| Describing Cisco WSA |
| • Technology Use Case |
| • Cisco WSA Solution |
| • Cisco WSA Features |
| • Cisco WSA Architecture |
| • Proxy Service |
| • Integrated Layer 4 Traffic Monitor |
| • Data Loss Prevention |
| • Cisco Cognitive Intelligence |
| • Management Tools |
| • Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration |
| • Cisco Content Security Management Appliance (SMA) |
| |
| Deploying Proxy Services |
| • Explicit Forward Mode vs. Transparent Mode |
| • Transparent Mode Traffic Redirection |
| • Web Cache Control Protocol |
| • Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow |
| • Proxy Bypass |
| • Proxy Caching |
| • Proxy Auto-Config (PAC) Files |
| • FTP Proxy |
| • Socket Secure (SOCKS) Proxy |
| • Proxy Access Log and HTTP Headers |
| • Customizing Error Notifications with End User Notification (EUN) Pages |
| |
| Utilizing Authentication |
| • Authentication Protocols |
| • Authentication Realms |
| • Tracking User Credentials |
| • Explicit (Forward) and Transparent Proxy Mode |
| • Bypassing Authentication with Problematic Agents |
| • Reporting and Authentication |
| • Re-Authentication |
| • FTP Proxy Authentication |
| • Troubleshooting Joining Domains and Test Authentication |
| • Integration with Cisco Identity Services Engine (ISE) |
| |
| Creating Decryption Policies to Control HTTPS Traffic |
| • Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview |
| • Certificate Overview |
| • Overview of HTTPS Decryption Policies |
| • Activating HTTPS Proxy Function |
| • Access Control List (ACL) Tags for HTTPS Inspection |
| • Access Log Examples |
| |
| Understanding Differentiated Traffic Access Policies and Identification Profiles |
| • Overview of Access Policies |
| • Access Policy Groups |
| • Overview of Identification Profiles |
| • Identification Profiles and Authentication |
| • Access Policy and Identification Profiles Processing Order |
| • Other Policy Types |
| • Access Log Examples |
| • ACL Decision Tags and Policy Groups |
| • Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications |
| |
| Defending Against Malware |
| • Web Reputation Filters |
| • Anti-Malware Scanning |
| • Scanning Outbound Traffic |
| • Anti-Malware and Reputation in Policies |
| • File Reputation Filtering and File Analysis |
| • Cisco Advanced Malware Protection |
| • File Reputation and Analysis Features |
| • Integration with Cisco Cognitive Intelligence |
| |
| Enforcing Acceptable Use Control Settings |
| • Controlling Web Usage |
| • URL Filtering |
| • URL Category Solutions |
| • Dynamic Content Analysis Engine |
| • Web Application Visibility and Control |
| • Enforcing Media Bandwidth Limits |
| • Software as a Service (SaaS) Access Control |
| • Filtering Adult Content |
| |
| Data Security and Data Loss Prevention |
| • Data Security |
| • Cisco Data Security Solution |
| • Data Security Policy Definitions |
| • Data Security Logs |
| |
| Performing Administration and Troubleshooting |
| • Monitor the Cisco Web Security Appliance |
| • Cisco WSA Reports |
| • Monitoring System Activity Through Logs |
| • System Administration Tasks |
| • Troubleshooting |
| • Command Line Interface |
| |
| References |
| • Comparing Cisco WSA Models |
| • Comparing Cisco SMA Models |
| • Overview of Connect, Install, and Configure |
| • Deploying the Cisco Web Security Appliance Open Virtualization Format (OVF) Template |
| • Mapping Cisco Web Security Appliance Virtual Machine (VM) Ports to Correct Networks |
| • Connecting to the Cisco Web Security Virtual Appliance |
| • Enabling Layer 4 Traffic Monitor (L4TM) |
| • Accessing and Running the System Setup Wizard |
| • Reconnecting to the Cisco Web Security Appliance |
| • High Availability Overview |
| • Hardware Redundancy |
| • Introducing Common Address Redundancy Protocol (CARP) |
| • Configuring Failover Groups for High Availability |
| • Feature Comparison Across Traffic Redirection Options |
| • Architecture Scenarios When Deploying Cisco AnyConnect® Secure Mobility |
| |
| Lab Outline |
| • Configure the Cisco Web Security Appliance |
| • Deploy Proxy Services |
| • Configure Proxy Authentication |
| • Configure HTTPS Inspection |
| • Create and Enforce a Time/Date-Based Acceptable Use Policy |
| • Configure Advanced Malware Protection |
| • Configure Referrer Header Exceptions |
| • Utilize Third-Party Security Feeds and MS Office 365 External Feed |
| • Validate an Intermediate Certificate |
| • View Reporting Services and Web Tracking |
| • Perform Centralized Cisco AsyncOS Software Upgrade Using Cisco SMA |