SWSA ((SECURING WEB WITH CISCO WEB SECURITY APPLIANCE)) 2.1
|
|
|
- Imogene Fleming
- 9 years ago
- Views:
Transcription
1 SWSA ((SECURING WEB WITH CISCO WEB SECURITY APPLIANCE)) 2.1 Objetivo Securing Web with Cisco Web Security Appliance (SWSA) é um curso com carga horário de dois dias, que proporciona aos alunos os conhecimentos necessários para instalar, configurar, gerenciar e realizar atividades de suporte ao produto. É curso desenvolvido para capacitação operacional do produto, aliando apresentação do conteúdo teórico, sempre reforçado e associado pela realização de atividades práticas associadas. Após completar este treinamento o aluno estará apto à: Descrevendo o Cisco WSA; Instalação do Cisco WSA; Administrar o Cisco WSA; Implantar serviço de Proxy utilizando o WSA; Utilizar processo de autenticação com o WSA; Utilizar serviço de uso responsável ( Enforce Acceptable Use ); Proteção com ameaças do tipo Malware ; Configuração para segurança de dados; Descrever o serviço Cisco Cloud Web Security; Utilização do Cisco Anyconnect secure Mobility Client; Realizar atividades administrativas e de suporte ao WSA. Público Alvo O público primário inclui os indivíduos os profissionais que demandam conhecimentos para instalar, operar, prestar suporte e otimizar o produto Cisco WSA. Pré-Requisitos Para maior aproveitamento é recomendado que o aluno possua conhecimentos fundamentais no protocolo TCP/IP, incluindo DNS, SSH, FTP, SNMP, HTTP e HTTPS e experiência com roteamento IP. Carga Horária 16 horas (2 dias). Conteúdo Programático Course Introduction Overview Course Goal and Objectives Course Flow Additional References Your Training Curriculum Module 1: Reviewing the System Customer Use Cases
2 Enforcing Acceptable Use Acceptable Usage Policies Malware Detection and Protection Mobile Users Bypassing Corporate Controls AnyConnect Secure Mobility Client Cisco Web Security Appliance Models and Architecture Cisco Web Security Appliance Models Architecture Overview AsyncOS Overview Proxy Service Overview Integrated L4TM Cisco Cloud Web Security Provides SaaS Delivery of Security Management Tools Splunk Application for Cisco Web Security Appliance Module 2: Installing and Verifying the Cisco Web Security Appliance Review the Cisco Security Management Appliance The Cisco Security Management Appliance Features and Benefits of the Cisco Security Management Appliance Centralized Reporting and Configuration Management Model Specifications Cisco Security Management Appliance Deployment Install and Verify Cisco Web Security Appliance Hardware Installing and Cabling Cisco Web Security Appliance Hardware Sample Interface Deployments Connecting to the Cisco Web Security Appliance for the First Time Install and Verify the Cisco Web Security Virtual Appliance for VMware Preparing for the Cisco Web Security Virtual Appliance Installation on VMware Deploying the Cisco Web Security Appliance OVF Template Additional VM Settings Map Cisco Web Security Appliance VM Ports to Correct Networks Connecting to the Cisco Web Security Virtual Appliance for the First Time Run the System Setup Wizard Accessing the System Setup Wizard Running the System Setup Wizard Reconnecting to the Cisco Web Security Appliance Configure L4TM Enable L4TM Module 3: Configuring Virtual Web Security Appliance Connector to Cisco Cloud Web Security Review Cisco Cloud Web Security
3 Cisco Cloud Web Security Supported and Unsupported Functionality Features Connect to Cisco Cloud Web Security Using the Cloud Web Security Connector Configuring the Cloud Connector Cloud Web Security Connector Option Network Interfaces and Wiring Routes for Management and Data Traffic Configure Transparent Connection Settings Directory Group Policies in the Cloud Cloud Connector Logs Module 4: Deploying Proxy Services Contrast Proxy Modes Objective: Contrast proxy modes This lesson includes these topics: Explicit Forward Mode vs. Transparent Mode Explicit Forward Mode Configuration Transparent Mode Traffic Redirection Web Cache Control Protocol WCCP Upstream Flow WCCP Downstream Flow Proxy Bypass Defining Cisco WSA WCCP Service Group Enabling Cisco WSA Transparent Redirection Enabling WCCP Redirection on a Cisco ASA Review PAC Files PAC File Troubleshooting PAC File Deployment Options PAC File Examples: Single and Failover PAC File Hosting Configure and Manage Proxy Services Configuring and Managing Proxy Caching Tune Caching Behavior for Safety or Performance The Proxy Settings GUI Page Customizing Error Notifications with EUN Pages EUN Localization Directories Deploy Native FTP Proxy FTP Proxy Supports Both Active and Passive Mode FTP Forward Mode vs. Transparent Mode FTP Proxy Configuration FTP Client Example: FileZilla Read Proxy Access Log and HTTP Headers
