Cisco Cisco Content Security Management Appliance M390 Guía Del Usuario
9-8
AsyncOS 8.1 for Cisco Content Security Management User Guide
Chapter 9 Managing Web Security Appliances
Step 5
In the New Master Defaults section, click Browse and select a valid configuration file from a Web
Security appliance.
Security appliance.
Step 6
Click Import File.
Step 7
Click Import.
Configuring Web
Security
Features Directly in Configuration
Masters
You can configure the following features in a Configuration Master, depending on the version:
To configure settings for each feature directly in a configuration master, choose Web > Configuration
Master <version> > <feature>.
Master <version> > <feature>.
Except for the few items described in
, instructions for configuring features in a Configuration Master are the
same as instructions for configuring the same features on the Web Security appliance. For instructions,
see the online help in your Web Security appliance or the Cisco IronPort AsyncOS for Web Security User
Guide for the AsyncOS version corresponding to the Configuration Master version. If necessary, consult
the following topic to determine the correct Configuration Master for your Web Security appliance:
see the online help in your Web Security appliance or the Cisco IronPort AsyncOS for Web Security User
Guide for the AsyncOS version corresponding to the Configuration Master version. If necessary, consult
the following topic to determine the correct Configuration Master for your Web Security appliance:
.
All versions of Web Security user guides are available from
.
Configuration Master 7.1
Configuration Master 7.5
Configuration Master 7.7
•
Identities
•
SaaS Policies
•
Decryption Policies
•
Routing Policies
•
Access Policies
•
Overall Bandwidth Limits
•
Cisco IronPort Data Security
•
External Data Loss
Prevention
Prevention
•
Outbound Malware Scanning
•
Custom URL Categories
•
Defined Time Ranges
•
Bypass Settings
•
Identities
•
SaaS Policies
•
Decryption Policies
•
Routing Policies
•
Access Policies
•
Overall Bandwidth Limits
•
Cisco IronPort Data Security
•
External Data Loss
Prevention
Prevention
•
Outbound Malware Scanning
•
Custom URL Categories
•
Defined Time Ranges
•
Bypass Settings
•
Identities
•
SaaS Policies
•
Decryption Policies
•
Routing Policies
•
Access Policies
•
Overall Bandwidth
Limits
Limits
•
Cisco IronPort Data
Security
Security
•
External Data Loss
Prevention
Prevention
•
Outbound Malware
Scanning
Scanning
•
SOCKS Policies
•
Custom URL Categories
•
Defined Time Ranges
•
Bypass Settings