Cisco Cisco Content Security Management Appliance M390 Guida Utente
Appendix D Examples
D-20
Cisco IronPort AsyncOS 7.2.0 for Security Management User Guide
OL-21768-01
The only challenge with this method is if you have a default policy or identity that
differs between sites. For example, if you have a policy set for “default allow with
auth” at one site and a “default deny” at another. At this point you will need to
create per-appliance identities and policies just above the default; essentially
creating your own “default” policy.
differs between sites. For example, if you have a policy set for “default allow with
auth” at one site and a “default deny” at another. At this point you will need to
create per-appliance identities and policies just above the default; essentially
creating your own “default” policy.
Related Topics
Table D-6
lists each of the topics discussed in this example. Click on the link for
details on each topic.
Example 7: Customizing Access Policies on Remote Web
Security Appliances and Managing Them on a Central Security
Management Appliance
Security Appliances and Managing Them on a Central Security
Management Appliance
Note
This example assumes that you have Configuration 6.3 initialized.
Many customers want to use one Security Management appliance to manage
multiple Web Security appliance deployments, where access policy can vary by
geographic location due to local laws.
multiple Web Security appliance deployments, where access policy can vary by
geographic location due to local laws.
For example, you may need a customized set of rules for employees in China,
North America, and Europe, where the access policies can be locally
administered.
North America, and Europe, where the access policies can be locally
administered.
In this scenario, we explain how to customize access policies for geographic
remote Web Security appliances and give local control of the access policy to the
local administrator on the Security Management appliance.
remote Web Security appliances and give local control of the access policy to the
local administrator on the Security Management appliance.
Table D-6
Related Topics for Importing a New Configuration File
Feature Name
Feature Information
Configuration Masters