Blue Coat Security First Steps Solution for Exception Pages
|
|
- Kelley Scott
- 6 years ago
- Views:
Transcription
1 Blue Coat Security First Steps Solution for Exception Pages SGOS 6.5
2 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE, CROSSBEAM, K9, DRTR, MACH5, PACKETWISE, POLICYCENTER, PROXYAV, PROXYCLIENT, SGOS, WEBPULSE, SOLERA NETWORKS, DEEPSEE, DS APPLIANCE, SEE EVERYTHING. KNOW EVERYTHING., SECURITY EMPOWERS BUSINESS, BLUETOUCH, the Blue Coat shield, K9, and Solera Networks logos and other Blue Coat logos are registered trademarks or trademarks of Blue Coat Systems, Inc. or its affiliates in the U.S. and certain other countries. This list may not be complete, and the absence of a trademark from this list does not mean it is not a trademark of Blue Coat or that Blue Coat has stopped using the trademark. All other trademarks mentioned in this document owned by third parties are the property of their respective owners. This document is for informational purposes only. BLUE COAT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. BLUE COAT PRODUCTS, TECHNICAL SERVICES, AND ANY OTHER TECHNICAL DATA REFERENCED IN THIS DOCUMENT ARE SUBJECT TO U.S. EXPORT CONTROL AND SANCTIONS LAWS, REGULATIONS AND REQUIREMENTS, AND MAY BE SUBJECT TO EXPORT OR IMPORT REGULATIONS IN OTHER COUNTRIES. YOU AGREE TO COMPLY STRICTLY WITH THESE LAWS, REGULATIONS AND REQUIREMENTS, AND ACKNOWLEDGE THAT YOU HAVE THE RESPONSIBILITY TO OBTAIN ANY LICENSES, PERMITS OR OTHER APPROVALS THAT MAY BE REQUIRED IN ORDER TO EXPORT, RE-EXPORT, TRANSFER IN COUNTRY OR IMPORT AFTER DELIVERY TO YOU. Americas: Blue Coat Systems, Inc. 420 N. Mary Ave. Sunnyvale, CA Rest of the World: Blue Coat Systems International SARL 3a Route des Arsenaux 1700 Fribourg, Switzerland
3 Blue Coat Security First Steps Contents Third Party Copyright Notices 2 Solution: Create Custom Exception Pages 4 Set Services to Intercept 4 Transparent Proxy Services 4 Explicit Proxy Services 7 Design a Custom Exception Page 8 Install a Custom Exception Page 11 Create Policy for a Custom Exception Page 12 Test a Custom Exception Page 14 Exception Page Troubleshooting 15 Why are my HTML tags displaying in my browser? 15 How can I view the exception page I created? 15 Why doesn't the content of my exception page display? 16 Why can't I delete my custom exceptions page? 16 3
4 Creating Custom Exception Pages Solution: Create Custom Exception Pages An exception page is an HTML page that appears in a user's web browser after the person has tried to access a website the company has blocked access. For example, if the company has a policy that blocks the Shopping URL category and a user attempts to go to amazon.com, an exception page displays instead of the Amazon website. The ProxySG offers built-in exception pages and allows you to create custom exception pages. The steps below are the tasks you need to perform in order to create custom exception pages. 1. Design a Custom Exception Page 2. Install a Custom Exception Page 3. Create Policy for a Custom Exception Page 4. Test a Custom Exception Page Note: This solution assumes that you have HTTP and/or HTTPS set to intercept.. Set Services to Intercept In transparent ProxySG deployments, Internet applications aren't aware that the proxy is in the network, so the ProxySG has to monitor the ports used for their traffic. The most common ports are 80, (HTTP) 443 (HTTPS), and 1935 (RTMP). Caution: Any transparent traffic that doesn't have a proxy service set to intercept will pass through the proxy's interfaces unfiltered. For explicit proxy deployments, client browsers direct all traffic to the appliance on the same port, (typically 80 or 8080). When explicit traffic is intercepted, the appliance uses an advanced protocol detection method to identify the type of traffic (HTTP, HTTPS, RTMP, and so on) and handles it according to the standards for that traffic. Transparent Proxy Services 1. In the Management Console, select Configuration > Services > Proxy Services. 2. Under Predefined Service Groups, expand the Standard group. A list of services displays. 3. Locate the service you want to set to Intercept. 4. From the drop-down menu next to the service, select Intercept. In this example, the HTTPS service is set to Intercept. 4
5 Blue Coat Security First Steps 5. Repeat steps 3 and 4 for each additional service you want to intercept. 6. (Optional) To intercept traffic types that are not predefined: a. Click New Service. b. Enter a name for the service and select the service group, under which the new service will be listed. c. Select a proxy type from the Proxy drop-down menu. This menu lists all of the types of traffic the ProxySG understands. If the type of traffic you are intercepting is not listed, select TCP Tunnel. Caution: Tunneled traffic can only be controlled based on the information contained in the TCP header of the request: client IP, destination IP, and source and destination ports. d. Click Edit/Add Listeners. The New Listener dialog displays. 5
6 Creating Custom Exception Pages e. In the Port range field, enter the port your application uses to communicate. f. Ensure that the Action field is set to Intercept and click OK. g. If enabled, uncheck Enable ADN. 6
7 Blue Coat Security First Steps h. Click OK. 7. Click Apply. The appliance confirms your changes. Explicit Proxy Services 1. In the Management Console, select Configuration > Services > Proxy Services. 2. Under Predefined Service Groups, expand the Standard group. A list of services displays. 3. Locate Explicit HTTP, select it, and click Edit Service. 4. Enable Detect Protocol. 5. Under Listeners, set the explicit proxy ports (8080 and/or 80) to Intercept. 7
