Symantec ProxySG 6.6 Basic Administration (BCCPA) (PROXYBASIC)

 

Pré-requis

This course assumes that students have a basic understanding of networking concepts, such as local-area networks (LANs), the Internet, security, and IP protocols.

Objectifs

By the completion of this course, you will be able to:

  • Describe the major Secure Web Gateway functions of the ProxySG
  • License and configure a ProxySG
  • Deploy a ProxySG in either explicit or transparent mode
  • Use the Visual Policy Manager to write policies to manage web filtering, authentication, and SSL traffic management
  • Use ProxySG access logs to generate reports.

Contenu

Module 1: Introduction to the Symantec ProxySG Secure Web Gateway

  • Describe the functions of a proxy server
  • Differentiate proxy servers from firewalls
  • Describe the key features and benefits of the ProxySG
  • List the various ProxySG models
  • Access online Symantec community resources
  • Module 2: ProxySG Security Deployment Options
  • Describe the three network deployment methods
  • Describe the three possible roles of the ProxySG

Module 3: ProxySG Management Console

  • Describe the relationship between the Management Console and the ProxySG CLI
  • Describe the primary function of the major areas of the Management Console
  • Use the Management Console to access on-box help and Symantec product documentation
  • Module 4: Traffic Interception Using Proxy Services
  • Understand the functions of proxy services, listeners, and proxy types
  • Describe the three most common proxy services
  • Explain how the intercept and bypass settings affect what happens to network traffic passing through the ProxySG
  • Explain the function of common global proxy service settings

Module 5: Hypertext Transfer Protocol

  • Understand how a connection is initiated over the transport layer
  • Identify the components of an HTTP URL
  • Explain the two types of HTTP messages: request and response
  • Identify common response codes

Module 6: Introduction to the Visual Policy Manager

  • Describe the relationship among the VPM, CPL, and the Management Console
  • Describe the default processing order for policy layers and rules
  • Describe triggers and actions that can be used in writing policy
  • Identify the types of objects that the VPM supports
  • Describe some of the best practices to be followed when using the VPM to create policy

Module 7: Filtering Web Content

  • Describe the main concepts of web filtering
  • Describe the primary category databases
  • Describe the category types available to policy
  • Describe how WebFilter and WebPulse work together

Module 8: Using Threat Intelligence to Defend the Network

  • Understand Intelligence Services as provided by the Global Intelligence Network
  • Understand Geolocation and Threat Risk Levels and how they can be used in policy

Module 9: Ensuring Safe Downloads

  • Describe how malware can be transmitted via HTTP
  • Explain the methods, advantages, and disadvantages of file type detection
  • Describe some of the considerations in deciding what content to block as possible malware sources

Module 10: Notifying User of Internet Usage Policies

  • Explain the function and various components of built-in and custom exception pages
  • Describe the function of Notify User objects
  • Identify the types of pages that can be sent to users by using Notify User objects
  • Describe splash pages and coaching pages using Notify User objects in the VPM

Module 11: Access Logging on the ProxySG

  • Describe, at a high level, how the ProxySG performs access logging
  • Describe the components of a ProxySG access log facility
  • Identify default log facilities and log formats
  • Describe common use cases for periodic and continuous uploading of access logs
Formation en ligne

Durée 2 jours

Prix (Hors Taxe)
  • 1 800,- €
Classroom training

Durée 2 jours

Prix (Hors Taxe)
  • France: 1 800,- €

Actuellement aucune session planifiée  Demande de date