4 Cisco Web Security Appliance Access Log: Squid Component Squid Access Log Format Common Response Codes HTTP Headers Access Log Examples Customizing the Access Log MIME Types Utilizing Authentication Configure NTLM and Proxy Authentication Cisco Web Security Appliance Proxy Authentication Authentication Protocols and Proxy Modes Explicit Forward Mode Transparent Mode Reporting and Authentication Reauthentication FTP Proxy Authentication Identify Authentication Settings and Realms Global Authentication Settings Creating Realms and Realm Sequences Creating an NTLM Realm for Active Directory Joining a Cisco WSA to the Active Directory Domain Configuring an Identity to Require Transparent User Identification Describe LDAP Authentication and Authorization Creating LDAP Realms for Other Directories Defining How Users Are Stored Binding to the Directory LDAP Group Authorization Troubleshoot Joining Domains and Test Authentication Trouble Joining the Domain Common Errors When Joining the Domain Test Authentication: NTLM or LDAP Authentication Always Starts with an Access Log Error Module 6: Configuring Policies Configure Access Policies and Identities Access Policies Access Policy Groups Policy Trace Identities Authentication Other Policy Types
5 Configure Authentication Exemptions Configure Access Policy Membership Configure an Identity to Avoid Authentication Review Access Log Tags Access Log Decision Tags Reflect Policy Controls Access Log Examples ACL Decision Tags and Policy Groups Module 7: Enforcing Acceptable Use Enable URL Categories and Filters URL Filtering URL Category Solutions Configure Application Visibility and Control Web Usage Controls Dynamic Content Analysis Engine Configuring the URL Filtering Engine Describe SaaS Access Control Enforcing Time-Based Acceptable Use Policies URL Warning Page Use HTTPS Inspection HTTPS Inspection and Decryption Policies Active HTTPS Proxy ACL Tags for HTTPS Inspection Access Log Examples Configure HTTPS Proxy Settings Relevant Licenses Enabling the HTTPS Proxy Invalid Certificate Management for HTTPS Proxy HTTPS Inspection Pipeline HTTPS Inspection Policy Module 8: Enforcing Acceptable Use: Advanced Topics Configure Application Visibility and Control: Advanced Topics Web Application Visibility and Control Streaming Media Bandwidth Control Describe SaaS Access Control: Advanced Topics SaaS Access Control How SaaS Access Control Works Configure Web Usage Controls and URL Categories
6 Relevant Licenses Web Usage Control Engines Custom URL Categories Creating Time Ranges to Use in Policies Predefined URL Category Control Settings Custom URL Category Control Settings Enabling Safe Search and Site Content Ratings Configuring Application Visibility Controls Configuring Media Bandwidth Limits SaaS Access Control Configuration View Logging and Reporting ACL Tags Associated with URL Filtering Access Log Examples URL Categories Reports Client Web Activity Report Client Detail Report AVC Report Module 9: Defending Against Malware Describe and Configure WBRS WBRS Actions WBRS Parameters Cisco DVS Engine Webroot vs. McAfee or Sophos Describe and Configure Antimalware Scanning Outbound Malware Scanning Relevant Licenses WBRS Configuration Antimalware: Global Configuration Antimalware: Per-Policy Configuration Destination Settings Describe and Configure Advanced Malware Protection Cisco Advanced Malware Protection Cisco Advanced Malware Protection Integration: Decision Flow Cisco Advanced Malware Protection File Analysis Relevant Cisco Advanced Malware Protection Licensing Cisco Advanced Malware Protection Global Configuration Cisco Advanced Malware Protection Architecture Cisco Advanced Malware Protection Per-Policy Configuration Cisco Advanced Malware Protection Reporting Interpret ACL Tags Relevant to Antimalware ACL Tags for WBRS and Cisco DVS Access Log Entries