8 Creating Custom Exception Pages 6. Click OK and Apply. The appliance confirms your changes. Design a Custom Exception Page Exception pages are rendered in HTML.To design a custom exception page, you need to create an HTML page to display your customized exception message. The HTML page you design displays when users try to access content for which a blocking policy has been created. This topic discusses the process of designing your custom exception page using HTML code. 1. Copy the following HTML code. <!DOCTYPE html> <html> <head> <title>denied Access Policy </title> <meta name= "author" content = "Your Company Name Here" > <meta name="description" content = "Denied Access Policy" > <meta name="category" content = "$(exception.category)"> </head> <body> <center> <img src= " /><br> 8
9 Blue Coat Security First Steps <p> <font face = "Arial, Helvetica, sans-serif" size = "4" color = "Red" ><b>you are about to access the internet from: Your Company Network </font><br> <font face= "Arial, Helvetica, sans-serif" size = "4" color = "Red">INTERNET USAGE IS MONITORED AND LOGGED.</font><br> <font face = "Arial, Helvetica, sans-serif" size = "3" color = "Red"><b>Your IP address: <!--$(client.address)--> <br>your username: Jane Smith <!-- $(user.name)--></b></font><br> <font face = "Arial, Helvetica, sans-serif" size = "4" color = "red" >YOU HAVE BEEN DENIED ACCESS TO THIS SITE. PLEASE READ OUR SECURITY POLICY AT: <front><br> <font face = "Arial, Helvetica, sans-serif" size = "4" color = "red" > This has been reported by: Your Proxy Name <!--$(proxy.name)--><font><br> For any comments <A href='mailto: YourCompany@example.com?subject=Barred web page <!--$(url)-->, IP address: <!--$(client.address)-->, User ID: <!-- $(user)-->' > Customer Service Center</a></font></a></font> </p> </center> </body> </html> Note: Errors can occur if <Opening tags> are not followed by </Closing tags> resulting in the improper rendering of your exception page content. 2. Paste the copied HTML code into your HTML editor. Each tag is designed to hold a particular type of text and It's important that you use each tag according to that purpose. Below is a close up of each tag that needs to be modified to fit your exception page needs. a. Edit the title of the exception page by removing the text in between the opening and closing title tags, and replacing that text with the name of the exception page you are creating. <title> Exception Page Title </title>. b. Edit the meta data tags to represent your company name, and the name of the exception. <meta name = "author" content = "Your Company Name Here"> <meta name = "description" content = "Denied Access Policy"> c. Edit the image tag to include your company logo. <img src=" />. Note: You can not download your company logo or other graphics on to the ProxySG. You can however, reference graphics from an externally hosted source, as shown in the above example. d. Edit the text between the opening and closing <font> tags to create your desired exception message. The font tags below display the body of your exception message. <font face = "Arial, Helvetica, sans-serif" size = "4" color = "Red" ><b>you are about to access the Internet from the Your Company Network </font><br> <font face= "Arial, Helvetica, sans-serif" size = "4" color = "Red">INTERNET USAGE IS MONITORED AND LOGGED.</font><br> 9
10 Creating Custom Exception Pages <font face = "Arial, Helvetica, sans-serif" size = "3" color = "Red"><b>Your IP address: <!--$(client.address)--> <br>your username: <!--$(user.name)--></b></font><br> <font face = "Arial, Helvetica, sans-serif" size = "4" color = "red" >YOU HAVE BEEN DENIED ACCESS TO THIS SITE. PLEASE READ OUR SECURITY POLICY AT <front><br> <font face = "Arial, Helvetica, sans-serif" size = "4" color = "red" > This has been reported by <!--$(proxy.name)-><font><br> For any comments <A href='mailto:yourcompany@example.com?subject=barred web page <!--$(url) -->, IP address: <!--$(client.address)-->, User ID: <!--$(user)-->' > Customer Service Center</a></font></a></font> Note: When you encounter a variable name such as $(client.address) enclosed in a comment such as: <!--$(client.address)--> You can remove the comments so that the content displays the information contained in the variable. You can delete them if you do not intend on ever displaying the information. e. Edit the font tag itself to change the font type, size and color. To change the font type, size and color, you must change the attributes named: face, size and color. For example, to change the size of the font to 7, you need to change the attribute, from size = "3" to size = "7". Each attribute s value must be surrounded in quotes otherwise the HTML does not render as desired. <font face="arial, Helvetica, sans-serif" size="3" color="red"><b> Your IP address: $(client.address) <br> Your username: $(user.name)</b> </font><br> 3. Save the file with the.html file extension. Substitution variables are predefined variables that can be included in your exception page. These variables, when referenced in your HTML code, display the values of the variables when the exception page is displayed to the user. The most commonly used substitution variables are listed below. Variable Description $(exception.category) The category of the requested URL $(user) The name of the requester $(url.host) The requested URL's host name portion $(proxy.name) The name of the ProxySG $(client.address) The IP address of the client A full list of variables can be found in the CPL guide, Appendix D. Next Step: Install a Custom Exception Page 10
