Cisco Cisco Web Security Appliance S360 Guía Del Usuario
M I S C E L L A N E O U S O P T I O N S
C H A P T E R 5 : W E B P R O X Y S E R V I C E S
103
Enter minimum idle
timeout for checking
unresponsive upstream
proxy (in seconds).
timeout for checking
unresponsive upstream
proxy (in seconds).
Time in
seconds
seconds
10
No
The minimum amount of time the
Web Proxy waits before checking if an
upstream proxy is still unavailable.
Web Proxy waits before checking if an
upstream proxy is still unavailable.
Enter maximum idle
timeout for checking
unresponsive upstream
proxy (in seconds).
timeout for checking
unresponsive upstream
proxy (in seconds).
Time in
seconds
seconds
86400
No
The maximum amount of time the
Web Proxy waits before checking if an
upstream proxy is still unavailable.
Web Proxy waits before checking if an
upstream proxy is still unavailable.
Mode of the proxy:
1, 2, 3
2
Yes
Choose how to deploy the Web Proxy
using one of the following options:
1. Explicit forward mode only
2. Transparent mode with L4 Switch or
no device for redirection
3. Transparent mode with WCCP v2
Router for redirection
For more information, see
“Deployment Overview” on page 28.
using one of the following options:
1. Explicit forward mode only
2. Transparent mode with L4 Switch or
no device for redirection
3. Transparent mode with WCCP v2
Router for redirection
For more information, see
“Deployment Overview” on page 28.
Spoofing of the client IP
by the proxy:
by the proxy:
1, 2, 3
1
Choose whether or not the Web Proxy
should spoof IP addresses when
sending requests to upstream proxies
and servers using one of the following
options:
1. Disable
2. Enable for all requests
3. Enable for transparent requests only
When IP spoofing is enabled, requests
originating from a client retain the
client’s source address and appear to
originate from the client rather than
from the Web Security appliance.
Note: When IP spoofing is enabled
and the appliance is connected to a
WCCP router, configure a WCCP
service to redirect the return path.
should spoof IP addresses when
sending requests to upstream proxies
and servers using one of the following
options:
1. Disable
2. Enable for all requests
3. Enable for transparent requests only
When IP spoofing is enabled, requests
originating from a client retain the
client’s source address and appear to
originate from the client rather than
from the Web Security appliance.
Note: When IP spoofing is enabled
and the appliance is connected to a
WCCP router, configure a WCCP
service to redirect the return path.
Table 5-10 advancedproxyconfig CLI Command—Miscellaneous Options (Continued)
Option
Valid
Values
Values
Default
Value
Value
Must Restart
Web Proxy?
Web Proxy?
Description