7 Access Log Examples WBRS Reports Antimalware Reports Client Malware Risk Reports Module 10: Configuring Data Security Configure Data Security Data Security Multiple Data Security Policies Data Security URL Filter Controls Data Security Reputation Filters Data Security Content Filters Configure DLP Data Loss Prevention Add an ICAP Server Create Multiple DLP Policies Requests Sent to External DLP Describe Access and Data Security Logs ACL Tags for Data Security Access and Data Security Logs Module 11: Describing Cisco Cloud Web Security Describe Cisco Cloud Web Security Features and Benefits Cisco Cloud Web Security Global Data Center Footprint Cloud Proxy IPv6 Readiness Explain Cisco Cloud Attach Model Cisco Cloud Attach Model Cisco Web Security Appliance Connector Cisco Web Security Appliance Connector Features Cisco Web Security Appliance Connector Definitions Managing the Web with Cisco Cloud Web Security URL Filtering Application Visibility and Control Web Intelligence Reporting Flexible Report Output (Grid) Flexible Report Output (Pie Chart) Time Analysis Trending User Audits Loss of Productivity Module 12: Using Cisco AnyConnect Secure Mobility Client
8 Describe Cisco AnyConnect Web Security Cisco AnyConnect Web Security Main Features Cisco AnyConnect Web Security VPN Client Integrate the Cisco AnyConnect Secure Mobility Client Configuration and Deployment of Cisco AnyConnect Web Security Creating the Profile Proxies Creating the Profile Exceptions Creating the Profile Preferences Creating the Profile Authentication Creating the Profile Advanced Dynamic Updates to Cisco AnyConnect Configuration Cisco AnyConnect GUI Cisco AnyConnect Web Security Messages Cisco AnyConnect Web Security Debugging Module 13: Performing Administration and Troubleshooting Describe Report Administration Reports for Delivery On-Demand Reports Report Archiving and Exporting Monitor the Cisco Web Security Appliance Comprehensive System Monitoring Tools System Capacity Report Log Subscriptions Alert Center Monitor the Cisco WSA with the CLI SNMP Configuration Configure W3C Logging W3C Logging W3C Logging Configuration Method 1 W3C Logging Configuration Method 2 Perform Other Administrative Tasks Restricting Administrative Access Creating Users Configuring File Management and Disaster Recovery Updates and Upgrades Upgrade Process Feature Keys Describe Hardware Redundancy Hardware RAID on All Models Redundant Power Supply on Higher Models
9 Troubleshoot the Cisco Web Security Appliance Troubleshooting with CLI Commands Authentication Troubleshooting Policy Trace Tool Open a Support Case Remote Access Packet Capture Tool Cisco Web Security Appliance Access Log Format Laboratórios Lab 1: Access the Cisco Remote Lab Lab 2: Installing and Verifying the Cisco Web Security Appliance Lab 3: Deploying Proxy Services Lab 4: Utilizing Authentication Lab 5: Configuring Cisco WSA Policies Lab 6: Enforcing Acceptable Use Lab 7: Enforcing Acceptable Use Advanced Topics Lab 8: Defending Against Malware Lab 9: Configuring Data Security Lab 10: Describing Cisco Cloud Web Security Lab 11: Performing Administration and Troubleshooting
SESA ((SECURING EMAIL WITH CISCO EMAIL SECURITY APPLIANCE PART 1 AND 2)) 2.0
SESA ((SECURING EMAIL WITH CISCO EMAIL SECURITY APPLIANCE PART 1 AND 2)) 2.0 Objetivo Securing Email with Cisco Email Security Appliance (SESA) é um curso com carga horário de três dias, que proporciona
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction
Cisco AnyConnect Secure Mobility Solution Guide
Cisco AnyConnect Secure Mobility Solution Guide This document contains the following information: Cisco AnyConnect Secure Mobility Overview, page 1 Understanding How AnyConnect Secure Mobility Works, page
Centralized Cloud Firewall. Ivan Ivanovic BUCC/AMRES Tbilisi, December 2013.