11 Blue Coat Security First Steps Install a Custom Exception Page Before you begin this step, be sure that you have completed the steps in the topic Design a Custom Exception Page. Use the command line interface to install the custom exceptions page you created. 1. Use a remote login utility (such as Putty) to access the command line interface. 2. Enter the following CLI commands: SG# enable Enable Password: SG# conf t SG#(config) exceptions SG#(config exceptions) create my_exception ok SG#(config exceptions) edit my_exception SG#(config exceptions user-defined.my_exception) inline format EOF 3. Copy the code from your HTML file and paste that code into the command line. 4. After you have pasted in the HTML code, type EOF to signal the end of your code. ok Once you have entered your CLI commands and HTML code in to the CLI, your screen should be similar to the example below. 11
12 Creating Custom Exception Pages 5. Assign an HTTP response status code to your custom exception page by entering the following command: SG#(config exceptions user-defined.my_exception) http-code <code#> ok where <code#> is one of the following HTTP status codes: 302, 307, 403. (403 is probably the most common when creating policy for blocked URL categories.) Status Code Description 302 The requested URL was temporarily changed but the same URL should be used in the future. 307 The URL was temporarily moved. The new URL should be given. 403 Access forbidden. Next Step: Create Policy for a Custom Exception Page Create Policy for a Custom Exception Page To reference the custom exceptions page you have created, you need to create policy. By creating policy, you instruct the ProxySG how to handle the exceptions being processed. 1. Log in to the ProxySG Management Console. 2. Select Configuration > Policy > Visual Policy Manager > Launch to open the Visual Policy Manager. 3. Select Policy > Web Access Layer. 4. In the Add New Layer pop-up dialog, enter a name for the Web Access layer. 5. To define the action that returns your custom exception, right click the Action setting and select Set. The Set Action Object dialog displays. 12
13 Blue Coat Security First Steps 6. Select New > Return Exception from the Set Action Object dialog. The Add Return Exception dialog displays. 7. Select User-defined exception from the Add Return Exception dialog. 8. Select the custom exception you created from the drop-down list. 9. Select OK. 10. Select OK. 11. Select Install Policy. 12. Select OK in the confirmation dialog. 13. Close the Visual Policy Manager. 13
14 Creating Custom Exception Pages Next Step: Test a Custom Exception Page Test a Custom Exception Page To test your custom exception page, go to a URL denied by your policy. For example, if the Shopping category is blocked, go to amazon.com. You should see the custom exceptions page you created. 14
15 Blue Coat Security First Steps Exception Page Troubleshooting Why are my HTML tags displaying in my browser? 15 How can I view the exception page I created? 15 Why doesn't the content of my exception page display? 16 Why can't I delete my custom exceptions page? 16 Why are my HTML tags displaying in my browser? Problem: When I click "View Sample HTML," from the Management Console, my content displays but fragments of HTML tags mistakenly display as well. Resolution: When you code HTML, all tags and characters must have opening and closing characters to match. For example, every <opening tag> must have a matching </closing tag>. Similarly, all "" and <> need to be properly opened and closed. If you do not do this, HTML renders improperly in various ways. Colors may not display correctly, a blank page may display or images may appear broken. 1. Open the HTML file containing your exception page code in a text editor. Study the code to make sure all opening tags have matching closing tags. Look for other errors (such as typing mistakes) in your tags. correct any errors you find. 2. Log in to your CLI console using a remote log-in utility. 3. To edit the exception page, enter the following commands. SG# config SG# exceptions SG# edit name_of_exception SG# inline EOF 4. Copy the HTML code from the file you edited in step 1 above. 5. Paste the HTML code into your CLI console. 6. Type EOF. and press Enter. Note: You can test your HTML before copying it into the console by right clicking the file and opening it with your browser of choice. How can I view the exception page I created? Problem: I would like to see a preview my custom exception page. Resolution: 1. Open the Management Console, select Configuration > Policy > Exceptions. 2. Select View File >Exception Configuration > View. 3. Choose the exception you would like to view from the User-Defined list. Click "View Sample HTML". The custom exception page opens in a new window. 15
16 Creating Custom Exception Pages Why doesn't the content of my exception page display? Problem: When I view my HTML output in the Management Console viewer, I am only able to see the name of the exception page I created. The image below is how my browse displays my custom exception page. Resolution: When you name your custom exception page, it is not necessary to precede the name with "user-exception." If you have mistakenly preceded the name of your exception with "user-defined," you need to delete it so that you can recreate the exception. You can do that by following the procedures listed in the Why can't I delete my custom exceptions page? topic. After deleting the misnamed exception, you can create a new custom exception page, with the correct name, by following the procedures in the Solution: Create Custom Exception Pages Why can't I delete my custom exceptions page? Problem: I cannot delete the custom exception page I created. Resolution: Custom exception pages that are referenced by policy cannot be deleted. In order to delete your custom exception page, you must first delete the policy that references the custom exception you wish to delete. Once you have deleted the policy, you can delete the custom exception. 1. Log in to the Management Console. 2. Select Configuration > Visual Policy Manager > Launch. 3. In the VPM, right-click the tab of the policy layer you wish to delete. 4. Click Delete Layer or Rule. 5. Click Yes to confirm the deletion. 6. Close the VPM. Once the above instructions are complete, you can delete the custom exception. 1. Log in to your CLI console using a remote log-in utility. 2. Enter the following CLI commands. SG# config SG# exceptions SG# edit name_exception SG# delete name_exception ok 16
