
17
Additional Configuration
Congratulations. Now that you have completed the installation and basic
configuration, you can start using your
Cisco S190 Web Security Appliance. You may wish to consider taking some of
the following steps to get more out of the appliance:
User Policies
Use the web interface to create policies that define which users can access which
web resources as necessary.
•
Identify Users—Choose
Web Security Manager > Identification Profiles
to
define groups of users that can access the Internet.
•
Define Access Policies—Choose
Web Security Manager > Access Policies
to
control user access to the Internet by configuring which objects and
applications to allow or block, which URL categories to monitor or block,
and web reputation and anti-malware settings.
You can also define several other policy types to enforce your organization’s
acceptable use policies by controlling access to the Internet. For example, you
can define policies for decrypting HTTPS transactions and other polices that
control upload requests.
Traffic Monitor
After running the System Setup Wizard, one
or both L4 traffic monitor ports (T1 only or
both T1 and T2) are configured to listen to
traffic on all TCP ports. The default setting
for the L4 traffic monitor is monitor only.
During or after setup, you can configure the
L4 traffic monitor to both monitor and
block suspicious traffic.
Computer
Address
Remember to change your computer IP
address back to the original settings that
you noted in the
“Temporarily Change Your
IP Address for Remote Access” section on
page 9
.
Item
Description