Centralized Cloud Firewall Ivan Ivanovic BUCC/AMRES Tbilisi, December 2013. AMRES NREN 172 institutions ~2200 km dark fiber links 22 cities 3 cross border optical links Redundant Geant internet links 1
SESA Securing Email with Cisco Email Security Appliance Parts 1 and 2
Course Overview Securing Email with Cisco Email Security Appliance (SESA) combines Parts 1 and 2 (SESA1, SESA2) into a single three day course. Students learn to use Cisco Email Security Appliances (ESA's)
Cisco Cloud Web Security
Data Sheet Today s highly connected and fast-moving world is filled with complex and sophisticated web security threats. Cisco delivers the strong protection, complete control, and investment value that
Web Security Deployment Guide
Web Security Deployment Guide Revision: H1CY11 The Purpose of This Guide This supplemental deployment guide introduces the Web Security solutions. It explains the requirements that were considered when
McAfee Firewall Enterprise System Administration Intel Security Education Services Administration Course
McAfee Firewall Enterprise System Administration Intel Security Education Services Administration Course The McAfee Firewall Enterprise System Administration course from McAfee University is a fast-paced,
QUICK START GUIDE. Cisco S170 Web Security Appliance. Web Security Appliance
1 0 0 0 1 1 QUICK START GUIDE Web Security Appliance Web Security Appliance Cisco S170 303417 Cisco S170 Web Security Appliance 1 Welcome 2 Before You Begin 3 Document Network Settings 4 Plan the Installation
FortiMail Email Filtering Course 221-v2.2 Course Overview
FortiMail Email Filtering Course 221-v2.2 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to design, configure,
Cisco Web Security Appliance
Data Sheet Cisco Web Security Appliance In our highly connected and increasingly mobile world, more complex and sophisticated threats require the right mix of security solutions. Cisco delivers security
Cyan Networks Secure Web vs. Websense Security Gateway Battle card
URL Filtering CYAN Secure Web Database - over 30 million web sites organized into 31 categories updated daily, periodically refreshing the data and removing expired domains Updates of the URL database
Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway
Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway Websense Support Webinar January 2010 web security data security email security
Cisco S380 and Cisco S680 Web Security Appliance
QUICK START GUIDE Cisco S380 and Cisco S680 Web Security Appliance 1 Welcome 2 Before You Begin 3 Document Network Settings 4 Plan the Installation 5 Install the Appliance in a Rack 6 Plug In the Appliance
Move over, TMG! Replacing TMG with Sophos UTM
Move over, TMG! Replacing TMG with Sophos UTM Christoph Litzbach, Pre-Sales Engineer NSG 39 Key Features of TMG HTTP Antivirus/spyware URL Filtering HTTPS forward inspection Web Caching Role based access
FortiMail Email Filtering. Course 221 - for FortiMail v4.0. Course Overview
FortiMail Email Filtering Course 221 - for FortiMail v4.0 Course Overview FortiMail Email Filtering is a 3-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed
FortiMail Email Filtering Course 221-v2.0. Course Overview. Course Objectives
FortiMail Email Filtering Course 221-v2.0 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to configure,
User Identification and Authentication
User Identification and Authentication Vital Security 9.2 Copyright Copyright 1996-2008. Finjan Software Inc.and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included
Third Party Integration
APPENDIXG This appendix contains the following sections: Overview, page G-1 BlackBerry Enterprise Server, page G-1 Blue Coat, page G-2 Check Point, page G-3 Firebox, page G-4 ISA Server/Forefront TMG,
McAfee Network Security Platform Administration Course
McAfee Network Security Platform Administration Course Intel Security Education Services Administration Course The McAfee Network Security Platform Administration course from McAfee Education Services
642 523 Securing Networks with PIX and ASA
642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall
Cisco ASA 5500 Series Adaptive Security Appliance 8.2 Software Release
Cisco ASA 5500 Series Adaptive Security Appliance 8.2 Software Release PB526545 Cisco ASA Software Release 8.2 offers a wealth of features that help organizations protect their networks against new threats