Blue Coat ProxySG First Steps Solution for Exception Pages SGOS 6.7
Blue Coat ProxySG First Steps Solution for Exception Pages SGOS 6.7 Legal Notice Copyright 2018 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue
More informationBlue Coat Security First Steps Solution for Streaming Media
Blue Coat Security First Steps Solution for Streaming Media SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
More informationBlue Coat Security First Steps Solution for Streaming Media
Solution for Streaming Media Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE, CROSSBEAM,
More informationBlue Coat Security First Steps Solution for Integrating Authentication Using LDAP
Solution for Integrating Authentication Using LDAP SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
More informationBlue Coat ProxySG First Steps Transparent Proxy Deployments SGOS 6.7
Transparent Proxy Deployments SGOS 6.7 Legal Notice Copyright 2018 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat logo are trademarks
More informationBlue Coat Security First Steps. Solution for Integrating Authentication using IWA BCAAA
Solution for Integrating Authentication using IWA BCAAA Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
More informationBlue Coat Security First Steps Solution for Controlling HTTPS
Solution for Controlling HTTPS SGOS 6.5 Legal Notice Copyright 2017 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat logo are trademarks
More informationBlue Coat ProxySG First Steps Solution for Controlling HTTPS SGOS 6.7
Blue Coat ProxySG First Steps Solution for Controlling HTTPS SGOS 6.7 Legal Notice Copyright 2018 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the
More informationProxySG Virtual Appliance MACH5 Edition Initial Configuration Guide
2015 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE, CROSSBEAM, K9, DRTR, MACH5, PACKETWISE, POLICYCENTER, PROXYAV, PROXYCLIENT,
More informationUsing Kerberos Authentication in a Reverse Proxy Environment
Using Kerberos Authentication in a Reverse Proxy Environment Legal Notice Copyright 2017 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat
More informationMulti-Tenant Policy Deployment Guide
Multi-Tenant Policy Deployment Guide SGOS 6.6.x and later Third Party Copyright Notices Copyright 2016 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and
More informationTechnical Brief. Best Practice. PacketShaper and Office 365
Best Practice PacketShaper and Office 365 October 13, 2016 Products Covered All current PacketShaper models running PacketShaper software 11.5 and above, this includes PacketShaper models PS-S200, PS-S400
More informationPolicyCenter Release Notes
PolicyCenter Release Notes Version 9.2.9 December, 2014 P/N 20-0230-929 Revision A 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS,
More informationBi-directional ADN Deployment Using WCCP with Reflect Client IP [Configuration Sample] Ken Fritz (PSS)
Bi-directional ADN Deployment Using WCCP with Reflect Client IP [Configuration Sample] February 17, 2011 Ken Fritz (PSS) Copyright 2011 Blue Coat Systems, Inc. All rights reserved worldwide. No part of
More informationBlue Coat ProxySG Maintenance and Upgrade Guide. ProxySG 900 Series B E T A D R A. Document Number: Rev B.2
Blue Coat ProxySG Maintenance and Upgrade Guide ProxySG 900 Series B E T A D R A Document Number: 231-03166 Rev B.2 Disclaimer THIS DOCUMENT IS PROVIDED AS IS WITHOUT ANY EXPRESS OR IMPLIED WARRANTY OF
More informationPolicyCenter Release Notes
PolicyCenter Release Notes Version 9.2.12 September, 2015 P/N 20-0230-9212 Revision A 2015 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
More informationMigrating to a New ProxySG Appliance. ProxySG 900/9000 to ProxySG S400/500
Migrating to a New ProxySG Appliance ProxySG 900/9000 to ProxySG S400/500 Migrating to a New Blue Coat ProxySG Appliance Copyright 2017 Symantec Corp. All rights reserved. Symantec, the Symantec Logo,
More informationSGOS on KVM Deployment Guide
SGOS on KVM Deployment Guide Guide Revision: 8/18/2017 2 SGOS on KVM Deployment Guide SGOS on KVM Deployment Guide 3 Legal Notice Copyright 2017 Symantec Corp. All rights reserved. Symantec, the Symantec
More informationOffice 365 Best Practices: Protocols
Office 365 Best Practices: Email Protocols VERSION 9: 08/11/17 Office 365 Integration: Email Protocols/Page 2 Skype/Lync Integration/Page 3 Copyrights Copyright 2016 Symantec Corp. All rights reserved.
More informationBCCPP Q&As. Blue Coat Certified Proxy Professional. Pass Blue Coat BCCPP Exam with 100% Guarantee
BCCPP Q&As Blue Coat Certified Proxy Professional Pass Blue Coat BCCPP Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money Back Assurance
More informationSGOS on AWS Deployment Guide
SGOS on AWS Deployment Guide Version 6.7.x Guide Revision: 4/6/2018 2 SGOS on AWS Deployment Guide SGOS on AWS Deployment Guide SGOS on AWS Deployment Guide 3 Legal Notice Copyright 2018 Symantec Corp.
