Installing Cisco WSA
In this and other posts we’ll discuss the Cisco Web Security Appliance. This is the blog agenda:
Part 1: Introduction
Part 2: Installing
Part 3: Deploying Proxy Services
Part 4: Policies
Part 5: Acceptable use & HTTPS Inspection
Part 6: Authentication
Part 7: Defending malware
This is the 2nd post in the series.
Installation of the (virtual) WSA is straight forward. I’ll cover the most important and critical steps in a basic installation.
A hardware appliances has 5 interfaces, connect the required interface to your network:
- T1 + T2 (used for L4TM only)
- P1 + P2 (used for web proxy)
- M1 (management or web proxy)
The virtual appliance is downloadable as a OVF file. Import the OVF file into you VMWare servers with the specifications as described in the previous blog post.
Your first basic installation starts with connecting to the M1 port and browse to: http://192.168.42.42:8080 and login with these default credentials:
- username: admin
- password: ironport
You can also connect with SSH with the same login credentials. Start the interface config with the interfaceonfig command:
- Run edit command
- enter number 1
- Enter IP address, netmaks and hostname.
Select the M1 interface and enter the IP of the default gateway.
Don’t forget to commit the changes with the commit command. This is only needed for CLI configuration.
And the WSA appliance is up and running!
After your first login, start the System Setup Wizard under “System Administration”. This wizard shows the following steps:
- Accept EULA
- Enter hostname and NTP
- Upstream proxy (if any)
- Interface configuration
- Transparent redirecting
- Administrative settings
- Security settings
- Review and installation of the config
First, enable L4 Traffic Monitor:
Click Security Services > L4 Traffic Monitor
Click Edit Global Settings
Check “Enable L4 Traffic Monitor” and select the required ports
Don’t forget to commit your changes by clicking the yellow button
Always fill in a comment!
And we’re done for today!