Cisco Cisco Content Security Management Appliance M1070 Mode D'Emploi

Page de 413
 
8-8
Cisco IronPort AsyncOS 8.0 for Security Management User Guide
Chapter 8      Managing Web Security Appliances
Step 5
In the New Master Defaults section, click Browse and select a valid configuration file from a Web 
Security appliance. 
Step 6
Click Import File.
Step 7
Click Import.
Configuring Web
 
Security
 
Features Directly in Configuration
 
Masters 
You can configure the following features in a Configuration Master, depending on the version: 
To configure settings for each feature directly in a configuration master, choose Web > Configuration 
Master
 <version> > <feature>
Except for the few items described in 
, instructions for configuring features in a Configuration Master are the 
same as instructions for configuring the same features on the Web Security appliance. For instructions, 
see the online help in your Web Security appliance or the Cisco IronPort AsyncOS for Web Security User 
Guide
 for the AsyncOS version corresponding to the Configuration Master version. If necessary, consult 
the following topic to determine the correct Configuration Master for your Web Security appliance: 
All versions of Web Security user guides are available from 
Configuration Master 7.1
Configuration Master 7.5
Configuration Master 7.7 
  •
Identities
  •
SaaS Policies
  •
Decryption Policies
  •
Routing Policies
  •
Access Policies
  •
Overall Bandwidth Limits
  •
Cisco IronPort Data Security
  •
External Data Loss 
Prevention
  •
Outbound Malware Scanning
  •
Custom URL Categories
  •
Defined Time Ranges
  •
Bypass Settings
  •
Identities
  •
SaaS Policies
  •
Decryption Policies
  •
Routing Policies
  •
Access Policies
  •
Overall Bandwidth Limits
  •
Cisco IronPort Data Security
  •
External Data Loss 
Prevention
  •
Outbound Malware Scanning
  •
Custom URL Categories
  •
Defined Time Ranges
  •
Bypass Settings
  •
Identities
  •
SaaS Policies
  •
Decryption Policies
  •
Routing Policies
  •
Access Policies
  •
Overall Bandwidth 
Limits
  •
Cisco IronPort Data 
Security
  •
External Data Loss 
Prevention
  •
Outbound Malware 
Scanning
  •
SOCKS Policies
  •
Custom URL Categories
  •
Defined Time Ranges
  •
Bypass Settings