Symantec ProxySG 6.6 Basic Administration
Prerequisites & Audience
This course assumes that students have a basic understanding of networking concepts, such as local-area networks (LANs), the Internet, security, and IP protocols.
Course Objectives
By the completion of this course, you will be able to:
Describe the major Secure Web Gateway functions of the ProxySG
License and configure a ProxySG
Deploy a ProxySG in either explicit or transparent mode
Use the Visual Policy Manager to write policies to manage web filtering, authentication, and SSL traffic management
Use ProxySG access logs to generate reports.
Course Topics
Module 1: Introduction to the Symantec ProxySG Secure Web Gateway
Describe the functions of …
Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.
Prerequisites & Audience
This course assumes that students have a basic understanding of
networking concepts, such as local-area networks (LANs), the
Internet, security, and IP protocols.
Course Objectives
By the completion of this course, you will be able to:
Describe the major Secure Web Gateway functions of the ProxySG
License and configure a ProxySG
Deploy a ProxySG in either explicit or transparent mode
Use the Visual Policy Manager to write policies to manage web filtering, authentication, and SSL traffic management
Use ProxySG access logs to generate reports.
Course Topics
Module 1: Introduction to the Symantec ProxySG Secure Web Gateway
Describe the functions of a proxy server
Differentiate proxy servers from firewalls
Describe the key features and benefits of the ProxySG
List the various ProxySG models
Access online Symantec community resources
Module 2: ProxySG Security Deployment Options
Describe the three network deployment methods
Describe the three possible roles of the ProxySG
Module 3: ProxySG Management Console
Describe the relationship between the Management Console and the ProxySG CLI
Describe the primary function of the major areas of the Management Console
Use the Management Console to access on-box help and Symantec product documentation
Module 4: Traffic Interception Using Proxy Services
Understand the functions of proxy services, listeners, and proxy types
Describe the three most common proxy services
Explain how the intercept and bypass settings affect what happens to network traffic passing through the ProxySG
Explain the function of common global proxy service settings
Module 5: Hypertext Transfer Protocol
Understand how a connection is initiated over the transport layer
Identify the components of an HTTP URL
Explain the two types of HTTP messages: request and response
Identify common response codes
Module 6: Introduction to the Visual Policy Manager
Describe the relationship among the VPM, CPL, and the Management Console
Describe the default processing order for policy layers and rules
Describe triggers and actions that can be used in writing policy
Identify the types of objects that the VPM supports
Describe some of the best practices to be followed when using the VPM to create policy
Module 7: Filtering Web Content
Describe the main concepts of web filtering
Describe the primary category databases
Describe the category types available to policy
Describe how WebFilter and WebPulse work together
Module 8: Using Threat Intelligence to Defend the Network
Understand Intelligence Services as provided by the Global Intelligence Network
Understand Geolocation and Threat Risk Levels and how they can be used in policy
Module 9: Ensuring Safe Downloads
Describe how malware can be transmitted via HTTP
Explain the methods, advantages, and disadvantages of file type detection
Describe some of the considerations in deciding what content to block as possible malware sources
Module 10: Notifying User of Internet Usage Policies
Explain the function and various components of built-in and custom exception pages
Describe the function of Notify User objects
Identify the types of pages that can be sent to users by using Notify User objects
Describe splash pages and coaching pages using Notify User objects in the VPM
Module 11: Access Logging on the ProxySG
Describe, at a high level, how the ProxySG performs access logging
Describe the components of a ProxySG access log facility
Identify default log facilities and log formats
Describe common use cases for periodic and continuous uploading of access logs
Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.

