Updated 8 months ago by admin

Time & NTP

To configure time settings for your USS Gateway, click ConfigureSettingsTime & NTP.

The Time & NTP section allows you to set the local time of the USS Gateway server. This is important, especially if you intend to use Active Directory authentication.


The timezone that best describes the location of the USS Gateway server.

NTP server

To ensure the server clock is always up to date, we recommend you use NTP (Network Time Protocol). Enter your preferred NTP server here (hostname or IP address).

If you're unsure, just accept the default of

Set Time

If you wish to set the server time manually, check this option and enter the correct time.

Setting the time manually will override any other setting in this section.


To configure advanced settings for your USS Gateway, click ConfigureSettingsAdvanced.

These options should only be changed if you understand the effect. Changing options may cause the proxy server to restart. Please contact your Service Provider for further assistance.

Early Access: Enable proxy version (includes web socket support)

This option enables early access to a new version of the USS Gateway proxy which is based on squid5. This version is not yet available for general release but does include some important new features, such as Web Socket support and bug fixes such as the certificate altnames bypass issue.

Enable this option if you are comfortable testing or using pre-release software in a production environment. Enabling this option will cause the proxy service to restart.

If you intend to use this version for Web Socket support, you must also enable Allow HTTP protocol upgrade within the Gateway Configuration profile.

Reduce noise from background Web requests to increase performance and report visibility

Many modern websites, particularly Search Engines and Mapping sites, use lots of background web requests to suggest terms and locations. On a large network with many users, this can add up to a significant amount of extra processing and log entries, which provide little benefit. This options filters the out these types of request, which should increase performance and also reduce the noise visible in the Web Security reports.

Reuse the same key when using temporary/ephemeral Diffie-Hellman key exchanges

Creating a key for every new Diffie-Hellman handshake is the most secure method, but the key creation is CPU- and disk-intensive which creates additional overhead. On very large networks, this can cause gateway resources to be consumed very quickly. This option can be used to toggle the new key creation mode to suit your requirements.

Loadbalancer VIP

See Configuring USS Gateway to work with software load balancer

How did we do?