Go to the table of contents Go to the previous page Go to the next page
Web Security Deployment Recommendations > High-level deployment diagrams
High-level deployment diagrams
Deployment and Installation Center | Web Security Solutions | Version 7.8.x
Web Filter and Web Security deployment diagram
The illustration below shows components distributed across multiple servers in a typical deployment.
All of the enforcement components, except for the optional transparent identification agents, may reside on a Windows or Linux server, or a Websense appliance.
For evaluation or very small (low traffic) deployments, all Websense components, plus an instance of SQL Server 2008 R2 Express (installed by the TRITON Unified Installer) may reside on a single Windows server.
For more information about the core components that make up a deployment, see Deploying Web Security core components.
Web Security Gateway deployment diagram
This illustration shows a basic software-based deployment of Web Security Gateway. Note that the illustration is intended to show the general distribution of components and does not include network details (such as segmenting, internal firewalls, routing, switching, and so forth).
Content Gateway and the enforcement components, except for the optional transparent identification agents, may also reside on a Websense appliance.
For more information about the core components that make up a deployment, see:
*
*
Web Security Gateway Anywhere deployment diagram
This illustration is a high-level diagram of a basic software-based deployment of Web Security Gateway Anywhere. Note that this illustration is intended to show the general distribution of components and does not include network details (such as segmenting, internal firewalls, routing, switching, and so forth).
Content Gateway and the enforcement components, except for the optional transparent identification agents, may also reside on a Websense appliance.
For more information about the core components that make up a deployment, see:
*
*
*

Go to the table of contents Go to the previous page Go to the next page
Web Security Deployment Recommendations > High-level deployment diagrams
Copyright 2016 Forcepoint LLC. All rights reserved.