2. Are explicit proxy connections also affected by the ARM config?
Achieving rapid success with WCCP and Web Security Gateway October 2011 Webinar Q/A 1. What if you are already using WCCP for Cisco waas on the same routers that you need to use WCCP for websense? Using
Websense Web Security Gateway: What to do when a Web site does not load as expected
Websense Web Security Gateway: What to do when a Web site does not load as expected Websense Support Webinar November 2011 web security data security email security Support Webinars 2009 Websense, Inc.
WAN Optimization, Web Cache, Explicit Proxy, and WCCP. FortiOS Handbook v3 for FortiOS 4.0 MR3
WAN Optimization, Web Cache, Explicit Proxy, and WCCP FortiOS Handbook v3 for FortiOS 4.0 MR3 FortiOS Handbook WAN Optimization, Web Cache, Explicit Proxy, and WCCP v3 13 January 2012 01-433-96996-20120113
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
CNS-208 Citrix NetScaler 10 Essentials for ACE Migration
KURSBESCHREIBUNG CNS-208 Citrix NetScaler 10 Essentials for ACE Migration The objective of the Citrix NetScaler 10 Essentials for ACE Migration course is to provide the foundational concepts and advanced
Implementing Cisco IOS Network Security
Implementing Cisco IOS Network Security IINS v3.0; 5 Days, Instructor-led Course Description Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles
Designing a Windows Server 2008 Applications Infrastructure
Designing a Windows Server 2008 Applications Infrastructure Course Number: 6437A Course Length: 3 Days Course Overview This three day course will prepare IT professionals for the role of Enterprise Administrator.
FortiMail Email Filtering. Course 221 (for FortiMail v5.0) Course Overview
FortiMail Email Filtering Course 221 (for FortiMail v5.0) Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed
M2273-Updating Your Database Administration Skills to Microsoft SQL Server 2005
M2273-Updating Your Database Administration Skills to Microsoft SQL Server 2005 Este é um curso de 35 horas queirá dotar os participantes com know-how necessário para efectuar um upgrade de conhecimentos
IINS Implementing Cisco Network Security 3.0 (IINS)
IINS Implementing Cisco Network Security 3.0 (IINS) COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions
CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions The objective of Implementing Citrix NetScaler 10.5 for App and Desktop Solutions is to provide the foundational concepts and skills
Implementing Core Cisco ASA Security (SASAC)
1800 ULEARN (853 276) www.ddls.com.au Implementing Core Cisco ASA Security (SASAC) Length 5 days Price $6215.00 (inc GST) Overview Cisco ASA Core covers the Cisco ASA 9.0 / 9.1 core firewall and VPN features.
FortiOS Handbook WAN Optimization, Web Cache, Explicit Proxy, and WCCP for FortiOS 5.0
FortiOS Handbook WAN Optimization, Web Cache, Explicit Proxy, and WCCP for FortiOS 5.0 FortiOS Handbook WAN Optimization, Web Cache, Explicit Proxy, and WCCP for FortiOS 5.0 June 10, 2014 01-500-96996-20140610
FortiMail Email Filtering. Course 221 (for FortiMail v4.2) Course Overview
FortiMail Email Filtering Course 221 (for FortiMail v4.2) Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed
ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0
ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0 Module 1: Vulnerabilities, Threats, and Attacks 1.1 Introduction to Network Security
Cisco IronPort AsyncOS 7.9 for Security Management User Guide
Cisco IronPort AsyncOS 7.9 for Security Management User Guide April 2, 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000
LEARNING SOLUTIONS website milner.com/learning email [email protected] phone 800 875 5042
Course 6451B: Planning, Deploying and Managing Microsoft System Center Configuration Manager 2007 Length: 3 Days Published: June 29, 2012 Language(s): English Audience(s): IT Professionals Level: 300 Technology:
Cisco Certified Security Professional (CCSP)
529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Security Professional (CCSP) Program Summary This instructor- led program with a combination
Use Cases for ASA CX
The following topics explain some common tasks you might want to accomplish with ASA CX. How to Set Up ASA CX in Transparent Mode, page 1 Managing High Availability, page 4 How to Gain Insight Into Your
Direct or Transparent Proxy?
