Red Hat DIRECTORY SERVER 2.0 - GATEWAY Instalační příručka

Procházejte online nebo si stáhněte Instalační příručka pro Servery Red Hat DIRECTORY SERVER 2.0 - GATEWAY. Red Hat DIRECTORY SERVER 2.0 - GATEWAY Installation guide Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 22
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 0
Deploying with Websense
Content Gateway
Websense® Content Gateway is a high-performance Web proxy that provides real-
time content scanning and Web site classification to protect network computers from
malicious Web content while controlling employee access to dynamic, user-generated
Web 2.0 content. Web content has evolved from a static information source to a
sophisticated platform for 2-way communications, which can be a valuable
productivity tool when adequately secured.
The dilemma for administrators is how much access to allow. Web 2.0 sites rely
primarily on HTTP/HTTPS protocols, which cannot be blocked without halting all
Internet traffic. Malicious content can use this means of entry into a company
network.
The Websense Content Gateway module offers:
Automatic categorization of dynamic Web 2.0 sites
Automatic categorization of new, unclassified sites
HTTPS content inspection
Enterprise proxy caching capabilities
Websense Content Gateway is deployed as an add-on module with Websense Web
Security or Websense Web Filter. Websense Content Gateway can also be an
important piece of the following Websense deployments:
Web Security Gateway for on premises deployments. On premises deployments
may be implemented on Websense V-Series appliances or as software running on
general purpose servers.
Hosted Web Security Gateway for software as a service (SaaS) deployments
Web Security Gateway Anywhere for distributed enterprises with one or more
branch offices and multiple remote users
Deploying Websense Content Gateway can improve network efficiency and
performance by caching frequently accessed information at the edge of the network.
However, the increasing availability of Web dynamic content that cannot be cached
can limit the effectiveness of this feature.
This paper includes the following topics:
Websense Content Gateway system requirements
Proxy deployment options
Zobrazit stránku 0
1 2 3 4 5 6 ... 21 22

Shrnutí obsahu

Strany 1 - Content Gateway

Deploying with Websense Content GatewayWebsense® Content Gateway is a high-performance Web proxy that provides real-time content scanning and Web site

Strany 2 - Deployment issues

 custom internal applicationsMany of these programs are not developed with proxy compatibility in mind. For a successful transparent proxy deployment

Strany 3

A router may also use Layer 2 (L2), which does not use GRE. Websense recommends the use of L2 if the router supports it. With L2 redirection, Content

Strany 4 - Proxy deployment options

A comparison of how some activities are handled in explicit and transparent proxy deployments appears in the following table:Special Deployment Scenar

Strany 5 - IP spoofing

switching options. This section summarizes some possibilities for highly available Web proxy deployments.Using explicit proxyAs previously mentioned f

Strany 6 - User authentication

Active/ActiveIn an active/active configuration with 2 proxies, more than one virtual IP address is assigned to the virtual IP address pool. At any poi

Strany 7 - HTTPS content inspection

With load balancingA load balancer is a network device that not only distributes specific client traffic to specific servers, but also periodically ch

Strany 8 - Explicit proxy deployment

Using transparent proxyIn a transparent proxy deployment for high availability, traffic forwarding may be accomplished using a Layer 4 switch or a WCC

Strany 9 - Transparent proxy deployment

specific proxy. In this scenario, WCCP distributes client requests based on the proxy server’s IP address, routing traffic to the proxy most likely to

Strany 10 - WCCP-enabled router

Websense Content Gateway is downstreamA simple deployment has Websense Content Gateway as the downstream proxy, closest to the client. In this scenari

Strany 11

If the third-party proxy can send the X-Forwarded-For header but not the X-Authenticated-User header, the following step is also required: Deploy an

Strany 12 - Special Deployment Scenarios

User authenticationHTTPS content inspectionHandling special casesExplicit proxy deploymentTransparent proxy deploymentHighly available Web proxyIn a p

Strany 13 - Using explicit proxy

If you want to exclude SLL traffic from the parent proxy and tunnel the traffic directly to the origin server, enable the Tunnel Requests Bypass Paren

Strany 14 - Active/Active

Set Websense Content Gateway as the forwarding host (in the Blue Coat Management Console Configuration tab, Forwarding > Forwarding Hosts). In the

Strany 15 - With load balancing

Content Gateway to read the X-Forwarded-For and X-Authenticated-User headers sent by the downstream ISA server. Two versions of the plug-in are availa

Strany 16 - Using transparent proxy

Transparent proxy deployment includes either a Web Cache Control Protocol (WCCP)-enabled router or Layer 4 switch to redirect traffic, as described be

Strany 17 - In a proxy chain

unless the issue is deemed a Red Hat Enterprise Linux-specific issue, at which point you must contact Red Hat directly for assistance.  RPM compat-li

Strany 18

Another type of clustering supported by the Content Gateway is cross-cache clustering, a complex proxy deployment that allows any node in a proxy clus

Strany 19 - SSL chaining

User authenticationAuthentication is the process of verifying a user via a username and password. User authentication may be configured on Websense Co

Strany 20 - With Blue Coat ProxySG

servers. Rules may be defined for both types of authentication realms, but only one method (NTLM or LDAP) can be active at any time. See Websense Cont

Strany 21 - $(x-client-address)

IP addresses for which SSL decryption is not performed. See the chapter titled Scanning and SSL Bypass Options in TRITON - Web Security Help for infor

Strany 22

For explicit proxy deployment, individual client browsers may be manually configured to send requests directly to the proxy. They may also be configur

Komentáře k této Příručce

Žádné komentáře