Athena SWG (Secure Web Gateway)

Athena SWG (formerly Internet Access Gateway) ensures visibility and control across the network, detecting risks like unauthorized access, non-compliant activities, and data leaks to manage endpoints.
{{ $t('productDocDetail.guideClickSwitch') }}
{{ $t('productDocDetail.know') }}
{{ $t('productDocDetail.dontRemind') }}
13.0.120
{{sendMatomoQuery("Athena SWG (Secure Web Gateway)","Connect IAG to Endpoint Secure")}}

Connect IAG to Endpoint Secure

{{ $t('productDocDetail.updateTime') }}: 2025-12-29

Background

As enterprises invest more in endpoint security protection, different security policies need to be deployed to adapt to different security requirements. In conventional solutions, an independent client needs to be installed for each security product. Consequently, multiple clients need to be installed, which consumes a large amount of resources on endpoint PCs. Moreover, this may result in compatibility issues and management issues. To resolve these issues, an all-in-one (AIO) client solution that integrates access control policies for endpoints, networks, application workloads, data, communication, and user workloads is necessary.

Solution

Sangfor's all-in-one (AIO) client is a client that can integrate features of various Sangfor security products. It provides a unified system tray and supports features such as unified client installation and product feature integration. In addition, with Endpoint Secure Agents deployed across the endpoints, the AIO client can effectively guard against security threats such as viruses, Trojans, and intrusions in the entire network, which not only improves office efficiency but also secures the entire system.

Features

Unified client installation: Administrators can configure client integration rules to prevent repeated client installations. To be specific, users only need to perform one installation to successfully install all the required clients, such as Endpoint Secure Agent and IAG client. This saves administrator's workload in pushing client installation notifications, simplifies the client installation process, and enhances user installation experience.

Unified system tray: Users can be navigated to different product interfaces through the unified system tray. This reduces the number of client icons displayed on endpoints and enhances user experience.

Deployment Architecture

  1. The IAG device is deployed at the Internet egress in bridge mode and performs access control over intranet users.
  2. Endpoint Secure Manager whose IP address is 172.31.2.110 is deployed in the O&M zone. Users can download Endpoint Secure Agent from Endpoint Secure Manager for installation.

Product

Version

Remarks

Endpoint Secure

3.7.10

IAG

13.0.102

C:\Users\SXF-AD~1\AppData\Local\Temp\ksohtml64600\wps1.jpg

The connection port of the IAG device is TCP port 9998, whereas the connection ports of the aTrust device and Endpoint Secure Manager are both TCP port 443. If security devices such as firewalls are deployed in the intranet, the connection ports must be enabled.

Configuration of Device Connection Settings

Log into the Endpoint Secure Manager, go to System > System > Network > Advanced > Ports, and change the access port of Endpoint Secure Manager and the upgrade port of Endpoint Secure Agent as required.

Go to System > System > Network > Advanced > Manager IP Addresses to add the address for downloading Endpoint Secure Agent. If Endpoint Secure Manager has multiple IP addresses or is accessed by users through the Internet, add the download address of Endpoint Secure Agent and the public IP address of the frontend gateway.

C:\Users\SXF-AD~1\AppData\Local\Temp\ksohtml64600\wps2.jpg

The system generates the client download address based on the settings in Ports and Manager IP Addresses[zyl177][A178], and then delivers the generated address to endpoint users for client download and installation.

Step 8.Log in to the IAG console, go to Endpoint Mgt > Device Connection, and click Generate Connection Key. In the dialog box that appears, select IAG IP Address, specify Connected Device, and click Generate.

Step 9.Log in to the Endpoint Secure Manager, go to System > Integrated Devices > Devices, and click Add Device. In the dialog box that appears, paste the connection key generated in the foregoing step and click Next. Then, specify Local Device IP and click OK.[A179]

Step 10.After the configuration is completed, click Test Connectivity.

Step 11.Log in to the IAG console, and go to Endpoint Mgt > Device Connection to view that the IAG device is connected to Endpoint Secure.

C:\Users\SXF-AD~1\AppData\Local\Temp\ksohtml64600\wps4.jpg

Alternatively, the connection key can be generated in the Endpoint Secure Manager, and the IAG device identifies the connection key to connect to Endpoint Secure.

