Describing Cisco WSA |
• Technology Use Case |
• Cisco WSA Solution |
• Cisco WSA Features |
• Cisco WSA Architecture |
• Proxy Service |
• Integrated Layer 4 Traffic Monitor |
• Data Loss Prevention |
• Cisco Cognitive Intelligence |
• Management Tools |
• Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration |
• Cisco Content Security Management Appliance (SMA) |
|
Deploying Proxy Services |
• Explicit Forward Mode vs. Transparent Mode |
• Transparent Mode Traffic Redirection |
• Web Cache Control Protocol |
• Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow |
• Proxy Bypass |
• Proxy Caching |
• Proxy Auto-Config (PAC) Files |
• FTP Proxy |
• Socket Secure (SOCKS) Proxy |
• Proxy Access Log and HTTP Headers |
• Customizing Error Notifications with End User Notification (EUN) Pages |
|
Utilizing Authentication |
• Authentication Protocols |
• Authentication Realms |
• Tracking User Credentials |
• Explicit (Forward) and Transparent Proxy Mode |
• Bypassing Authentication with Problematic Agents |
• Reporting and Authentication |
• Re-Authentication |
• FTP Proxy Authentication |
• Troubleshooting Joining Domains and Test Authentication |
• Integration with Cisco Identity Services Engine (ISE) |
|
Creating Decryption Policies to Control HTTPS Traffic |
• Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview |
• Certificate Overview |
• Overview of HTTPS Decryption Policies |
• Activating HTTPS Proxy Function |
• Access Control List (ACL) Tags for HTTPS Inspection |
• Access Log Examples |
|
Understanding Differentiated Traffic Access Policies and Identification Profiles |
• Overview of Access Policies |
• Access Policy Groups |
• Overview of Identification Profiles |
• Identification Profiles and Authentication |
• Access Policy and Identification Profiles Processing Order |
• Other Policy Types |
• Access Log Examples |
• ACL Decision Tags and Policy Groups |
• Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications |
|
Defending Against Malware |
• Web Reputation Filters |
• Anti-Malware Scanning |
• Scanning Outbound Traffic |
• Anti-Malware and Reputation in Policies |
• File Reputation Filtering and File Analysis |
• Cisco Advanced Malware Protection |
• File Reputation and Analysis Features |
• Integration with Cisco Cognitive Intelligence |
|
Enforcing Acceptable Use Control Settings |
• Controlling Web Usage |
• URL Filtering |
• URL Category Solutions |
• Dynamic Content Analysis Engine |
• Web Application Visibility and Control |
• Enforcing Media Bandwidth Limits |
• Software as a Service (SaaS) Access Control |
• Filtering Adult Content |
|
Data Security and Data Loss Prevention |
• Data Security |
• Cisco Data Security Solution |
• Data Security Policy Definitions |
• Data Security Logs |
|
Performing Administration and Troubleshooting |
• Monitor the Cisco Web Security Appliance |
• Cisco WSA Reports |
• Monitoring System Activity Through Logs |
• System Administration Tasks |
• Troubleshooting |
• Command Line Interface |
|
References |
• Comparing Cisco WSA Models |
• Comparing Cisco SMA Models |
• Overview of Connect, Install, and Configure |
• Deploying the Cisco Web Security Appliance Open Virtualization Format (OVF) Template |
• Mapping Cisco Web Security Appliance Virtual Machine (VM) Ports to Correct Networks |
• Connecting to the Cisco Web Security Virtual Appliance |
• Enabling Layer 4 Traffic Monitor (L4TM) |
• Accessing and Running the System Setup Wizard |
• Reconnecting to the Cisco Web Security Appliance |
• High Availability Overview |
• Hardware Redundancy |
• Introducing Common Address Redundancy Protocol (CARP) |
• Configuring Failover Groups for High Availability |
• Feature Comparison Across Traffic Redirection Options |
• Architecture Scenarios When Deploying Cisco AnyConnect® Secure Mobility |
|
Lab Outline |
• Configure the Cisco Web Security Appliance |
• Deploy Proxy Services |
• Configure Proxy Authentication |
• Configure HTTPS Inspection |
• Create and Enforce a Time/Date-Based Acceptable Use Policy |
• Configure Advanced Malware Protection |
• Configure Referrer Header Exceptions |
• Utilize Third-Party Security Feeds and MS Office 365 External Feed |
• Validate an Intermediate Certificate |
• View Reporting Services and Web Tracking |
• Perform Centralized Cisco AsyncOS Software Upgrade Using Cisco SMA |