Cisco Cisco Content Security Management Appliance M1070 Mode D'Emploi

Page de 408
 
9-8
AsyncOS 8.3.5 for Cisco Content Security Management User Guide
 
Chapter 9      Managing Web Security Appliances
  Setting Up Configuration Masters to Centrally Manage Web Security Appliances
Configuring Web
 
Security
 
Features Directly in Configuration
 
Masters 
You can configure the following features in a Configuration Master, depending on the version: 
To configure settings for each feature directly in a configuration master, choose Web > Configuration 
Master
 <version> > <feature>
Except for the few items described in 
, instructions for configuring features in a Configuration Master are the 
same as instructions for configuring the same features on the Web Security appliance. For instructions, 
see the online help in your Web Security appliance or the AsyncOS for Cisco Web Security Appliances 
User Guide
 for the AsyncOS version corresponding to the Configuration Master version. If necessary, 
consult the following topic to determine the correct Configuration Master for your Web Security 
appliance: 
All versions of Web Security user guides are available from 
SMA-Specific Differences when Configuring Features in Configuration Masters 
When you configure a feature in a Configuration Master, note the following differences from configuring 
the same feature directly on the Web Security appliance. 
Configuration Master 7.5
Configuration Master 7.7 
Configuration Master 8.0 
Identities
SaaS Policies
Decryption Policies
Routing Policies
Access Policies
Overall Bandwidth Limits
Cisco Data Security
External Data Loss 
Prevention
Outbound Malware Scanning
Custom URL Categories
Defined Time Ranges
Bypass Settings
Identities
SaaS Policies
Decryption Policies
Routing Policies
Access Policies
Overall Bandwidth Limits
Cisco Data Security
External Data Loss 
Prevention
Outbound Malware 
Scanning
SOCKS Policies
Custom URL Categories
Defined Time Ranges
Bypass Settings
Identities
SaaS Policies
Decryption Policies
Routing Policies
Access Policies
Overall Bandwidth Limits
Cisco Data Security
External Data Loss 
Prevention
Outbound Malware 
Scanning
SOCKS Policies
Custom URL Categories
Defined Time Ranges
Bypass Settings