| Describing Cisco WSA |
| - Technology Use Case |
| - Cisco WSA Solution |
| - Cisco WSA Features |
| - Cisco WSA Architecture |
| - Proxy Service |
| - Integrated Layer 4 Traffic Monitor |
| - Data Loss Prevention |
| - Cisco Cognitive Intelligence |
| - Management Tools |
| - Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration |
| - Cisco Content Security Management Appliance (SMA) |
|
| Deploying Proxy Services |
| - Explicit Forward Mode vs. Transparent Mode |
| - Transparent Mode Traffic Redirection |
| - Web Cache Control Protocol |
| - Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow |
| - Proxy Bypass |
| - Proxy Caching |
| - Proxy Auto-Config (PAC) Files |
| - FTP Proxy |
| - Socket Secure (SOCKS) Proxy |
| - Proxy Access Log and HTTP Headers |
| - Customizing Error Notifications with End User Notification (EUN) Pages |
|
| Utilising Authentication |
| - Authentication Protocols |
| - Authentication Realms |
| - Tracking User Credentials |
| - Explicit (Forward) and Transparent Proxy Mode |
| - Bypassing Authentication with Problematic Agents |
| - Reporting and Authentication |
| - Re-Authentication |
| - FTP Proxy Authentication |
| - Troubleshooting Joining Domains and Test Authentication |
| - Integration with Cisco Identity Services Engine (ISE) |
|
| Creating Decryption Policies to Control HTTPS Traffic |
| - Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview |
| - Certificate Overview |
| - Overview of HTTPS Decryption Policies |
| - Activating HTTPS Proxy Function |
| - Access Control List (ACL) Tags for HTTPS Inspection |
| - Access Log Examples |
|
| Understanding Differentiated Traffic Access Policies and Identification Profiles |
| - Overview of Access Policies |
| - Access Policy Groups |
| - Overview of Identification Profiles |
| - Identification Profiles and Authentication |
| - Access Policy and Identification Profiles Processing Order |
| - Other Policy Types |
| - Access Log Examples |
| - ACL Decision Tags and Policy Groups |
| - Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications |
|
| Defending Against Malware |
| - Web Reputation Filters |
| - Anti-Malware Scanning |
| - Scanning Outbound Traffic |
| - Anti-Malware and Reputation in Policies |
| - File Reputation Filtering and File Analysis |
| - Cisco Advanced Malware Protection |
| - File Reputation and Analysis Features |
| - Integration with Cisco Cognitive Intelligence |
|
| Enforcing Acceptable Use Control Settings |
| - Controlling Web Usage |
| - URL Filtering |
| - URL Category Solutions |
| - Dynamic Content Analysis Engine |
| - Web Application Visibility and Control |
| - Enforcing Media Bandwidth Limits |
| - Software as a Service (SaaS) Access Control |
| - Filtering Adult Content |
|
| Data Security and Data Loss Prevention |
| - Data Security |
| - Cisco Data Security Solution |
| - Data Security Policy Definitions |
| - Data Security Logs |
|
| Performing Administration and Troubleshooting |
| - Monitor the Cisco Web Security Appliance |
| - Cisco WSA Reports |
| - Monitoring System Activity Through Logs |
| - System Administration Tasks |
| - Troubleshooting |
| - Command Line Interface |
|
| References |
| - Comparing Cisco WSA Models |
| - Comparing Cisco SMA Models |
| - Overview of Connect, Install, and Configure |
| - Deploying the Cisco Web Security Appliance Open Virtualization Format (OVF) Template |
| - Mapping Cisco Web Security Appliance Virtual Machine (VM) Ports to Correct Networks |
| - Connecting to the Cisco Web Security Virtual Appliance |
| - Enabling Layer 4 Traffic Monitor (L4TM) |
| - Accessing and Running the System Setup Wizard |
| - Reconnecting to the Cisco Web Security Appliance |
| - High Availability Overview |
| - Hardware Redundancy |
| - Introducing Common Address Redundancy Protocol (CARP) |
| - Configuring Failover Groups for High Availability |
| - Feature Comparison Across Traffic Redirection Options |
| - Architecture Scenarios When Deploying Cisco AnyConnect® Secure Mobility |
|
| Lab Outline |
| - Configure the Cisco Web Security Appliance |
| - Deploy Proxy Services |
| - Configure Proxy Authentication |
| - Configure HTTPS Inspection |
| - Create and Enforce a Time/Date-Based Acceptable Use Policy |
| - Configure Advanced Malware Protection |
| - Configure Referrer Header Exceptions |
| - Utilize Third-Party Security Feeds and MS Office 365 External Feed |
| - Validate an Intermediate Certificate |
| - View Reporting Services and Web Tracking |
| - Perform Centralized Cisco AsyncOS Software Upgrade Using Cisco SMA |