Cisco ASA Series Cli Configuration Manual page 1382

Software version 9.0 for the services module
Hide thumbs Also See for ASA Series:
Table of Contents

Advertisement

Information About Cisco Cloud Web Security
This chapter includes the following sections:
Information About Cisco Cloud Web Security
This section includes the following topics:
Redirection of Web Traffic to Cloud Web Security
When an end user sends an HTTP or HTTPS request, the ASA receives it and optionally retrieves the
user and/or group information. If the traffic matches an ASA service policy rule for Cloud Web Security,
then the ASA redirects the request to the Cloud Web Security proxy servers. The ASA acts as an
intermediary between the end user and the Cloud Web Security proxy server by redirecting the
connection to the proxy server. The ASA changes the destination IP address and port in the client
requests and adds Cloud Web Security-specific HTTP headers and then sends the modified request to the
Cloud Web Security proxy server. The Cloud Web Security HTTP headers include various kinds of
information, including the username and user group (if available).
User Authentication and Cloud Web Security
User identity can be used to apply policy in Cloud Web Security. User identity is also useful for Cloud
Web Security reporting. User identity is not required to use Cloud Web Security. There are other methods
to identify traffic for Cloud Web Security policy.
Cisco ASA Series CLI Configuration Guide
1-2
Information About Cisco Cloud Web Security, page 1-2
Licensing Requirements for Cisco Cloud Web Security, page 1-6
Prerequisites for Cloud Web Security, page 1-7
Guidelines and Limitations, page 1-7
Default Settings, page 1-8
Configuring Cisco Cloud Web Security, page 1-8
Monitoring Cloud Web Security, page 1-16
Configuration Examples for Cisco Cloud Web Security, page 1-17
Related Documents, page 1-25
Feature History for Cisco Cloud Web Security, page 1-25
Redirection of Web Traffic to Cloud Web Security, page 1-2
User Authentication and Cloud Web Security, page 1-2
Authentication Keys, page 1-3
ScanCenter Policy, page 1-4
Cloud Web Security Actions, page 1-5
Bypassing Scanning with Whitelists, page 1-5
IPv4 and IPv6 Support, page 1-6
Failover from Primary to Backup Proxy Server, page 1-6
Chapter 1
Configuring the ASA for Cisco Cloud Web Security

Advertisement

Table of Contents
loading

Table of Contents