Module 1: Introduction to the Symantec Proxy SG Secure Web Gateway
- Describe the functions of a proxy server
- Differentiate proxy servers from firewalls
- Describe the key features and benefits of the Proxy SG
- List the various Proxy SG models
- Access online Symantec community resources
Module 2: Proxy SG Security Deployment Options
- Describe the three network deployment methods
- Describe the three possible roles of the Proxy SG
Module 3: Proxy SG Management Console
- Describe the relationship between the Management Console and the Proxy SG CLI
- Describe the primary function of the major areas of the Management Console
- Use the Management Console to access on-box help and Symantec product documentation
Module 4: Traffic Interception Using Proxy Services
- Understand the functions of proxy services, listeners, and proxy types
- Describe the three most common proxy services
- Explain how the intercept and bypass settings affect what happens to network traffic passing through the Proxy SG
- Explain the function of common global proxy service settings
Module 5: Hypertext Transfer Protocol
- Understand how a connection is initiated over the transport layer
- Identify the components of an HTTP URL
- Explain the two types of HTTP messages: request and response
- Identify common response codes
Module 6: Introduction to the Visual Policy Manager
- Describe the relationship among the VPM, CPL, and the Management Console
- Describe the default processing order for policy layers and rules
- Describe triggers and actions that can be used in writing policy
- Identify the types of objects that the VPM supports
- Describe some of the best practices to be followed when using the VPM to create policy
Module 7: Filtering Web Content
- Describe the main concepts of web filtering
- Describe the primary category databases
- Describe the category types available to policy
- Describe how Web Filter and Web Pulse work together
Module 8: Using Threat Intelligence to Defend the Network
- Understand Intelligence Services as provided by the Global Intelligence Network
- Understand Geolocation and Threat Risk Levels and how they can be used in policy
Module 9: Ensuring Safe Downloads
- Describe how malware can be transmitted via HTTP
- Explain the methods, advantages, and disadvantages of file type detection
- Describe some of the considerations in deciding what content to block as possible malware sources
Module 10: Notifying User of Internet Usage Policies
- Explain the function and various components of built-in and custom exception pages
- Describe the function of Notify User objects
- Identify the types of pages that can be sent to users by using Notify User objects
- Describe splash pages and coaching pages using Notify User objects in the VPM
Module 11: Access Logging on the Proxy SG
- Describe, at a high level, how the Proxy SG performs access logging
- Describe the components of a Proxy SG access log facility
- Identify default log facilities and log formats
- Describe common use cases for periodic and continuous uploading of access logs
Appendix A: Proxy SG Initial Configuration
Appendix B: IPv6 in Proxy SG Deployments