Manualsbrain.com
en
Deutsch
Español
Français
Italiano
Português
Русский
조선말, 한국어
日本語
中文
Manuals
Brands
Cisco
Cisco Web Security Appliance S690
User Guide
Cisco Cisco Web Security Appliance S690 User Guide
Download
Like
Full screen
Standard
Page
of
582
Go
xxi
Table 15-3: Anti-Malware Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .328
Table 15-4: Anti-Malware Settings for Access Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .330
Table 15-5: Anti-Malware Scanning Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .332
Table 16-1: Web Security Appliance Authentication Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .338
Table 16-2: Basic versus NTLMSSP Authentication Schemes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .339
Table 16-3: Methods of Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .339
Table 16-4: Pros and Cons of Explicit Forward Basic Authentication . . . . . . . . . . . . . . . . . . . . . . . . . .340
Table 16-5: Pros and Cons of Transparent Basic Authentication—IP Caching . . . . . . . . . . . . . . . . . . .341
Table 16-6: Pros and Cons of Transparent Basic Authentication—Cookie Caching . . . . . . . . . . . . . . .342
Table 16-7: Pros and Cons of Explicit Forward NTLM Authentication . . . . . . . . . . . . . . . . . . . . . . . . .343
Table 16-8: Global Authentication Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .354
Table 16-9: Transparent Proxy Mode Authentication Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .356
Table 16-10: Explicit Forward Proxy Mode Authentication Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . .360
Table 16-11: Supported Authentication Surrogates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .369
Table 16-12: LDAP Authentication Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .370
Table 16-13: LDAP Group Authorization—Group Object Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . .374
Table 16-14: LDAP Group Authorization—User Object Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .374
Table 16-15: NTLM Authentication Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .377
Table 16-16: Supported Active Directory Server Characters — User Name Field. . . . . . . . . . . . . . . . . .381
Table 16-17: Supported Active Directory Server Characters — Password Field . . . . . . . . . . . . . . . . . . .381
Table 16-18: Supported Active Directory Server Characters — Location Field . . . . . . . . . . . . . . . . . . . .382
Table 16-19: Supported Active Directory Server Characters — Group Field . . . . . . . . . . . . . . . . . . . . .382
Table 16-20: Supported LDAP Server Characters — User Name Field . . . . . . . . . . . . . . . . . . . . . . . . . .383
Table 16-21: Supported LDAP Server Characters — Password Field . . . . . . . . . . . . . . . . . . . . . . . . . . .383
Table 16-22: Supported LDAP Server Characters — Group Field. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .383
Table 16-23: Supported LDAP Server Characters — Custom User Filter Query Field . . . . . . . . . . . . . . .384
Table 16-24: Supported LDAP Server Characters — Custom Group Filter Query Field . . . . . . . . . . . . .384
Table 17-1: L4 Traffic Monitor Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .391
Table 17-2: L4 Traffic Monitor Scanning Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .393
Table 18-1: Time Intervals for Data Collection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .397
Prev
Next
1
…
19
20
21
22
23
…
582