More informationBlueCoat BCCPP. Blue Coat Certified Proxy Professional.
BlueCoat BCCPP Blue Coat Certified Proxy Professional https://killexams.com/pass4sure/exam-detail/bccpp Question: 201 Which method of controlling downloads of certain file types works fastest on ProxySG?
More informationReverse Proxy Deployment Guide
Reverse Proxy Deployment Guide PDF of the Online WebGuide SGOS 6.5.x and Later Third Party Copyright Notices Copyright 2016 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark
More informationIPv6 Classification. PacketShaper 11.8
PacketShaper 11.8 Legal Notice Copyright 2017 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat logo are trademarks or registered trademarks
More informationAdaptive Strong Authenticator Configuration Guide 10g ( ) December 2007
Adaptive Strong Authenticator Configuration Guide 10g (10.1.4.3.0) December 2007 Adaptive Strong Authenticator Configuration Guide, 10g (10.1.4.3.0) Copyright 2007, Oracle. All rights reserved. The Programs
More informationConfiguration & Management Guide
Configuration & Management Guide Management Center v1.7.1.1 Guide Revision: September 13, 2016 2 TOC Management Center Overview 23 Web Console Overview 25 Dashboard 26 Network 26 Configuration 27 Jobs
More informationHTTP 1.1 Web Server and Client
HTTP 1.1 Web Server and Client Last Updated: October 12, 2011 The HTTP 1.1 Web Server and Client feature provides a consistent interface for users and applications by implementing support for HTTP 1.1
More informationCisco Stealthwatch. Proxy Log Configuration Guide 7.0
Cisco Stealthwatch Proxy Log Configuration Guide 7.0 Table of Contents Introduction 3 Overview 3 Important Configuration Guidelines 3 Contacting Support 3 Configuring the Blue Coat Proxy Logs 5 Creating
More informationProxySG Virtual Appliance MACH5 Edition Initial Configuration Guide
ProxySG Virtual Appliance MACH5 Edition Initial Configuration Guide Platform: VMware ESX or ESXi Server Platform: ESX/ESXi Server Version 6.5.x and later SGOS 6.5.x and later i ProxySG Virtual Appliance
More informationAT&T Cloud Web Security Service
AT&T Cloud Web Security Service Troubleshooting Guide Table of Contents 1 Summary... 3 2 Explicit Proxy Access Method... 4 2.1 Explicit Proxy Flow Diagram... 4 3 Proxy Forwarding Access Method... 6 3.1
More informationRealms and Identity Policies
The following topics describe realms and identity policies: Introduction:, page 1 Creating a Realm, page 5 Creating an Identity Policy, page 11 Creating an Identity Rule, page 15 Managing Realms, page
More informationCisco Service Control Online Advertising Solution Guide: Behavioral. Profile Creation Using Traffic Mirroring, Release 4.0.x
CISCO SERVICE CONTROL SOLUTION GUIDE Cisco Service Control Online Advertising Solution Guide: Behavioral Profile Creation Using Traffic Mirroring, Release 4.0.x 1 Overview 2 Configuring Traffic Mirroring
More informationUser Identity Sources
The following topics describe Firepower System user identity sources, which are sources for user awareness. These users can be controlled with identity and access control policies: About, on page 1 The
More informationActivIdentity 4TRESS AAA Web Tokens and F5 BIG-IP Access Policy Manager. Integration Handbook
ActivIdentity 4TRESS AAA Web Tokens and F5 BIG-IP Access Policy Manager Integration Handbook Document Version 1.1 Released July 11, 2012 ActivIdentity 4TRESS AAA Web Tokens and F5 APM Integration Handbook
More informationInstalling a CoreStreet Responder
Entrust Managed Services PKI Installing a CoreStreet Responder Document issue: 1.0 Date of issue: December 2008 Copyright 2008 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
More informationCajunRules Policy Manager User Guide. Version 2.0
CajunRules Policy Manager User Guide Version 2.0 January, 2001 Copyright Avaya Inc. 2001 ALL RIGHTS RESERVED Printed in USA, January 2001 The products, specifications, and other technical information regarding
More informationApplication Notes for Mutare EVM Plus gistt with Avaya IP Office 8.1 and Embedded Voic Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Mutare EVM Plus gistt with Avaya IP Office 8.1 and Embedded Voicemail Issue 1.0 Abstract These Application Notes describe a compliance-tested
More informationUser Identity Sources
The following topics describe Firepower System user identity sources, which are sources for user awareness. These users can be controlled with identity and access control policies: About, page 1 The User
More informationParallels Remote Application Server
Parallels Remote Application Server Parallels Client for Mac User's Guide v16 Parallels International GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 672 20 30 www.parallels.com Copyright
More informationMicrosoft ISA 2006 Integration. Microsoft Internet Security and Acceleration Server (ISA) Integration Notes Introduction
Microsoft ISA 2006 Integration Contents 1 Microsoft Internet Security and Acceleration Server (ISA) Integration Notes 2 Introduction 3 Prerequisites 3.1 ISA 2006 Filter 3.2 TMG Filter 4 Baseline 5 Architecture
More informationInstallation and Configuration Guide
Installation and Configuration Guide h-series 800-782-3762 www.edgewave.com 2001 2011 EdgeWave Inc. (formerly St. Bernard Software). All rights reserved. The EdgeWave logo, iprism and iguard are trademarks
More informationA10 Thunder ADC with Oracle E-Business Suite 12.2 DEPLOYMENT GUIDE
A10 Thunder ADC with Oracle E-Business Suite 12.2 DEPLOYMENT GUIDE Table of Contents 1. Introduction... 2 2 Deployment Prerequisites... 2 3 Oracle E-Business Topology... 3 4 Accessing the Thunder ADC Application
More informationEnforced Client Policy & Reporting Server (EPRS) 2.3. Administration Guide
Enforced Client Policy & Reporting Server (EPRS) 2.3 Copyright 2016 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. Dell, the
More informationCreating Web Pages with SeaMonkey Composer
1 of 26 6/13/2011 11:26 PM Creating Web Pages with SeaMonkey Composer SeaMonkey Composer lets you create your own web pages and publish them on the web. You don't have to know HTML to use Composer; it
More informationVII. Corente Services SSL Client
VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...
