Upgrading V-Series Appliances
24
Upgrading V-Series Appliances
3. Upgrade this appliance to version 7.8.1. The appliance automatically restarts
when the upgrade is done.
After the original
Full policy source
appliance has been upgraded, replaced, or
re-imaged, change the upgraded temporary
Full policy source
machine to point to the
original
Full policy source
again for its policy information. To do this:
1. Upgrade the primary appliance.The appliance automatically restarts when the
upgrade is done.
2. On the previously upgraded secondary appliance, in the V-Series console,
navigate to
Configuration > Web Security Components
.
3. For
Policy Source
, select
User directory and filtering
or
Filtering only
and
enter the IP address of the primary appliance. Save the setting.
4. Use the version 7.8.1 TRITON installer to upgrade remaining off-appliance
components. See
Upgrading Websense Web Security Solutions
for instructions.
To see all upgrade instructions go to
Upgrading V-Series appliances from v7.7.x to
Post-upgrade activities
V-Series Appliance Upgrade Guide | Upgrades to 7.8.1
● If your appliance includes Email Security Gateway (Anywhere), perform the
Email Security Gateway
● If your appliance hosts a Web Security Policy Server (is a user directory and
filtering appliance), log onto the TRITON console, go to the Web Security
manager
Settings > General > Policy Servers
page, and add the Policy Server
instance. Next, go to the TRITON console
Appliances
tab and register the
appliance.
● If your appliance includes Web Security Gateway (Anywhere), perform the
Content Gateway
● If your appliance uses the Network Agent module,
● Review the Release Notes for the solutions on your TRITON appliances (links
provided below). There are several new features that may require some
configuration to put into effect.
Web Security users will be especially interested in the deployment visualization
and management tools offered by the
Status
>
Deployment
page. Web Security
Gateway Anywhere users will be interested in the option to enable ThreatScope™
sandboxing of suspicious files.
Email Security users will be interested in the ThreatScope cloud-based message
analysis function, which inspects email attachment file types for security threats.
■
■
■