Duration: 2 Days
In this comprehensive two-day course containing hands-on labs, demos, and presentations, you will learn to install, configure, operate, and maintain the S-Series web security appliances. You will focus on HTTP and HTTPS proxy services, L4 traffic monitoring, authentication and web access control, URL filtering, anti-malware filtering, troubleshooting S-Series configuration issues, and S-Series deployment. Hands-on labs provide you with a safe environment to experiment with malware and attempt configurations that might not be appropriate for a production network.
What You Will Learn
- HTTP and HTTPS proxy services L4 traffic monitoring
- Authentication and web access control
- URL filtering anti-malware filtering
- Troubleshoot S-Series configuration issues
- S-Series deployment
Audience
- Security architects and system designers
- Network administrators and operations engineers
- Network or security managers responsible for web security
Prerequistes
- Knowledge of TCP/IP services, including DNS, SSH, FTP, SNMP, HTTP, and HTTPS
- Familiarity with IP routing
- Familiarity with the Cisco IronPort S-Series Overview, or equivalent knowledge
Course Outline
1. Product and Malware Overview
2. S-Series
- Key Features
- Malware Threats
3. L4TM Setup
4. Web Proxy
5. HTTPS
- Configuring the HTTPS Proxy Service Web Reputation Filtering
6. WBRS
7. DVS
8. Webroot
9. MacAfee Scanning
- Working with Webroot and McAfee
10. Authentication
- Configuring and Testing Web Security Manager
11. Access Control
12. L4TM Policies
13. Configuring Web Security Manager
14. Configuring the HTTPS Proxy Service
15. Use Case Scenarios
- System Administration
- Reports
16. System Administration Troubleshooting
- Ports and Tools
- Logs
- Alerts
17. Command Line Interface (CLI)
18. SNMP
- Monitoring Other Deployment Scenarios
- Transparent Proxy Mode
19. Deployment Life Cycle
- Multi-Appliance Deployment
Course Labs
Lab 1: Deploying Proxy Services
Lab 2: Utilizing Authentication
Lab 3: Configuring WSA Policies
Lab 4: Enforcing Acceptable Use
Lab 5: Defending Against Malware
Lab 6: Data Security
Lab 7: Administrative Tasks
Lab 8: Troubleshooting