the client while the ICAP scan occurs. This is primarily designed for non-interactive (non-Web browser based) HTTP traffic. For interactive (browser-based) traffic, you can employ data trickling or patience pages. ❐ For a non-interactive client, feedback is set to none. ❐ For an interactive client: • If no ICAP RESPMOD service is found in a pre-SGOS 5.2.x configuration, interactive feedback is set to none. • If an ICAP RESPMOD service is found in a pre-SGOS 5.2 configuration and all ICAP RESPMOD services were set to patience-page, interactive feedback is set to patience-page. The delay is set to the minimum of the delays configured on all ICAP services. To set patience-page feedback in the upgraded system, enable patience page for each ICAP service prior to the upgrade. Alternatively, use the CLI to do this after upgrading. ❐ VPM: Any existing ICAP Patience Page objects are converted into the Return ICAP Feedback object. The Interactive section within the Return ICAP Feedback object is derived from the older ICAP Patience Page object. ❐ VPM: Existing older versions of the ICAP Request Service objects and ICAP Response Service objects with the option "Use ICAP request/response service" selected are upgraded to the newer version of ICAP Request/Response Service object with the same option selected. ❐ VPM: Older version of the ICAP Request Service objects and ICAP Response Service objects with the option Do not use any ICAP service selected are upgraded to the newer version of the ICAP Request/Response Service object with the same option selected. Downgrade Behavior ❐ VPM: Any existing Return ICAP Feedback objects are converted into ICAP Patience Page objects and the Interactive section within the Return ICAP Feedback object is used to create the ICAP Patience Page object. ❐ VPM: Any existing newer version of the ICAP Request Service objects and ICAP Response Service objects with the option Use ICAP request/response service selected are downgraded to the older version of ICAP Request/ Response Service object with the same option and the service selected is the same as the first item selected in the pre-downgrade object. 63 Blue Coat SGOS 5.4.x Upgrade/Downgrade Feature Change Reference ❐ VPM: Any existing newer version of the ICAP Request Service objects and ICAP Response Service objects with the option Do not use any ICAP service selected are downgraded to the older version of the ICAP Request/Response Service object with the same option selected. Deprecated CLI The following command has been deprecated for ICAP. SGOS# (config icap services service_name) patience-page seconds Deprecated Policy The following policy has been deprecated for ICAP. Table 3–3 Deprecated Policy Deprecated Policy Replacement Policy patience_page(delay) response.icap_feedback.interactive(patie nce_page, 10) patience_page(no) response.icap_feedback.interactive(no) force_patience_page(yes) response.icap_feedback.force_interactive (yes) force_patience_page.useragent (yes) response.icap_feedback.force_interactive .user-agent (yes) force_patience_page[useragent, extension, contenttype](yes) response.icap_feedback.force_interactive [user-agent, extension, contenttype](yes) force_patience_page(useragent, extension) response.icap_feedback.force_interactive (user-agent, extension) VPM-Specific Deprecated Objects: The ICAP Patience Page object generates patience_page( ) Related Documentation Volume 6: The Visual Policy Manager and Advanced Policy ICAP Scanning Impact: 4.3.x Upgrades In new SGOS 5.2.x and later installations, you can no longer create ICAP services named fail_open and fail_closed. If you are upgrading, you can continue to use the names. In CPL, you can continue to have ICAP services named fail_open and fail_closed as long as those names are either the only service specified or not the last service named if more than one service is specified in a failover sequence. To specify a service named fail_over or fail_closed as the last service in a sequence, you must follow the sequence with a failure behavior directive. 64 Chapter 3: Feature-Specific Upgrade Behavior For example: response.icap_service(first_service, fail_open, fail_closed) Here, fail_open is interpreted as a service name (since it is not the last token) and fail_closed is taken as a failure directive, since it is the last token. Before downgrading, change any ICAP failover sequence containing more than one service to a sequence of one service. A policy syntax error is generated if policy contains an ICAP failover sequence of more than one service or group. Related Documentation ❐ Volume 6: The Visual Policy Manager and Advanced Policy ❐ Volume 7: Managing Content ❐ Volume 10: Content Policy Language Guide Forwarding and SOCKS Gateways Impact: 4.3.x Upgrades In SGOS 5.2 and later, support for groups (including load balancing and host affinity) has been added to the SOCKS gateways in the Configuration > Forwarding tab. In addition, some changes were made to the