Cisco Cisco Content Security Management Appliance M390 사용자 가이드
9-8
AsyncOS 8.3.5 for Cisco Content Security Management User Guide
Chapter 9 Managing Web Security Appliances
Setting Up Configuration Masters to Centrally Manage Web Security Appliances
Configuring Web
Security
Features Directly in Configuration
Masters
You can configure the following features in a Configuration Master, depending on the version:
To configure settings for each feature directly in a configuration master, choose Web > Configuration
Master <version> > <feature>.
Master <version> > <feature>.
Except for the few items described in
, instructions for configuring features in a Configuration Master are the
same as instructions for configuring the same features on the Web Security appliance. For instructions,
see the online help in your Web Security appliance or the AsyncOS for Cisco Web Security Appliances
User Guide for the AsyncOS version corresponding to the Configuration Master version. If necessary,
consult the following topic to determine the correct Configuration Master for your Web Security
appliance:
see the online help in your Web Security appliance or the AsyncOS for Cisco Web Security Appliances
User Guide for the AsyncOS version corresponding to the Configuration Master version. If necessary,
consult the following topic to determine the correct Configuration Master for your Web Security
appliance:
All versions of Web Security user guides are available from
.
SMA-Specific Differences when Configuring Features in Configuration Masters
When you configure a feature in a Configuration Master, note the following differences from configuring
the same feature directly on the Web Security appliance.
the same feature directly on the Web Security appliance.
Configuration Master 7.5
Configuration Master 7.7
Configuration Master 8.0
•
Identities
•
SaaS Policies
•
Decryption Policies
•
Routing Policies
•
Access Policies
•
Overall Bandwidth Limits
•
Cisco Data Security
•
External Data Loss
Prevention
Prevention
•
Outbound Malware Scanning
•
Custom URL Categories
•
Defined Time Ranges
•
Bypass Settings
•
Identities
•
SaaS Policies
•
Decryption Policies
•
Routing Policies
•
Access Policies
•
Overall Bandwidth Limits
•
Cisco Data Security
•
External Data Loss
Prevention
Prevention
•
Outbound Malware
Scanning
Scanning
•
SOCKS Policies
•
Custom URL Categories
•
Defined Time Ranges
•
Bypass Settings
•
Identities
•
SaaS Policies
•
Decryption Policies
•
Routing Policies
•
Access Policies
•
Overall Bandwidth Limits
•
Cisco Data Security
•
External Data Loss
Prevention
Prevention
•
Outbound Malware
Scanning
Scanning
•
SOCKS Policies
•
Custom URL Categories
•
Defined Time Ranges
•
Bypass Settings