Hello,
we use a squid proxy with a large cache and active-directory authentication for the internal lan. the utm 9-312.8 is used as upstream proxy for HTTP/HTTPS AV-Scanning. all other web-filter features are disabled (caching, logging, blocking...). The UTM is configured as cache_peer in squid config and everything works just fine. security is a concern in our company and so i need to know if there is a way to block the "via" and "x-forwarded-for" headers within the UTM? i know, if i use the UTM as primary proxy (without squid) the headers are already blocked, but not in an upstream scenario. i tried blocking the headers in squid-config, which works, but breaks various things related to the upstream scenario (some sites just not working as expected. same sites work when i use UTM proxy only, or squid and UTM without blocking the header). i would just like to delete the headers after squid reaches for the parent-proxy and before reaching the internet (at UTM level). maybe just an edit in the web-filter config file? is that possible?
Thank you very much
This thread was automatically locked due to age.