More informationCisco Service Control Usage Analysis and Reporting Solution Guide,
CISCO SERVICE CONTROL SOLUTION GUIDE Cisco Service Control Usage Analysis and Reporting Solution Guide, Release 3.8.x 1 About this Guide 2 Usage Analysis and Reporting Solution Overview 3 Using the SCA
More informationCisco TEO Adapter Guide for Microsoft System Center Operations Manager 2007
Cisco TEO Adapter Guide for Microsoft System Center Operations Manager 2007 Release 2.3 April 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com
More informationLiveNX Upgrade Guide from v5.1.2 to v Windows
LIVEACTION, INC. LiveNX Upgrade Guide from v5.1.2 to v5.1.3 - Windows UPGRADE LiveAction, Inc. 3500 Copyright WEST BAYSHORE 2016 LiveAction, ROAD Inc. All rights reserved. LiveAction, LiveNX, LiveUX, the
More informationInstallation and Configuration Guide
CYBERSECURITY, EVOLVED EdgeWave iprism Web Security Installation and Configuration Guide V8.0 15333 Avenue of Science, Suite 100 San Diego, CA 92128 Give us a call 1-855-881-2004 Send us an email: info@edgewave.com
More informationCustomer Portal. PacketShaper 11.7
Customer Portal PacketShaper 11.7 Legal Notice Copyright 2016 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat logo are trademarks or registered
More informationCisco TEO Adapter Guide for Microsoft Windows
Cisco TEO Adapter Guide for Microsoft Windows Release 2.3 April 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800
More informationPolycom RealPresence Resource Manager System
Upgrade Guide 8.2.0 July 2014 3725-72106-001E Polycom RealPresence Resource Manager System Copyright 2014, Polycom, Inc. All rights reserved. No part of this document may be reproduced, translated into
More informationWeb Publishing Basics I
Web Publishing Basics I Jeff Pankin Information Services and Technology Contents Course Objectives... 2 Creating a Web Page with HTML... 3 What is Dreamweaver?... 3 What is HTML?... 3 What are the basic
More informationConfiguring the CSS for Device Management
CHAPTER 2 Configuring the CSS for Device Management Before you can use the WebNS Device Management user interface software, you need to perform the tasks described in the following sections: WebNS Device
More informationBLUEPRINT TEAM REPOSITORY. For Requirements Center & Requirements Center Test Definition
BLUEPRINT TEAM REPOSITORY Installation Guide for Windows For Requirements Center & Requirements Center Test Definition Table Of Contents Contents Table of Contents Getting Started... 3 About the Blueprint
More informationTzunami Deployer Confluence Exporter Guide
Tzunami Deployer Confluence Exporter Guide Supports extraction of Confluence Enterprise contents and migrate to Microsoft SharePoint using Tzunami Deployer. Version 2.7 Table of Content PREFACE... I INTENDED
More informationSubscriber Traffic Redirection
Subscriber Traffic Redirection Published: 2014-06-06 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved. Juniper Networks,
More informationNimsoft Service Desk. Single Sign-On Configuration Guide. [assign the version number for your book]
Nimsoft Service Desk Single Sign-On Configuration Guide [assign the version number for your book] Legal Notices Copyright 2012, CA. All rights reserved. Warranty The material contained in this document
More informationPersonality Migration Reference
www.novell.com/documentation Personality Migration Reference ZENworks 11 Support Pack 3 July 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use
More information1.1 How to Install Prerequisites
1 1 SharpReader Installation Manual 1.1 How to Install Prerequisites 1.1.1 Installing SharpReader 1. Using the internet, open a web browser and access to SharpReader s home page.. SharpReader is an RSS/Atom
More informationCisco TEO Adapter Guide for
Release 2.3 April 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Text Part
More informationedocs Home > BEA AquaLogic Service Bus 3.0 Documentation > Accessing ALDSP Data Services Through ALSB
Accessing ALDSP 3.0 Data Services Through ALSB 3.0 edocs Home > BEA AquaLogic Service Bus 3.0 Documentation > Accessing ALDSP Data Services Through ALSB Introduction AquaLogic Data Services Platform can
More informationAddendum to Cisco Physical Security Operations Manager Documentation, Release 6.1
Addendum to Cisco Physical Security Operations Manager Documentation, Release 6.1 January 31, 2013 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com
More informationFaculty Web Page Management System. Help Getting Started
Faculty Web Page Management System Help Getting Started 2 Table of Contents Faculty Web Page Management System...1 Help Getting Started...1 Table of Contents...2 Manage My Personal Information...3 Creating
More informationProduct overview. McAfee Web Protection Hybrid Integration Guide. Overview
McAfee Web Protection Hybrid Integration Guide Product overview Overview The McAfee Web Protection hybrid solution is the integration of McAfee Web Gateway and McAfee Web Gateway Cloud Service (McAfee
More informationProxy Log Configuration
Stealthwatch System Proxy Log Configuration (for Stealthwatch System v6.10.x) Copyrights and Trademarks 2018 Cisco Systems, Inc. All rights reserved. NOTICE THE SPECIFICATIONS AND INFORMATION REGARDING
More informationunisys Unisys Stealth(cloud) for Amazon Web Services Deployment Guide Release 2.0 May
unisys Unisys Stealth(cloud) for Amazon Web Services Deployment Guide Release 2.0 May 2016 8205 5658-002 NO WARRANTIES OF ANY NATURE ARE EXTENDED BY THIS DOCUMENT. Any product or related information described
More informationSecure Web Appliance. SSL Intercept
Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...
