Barracuda Networks 4 Dokumentacja Strona 11

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 92
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 10
Administrator’s Guide
Deploying the Barracuda Web Filter 11
Deploying the Barracuda Web Filter
You can deploy your Barracuda Web Filter so it is either inline with your core network components,
or you can deploy the system as a forward proxy. The following sections provide a brief overview of
each deployment type.
Inline pass-through (transparent) mode
Inline pass-through is the recommended type of deployment because it provides the strongest level of
protection against spyware. In this deployment, the Barracuda Web Filter is directly inline with your
core Internet network components, and all network traffic to the Internet passes through the Barracuda
Web Filter. In this mode, your Barracuda Web Filter is able to:
Filter and scan all Internet traffic requests.
Perform content filtering and scan downloads for spyware and viruses.
Detect and block outbound spyware protocol requests.
Scan all outbound traffic for spyware activity on all ports to detect infected clients.
Inline pass-through deployment requires you to have an understanding of your network topology
because even though the Barracuda Web Filter acts as a proxy, it does not participate in routing
protocols. As a result, you may need to set up static routes in your Barracuda Web Filter so it knows
how to properly route traffic.
The following table describes the advantages and disadvantages of deploying your Barracuda Web
Filter in inline pass-through mode.
Figure 1.2 illustrates a basic installation using the Inline Pass-Through deployment.
Advantages Disadvantages
Supports application blocking May require setting up static routes in your Barracuda
Web Filter.
Supports automatic pass-through mode in
the event of a system failure (model 310
and above)
Initial setup requires an interruption to network traffic
while you make necessary cabling changes.
Does not require users to configure proxy
server settings in their Web browser
Uses perimeter transparency mode that
exposes client IP addresses (supports
corporate firewall rules)
Przeglądanie stron 10
1 2 ... 6 7 8 9 10 11 12 13 14 15 16 ... 91 92

Komentarze do niniejszej Instrukcji

Brak uwag