User Guide

xxi
Table 15-3: Anti-Malware Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .328
Table 15-4: Anti-Malware Settings for Access Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .330
Table 15-5: Anti-Malware Scanning Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .332
Table 16-1: Web Security Appliance Authentication Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .338
Table 16-2: Basic versus NTLMSSP Authentication Schemes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .339
Table 16-3: Methods of Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .339
Table 16-4: Pros and Cons of Explicit Forward Basic Authentication . . . . . . . . . . . . . . . . . . . . . . . . . .340
Table 16-5: Pros and Cons of Transparent Basic Authentication—IP Caching . . . . . . . . . . . . . . . . . . .341
Table 16-6: Pros and Cons of Transparent Basic Authentication—Cookie Caching . . . . . . . . . . . . . . .342
Table 16-7: Pros and Cons of Explicit Forward NTLM Authentication . . . . . . . . . . . . . . . . . . . . . . . . .343
Table 16-8: Global Authentication Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .354
Table 16-9: Transparent Proxy Mode Authentication Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .356
Table 16-10: Explicit Forward Proxy Mode Authentication Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . .360
Table 16-11: Supported Authentication Surrogates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .369
Table 16-12: LDAP Authentication Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .370
Table 16-13: LDAP Group Authorization—Group Object Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . .374
Table 16-14: LDAP Group Authorization—User Object Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .374
Table 16-15: NTLM Authentication Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .377
Table 16-16: Supported Active Directory Server Characters — User Name Field. . . . . . . . . . . . . . . . . .381
Table 16-17: Supported Active Directory Server Characters — Password Field . . . . . . . . . . . . . . . . . . .381
Table 16-18: Supported Active Directory Server Characters — Location Field. . . . . . . . . . . . . . . . . . . .382
Table 16-19: Supported Active Directory Server Characters — Group Field . . . . . . . . . . . . . . . . . . . . .382
Table 16-20: Supported LDAP Server Characters — User Name Field . . . . . . . . . . . . . . . . . . . . . . . . . .383
Table 16-21: Supported LDAP Server Characters — Password Field . . . . . . . . . . . . . . . . . . . . . . . . . . .383
Table 16-22: Supported LDAP Server Characters — Group Field. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .383
Table 16-23: Supported LDAP Server Characters — Custom User Filter Query Field . . . . . . . . . . . . . . .384
Table 16-24: Supported LDAP Server Characters — Custom Group Filter Query Field . . . . . . . . . . . . .384
Table 17-1: L4 Traffic Monitor Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .391
Table 17-2: L4 Traffic Monitor Scanning Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .393
Table 18-1: Time Intervals for Data Collection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .397