Proxy Configuration
The CipherTrust Manager allows you to set up HTTP proxy values through the Command Line Interface (CLI). CCKM uses this proxy for its outbound traffic to communicate with the external network.
Configuring Proxies
The following operations can be performed:
Add proxies
Get/list proxies
Delete proxies
Note
• If a proxy host is added using the proxy hostname, then IP mapping is required in the DNS.
• A system restart is required after adding a new proxy or changing proxy settings.
• For CCKM, configure an HTTPS proxy.
Adding Proxies
To add a proxy, run:
Syntax
Example Request 1
Example Response 1
Example Request 2
Example Response 2
Getting List of Proxies
To get a list of proxies, run:
Syntax
Example Request
Example Response
Deleting Proxies
To delete proxy configurations, run:
Syntax
Example Request
No response is displayed if the proxy is deleted successfully.