NOTE: Proxy computers cannot download patches or updates through the Panda Patch Management module. Only computers with direct access to the Panda Security cloud or with indirect access through a corporate proxy can download patches.
Proxy computers can serve a variable number of devices, depending on the hardware resources installed. As a general rule, a proxy computer can serve a maximum of 100 computers.
Requirements for designating a computer as a proxy
- Windows operating system and Panda Adaptive Defense 360 product installed.
- Support for the 8.3 filename format. For more information on file name requirements, see this MSDN article.
- TCP port 3128 must not be in use by other applications.
- Port 3128 open for inbound and outbound connections.
- The proxy computer name must be resolved from the computer that uses it. For further information, see Internet connections through proxy in products based on Aether article.
Configuring a computer as a proxy server
- Click the Network settings tab. Select an existing Proxy and language settings profile or create a new one.
- Expand the Proxy section and select Adaptive Defense 360 proxy.
- Click Select computer...
- In the computer selection window, click Add proxy server. A list will be displayed with all managed computers that haven't been designated as proxy server yet.
- Select the computers that will act as a proxy server for all other workstations and servers protected by Adaptive Defense 360.
NOTE: For Linux, it is not possible to add more than one machine as proxy, therefore, there is no fallback mechanism in place.
- Click the Network settings tab. Select an existing Proxy and language settings profile or create a new one.
- Expand the Proxy section and select Adaptive Defense 360 proxy.
- Click Select
computer.. - Click the icon of the computer that you want to stop acting as a proxy.
When a Panda agent cannot connect to the Aether platform, in Windows, the following fallback logic is applied to restore the connection via other means:
- If the Internet connection is configured via corporate proxy or Panda Adaptive Defense 360 proxy and there is no response, an attempt is made to connect directly.
- Internet Explorer: The Panda agent tries to recover the Internet Explorer proxy settings with the profile of the user logged in to the computer.
- If the configuration of the proxy credentials is defined explicitly, this method can?t be used.
- If the Internet Explorer proxy settings use PAC (Proxy Auto-Config) the URL is obtained from the settings file, provided that the protocol is HTTP or HTTPS.
- WinHTTP / WinInet: The default proxy settings are read.
- WPAD (Web Proxy Auto-discovery Protocol): A request is sent to the network via DNS or DHCP to get the URL that points to the PAC settings file.