Configuration of a Device Connection Policy

Log in to the IAG console, go to Access Mgt > Endpoint Check > Check Rules > Ingress Client Based, click Add, and select Client Integration Rule. In the dialog box that appears, specify the rule name and type, enter a rule description, and select the device to be connected to. In this example, select Endpoint Secure.

Step 12.Go to Access Mgt > Endpoint Check > Check Policies and click Add. In the dialog box that appears, specify Name and Description as needed. On the Options tab, select Ingress Client Based and click Add to add the check rule created in the foregoing step. Then, click the Object tab and select the applicable users of this policy to associate the check rule with the users who need to install the AIO client.

Step 13.Enable the installation reminder. Specifically, go to Access Mgt > Endpoint Check > Ingress Client Settings. Under Installation Reminder, select Remind users to install Ingress Client.

C:\Users\SXF-AD~1\AppData\Local\Temp\ksohtml64600\wps5.jpg

After the installation reminder is enabled, a page indicating that the installation is ongoing will appear on the target endpoints. During the installation, network connections will be interrupted and can be recovered only after the installation is completed. Therefore, we recommend that you send notifications to endpoint users before the client installation reminder is enabled.

Step 14.(Optional) Log in to the Endpoint Secure Manager, go to System > System > General and select Download Ingress client and integrate it into Agent. Perform this step if you want to first install the Endpoint Secure Agent and then install the IAG client through device connection.

C:\Users\SXF-AD~1\AppData\Local\Temp\ksohtml64600\wps6.jpg

1.You can deselect Download Ingress client and integrate it into Agent if all users first install the IAG client and then install the Endpoint Secure Agent through device connection.

2.If the Endpoint Secure Agent is first installed, the installation reminder settings for installing the IAG client and aTrust client through device connection apply to all users rather than specific users.

Client Use

Client installation

Scenario 1

The user has never installed the IAG Ingress Client and Endpoint Secure Agent before.

Steps

  1. After IAG-based access control is enabled, users' access traffic flows through the IAG device. In this case, if a user has never installed the IAG Ingress Client and Endpoint Secure Agent before, the user will be redirected to the page to download the Ingress Client.

  1. After the Ingress Client is installed, you can view that the Ingress Client process is displayed in Task Manager even if the Ingress Client is disabled.

  1. After the user is associated with the device connection policy, the Endpoint Secure Agent will be downloaded and installed in the backend in silent mode. The installation package of Endpoint Secure Agent is large, and the installation process takes about 5 to 10 minutes in the intranet.

C:\Users\SXF-AD~1\AppData\Local\Temp\ksohtml64600\wps7.jpg

For the current version, you cannot view the installation progress when the Endpoint Secure Agent is being installed in the backend.

  1. After the Endpoint Secure Agent is installed, the system tray displays only the Endpoint Secure Agent if the user does not enable the Ingress Client.

  1. If the user has enabled the Ingress Client, the system tray displays the AIO client icon that integrates the Endpoint Secure Agent with the Ingress Client.

C:\Users\SXF-AD~1\AppData\Local\Temp\ksohtml64600\wps8.jpg

In the IAG-Endpoint Secure connection scenario, the system tray interface of the AIO client is based on that of the Endpoint Secure Agent.

Scenario 2

The user has installed the IAG Ingress Client and Endpoint Secure Agent of earlier versions that do not support the AIO client.

Steps

  1. Upgrade the IAG device and Endpoint Secure device to the version that supports the AIO client. For more information about how to upgrade the devices, see their corresponding upgrade guides.
  2. After the upgrade process is completed, the Ingress Client of IAG and the Endpoint Secure Agent will be upgraded in the backend in silent mode. You can view the client upgrade status in the Endpoint Secure Manager. After the clients are upgraded, their system icons will be merged into one icon, namely, the AIO client icon.

C:\Users\SXF-AD~1\AppData\Local\Temp\ksohtml64600\wps8.jpg

The upgrade package of the Endpoint Secure Agent is large, and the upgrade process takes about 5 to 10 minutes in the intranet. Wait patiently.