forwarding group structure to match the new SOCKS gateway groups. Note: The retention of deprecated CLI and installable list commands and command options ensures that older configurations continue to work after an upgrade. The upgrade introduces new capabilities without removing older ones. The new load balancing and host affinity capabilities in the forwarding and SOCKS gateways are disabled by default after an upgrade. The other setting for host affinity will be none in all cases. Changes to Forwarding and SOCKS Gateways On upgrade, the forwarding and SOCKS gateway configurations are updated to match the new forwarding/SOCKS behavior. ❐ Empty groups are allowed, can be created, and are not automatically deleted. ❐ Hosts can become members of more than one group. ❐ Load balancing and host affinity commands have been changed. ❐ Many CLI commands have been deprecated in favor of commands that better reflect the new functionality. ❐ Directives have been changed to match the new CLI. After an upgrade, SOCKS gateway group names may be used in the socks_gateway policy. The introduction of new forwarding host or group names or new SOCKS gateway or group names into policy can cause problems when downgrading as the policy might not compile. 65 Blue Coat SGOS 5.4.x Upgrade/Downgrade Feature Change Reference In SGOS 5.2 and later, when you create a forwarding alias, a socks gateway, or a health check through the CLI or the Management Console, you can use any printable character in the name except for back quotes (`), colons (:), double quotes ("), and spaces. Use of non-ASCII characters are legal. On an upgrade, previously created alias names are transformed into legal alias names, using the following mappings: ❐ ` becomes ' ❐ : becomes % ❐ " becomes = ❐ space becomes _ For example, if you used a string such as http://example.com as a forwarding alias, the alias is transformed to http%//example.com after upgrade. If your VPM policy references a forwarding alias or socks gateway alias that contains one of the four illegal characters, a warning message will display when you attempt to install VPM policy after the upgrade. To fix the problem, edit each forwarding and SOCKS gateway object to delete the old, invalid alias name and replace it with the modified alias name. If you created custom CPL code and this code contains a <Forward> layer that references forwarding or socks gateway aliases, edit the CPL code, replacing the old, invalid alias name with the modified alias name. On downgrade, the system reverts to the configuration that existed prior to the upgrade. Any changes to the configuration are lost on downgrade. Related Documentation Volume 5: Advanced Networking Health Checks Impact: 4.3.x Upgrades Starting in 5.2, health checks are now automatically created and deleted for forwarding hosts and groups, SOCKS gateways and groups, ICAP servers and service groups, Websense off-box servers and service groups, and DRTR. You can create additional health checks for any target host or create composite health checks that merge the results of other health checks. All health checks are now individually configurable. Policy conditions allow the state of any health check to be used in policy. Health checks are subject to forwarding and SOCKS gateway policy when appropriate. SSL certificate policy affects certain types of health checks. Changes ❐ 66 Health checks for the ICAP and Websense off-box services are no longer optional, but are automatically created and deleted as the service is created and deleted. You cannot create health checks for these services. Chapter 3: Feature-Specific Upgrade Behavior ❐ Health check names have changed, with each health check type having a different prefix. ❐ External services and external service group names are now limited to 64 characters each. If an old name exceeds 64 characters, the service or service group continues to function normally but no corresponding health check is created. ❐ Although health checks were used for DRTR in previous releases, they were hidden. The DNS resolution for DRTR is checked according to the site's timeto-live value. ❐ Health checks have vastly changed functionality so CLI commands in previous versions do not work, and there is no backward compatibility. See "Deprecated CLI" on page 68 for more information. Upgrade Behavior After an upgrade, examine the new health checks and the configuration and ensure that the health checks are properly configured and succeeding. Check that the results of the upgrade are satisfactory. Note that any health check can be disabled if necessary. ❐ Forwarding hosts and SOCKS gateways have health checks created that are based on the previous global health check configuration settings. New health checks are created for any forwarding groups that previously existed. ❐ ICAP and Websense off-box services that had health checks before the upgrade have health checks created that are based on the previous settings for that health