More informationPeopleFluent OrgPublisher HTML5 Installation and Configuration Guide
July 30, 2017 Document Version Number: 1.0 Copyright 2017, PeopleFluent. All Rights Reserved. Contents Contents Preface...1 Audience... 1 Intent... 1 Before You Begin... 1 Document Revision... 1 Document
More informationDeployment Guide AX Series with Oracle E-Business Suite 12
Deployment Guide AX Series with Oracle E-Business Suite 12 DG_OEBS_032013.1 TABLE OF CONTENTS 1 Introduction... 4 2 Deployment Prerequisites... 4 3 Oracle E-Business Topology... 5 4 Accessing the AX Series
More informationMcAfee Firewall Enterprise epolicy Orchestrator Extension
Integration Guide Revision A McAfee Firewall Enterprise epolicy Orchestrator Extension COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,
More informationAspera Connect Windows XP, 2003, Vista, 2008, 7. Document Version: 1
Aspera Connect 2.6.3 Windows XP, 2003, Vista, 2008, 7 Document Version: 1 2 Contents Contents Introduction... 3 Setting Up... 4 Upgrading from a Previous Version...4 Installation... 4 Set Up Network Environment...
More informationWebthority can provide single sign-on to web applications using one of the following authentication methods:
Webthority HOW TO Configure Web Single Sign-On Webthority can provide single sign-on to web applications using one of the following authentication methods: HTTP authentication (for example Kerberos, NTLM,
More informationFirewall Enterprise epolicy Orchestrator
Integration Guide McAfee Firewall Enterprise epolicy Orchestrator Extension version 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationOPC-UA Tutorial. A Guide to Configuring the TOP Server for OPC-UA
OPC-UA Tutorial A Guide to Configuring the TOP Server for OPC-UA Page 2 of 40 Table of Contents INTRODUCTION 4 Introduction to OPC UA 4 Introduction to TOP Server 5 Intended Audience 5 Prerequisites 6
More informationStorageCraft Cloud Backup
User Guide v1.3 (June 2017) StorageCraft Copyright Declaration StorageCraft ImageManager, StorageCraft ShadowProtect, StorageCraft Cloud, and StorageCraft Cloud Services, together with any associated logos,
More informationCisco Service Control Service Security: Outgoing Spam Mitigation Solution Guide, Release 4.1.x
CISCO SERVICE CONTROL SOLUTION GUIDE Cisco Service Control Service Security: Outgoing Spam Mitigation Solution Guide, Release 4.1.x 1 Introduction and Scope 2 Functionality Overview 3 Mass-Mailing-Based
More informationFileNET Guide for AHC PageMasters
PageMasters have the permissions necessary to perform the following tasks with Site Tools: ACADEMIC HEALTH CENTER 2 Application Requirements...3 Access FileNET...3 Log in to FileNET...3 Navigate the Site...3
More informationThe Evolved Office Assistant
The Evolved Office Assistant USER GUIDE TM 995 Old Eagle School Road Suite 315 Wayne, PA 19087 USA 610.964.8000 www.evolveip.net Release 1.0 Document Version 1 Copyright Notice Copyright 2008 Evolve IP,
More informationNetScaler Radius Authentication. Integration Guide
NetScaler Radius Authentication Integration Guide Copyright 2018 Crossmatch. All rights reserved. Specifications are subject to change without prior otice. The Crossmatch logo and Crossmatch are trademarks
More informationBlue Coat Systems SG810 Series
Blue Coat Systems SG810 Series Installation Guide Version: SGOS 4.2.x and 5.1.x Contact Information Blue Coat Systems Inc. 420 North Mary Ave Sunnyvale, CA 94085-4121 http://www.bluecoat.com/support/index.html
More informationAdobe Marketing Cloud Bloodhound for Mac 3.0
Adobe Marketing Cloud Bloodhound for Mac 3.0 Contents Adobe Bloodhound for Mac 3.x for OSX...3 Getting Started...4 Processing Rules Mapping...6 Enable SSL...7 View Hits...8 Save Hits into a Test...9 Compare
More informationTechDirect User's Guide for ProDeploy Client Suite
TechDirect User's Guide for ProDeploy Client Suite Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates
More informationTzunami Deployer Confluence Exporter Guide
Tzunami Deployer Confluence Exporter Guide Supports extraction of Confluence Enterprise contents and migrate to Microsoft SharePoint using Tzunami Deployer. Version 3.2 Table of Contents PREFACE... II
More informationClavis Webmail Manual