Direct or Transparent Proxy? Choose the right configuration for your gateway. Table of Contents Direct Proxy...3 Transparent Proxy...4 Other Considerations: Managing authentication made easier.....4 SSL
1Y0-250 Implementing Citrix NetScaler 10 for App and Desktop Solutions Practice Exam
1Y0-250 Implementing Citrix NetScaler 10 for App and Desktop Solutions Practice Exam Section 1: Assessing infrastructure needs for the NetScaler implementation 1.1 Task Description: Verify the objectives
McAfee Web Gateway 7.4.1
Release Notes Revision B McAfee Web Gateway 7.4.1 Contents About this release New features and enhancements Resolved issues Installation instructions Known issues Find product documentation About this
Configuration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
Lesson Plans Configuring Exchange Server 2007
Lesson Plans Configuring Exchange Server 2007 (Exam 70-236) Version 2.1 Table of Contents Course Overview... 2 Section 1.1: Server-based Messaging... 4 Section 1.2: Exchange Versions... 5 Section 1.3:
Cisco IronPort S-Series Web Security Appliances
Cisco IronPort S-Series Web Security Appliances The industry s best secure web gateway for acceptable use policy enforcement, malware protection, data security, and application visibility and control Introduction
Basic & Advanced Administration for Citrix NetScaler 9.2
Basic & Advanced Administration for Citrix NetScaler 9.2 Day One Introducing and deploying Citrix NetScaler Key - Brief Introduction to the NetScaler system Planning a NetScaler deployment Deployment scenarios
NETASQ MIGRATING FROM V8 TO V9
UTM Firewall version 9 NETASQ MIGRATING FROM V8 TO V9 Document version: 1.1 Reference: naentno_migration-v8-to-v9 INTRODUCTION 3 Upgrading on a production site... 3 Compatibility... 3 Requirements... 4
Cisco Security Manager 4.2: Integrated Security Management for Cisco Firewall, IPS, and VPN Solutions
Data Sheet Cisco Security Manager 4.2: Integrated Security Management for Cisco Firewall, IPS, and VPN Solutions Security Operations Challenges Businesses are facing daunting new challenges in security
CCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
SuperLumin Nemesis. Administration Guide. February 2011
SuperLumin Nemesis Administration Guide February 2011 SuperLumin Nemesis Legal Notices Information contained in this document is believed to be accurate and reliable. However, SuperLumin assumes no responsibility
CLEARSWIFT SECURE Web Gateway HTTPS/SSL decryption
CLEARSWIFT SECURE Web Gateway HTTPS/SSL decryption Introduction This Technical FAQ explains the functionality of the optional HTTPS/SSL scanning and inspection module available for the Web Gateway and
Web Appliance Configuration Guide
Web Appliance Configuration Guide Sophos TOC 3 Contents Copyrights and Trademarks...4 Introduction...4 Features...5 Network Deployment...6 Explicit Deployment...7 Transparent Deployment...9 Bridged Deployment...10
Websense Web Security Gateway: Integrating the Content Gateway component with Third Party Data Loss Prevention Applications
Websense Web Security Gateway: Integrating the Content Gateway component with Third Party Data Loss Prevention Applications November, 2010 2010 Websense, Inc. All rights reserved. Websense is a registered
Introducing Cisco Voice and Unified Communications Administration Volume 1
Introducing Cisco Voice and Unified Communications Administration Volume 1 Course Introduction Overview Learner Skills and Knowledge Course Goal and Course Flow Additional Cisco Glossary of Terms Your
Configuration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
Implementing Cisco Intrusion Prevention System 7.0 (IPS)
Implementing Cisco Intrusion Prevention System 7.0 (IPS) Course Overview: The Implementing Cisco Intrusion Prevention System (IPS) v7.0 course is a five-day course aims at providing network security engineers
