Cisco Cisco ScanSafe Web Filtering 기술 매뉴얼
Introduction
This document describes how to configure a Blue Coat ProxySG to upload its log files to
the Cisco Cognitive Threat Analytics (CTA) system. Once the log files have been uploaded
to the system, CTA analyzes the data and reports findings to the CTA portal.
the Cisco Cognitive Threat Analytics (CTA) system. Once the log files have been uploaded
to the system, CTA analyzes the data and reports findings to the CTA portal.
Prerequisites
Requirements
Cisco ScanCenter is the administration portal into Cisco Cloud Web Security. You must first
create a device account in Cisco ScanCenter for your Blue Coat ProxySG.
create a device account in Cisco ScanCenter for your Blue Coat ProxySG.
• Log in to Cisco ScanCenter
• Click the Threats tab
• Click the Threats tab
• Click the global settings menu icon in the upper-right corner of the page
• Click Device Accounts
• Click Device Accounts
• Choose Automatic upload method
For further information, refer to the “
" section of the Cisco
ScanCenter Administrator Guide.
Once the device account is created, copy this information from the Add Device Account
page in Cisco ScanCenter to paste into your proxy configuration:
page in Cisco ScanCenter to paste into your proxy configuration:
• HTTPS host: etr.cloudsec.sco.cisco.com
• HTTPS path
• Device username generated for your proxy device, case sensitive, different per
• HTTPS path
• Device username generated for your proxy device, case sensitive, different per
proxy device
• Device password, case sensitive
In order to access your Blue Coat ProxySG, you need:
• Hostname or IP address of your Blue Coat ProxySG
• Login credentials to the Blue Coat ProxySG
• Login credentials to the Blue Coat ProxySG
o
Default username is admin
o
No default password, must be configured
• Web browser with Java
TM
plug-in, Blue Coat does NOT support Google Chrome,
Opera, or Safari
Caution:
The information in this document was created from devices in a lab environment. If
your network is live, understand the potential impact of any configuration command.