Go to the table of contents Go to the previous page Go to the next page
Web Security Deployment Recommendations > Deploying Web Security core components
Deploying Web Security core components
Deployment and Installation Center | Web Security Solutions | Version 7.7.x
 
This section of the Deployment and Installation Center describes the core components required by all Websense Web Security solutions, and explains how they are typically distributed.
For information about how a deployment can be extended beyond the core components, see Extending your Web Security deployment and Deploying transparent identification agents.
*
*
Core policy components
To ensure effective filtering, Websense Web Security core management components must be installed so that:
*
*
*
*
*
Most components must be able to communicate with Policy Broker on port 55880. (The exceptions are all optional components: transparent identification agents, State Server, Multiplexer, Linking Service, and Directory Agent.)
*
*
*
*
*
Most components must be able to communicate with Policy Server on ports 55806 and 40000. (The exceptions are Remote Filtering Server and State Server.)
*
*
*
*
Additional instances of Filtering Service can be deployed on Windows or Linux machines, or on either user identification and filtering (includes Policy Server) or filtering only (must point to a remote Policy Server) appliances.
*
*
*
*
Core management components
The TRITON Unified Security Center (TRITON console) is the centralized management console for Websense Web, data, and email security solutions. The TRITON console includes global administrator settings and appliance connection data, as well as 3 management modules: Web Security, Data Security, and Email Security.
TRITON - Web Security is the console used to perform product configuration, policy management, and reporting tasks for Websense Web Security solutions.
*
*
*
*
*
*
*
*
*
Core reporting components
Web Security Log Server receives information about Internet activity from Filtering Service and processes it into the Log Database.
*
*
*
*
*
*
*

Go to the table of contents Go to the previous page Go to the next page
Web Security Deployment Recommendations > Deploying Web Security core components
Copyright 2016 Forcepoint LLC. All rights reserved.