Red Hat DIRECTORY SERVER 2.0 - GATEWAY Guida di Installazione

Navigare online o scaricare Guida di Installazione per Server Red Hat DIRECTORY SERVER 2.0 - GATEWAY. Red Hat DIRECTORY SERVER 2.0 - GATEWAY Installation guide Manuale Utente

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
  • Pagina
    / 22
  • Indice
  • SEGNALIBRI
  • Valutato. / 5. Basato su recensioni clienti
Vedere la pagina 0
Deploying with Websense
Content Gateway
Websense® Content Gateway is a high-performance Web proxy that provides real-
time content scanning and Web site classification to protect network computers from
malicious Web content while controlling employee access to dynamic, user-generated
Web 2.0 content. Web content has evolved from a static information source to a
sophisticated platform for 2-way communications, which can be a valuable
productivity tool when adequately secured.
The dilemma for administrators is how much access to allow. Web 2.0 sites rely
primarily on HTTP/HTTPS protocols, which cannot be blocked without halting all
Internet traffic. Malicious content can use this means of entry into a company
network.
The Websense Content Gateway module offers:
Automatic categorization of dynamic Web 2.0 sites
Automatic categorization of new, unclassified sites
HTTPS content inspection
Enterprise proxy caching capabilities
Websense Content Gateway is deployed as an add-on module with Websense Web
Security or Websense Web Filter. Websense Content Gateway can also be an
important piece of the following Websense deployments:
Web Security Gateway for on premises deployments. On premises deployments
may be implemented on Websense V-Series appliances or as software running on
general purpose servers.
Hosted Web Security Gateway for software as a service (SaaS) deployments
Web Security Gateway Anywhere for distributed enterprises with one or more
branch offices and multiple remote users
Deploying Websense Content Gateway can improve network efficiency and
performance by caching frequently accessed information at the edge of the network.
However, the increasing availability of Web dynamic content that cannot be cached
can limit the effectiveness of this feature.
This paper includes the following topics:
Websense Content Gateway system requirements
Proxy deployment options
Vedere la pagina 0
1 2 3 4 5 6 ... 21 22

Sommario

Pagina 1 - Content Gateway

Deploying with Websense Content GatewayWebsense® Content Gateway is a high-performance Web proxy that provides real-time content scanning and Web site

Pagina 2 - Deployment issues

 custom internal applicationsMany of these programs are not developed with proxy compatibility in mind. For a successful transparent proxy deployment

Pagina 3

A router may also use Layer 2 (L2), which does not use GRE. Websense recommends the use of L2 if the router supports it. With L2 redirection, Content

Pagina 4 - Proxy deployment options

A comparison of how some activities are handled in explicit and transparent proxy deployments appears in the following table:Special Deployment Scenar

Pagina 5 - IP spoofing

switching options. This section summarizes some possibilities for highly available Web proxy deployments.Using explicit proxyAs previously mentioned f

Pagina 6 - User authentication

Active/ActiveIn an active/active configuration with 2 proxies, more than one virtual IP address is assigned to the virtual IP address pool. At any poi

Pagina 7 - HTTPS content inspection

With load balancingA load balancer is a network device that not only distributes specific client traffic to specific servers, but also periodically ch

Pagina 8 - Explicit proxy deployment

Using transparent proxyIn a transparent proxy deployment for high availability, traffic forwarding may be accomplished using a Layer 4 switch or a WCC

Pagina 9 - Transparent proxy deployment

specific proxy. In this scenario, WCCP distributes client requests based on the proxy server’s IP address, routing traffic to the proxy most likely to

Pagina 10 - WCCP-enabled router

Websense Content Gateway is downstreamA simple deployment has Websense Content Gateway as the downstream proxy, closest to the client. In this scenari

Pagina 11

If the third-party proxy can send the X-Forwarded-For header but not the X-Authenticated-User header, the following step is also required: Deploy an

Pagina 12 - Special Deployment Scenarios

User authenticationHTTPS content inspectionHandling special casesExplicit proxy deploymentTransparent proxy deploymentHighly available Web proxyIn a p

Pagina 13 - Using explicit proxy

If you want to exclude SLL traffic from the parent proxy and tunnel the traffic directly to the origin server, enable the Tunnel Requests Bypass Paren

Pagina 14 - Active/Active

Set Websense Content Gateway as the forwarding host (in the Blue Coat Management Console Configuration tab, Forwarding > Forwarding Hosts). In the

Pagina 15 - With load balancing

Content Gateway to read the X-Forwarded-For and X-Authenticated-User headers sent by the downstream ISA server. Two versions of the plug-in are availa

Pagina 16 - Using transparent proxy

Transparent proxy deployment includes either a Web Cache Control Protocol (WCCP)-enabled router or Layer 4 switch to redirect traffic, as described be

Pagina 17 - In a proxy chain

unless the issue is deemed a Red Hat Enterprise Linux-specific issue, at which point you must contact Red Hat directly for assistance.  RPM compat-li

Pagina 18

Another type of clustering supported by the Content Gateway is cross-cache clustering, a complex proxy deployment that allows any node in a proxy clus

Pagina 19 - SSL chaining

User authenticationAuthentication is the process of verifying a user via a username and password. User authentication may be configured on Websense Co

Pagina 20 - With Blue Coat ProxySG

servers. Rules may be defined for both types of authentication realms, but only one method (NTLM or LDAP) can be active at any time. See Websense Cont

Pagina 21 - $(x-client-address)

IP addresses for which SSL decryption is not performed. See the chapter titled Scanning and SSL Bypass Options in TRITON - Web Security Help for infor

Pagina 22

For explicit proxy deployment, individual client browsers may be manually configured to send requests directly to the proxy. They may also be configur

Commenti su questo manuale

Nessun commento