Table of Contents You are at the beginning of the document Go to the next page

Table of Contents

Deployment and Installation Center
Planning your deployment
Installing your security solution
Upgrading your security solution
System requirements for this version
Preparing for installation
Obtaining Microsoft SQL Server
Installing the reporting database in a custom folder with SQL Server 2012
Deployment Planning for TRITON Solutions
TRITON Enterprise deployment overview
Deploying Web Protection Solutions
High-level deployment diagrams
Deploying core web protection components
Deploying Web Hybrid module components
Understanding standalone and integrated modes for web protection solutions
Hardware recommendations for standalone Web Filter & Security deployments
Extending your deployment with additional web protection components
Additional reporting considerations
Required external resources for web protection solutions
Maximizing system performance for web protection solutions
Deploying transparent identification agents
Deployment guidelines for Network Agent
Locating Network Agent in a single-segment network
Locating Network Agent in a multiple-segment network
Network Agent on a gateway
Deploying Remote Filtering Server and Client
Deploying web protection for a distributed enterprise
Web protection basic distributed enterprise topology
Web protection for remote users or locations
Web protection distributed deployment models
Web protection distributed deployments and secure VPN connections
Content Gateway Deployment
Content Gateway deployment issues
Content Gateway explicit and transparent proxy deployments
Special Content Gateway deployment scenarios
Chaining Content Gateway with other proxies
Installing TRITON AP-WEB components to work with Content Gateway
Planning TRITON AP-DATA Deployment
Deploying Email Protection Solutions
System requirements
Single-appliance TRITON AP-EMAIL deployments
Multiple-appliance TRITON AP-EMAIL deployments
Installing TRITON Solutions
Creating a TRITON Management Server
Installing the Web module of the TRITON Manager
Installing the Data module of the TRITON Manager
Installing the Email module of the TRITON Manager
Installing Web Protection Solutions
Installing via the TRITON AP-WEB or Web Filter & Security All option
Using the TRITON management server as policy source for filtering-only appliances
Installing Web Protection Components on Linux
Starting the Web Linux installer
Using the Policy Enforcement option to install web components on Linux
Installing appliance-based Websense solutions
Setting Up Websense V-Series Appliances
Set up the appliance hardware
V10000 hardware setup
V5000 hardware setup
Serial port activation
Perform initial command-line configuration
Configure the appliance
Network interface configuration
Appliance Controller Interface (C)
Websense Content Gateway Interfaces (P1 and P2)
Network Agent Interface (N)
Email appliance interfaces (E1 and E2, or P1 and P2)
Interface bonding
Routing configuration
Alerting
Configuring Web appliance components
Install off-appliance or optional components
Restoring to Factory Image
Installing TRITON AP-DATA
Installing components via the Custom option
Starting a custom installation (Windows)
Installing TRITON Infrastructure
Installing web protection components
Policy Server Connection Screen
Policy Broker Connection Screen
Filtering Service Communication Screen
Multiple Network Interfaces Screen
Active Directory Screen
Computer Browser Screen
Integration Option Screen
Select Integration Screen
Network Card Selection Screen
Database Information Screen
Log Database Location Screen
Optimize Log Database Size Screen
Feedback Screen
Directory Service Access Screen
Remote Filtering Communication Screen
Remote Filtering Pass Phrase Screen
Filtering Service Information for Remote Filtering Screen
Turning on the Computer Browser service
Installing with SQL Server
Installing TRITON AP-DATA components
Installing email protection components
Installing SQL Server 2008 R2 Express (without TRITON Infrastructure)
Installing Websense Endpoint Solutions
Integrating Web Filter & Security with Cisco
Deployment considerations for integration with Cisco products
Getting started with a Cisco integration
Configuring a Cisco Security Appliance
Cisco integration configuration procedure
User-based policies and Cisco integration
Configuring a Cisco IOS Router
Cisco IOS startup configuration
Cisco IOS configuration commands
Cisco IOS executable commands
Integrating Web Filter & Security with Citrix
Managing Internet requests from Citrix server users
Citrix Integration Service installation overview
Install Filtering Service and Network Agent to integrate with Citrix
Obtain the Citrix Integration Service configuration package
Configure the Citrix Integration Service installation package
Use the installation package to install Citrix Integration Service on a Citrix server
Upgrading the Citrix Integration Service
Configuring user access on Citrix servers
Initial Setup of Citrix integration
Integrating Web Filter & Security with TMG
Deployment considerations for integration with Forefront TMG
Installing Web Filter & Security to integrate with Forefront TMG
Upgrading Web Filter & Security when integrated with ISA Server or Forefront TMG
Removing the ISAPI Filter Plug-In
Converting to an integration with Forefront TMG
Forefront TMG initial setup
Enabling communication with the Log Database when integrated with Forefront TMG
Configuring for TMG using non-web-proxy clients
Configuring the ISAPI Filter plug-in to ignore specific traffic
User identification and authentication with Forefront TMG
Troubleshooting integration with Forefront TMG
Integrating Web Filter & Security using ICAP Service
Installing Web Filter & Security to integrate with ICAP Service
Configuring the proxy to communicate with ICAP Service
Configuring ICAP Service
Installing for Universal Integrations
Upgrading more than one TRITON solution
Upgrade procedure for solutions that include web, email, and data protection
Upgrading the TRITON management server
Upgrading Websense Web Protection Solutions
Web protection or web and data protection upgrade outline
Upgrading from web security version 7.7.x or earlier
Before upgrading to v8.0.x web protection solutions
Preparing the Log Database for upgrade
Web protection upgrade order
Upgrading web or web and data protection solutions from v7.8
v8.0.x web protection software upgrade instructions (Windows)
v8.0 Linux upgrade instructions for web security products
Upgrading Content Gateway to v8.0.x
Preparing to upgrade
Upgrading V-Series Appliances to v8.0.x
Upgrading to TRITON AP-DATA v8.0.x
Migrating web solutions to a new operating system
Order of migration and upgrade steps
Migrating web management components
Moving web policy components to a new machine
Updating the operating system on an existing web protection machine
Upgrading Email Protection Solutions
Backup procedures
Recovery procedures
Initial Configuration for All Websense Modules
Initial configuration for web protection solutions
Additional configuration for the Web DLP Module
TRITON AP-DATA initial configuration
TRITON AP-EMAIL initial configuration
Content Gateway initial configuration
Network Agent and stealth mode NICs
Adding, Modifying, or Removing Components
Adding or modifying Windows components
Modifying TRITON Infrastructure
Adding web protection components
Adding email protection components
Removing components
Removing TRITON Infrastructure
Removing web protection components
Removing Content Gateway
Removing TRITON AP-DATA components
Removing email protection components
Quick Reference
Default ports for on-premises TRITON solutions
TRITON AP-DATA ports
TRITON AP-EMAIL ports
Excluding Websense files from antivirus scans
Configuring Websense Apache services to use a trusted connection
Component Reference
TRITON management server
TRITON Manager
TRITON Infrastructure
SQL Server 2008 R2 Express
Websense Content Gateway
Data Security manager
Protector
Mobile agent
Microsoft TMG agent
TRITON AP-ENDPOINT DLP
Microsoft FCI agent
Integration agent
Crawler
The Email module
Email Log Server
Using the TRITON AP-DATAProtector CLI

Table of Contents You are at the beginning of the document Go to the next page
Copyright 2016 Forcepoint LLC. All rights reserved.