It will define complexity in this context and describe how to minimize it in policy design. ![]() This guide will address how the complexity of a configuration impacts system resources. ![]() The WSA policy configuration has implications not only for security efficacy and enforcement, but also for the performance of the appliance. This guide addresses the most common issues related to the surrounding network device configuration. ![]() It can also spoof client IP addresses, adding another layer of complexity to the deployment and imposing additional requirements on the supporting network configuration. At a minimum, it employs server-side IP address spoofing and man-in-the-middle techniques to inspect HTTPS transactions. It is a both a source and destination of web traffic it acts at the same time as a web server and a web client. Each network will have its own specific requirements and challenges.Īs a security device, the WSA interacts with the network in several unique ways. While the best practices documented here are important for all administrators, architects, and operators to understand, they are only guidelines and should be treated as such. It addresses many aspects of a WSA deployment, including the supporting network environment, policy configuration, monitoring, and troubleshooting. This guide is intended as a reference for best practice configuration of the Cisco ® Web Security Appliance (WSA).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |