SWS Student Guide, Courseware, Symantec, Symantec Web Security 2.5 CourseWare

[ Pobierz całość w formacie PDF ]
//-->ForSymantecPartnerInternalSymantec WebSecurity 2.5Student GuideRevision April 25, 2002Part Number: SM-00020StaffTrainingOnlyCopyright NoticeSymantec and the Symantec logo are U.S. registered trademarks of Symantec Corporation.Other brands and products are trademarks of their respective holder/s. Copyright © 2002Symantec Corporation. All Rights Reserved. Any technical documentation that is madeavailable by Symantec Corporation is the copyrighted work of Symantec Corporation and isowned by Symantec Corporation.NO WARRANTY. The technical documentation is being delivered to you AS-IS, andSymantec Corporation makes no warranty as to its accuracy or use. Any use of the technicaldocumentation or the information contained therein is at the risk of the user. Documentationmay include technical or other inaccuracies or typographical errors. Symantec reserves theright to make changes without prior notice.No part of this publication may be copied without the express written permission ofSymantec Corporation, 20330 Stevens Creek Blvd., Cupertino, CA 95014.TrademarksForSymantecSymantec, the Symantec logo, Intruder Alert, NetProwler, Raptor, VelociRaptor, SymantecDesktop Firewall, Symantec Enterprise VPN, Symantec Enterprise Firewall, RaptorMobile,NetRecon, Enterprise Security Manager, NAV, Norton AntiVirus, Symantec System Center,Symantec Web Security, Mail-Gear and Symantec Web Security, pcAnywhere are trademarksof Symantec Corporation.Windows is a registered trademark of Microsoft Corporation. Pentium is a registeredtrademark of Intel Corporation. Other product names mentioned in this manual may betrademarks of their respective companies and are hereby acknowledged.Printed in the United States of America.10987654321PartnerInternalStaffTrainingOnlyTable of ContentsCourse Overview................................................................................................................................ixIntended Audience ...................................................................................................................ixCourse Prerequisites.................................................................................................................ixRelated Documentation ............................................................................................................ixConventions..............................................................................................................................xCourse Description ....................................................................................................................xCourse Objectives ....................................................................................................................xiCourse Agenda.................................................................................................................................xiiDay 1.....................................................................................................................................xiiDay 2.....................................................................................................................................xiiUnit 1 Understanding Symantec Web Security .................................................................................. 1-1Overview................................................................................................................................. 1-1Understanding Symantec Web Security (SWS)............................................................................ 1-2Defining SWS ....................................................................................................................... 1-2How SWS provides protection....................................................................................................1-4Antivirus protection ............................................................................................................... 1-4Content filtering protection .................................................................................................... 1-6Understanding lists.................................................................................................................. 1-8Differentiating predefined and local lists ................................................................................. 1-8Understanding dictionaries and DDR....................................................................................... 1-10Defining Dynamic Document Review (DDR) ........................................................................... 1-10How DDR works .................................................................................................................. 1-10Understanding list access states..............................................................................................1-12Understanding how lists and dictionaries work together............................................................. 1-14The relationship between lists and dictionaries ...................................................................... 1-14What happens when a URL is accidentally placed in conflicting list states................................ 1-16Overriding the list access state of a predefined list ................................................................. 1-16Lab 1-1:Understanding how SWS uses lists.............................................................................. 1-19Unit 2 Pre-installation considerations............................................................................................... 2-1Overview................................................................................................................................. 2-1Deploying Symantec Web Security............................................................................................. 2-2Options to consider before deploying SWS ............................................................................... 2-2Understanding the deployment options...................................................................................... 2-4Using SWS as a proxy within a network versus a CVP resource ................................................... 2-4Differentiating centralized and distributed deployment ............................................................. 2-6Configuring browsers versus transparent proxying ..................................................................... 2-8System versus object based policy- content filtering only ........................................................ 2-10ForSymUnit 3 Installing and uninstalling SWS ............................................................................................. 3-1Overview................................................................................................................................. 3-1Understanding the complete installation process.........................................................................3-2Process overview ................................................................................................................... 3-2Completing the pre-installation checklist.................................................................................... 3-4iantecPartnerInternalStaffTrainingOnlyUnit 4 Administration fundamentals.................................................................................................4-1Overview.................................................................................................................................4-1Using the virtual administrator account......................................................................................4-2Accessing the administrative interface.....................................................................................4-2Properties of the virtadmin account.........................................................................................4-2Components of the administrative interface................................................................................4-4Identifying the SWS objects ...................................................................................................4-4Identifying the SWS methods .................................................................................................4-6Configuring the System object using the Modify method............................................................4-10Accessing the Modify System page........................................................................................4-10Configuration options...........................................................................................................4-10Defining the options on the Modifying Proxy Configuration page...............................................4-12Defining the options on the Modifying Cache Configuration page .............................................4-14Modifying built-in HTTP options ...........................................................................................4-16Modifying the Manage Certificates page ................................................................................4-18Defining the HTTPS Server...................................................................................................4-22Modifying the Software License page ....................................................................................4-24Modifying the List/Dictionary Download page .........................................................................4-26Modifying Object Box Controls..............................................................................................4-28Modifying Other Settings .....................................................................................................4-30Modifying the Backup Configuration page ..............................................................................4-36Configuring the Restore Configuration page ...........................................................................4-38Modifying the Directory Services page ...................................................................................4-38Understanding directory services and SWS...............................................................................4-40Supported directory services platforms ..................................................................................4-40Installation and reinstallation ...............................................................................................4-42Configuring SWS to use directory services.................................................................................4-44Accessing the Modify System page to configure SWS to use directory services: .........................4-44Configuring SWS for system user and groups .........................................................................4-46Configuring SWS for RADIUS users.......................................................................................4-46Configuring SWS for LDAP users and groups ..........................................................................4-48Differentiating global and Access Control List permissions.........................................................4-52Differentiating the two types of SWS administrative permissions ..............................................4-52ForSymiiantecPartnerInternalStaffPre-installation checklist........................................................................................................3-4Minimum system requirements ...............................................................................................3-6Verifying DNS settings ...........................................................................................................3-8Configuring the DNS server ..................................................................................................3-12Preparing to install.................................................................................................................3-14Identifying the installation prompts.......................................................................................3-14Lab 3-1:Installing Symantec Web Security...............................................................................3-19Perform the following procedures:.........................................................................................3-24Claiming license and certificate keys........................................................................................3-26Understanding the significance of keys .................................................................................3-26Lab 3-2:Activating SWS keys..................................................................................................3-29Configuring browsers..............................................................................................................3-34Why browsers need to be configured .....................................................................................3-34When to configure a browser ................................................................................................3-34Lab 3-3:Configuring browsers..................................................................................................3-37Uninstalling SWS...................................................................................................................3-42Considerations when uninstalling SWS ..................................................................................3-42Lab 3-4:Uninstalling SWS.......................................................................................................3-45TrainingSymantec Web Security 2.5OnlyUnit 6 Creating a filtering policy for users .........................................................................................6-1Overview..................................................................................................................................6-1Understanding users.................................................................................................................6-2Defining the Four Types of SWS users .....................................................................................6-2Adding users............................................................................................................................6-4Adding user options...............................................................................................................6-4Accessing the main administration page ..................................................................................6-6Accessing the Create User page ..............................................................................................6-6Adding system users..............................................................................................................6-8Adding RADIUS users ..........................................................................................................6-12Adding LDAP users..............................................................................................................6-14Adding virtual users.............................................................................................................6-16Lab 6-1:Creating a virtual user................................................................................................6-19Adding multiple virtual users ................................................................................................6-22Lab 6-2:Creating multiple virtual users.....................................................................................6-29Adding users and assigning administrative permissions..............................................................6-36Defining the global administrative permissions.......................................................................6-36Assigning global administrative permissions...........................................................................6-36Lab 6-3:Adding one user at a time (advanced)..........................................................................6-39Deleting a user.......................................................................................................................6-44Deleting an imported user from SWS.....................................................................................6-44Deleting a user from a directory service .................................................................................6-44Deleting a virtual user..........................................................................................................6-44Lab 6-4:Deleting a virtual user................................................................................................6-47Modifying the User object.......................................................................................................6-50Accessing the Modify User page ...........................................................................................6-50Options for modifying a user account ....................................................................................6-50Defining the Modify Attributes options ..................................................................................6-52Modify Object Creation/Modification Attributes.......................................................................6-58Add/Delete Object(s) to or from Access Control List ................................................................6-60ForSymantecPartnerInternalStaffUnit 5 Creating a filtering policy using system-based administration ....................................................5-1Overview..................................................................................................................................5-1Understanding system-based administration...............................................................................5-2System versus policy-based administration ..............................................................................5-2Configuring the System object using the Schedule method...........................................................5-4Accessing the Schedule System page in order to set defaults.....................................................5-4Configuration options when scheduling a default event .............................................................5-6TrainingCreating quotas when adding users and lists.............................................................................4-54Modifying an object’s creation/modification attributes.............................................................4-54Accessing the Modify A User's Object Creation/Modification Attributes page .............................4-54Lab 4-1:Setting user creation quotas........................................................................................4-57Understanding Access Control Lists.........................................................................................4-60Defining Access Control Lists ...............................................................................................4-60Adding and removing objects from an ACL .............................................................................4-62To Add/Remove an objects to/from an Access Control List .......................................................4-62Modifying permissions on Access Control Lists .......................................................................4-66To modify permissions on an Access Control List ....................................................................4-66Hierarchy of Access Control List permissions .........................................................................4-68Defining ACL hierarchy of permissions ..................................................................................4-68Lab 4-2:Configuring Access Control Lists..................................................................................4-71Onlyiii [ Pobierz całość w formacie PDF ]

  • zanotowane.pl
  • doc.pisz.pl
  • pdf.pisz.pl
  • kfc.htw.pl