check. ❐ New health checks are created on upgrade for any ICAP or Websense off-box service groups. ❐ User-defined health checks from previous versions are converted to the new user-defined health checks on upgrade. In SGOS 5.2 and higher, when you create a health check through the CLI or the Management Console, you can use any printable character in the name except for back quotes (`), colon (:), double quotes ("), and spaces. Note that non-ASCII characters are legal. On an upgrade from SGOS 4.2.x, previously created alias names are transformed into legal alias names, using the following mappings: ❐ ` becomes ' ❐ : becomes % ❐ " becomes = ❐ space becomes _ For example, if you used a string such as http://example.com as a forwarding alias, the alias is transformed to http%//example.com after upgrading from 4.2.x to 5.2/5.3. 67 Blue Coat SGOS 5.4.x Upgrade/Downgrade Feature Change Reference If the SGOS 4.2.x VPM policy references a forwarding alias or socks gateway alias that contains one of the four illegal characters, you will see warning messages the next time you try to install VPM policy after the upgrade. To fix the problem, edit each forwarding and SOCKS gateway object to delete the old, invalid alias name and replace it with the transformed alias name. If you created custom CPL code and this code contains a <Forward> layer that references forwarding or socks gateway aliases, edit the CPL code, replacing the old, invalid alias name with the transformed alias name. Downgrade Behavior ❐ The system reverts to the configuration that existed prior to this upgrade. Any changes to the configuration are lost on downgrade. ❐ Policy that contains new health check types does not compile. Policy New policy conditions include: ❐ is_healthy.alias = yes | no ❐ health_check = yes | no | alias Deprecated CLI SGOS#(config health-check) forwarding SGOS#(config health-check) socks-gateways New CLI SGOS#(config health-check) copy source-alias target-alias SGOS#(config health-check) create {composite alias_name | http alias_name url | https alias_name url | icmp alias_name hostname| ssl alias_name hostname [port]| tcp alias_name hostname [port]} SGOS#(config health-check) default e-mail {healthy {enable |disable} | report-all-ips {enable | disable} | sick {enable | disable}} SGOS#(config health-check) default event-log {healthy {enable |disable} | report-all-ips {enable | disable} | sick {enable | disable}} SGOS#(config health-check) default failure-trigger {none | count} SGOS#(config health-check) default interval {healthy seconds| sick seconds} SGOS#(config health-check) default snmp {healthy {enable |disable} | report-all-ips {enable | disable} | sick {enable | disable}} SGOS#(config health-check) default threshold {healthy count | response-time milliseconds | sick count} SGOS#(config health-check) delete alias_name SGOS#(config health-check) disable {healthy alias_name | sick alias_name} SGOS#(config health-check) edit composite_health_check SGOS#(config health-check) edit health_check_type SGOS#(config health-check) enable alias_name SGOS#(config health-check) exit 68 Chapter 3: Feature-Specific Upgrade Behavior SGOS#(config health-check) perform-health-check alias_name SGOS#(config health-check) view {configuration | quick-statistics | statistics} HTTP Proxy Impact: Downgrades Beginning in SGOS 5.4.3.7, the max-cache-size value is stored in 64-bits and this field supports a value of up to 8448MB (8.25GB). In earlier SGOS versions the value was stored in 32 bits and the maximum supported value was 2047MB (2GB approx.). Because the value is now stored in 64-bits, when you downgrade from SGOS 5.4.3.7 to an earlier SGOS version that stores this value in the 32-bit format, the max-cache size value is reset to the default value of 1024MB. This option can be configured using the Do not cache objects larger than [ ] megabytes in the Configuration > Proxy Settings > HTTP Proxy > Policies tab or using the ProxySG CLI. Policy/VPM The changes discusses changes to Policy and the Visual Policy Manager (VPM): ❐ ❐ ❐ ❐ ❐ ❐ ❐ ❐ "QoS" on page 69 "Revocation Checks on Certificates" on page 70 "Content-Type Matching" on page 71 "File Extension Objects" on page 71 "SSL Forward Proxy Object Renamed" on page 71 "Proxy Forwarding" on page 72 "Authentication" on page 72 "New User Login Address Object" on page 72 QoS Impact: 4.3.x Upgrades Beginning with SGOS 5.1, the ProxySG appliance supports Quality of Service (QoS) detection, which is becoming a more prevalent control point for network layer traffic. Previously, the QoS information was lost or not detected when the ProxySG terminated the client connection and issued a new connection to the server. QoS support allows you to create policy to examine the Type of Service (ToS) fields in the IP header to determine the QoS of the bits. Policy matches are based on Differentiated Services Code Point (DSCP) values, which network devices use to identify traffic to be handled with higher