Clavis Webmail Manual By SYSCOM (USA) September 5, 2014 Version 1.3 1 Contents 1. How to Log in to Webmail... 3 2. How to Change Default Password... 4 3. How to Setup Email Forwarding... 5 4. How to Setup
More informationUSING STYLESHEETS TO DESIGN A WEB SITE IN DREAMWEAVER MX 2004
USING STYLESHEETS TO DESIGN A WEB SITE IN DREAMWEAVER MX 2004 Introduction This document assumes that you are familiar with the use of a computer keyboard and mouse, have a working knowledge of Microsoft
More informationBIG-IP DataSafe Configuration. Version 13.1
BIG-IP DataSafe Configuration Version 13.1 Table of Contents Table of Contents Adding BIG-IP DataSafe to the BIG-IP System...5 Overview: Adding BIG-IP DataSafe to the BIG-IP system... 5 Provisioning Fraud
More informationImplementing and Supporting Windows Intune
Implementing and Supporting Windows Intune Lab 4: Managing System Services Lab Manual Information in this document, including URL and other Internet Web site references, is subject to change without notice.
More informationORACLE USER PRODUCTIVITY KIT USAGE TRACKING ADMINISTRATION & REPORTING RELEASE SERVICE PACK 1 PART NO. E
ORACLE USER PRODUCTIVITY KIT USAGE TRACKING ADMINISTRATION & REPORTING RELEASE 3.6.1 SERVICE PACK 1 PART NO. E17383-01 MARCH 2010 COPYRIGHT Copyright 1998, 2010, Oracle and/or its affiliates. All rights
More informationRealPresence Media Manager
RealPresence CloudAXIS Suite Administrators Guide Software 1.3.1 USER GUIDE Software 6.7 January 2015 3725-75302-001A RealPresence Media Manager Polycom, Inc. 1 Copyright 2015, Polycom, Inc. All rights
More informationEnsim WEBppliance Pro for Windows 2000 (ServerXchange ) Installation Guide
Ensim WEBppliance Pro for Windows 2000 (ServerXchange ) Installation Guide October 8, 2003 About this guide Introduction... iii Intended audience... iii Printer-friendly version (for HTML documents)...
More informationFileNET Guide for AHC PageMasters
ACADEMIC HEALTH CENTER 2 PageMasters have the permissions necessary to perform the following tasks with Site Tools: Application Requirements...3 Access FileNET...3 Login to FileNET...3 Navigate the Site...3
More informationNovell Access Manager
Quick Start AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP2 June 11, 2010 www.novell.com Novell Access Manager 3.1 SP2 Quick Start Legal Notices Novell, Inc., makes no representations or warranties
More informationPolicy Manager for IBM WebSphere DataPower 7.2: Configuration Guide
Policy Manager for IBM WebSphere DataPower 7.2: Configuration Guide Policy Manager for IBM WebSphere DataPower Configuration Guide SOAPMDP_Config_7.2.0 Copyright Copyright 2015 SOA Software, Inc. All rights
More informationOcé Posterizer Pro Designer. POP into retail. User manual Application guide
- Océ Posterizer Pro Designer POP into retail o User manual Application guide Copyright copyright-2010 Océ All rights reserved. No part of this work may be reproduced, copied, adapted, or transmitted in
More informationHost Upgrade Utility User Guide for Cisco UCS E-Series Servers and the Cisco UCS E-Series Network Compute Engine
Host Upgrade Utility User Guide for Cisco UCS E-Series Servers and the Cisco UCS E-Series Network Compute First Published: August 09, 2013 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive
More informationEnterpriseTrack Reporting Data Model Configuration Guide Version 17
EnterpriseTrack EnterpriseTrack Reporting Data Model Configuration Guide Version 17 October 2018 Contents About This Guide... 5 Configuring EnterpriseTrack for Reporting... 7 Enabling the Reporting Data
More informationHTTP 1.1 Web Server and Client
HTTP 1.1 Web Server and Client Finding Feature Information HTTP 1.1 Web Server and Client Last Updated: June 01, 2011 The HTTP 1.1 Web Server and Client feature provides a consistent interface for users
More informationAndroid Mobile Single Sign-On to VMware Workspace ONE. SEP 2018 VMware Workspace ONE VMware Identity Manager VMware Identity Manager 3.
Android Mobile Single Sign-On to VMware Workspace ONE SEP 2018 VMware Workspace ONE VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on the VMware
More informationGetting Started with Amazon Web Services
Getting Started with Amazon Web Services Version 3.3 September 24, 2013 Contacting Leostream Leostream Corporation 411 Waverley Oaks Rd. Suite 316 Waltham, MA 02452 USA http://www.leostream.com Telephone:
More information