Authentication on the Cisco IronPort Web Security Appliance
Cisco IronPort Web Security Appliance White Paper Authentication on the Cisco IronPort Web Security Appliance Executive Summary Table of Contents 1 Executive Summary 2 Introduction 2 Authentication Protocals
WatchGuard Training. Introduction to WatchGuard Dimension
WatchGuard Training Introduction to WatchGuard Dimension Introduction to WatchGuard Dimension What is WatchGuard Dimension? Deploy WatchGuard Dimension Configure WatchGuard Dimension Use WatchGuard Dimension
Securing Networks with Cisco Routers and Switches (642-637)
Securing Networks with Cisco Routers and Switches (642-637) Exam Description: The 642-637 Securing Networks with Cisco Routers and Switches exam is the exam associated with the CCSP, CCNP Security, and
Virtual Web Appliance Setup Guide
Virtual Web Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance This guide describes the procedures for installing a Virtual Web Appliance. If you are installing
NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis
Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
Quick Start 4: Identifying and Troubleshooting proxy issues for Websense Web Security Gateway
Quick Start 4: Identifying and Troubleshooting proxy issues for Websense Web Security Gateway Websense Support Webinar March 2013 1 Presenter Greg Didier Title: Support Specialist Accomplishments: 9 years
Web Application Firewall
Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
Cisco ASA. Administrators
Cisco ASA for Accidental Administrators Version 1.1 Corrected Table of Contents i Contents PRELUDE CHAPTER 1: Understanding Firewall Fundamentals What Do Firewalls Do? 5 Types of Firewalls 6 Classification
Kerio Control. Administrator s Guide. Kerio Technologies
Kerio Control Administrator s Guide Kerio Technologies 2012 Kerio Technologies s.r.o. All Rights Reserved. This guide provides detailed description on configuration and administration of Kerio Control,
Configuration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
Configuring Windows Server 2008 Network Infrastructure
Configuring Windows Server 2008 Network Infrastructure Course Number: 70-642 Certification Exam This course is preparation for the Microsoft Technical Specialist (TS) exam, Exam 70-642: TS: Windows Server
Blue Coat Security First Steps Transparent Proxy Deployments
Transparent Proxy Deployments SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE,
1. Barracuda Web Filter - Overview... 3 1.1 What's New in the Barracuda Web Filter... 3 1.1.1 Release Notes... 7 1.2 Deployment Options... 8 1.2.
1. Barracuda Web Filter - Overview................................................................................ 3 1.1 What's New in the Barracuda Web Filter.....................................................................
Configuring Primary and Backup Proxy Servers for Standalone Content Engines
CHAPTER 14 Configuring Primary and Backup Proxy Servers for Standalone Content Engines This chapter describes how to configure primary and backup (failover) proxy servers for standalone Content Engines
CYAN Secure Web Microsoft ISA Server Deployment Guide
February 2010 Applies to: CYAN Secure Web 1.7.18 and above Table of Contents 1 Introduction...2 2 Prerequisites...3 3 Deployment scenarios...4 3.1 Variant 1: CYAN Secure Web is downstream proxy...4 3.2
המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון 79165 טל'- 08-6801535 פקס- 08-6801543 בשיתוף עם מכללת הנגב ע"ש ספיר
מודולות הלימוד של מייקרוסופט הקורס מחולק ל 4 מודולות כמפורט:.1Configuring Microsoft Windows Vista Client 70-620 Installing and upgrading Windows Vista Identify hardware requirements. Perform a clean installation.
Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture
Deploying Cisco ASA VPN Solutions Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and Course Flow Additional Cisco Glossary of Terms Your Training Curriculum Evaluation of the Cisco
Installing and Using the vnios Trial
Installing and Using the vnios Trial The vnios Trial is a software package designed for efficient evaluation of the Infoblox vnios appliance platform. Providing the complete suite of DNS, DHCP and IPAM
Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]
Cisco Cloud Web Security Cisco IT Methods Introduction Malicious scripts, or malware, are executable code added to webpages that execute when the user visits the site. Many of these seemingly harmless
MCSA Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring
MCSA Objectives Exam 70-236: TS:Exchange Server 2007, Configuring Installing and Configuring Microsoft Exchange Servers Prepare the infrastructure for Exchange installation. Prepare the servers for Exchange
McAfee Web Gateway 7.4.2
Release Notes Revision A McAfee Web Gateway 7.4.2 Contents About this release New features and enhancements Resolved issues Installation instructions Known issues Additional information Find product documentation
Filtering remote users with Websense remote filtering software v7.6
Filtering remote users with Websense remote filtering software v7.6 Websense Support Webinar April 2012 Websense 2012 Webinar Presenter Greg Didier Title: Support Specialist Accomplishments: 9 years supporting
Configuration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
February 2014. Considerations When Choosing a Secure Web Gateway
February 2014 Considerations When Choosing a Secure Web Gateway Introduction Evaluating a Secure Web Gateway (SWG) can be a complicated process and nothing is better than testing a solution in your own
Superior protection from Internet threats and control over unsafe web usage
datasheet Trend Micro interscan web security Superior protection from Internet threats and control over unsafe web usage Traditional secure web gateway solutions that rely on periodic updates to cyber
70-642 R4: Configuring Windows Server 2008 Network Infrastructure
70-642 R4: Configuring Windows Server 2008 Network Infrastructure Course Introduction Chapter 01 - Understanding and Configuring IP Lesson: Introducing the OSI Model Understanding the Network Layers OSI
"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary
Course Summary Description The objective of this course is to provide the foundational concepts and teach the skills necessary to implement, configure, secure and monitor a Citrix NetScaler system with
Endian Unified Threat Management
Endian Unified Threat Management Introduction/Demo to Endian UTM lmarzke Lee Marzke (4AERO.com) Infrastructure Consultant: Software Development organizations Specialize in SCM, Process, PM, Tools Just
Introduction to Mobile Access Gateway Installation
Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure
Barracuda Web Filter Administrator s Guide
Barracuda Web Filter Administrator s Guide Version 4.x Barracuda Networks Inc. 3175 S. WInchester Blvd Campbell, CA 95008 http://www.barracuda.com 1 Copyright Notice Copyright 2004-2010, Barracuda Networks
Next Generation Network Firewall
Next Generation Network Firewall Overview Next Generation Network Firewalls are an important part of protecting any organisation from Internet traffic. Next Generation Firewalls provide a central point
INTRODUCTION TO FIREWALL SECURITY
INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ
Network Agent Quick Start
Network Agent Quick Start Topic 50500 Network Agent Quick Start Updated 17-Sep-2013 Applies To: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere, v7.7 and 7.8 Websense
Websense Content Gateway v7.x: Troubleshooting
Websense Content Gateway v7.x: Troubleshooting Topic 60042 Content Gateway Troubleshooting Updated: 28-October-2013 Dropped HTTPS connections Websites that have difficulty transiting Content Gateway Low
McAfee Network Data Loss Prevention Administration Intel Security Education Services Administration Course
McAfee Network Data Loss Prevention Administration Intel Security Education Services Administration Course The McAfee Data Loss Prevention Administration course enables attendees to receive in-depth training
Deploying with Websense Content Gateway
Deploying with Websense Content Gateway Websense Content Gateway is a high-performance Web proxy that provides realtime content scanning and Web site classification to protect network computers from malicious
Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Virtual Managment Appliance Setup Guide
Virtual Managment Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance As an alternative to the hardware-based version of the Sophos Web Appliance, you can deploy
FortiGate Multi-Threat Security Systems I Administration, Content Inspection and SSL VPN Course #201
FortiGate Multi-Threat Security Systems I Administration, Content Inspection and SSL VPN Course #201 Course Overview Through this 2-day instructor-led classroom or online virtual training, participants
