Cisco WS-CE500-24TT Administration Guide - Page 31

Scenario 8: Configuring ProtectLink Web & Email Security

Page 31 highlights

Getting Started Common Configuration Scenarios 1 Scenario 8: Configuring ProtectLink Web & Email Security For added protection against web and email threats, the security appliance supports Cisco ProtectLink Security services. By using these services, your network is protected from email threats in the Internet "cloud" and web threats in the Cisco security appliance, providing access only to email and websites that are appropriate for your business. Configuration tasks for this scenario: In the ProtectLink Web & Email Security section of the Getting Started (Advanced) page, click Enable ProtectLink Gateway and/or Endpoint. The Protect Link window opens. For more information, see Chapter 6, "Using Cisco ProtectLink Security Services." Scenario 9: Site-to-Site Networking and Remote Access You can configure a Virtual Private Network (VPN) to extend your network to other sites or to allow business partners and teleworkers to access applications and network resources. You can configure the following types of VPNs: • IPsec VPN for a Site-to-Site Tunnel • IPsec VPN for Remote Access with a VPN Client • SSL VPN for Remote Access with a Web Browser Cisco SA500 Series Security Appliances Administration Guide 31

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240

Getting Started
Common Configuration Scenarios
Cisco SA500 Series Security Appliances Administration Guide
31
1
Scenario 8: Configuring ProtectLink Web & Email Security
For added protection against web and email threats, the security appliance
supports Cisco ProtectLink Security services. By using these services, your
network is protected from email threats in the Internet “cloud” and web threats in
the Cisco security appliance, providing access only to email and websites that are
appropriate for your business.
Configuration tasks for this scenario:
In the
ProtectLink Web & Email Security
section of the Getting Started
(Advanced) page, click
Enable ProtectLink Gateway
and/or Endpoint
. The
Protect Link window opens. For more information, see
Chapter 6, “Using Cisco
ProtectLink Security Services.”
Scenario 9: Site-to-Site Networking and Remote Access
You can configure a Virtual Private Network (VPN) to extend your network to other
sites or to allow business partners and teleworkers to access applications and
network resources.
You can configure the following types of VPNs:
IPsec VPN for a Site-to-Site Tunnel
IPsec VPN for Remote Access with a VPN Client
SSL VPN for Remote Access with a Web Browser