Red Hat DIRECTORY SERVER 2.0 - GATEWAY Guia de Instalação

Consulte online ou descarregue Guia de Instalação para Servidores Red Hat DIRECTORY SERVER 2.0 - GATEWAY. Red Hat DIRECTORY SERVER 2.0 - GATEWAY Installation guide Manual do Utilizador

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 22
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 0
Deploying with Websense
Content Gateway
Websense® Content Gateway is a high-performance Web proxy that provides real-
time content scanning and Web site classification to protect network computers from
malicious Web content while controlling employee access to dynamic, user-generated
Web 2.0 content. Web content has evolved from a static information source to a
sophisticated platform for 2-way communications, which can be a valuable
productivity tool when adequately secured.
The dilemma for administrators is how much access to allow. Web 2.0 sites rely
primarily on HTTP/HTTPS protocols, which cannot be blocked without halting all
Internet traffic. Malicious content can use this means of entry into a company
network.
The Websense Content Gateway module offers:
Automatic categorization of dynamic Web 2.0 sites
Automatic categorization of new, unclassified sites
HTTPS content inspection
Enterprise proxy caching capabilities
Websense Content Gateway is deployed as an add-on module with Websense Web
Security or Websense Web Filter. Websense Content Gateway can also be an
important piece of the following Websense deployments:
Web Security Gateway for on premises deployments. On premises deployments
may be implemented on Websense V-Series appliances or as software running on
general purpose servers.
Hosted Web Security Gateway for software as a service (SaaS) deployments
Web Security Gateway Anywhere for distributed enterprises with one or more
branch offices and multiple remote users
Deploying Websense Content Gateway can improve network efficiency and
performance by caching frequently accessed information at the edge of the network.
However, the increasing availability of Web dynamic content that cannot be cached
can limit the effectiveness of this feature.
This paper includes the following topics:
Websense Content Gateway system requirements
Proxy deployment options
Vista de página 0
1 2 3 4 5 6 ... 21 22

Resumo do Conteúdo

Página 1 - Content Gateway

Deploying with Websense Content GatewayWebsense® Content Gateway is a high-performance Web proxy that provides real-time content scanning and Web site

Página 2 - Deployment issues

 custom internal applicationsMany of these programs are not developed with proxy compatibility in mind. For a successful transparent proxy deployment

Página 3

A router may also use Layer 2 (L2), which does not use GRE. Websense recommends the use of L2 if the router supports it. With L2 redirection, Content

Página 4 - Proxy deployment options

A comparison of how some activities are handled in explicit and transparent proxy deployments appears in the following table:Special Deployment Scenar

Página 5 - IP spoofing

switching options. This section summarizes some possibilities for highly available Web proxy deployments.Using explicit proxyAs previously mentioned f

Página 6 - User authentication

Active/ActiveIn an active/active configuration with 2 proxies, more than one virtual IP address is assigned to the virtual IP address pool. At any poi

Página 7 - HTTPS content inspection

With load balancingA load balancer is a network device that not only distributes specific client traffic to specific servers, but also periodically ch

Página 8 - Explicit proxy deployment

Using transparent proxyIn a transparent proxy deployment for high availability, traffic forwarding may be accomplished using a Layer 4 switch or a WCC

Página 9 - Transparent proxy deployment

specific proxy. In this scenario, WCCP distributes client requests based on the proxy server’s IP address, routing traffic to the proxy most likely to

Página 10 - WCCP-enabled router

Websense Content Gateway is downstreamA simple deployment has Websense Content Gateway as the downstream proxy, closest to the client. In this scenari

Página 11

If the third-party proxy can send the X-Forwarded-For header but not the X-Authenticated-User header, the following step is also required: Deploy an

Página 12 - Special Deployment Scenarios

User authenticationHTTPS content inspectionHandling special casesExplicit proxy deploymentTransparent proxy deploymentHighly available Web proxyIn a p

Página 13 - Using explicit proxy

If you want to exclude SLL traffic from the parent proxy and tunnel the traffic directly to the origin server, enable the Tunnel Requests Bypass Paren

Página 14 - Active/Active

Set Websense Content Gateway as the forwarding host (in the Blue Coat Management Console Configuration tab, Forwarding > Forwarding Hosts). In the

Página 15 - With load balancing

Content Gateway to read the X-Forwarded-For and X-Authenticated-User headers sent by the downstream ISA server. Two versions of the plug-in are availa

Página 16 - Using transparent proxy

Transparent proxy deployment includes either a Web Cache Control Protocol (WCCP)-enabled router or Layer 4 switch to redirect traffic, as described be

Página 17 - In a proxy chain

unless the issue is deemed a Red Hat Enterprise Linux-specific issue, at which point you must contact Red Hat directly for assistance.  RPM compat-li

Página 18

Another type of clustering supported by the Content Gateway is cross-cache clustering, a complex proxy deployment that allows any node in a proxy clus

Página 19 - SSL chaining

User authenticationAuthentication is the process of verifying a user via a username and password. User authentication may be configured on Websense Co

Página 20 - With Blue Coat ProxySG

servers. Rules may be defined for both types of authentication realms, but only one method (NTLM or LDAP) can be active at any time. See Websense Cont

Página 21 - $(x-client-address)

IP addresses for which SSL decryption is not performed. See the chapter titled Scanning and SSL Bypass Options in TRITON - Web Security Help for infor

Página 22

For explicit proxy deployment, individual client browsers may be manually configured to send requests directly to the proxy. They may also be configur

Comentários a estes Manuais

Sem comentários