This topic is a chance to discuss more about Policy Configuration, Security Services and HTTPS proxy functionality on the Web Security Appliance (WSA). The session will provide a better understanding of Identity/Access/Decryption/Routing policy configuration on the WSA. In addition to this, this session will cover HTTPS proxy deployment, certificate requirements for deploying HTTPS proxy, decryption policy configuration, authentication with explicit/transparent HTTPS requests and troubleshooting HTTPS issues. Join the discussion and learn more about configuring and troubleshooting WSA policies and WSA HTTPS proxy feature.
Ask questions from Monday 21st of May to Friday 8th of June, 2018
Jai Gillhas been working as an Escalation Engineer in the Cloud Security team for the past 4 years, he focuses on the Web Security Appliance (WSA) technology. He is based in San Jose California. In addition to the WSA, he is proficient with the entire Content Security suite of products offered by Cisco, including Email Security Appliance (ESA) and Security Management Appliance (SMA). On his actual role, he works with TAC engineers, customers and engineering to help resolve complex issues and defects. Jai holds a Master’s degree in Electrical Engineering from the Arizona State University. He holds a CCNP and VCP certifications.
.Handy Putra is an escalation engineer at the Cisco Web Security Appliance team of Cisco’s Global TAC in Sidney Australia. Prior becoming an Escalation Engineer, he was a Customer Support Engineer for almost 6 years. Handy holds a Bachelor’s degree in computing from the University of Technology Sydney (UTS). He has several certifications: CCNA, CCNP, CCNP Security, MCSA and MCSE. In his spare time, he likes to swim, watch movies or go for bushwalking.
Jai and Handy might not be able to answer each question due to the volume expected during this event. Remember that you can continue the conversation on the Contact Center Community
We have a customer who uses the AnyConnect VPN software to connect to their database and have come up against an issue where the software does not work when the users are in the office. They have advised that they believe this is down to the fact they use...
Hi All,I am trying to clarify disk space sizing for Stealthwatch Enterprise SMC and Flow Collector VMs. As per doc, it states:"FPS Calculation: Allocate a minimum of 1 GB of data storage for every 1,000 flows per second (FPS) your system averages dai...
Good Day, We are in a process of moving from ACS 5.8 to ISE 2.7.We have run the migration tool and it appears to have worked without issue. I checked the policy on the ISE server and we now have a policy set containing 2 elements. Rule 1Con...
Hello, Bit of a while since I've posted here, need some advice. I'm revisiting the configuration for an active/standby ASA HA setup, and I don't think I've ever totally nailed a proven, recommended resilient topology when thinking about th...