or lower priority. In SGOS 5.2.x, the following VPM objects and CPL gestures were added to support QoS: 69 Blue Coat SGOS 5.4.x Upgrade/Downgrade Feature Change Reference server.connection.dscp= client.connection.dscp= server.connection.dscp( ) client.connection.dscp( ) adn.connection.dscp( ) The following objects have been added to VPM to support QoS: ❐ Client Connection DSCP Trigger ❐ Server Connection DSCP Trigger ❐ Set Client Connection DSCP (Action) ❐ Set Server Connection DSCP (Action) ❐ Set ADN Connection DSCP (Source) (Destination) (Action) Related Documentation ❐ ADN and DSCP: "DSCP" on page 26 ❐ Volume 6: The Visual Policy Manager and Advanced Policy Revocation Checks on Certificates Impact: 4.3.x, 5.2.x Upgrades In addition to the “no revocation” and “revocation check” actions available in previous versions, SGOS 5.3 adds two new actions on the client/server certificate validation object in the VPM: Use only OCSP revocation check (checks the certificate through Online Certificate Status Protocol) and Use OCSP revocation check if available otherwise use local (checks the certificate through OCSP if available, otherwise checks it against a locally installed revocation list). When upgrading the VPM to 5.3 or later: ❐ Do not check certificate revocation ❐ Also check certificate revocation gets available otherwise use local action. remains unchanged. converted to the Use OCSP revocation check if When downgrading the 5.3 or later VPM to earlier versions: 70 ❐ Do not check certificate revocation ❐ Use only local certificate revocation check” revocation. remains unchanged. converts to Also check certificate Chapter 3: Feature-Specific Upgrade Behavior ❐ Use OCSP revocation check if available otherwise use local” certificate revocation. converts to Also check ❐ Use only OCSP revocation check converts to Do not check certificate revocation since earlier releases didn’t offer OCSP. Related Documentation Volume 6: The Visual Policy Manager and Advanced Policy, Chapter 3 Content-Type Matching Impact: 4.3.x, 5.2.x Upgrades Starting in SGOS 5.3, the policy when using HTTP MIME Type objects specifies an exact match on content type. The generated CPL code for this is: response.header.Content-Type=”application/x-sh( |\t)*($|;)” In earlier versions, there wasn’t a straightforward way to specify an exact match on content type for HTTP MIME Type objects in the VPM. For example, blocking on content-type “application/x-sh” would block “application-x-shar” and “application/x-shockwave.” The CPL code for this was: response.header.Content-Type=”application/x-sh”. After upgrading to 5.3, the policy will be unaffected unless it is modified with the Install Policy button in the VPM; in this case, it will automatically be updated to the new format (which performs an exact match on content type). When downgrading from 5.3, the next time policy is installed in VPM, the generated CPL will revert to the old format (which does a wildcard type of match). File Extension Objects Impact: All Upgrades Except 5.3.2 Support for the following file extensions has been added in the Destination column of the Web Content Layer and Web Access Layer. • .xlb — Excel Worksheet (Microsoft) • .xld — Excel Dialog (Microsoft) • .xll — Excel Add-in (Microsoft) • .xlk — Excel Backup (Microsoft) • .dif — Data Interchange Format SSL Forward Proxy Object Renamed Impact: 4.3.x Upgrades In SGOS 5.2.2, the Add SSL Forward Proxy object is renamed to Enable HTTPS Interception to better reflect the object’ s function. In addition, the HTTPS Interception on Exception object is used to intercept SSL traffic if there is an exception, such as a certificate error or policy denial. This differs from the HTTPS Intercept object, which intercepts all HTTPS traffic. 71 Blue Coat SGOS 5.4.x Upgrade/Downgrade Feature Change Reference Proxy Forwarding Impact: 5.2.x and 5.3.x Upgrades (MACH5 Edition license only) If you are upgrading from a 5.x version earlier than 5.2.4.8 or 5.3.x earlier than 5.3.2.1. This section is relevant to you. The MACH5 Edition license supports Proxy Forwarding. You can configure forwarding hosts and forwarding groups and apply related policy using the VPM. The CLI commands for proxy forwarding are also available. The Statistics > Health Checks tab displays the automatically created health checks for the forwarding hosts and groups. Note: Upgrading from 4.x to 5.x MACH 5 edition license is not possible. Before downgrading from 5.4 to a version of SG 5.2.x before 5.2.4.8 or a version of SG 5.3 before 5.3.2.1 all forwarding configuration and policy should be manually disabled. Downgrade from MACH5 edition to SG 4.x is not permitted. Authentication Impact: All Upgrades Addition of a VPM action in the pre-created object list under Web Authentication Layer is Do not Authenticate (Forward Credentials) whereby credentials will be forwarded to upstream proxies instead of being authenticated on the ProxySG. The CPL action for this command maps to authenticate (no, upstream_authentication). This action disables authentication on the proxy for the matching transaction, but allows any existing credentials in the request to be sent upstream. Use of this action is limited to proxy-chaining configurations where the upstream proxy is authenticating the user. Alternatively, the Do not Authenticate action disables authentication on the proxy for the matching transaction and blocks existing credentials in the request from being sent upstream. Related Documentation Volume 6: The Visual Policy Manager and Advanced Policy New User Login Address Object Impact: 4.3.x Upgrades Starting in SGOS 5.2, a new subnet mask field allows you to specify a subnet of addresses to match in addition to single IP addresses. This lets you match against all machines on a particular subnet, rather than specific individual machines. On an upgrade, existing User Login Address objects are treated as if no subnet mask was specified. User Login Address objects created with a subnet mask are not supported if the ProxySG is downgraded to a previous release without this functionality. Related Documentation Volume 6: The Visual Policy Manager and Advanced Policy 72 Chapter 3: Feature-Specific Upgrade Behavior Statistics Impact: 4.3.x Upgrades ❐ Persistent bandwidth statistics are not preserved on upgrade from SGOS 4.3.x. These statistics are now computed differently. ❐ Persistent statistics are kept differently in SGOS 5.x and SGOS 4.3.x. Statistics are imported on first upgrade. After that, SGOS 5.x statistics show gaps when SGOS 4.3.x is running and vice versa. Related Documentation Volume 9: Managing the Blue Coat ProxySG Appliance Upgrade Impact: 4.3.x, 5.2.x Upgrades Beginning with SGOS 5.3, Blue coat offers the option of using signed system images when upgrading. This option can be selected in the Maintenance > Upgrade tab. A signed system image is one that is cryptographically signed with a key known only to Blue Coat, and the signature is verified when the image is downloaded to the system. Blue Coat is currently providing signed and unsigned images for SGOS releases 5.3 and later. At some point, only signed images will be offered. When upgrading from a pre-5.3 version, you will need to upgrade to an unsigned version of 5.3 before upgrading to a signed version of a later release. Related Documentation Volume 9: Managing the Blue Coat ProxySG Appliance 73 Blue Coat SGOS 5.4.x Upgrade/Downgrade Feature Change Reference 74 Chapter 4: FIPS Upgrade Information This chapter covers information pertaining to Federal Information Processing Standards (FIPS) implementations. It covers upgrade/downgrade issues related to FIPS mode. Topics in this Chapter The following topics are discussed in this chapter: ❐ "Configuration Files" on page 75 ❐ "Signed Archive Configurations" on page 75 ❐ "DRTR Connections" on page 76 ❐ "SSL" on page 76 Note: The information in this chapter is applicable to all 4.x, 5.1 and 5.2 upgrades. Configuration Files FIPS mode devices will not accept old configuration files (unless they are manually pasted through the CLI). Signed Archive Configurations On an upgrade to SGOS 5.4 in non-FIPS mode, the new archive configuration options will be available, but will be disabled by default. On entry to FIPS mode, unsigned configuration archives will be disabled. You will need to create/select the appropriate keyrings and CCLs for signing and verifying the archive. When downgrading to a pre-5.3 version, the signed archive configuration will be disabled. The system will default to the original archive format. If a protocol other than TFTP or FTP was configured for archiving the configuration, the protocol will default to FTP. Signed configurations cannot be directly loaded by the downgraded system. However, it would be possible to extract the configuration.txt file from the signed archive and attempt to load that configuration. Related Documentation Volume 1: Getting Started, Chapter 5 75 Blue Coat SGOS 5.4.x Upgrade/Downgrade Feature Change Reference DRTR Connections When upgrading, secure DRTR connections are disabled in non-FIPS mode devices. If the device is put into FIPS mode, secure connections will be enabled and cannot be disabled. If the device is then downgraded to a pre-5.3 version, it will use unsecured DRTR connections. Related Documentation Volume 7: Managing Content, Chapter 2 SSL In SGOS 5.3 and later, the following applications are subject to FIPS compliance: ❐ Authentication realms that use SSL with the authentication servers ❐ URL database downloads over SSL ❐ Image downloads over SSL ❐ Secure heartbeats ❐ Secure access log uploads Upon upgrading, the above applications will use the SSL device profile instead of the SSL client. After entering the FIPS mode of operation, the “default” SSL device profile will be created as FIPS compliant and will thus allow only FIPS-compliant SSL versions, ciphers, and so forth. Related Documentation ❐ 76 FIPS documentation