Scenario 3

The user has installed the IAG Ingress Client but not the Endpoint Secure Agent.

Steps

  1. If the IAG device is of a version that does not support the AIO client, the user needs to first upgrade the IAG device. Then, the user needs to deploy the Endpoint Secure device and complete device connection settings. For more information about how to configure device connection settings, see the “Configure Device Connection Settings” section above.
  2. After the IAG Ingress Client identifies and connects to the gateway, the Ingress Client starts the upgrade immediately in silent mode. After the upgrade is completed, the Endpoint Secure Agent starts to be installed in the backend in silent mode. Wait patiently for the installation process to complete.
  3. After the client installation and upgrade processes are completed, the client system trays of the two clients will be merged into one. The merging process is the same as those in Scenarios 1 and 2.

Scenario 4

The user has installed the Endpoint Secure Agent but not the IAG Ingress Client.

Steps

  1. If Endpoint Secure is of a version that does not support the AIO client, the user needs to first upgrade the Endpoint Secure Manager. Then, the user needs to deploy the IAG device and complete device connection settings. For more information about how to configure device connection settings, see the “Configure Device Connection Settings” section above.
  2. After the Endpoint Secure Manager is upgraded, the Endpoint Secure Agent will be automatically upgraded in silent mode. The upgrade process takes several minutes to complete, and wait patiently.
  1. If the Download Ingress client and integrate it into Agent check box is selected in the Endpoint Secure Manager, the IAG Ingress Client will be automatically installed in the backend in silent mode after the Endpoint Secure Agent is successfully upgraded.
  2. After the client installation and upgrade processes are completed, the client system trays of the two clients will be merged into one. The merging process is the same as those in Scenarios 1 and 2

Client Use

  1. After Endpoint Secure and IAG are connected, the system tray of the AIO client displays the  Authentication[zyl180][A181] button when IAG access control is enabled but the endpoint user has not completed IAG authentication.

  1. If the user has passed IAG authentication and is online, the information about the user is displayed in the system tray.

Client Logout

  1. You cannot log out of both the IAG Ingress Client and Endpoint Secure Agent at a time. To exit both clients, first right-click the system tray and select Exit[zyl182][A183]. In the dialog box that appears, enter the logout password for the Endpoint Secure Agent. Then, you can successfully log out of the Endpoint Secure Agent.

  1. After you log out of the Endpoint Secure Agent, the system tray of the AIO client changes to that of the IAG Ingress Client. To fully log out of the AIO client, you need to further log out of the IAG Ingress Client.

Client Uninstallation

The Endpoint Secure Agent and the IAG Ingress Client can be uninstalled independently.

Usage Notes

  1. AIO V3.0 supports only Windows. It does not support macOS, Linux, or Windows Server.

The following table describes the operating systems supported by Endpoint Secure and IAG.

Product

Windows XP

Windows 7

Windows 8

Windows 8.1

Windows 10

Windows 11

Endpoint Secure

Yes

Yes

Yes

Yes

Yes

Yes

IAG

No

Yes

Yes

Yes

Yes

Yes

  1. After a client is manually uninstalled, the information about the client will be retained in the registry. To re-install the uninstalled client, you must manually download and install the client again. You cannot re-install the uninstalled client through any AIO client. This is to prevent client installation reminders from being repeatedly pushed to endpoints. To re-install the uninstalled client through the AIO client, you must delete the register key HKEY_LOCAL_MACHINE\SOFTWARE.
  2. In active-active and active-standby modes in IAG, we recommend that you disable the AIO-based client installation feature in a high-availability cluster. This is because the nodes in the cluster share the same connection ID in these modes. If an error occurs on the active node, the other node takes over. Therefore, when the new active node requests to establish a mutually trusted connection to Endpoint Secure based on the management IP address of the new active node and the connection ID, the request will be rejected because the management IP address is changed.
  3. Endpoint Secure of Essential Edition does not support the AIO feature. Other editions such as Enterprise Edition and Full Edition for hosts and Ultimate Edition and Full Edition for servers all support the AIO feature. In addition, Endpoint Secure STA also supports the AIO feature, but STA does not support the unified system tray.