Cisco Cisco Web Security Appliance S660 Guide De Montage

Page de 22
18
15  
Additional Configuration
Congratulations. Now that you have completed the installation 
and basic configuration, you can start using your 
Cisco S190 Web Security Appliance. You may wish to consider 
taking some of the following steps to get more out of the 
appliance:
User Policies
Use the web interface to create policies that define which users 
can access which web resources as necessary. 
  •
Identify Users—Choose Web Security Manager > 
Identification Profiles 
to define groups of users that can 
access the Internet.
  •
Define Access Policies—Choose Web Security Manager > 
Access Policies
 to control user access to the Internet by 
configuring which objects and applications to allow or 
block, which URL categories to monitor or block, and web 
reputation and anti-malware settings.
Traffic Monitor
After running the System Setup Wizard, one 
or both L4 traffic monitor ports (T1 only or 
both T1 and T2) are configured to listen to 
traffic on all TCP ports. The default setting 
for the L4 traffic monitor is monitor only. 
During or after setup, you can configure the 
L4 traffic monitor to both monitor and 
block suspicious traffic. 
Computer 
Address
Remember to change your computer IP 
address back to the original settings that 
you noted in the 
.
Item
Description