Beruflich Dokumente
Kultur Dokumente
• General Knowledge
• Products
• Deployment Method
• Initial Setup
• Content Filter & Authentication
• Policy Management - VPM
• Access Logging & Failover
• Bluecoat Reporter
• Troubleshooting
• Designed to:
• Enhance security
• Control content
• Increase performances
Blue Coat RA
Bluecoat Packetshaper
Bluecoat DLP
SG8100 Series
Headquarters
SG9000 Series
Corporate
SG810 Series
SG900 Series
businesses
Medium
SG510 Series
SG200 Series SG600 Series
SG300 Series
Remote
Offices
Proxy Role
• Forward Proxy
• Reverse Proxy
• Physical Installation
• Basic Setup
• Licensing
Microsoft Office
Microsoft Office Word 97 - 2003 Document
Word 97 - 2003 Document
• Local database
IWA
• Windows NT Domains and Active Directory
• Basic, NTLM, and Kerberos credentials
• BCAAA agent is required for integrating with Micrsoft AD
• BCCAA version and the Proxy version has to be the same
LDAP
• Active Directory and other LDAP Databases
Sequence
• List of authentication realms to be processed
Deny
• Default option for Blue Coat SG
• All network traffic received by the proxy is blocked
Allow
• Network traffic is allowed through the proxy
• Other policies can deny selected traffic
Source: ANY
Destination: Hacking
Service: ANY
Time: ANY
Action: DENY
Track: none
“Employees can visit travel web sites only outside regular working hours”
• Source: ANY
• Destination: Travel
• Service: ANY
• Time: Mon-Fri; 08:00..17:00
• Action: DENY
• Track: none
Microsoft Office
Word 97 - 2003 Document
Track Usage
• Entire network
• Specific information
• User or department usage patterns
• Failover allows a second machine to take over in case a primary machine fails
• Works on master-slave model
• Similar to VRRP with following exceptions
o A configurable IP multicast address is the destination of the advertisements.
o The advertisements’ interval is included in protocol messages and is learned by the slaves.
o A virtual router identifier (VRID) is not used.
o Virtual MAC addresses are not used.
o MD5 is used for authentication at the application level.
• Master takes over once online
Microsoft Office
Word 97 - 2003 Document
• Access Logs
• Event Logs
• Policy Trace
• Packet Capture on Bluecoat
• Packet Capture on User Machine
• Health Check
•Management logs
•Hardware specific logs
•Event logs can be viewed from StatisticsAdvanced option
•It can also be viewed from URL https://x.x.x.x:8082/eventlog/statistics
To find –
• traffic is hitting which policy
• Reason of Blocking/Allowing the connection
• Authentication is working fine or not
C:\Documents and
Settings\badal.chandani
• Proxy can perform health check on HTTP, HTTPS, ICAP, Websense and SOCKS gateways
• Periodically verifies availability and health status of the host
• Time interval is configurable
• Failed health check results in administrator notification
• Health checks are configurable in the Management Console by going to the Management
Console > Configuration tab > Health Checks > General