Cisco Cisco Web Security Appliance S170 Guida Utente
C H A P T E R
10-1
Cisco IronPort AsyncOS 7.7 for Web User Guide
10
Working with External Proxies
•
•
•
•
•
Working with External Proxies Overview
The Web Security appliance is a proxy-compatible device, and is easily deployed within an existing
proxy environment. However, it is recommended that you place the appliance downstream from existing
proxy servers, meaning closer to the clients.
proxy environment. However, it is recommended that you place the appliance downstream from existing
proxy servers, meaning closer to the clients.
You can configure the appliance to work with multiple existing, upstream proxies. Use the Network >
Upstream Proxies page to define upstream proxies or to modify existing settings. You define groups of
proxies, and you can configure the appliance to use load balancing and failover features when connecting
to multiple proxies.
Upstream Proxies page to define upstream proxies or to modify existing settings. You define groups of
proxies, and you can configure the appliance to use load balancing and failover features when connecting
to multiple proxies.
After defining proxy groups, you can create Routing Policies to determine whether the Web Proxy
connects to the server identified by the client or to a member of one the proxy groups.
connects to the server identified by the client or to a member of one the proxy groups.
For more information about using Routing Policies to route transactions, see
. For more information about defining external proxies, see
.
Routing Traffic to Upstream Proxies
When the Web Proxy does not deliver a response from the cache, it can direct client requests directly to
the destination server or to an external proxy on the network. You use Routing Policies to create rules
that indicate when and to where to direct transactions. A Routing Policy determines to where to pass the
client request, either to another proxy (as defined by the proxy group) or to the destination server. It
addresses the question, “from where to fetch content?” You might want to create Routing Policies if you
have a highly distributed network.
the destination server or to an external proxy on the network. You use Routing Policies to create rules
that indicate when and to where to direct transactions. A Routing Policy determines to where to pass the
client request, either to another proxy (as defined by the proxy group) or to the destination server. It
addresses the question, “from where to fetch content?” You might want to create Routing Policies if you
have a highly distributed network.
shows Routing Policies on the Web Security Manager > Routing Policies page.