The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
This document describes how to design the Cisco Web Security Appliance (WSA) and associated components for optimal performance.
When you design a solution for the WSA, it requires careful consideration, not only in regards to the configuration of the appliance itself, but also the associated network devices and their features. Every network is a collaboration of multiple devices, and if one of them does not participate correctly in the network, then user experiences might decline.
There are two main components that must be considered when you configure the WSA: the hardware and the software. The hardware comes in two different types. The first is the physical type of hardware, such as the S170, S380, and S680 Series models, as well as other End of Life (EoL) models, such as the S160, S360, S660, S370, and S670 Series models. The other hardware type is virtual, such as the S000v, S100v, and S300v Series models. The Operating System (OS) that runs on this hardware is called AsyncOS for Web, which is based on FreeBSD at its core.
The WSA offers proxy service and also scans, inspects, and categorizes all traffic (HTTP, HTTPS, and File Transfer Protocol (FTP)). All of these protocols run on top of TCP and heavily rely on Domain Name System (DNS) for proper operation. For these reasons, the network health is vital for proper operation of the appliance and its communication with various parts of the network, both inside and outside of the enterprise control.
Use the information that is described in this section in order to design the WSA and related components for optimal performance.
An error free, fast network is vital for the proper operation of the WSA. If the network is unstable, user experience might decline. Network problems are usually detected when web pages take longer to reach or are unreachable. The initial inclination is blame the appliance, but it is usually the network that misbehaves. Thus, careful consideration and audit should be made in order to ensure that the network offers the best service for high-level application protocols such as HTTP, HTTPS, FTP, and DNS.
Here are some general considerations that you can implement in order to ensure the best network behavior:
Note: The separation of routing tables is not per interface, but rather per service. For example, traffic between the WSA and the Microsoft Active Directory (AD) domain controller always obey the routes that are specified in the Management routing table, and it is possible to configure routes that point out of the P1/P2 interface in this table. It is not possible to include routes in the Data routing table that use the Management interfaces.
Here are some load-balancing considerations that you can implement in order to ensure the best network behavior:
Here are some Firewall considerations that you can implement in order to ensure the best network behavior:
Remember that the logical AND principle applies in all components of the identity. For example, if you configure both the user-agent and IP address, it means the user-agent from this IP address. It does not mean the user-agent or this IP address.
Use one identity for authentication of the same surrogate type (or no surrogate) and/or user-agent.
It is important to ensure each identity that requires authentication includes the user-agent strings for known browsers/user-agents that support proxy authentication, such as Internet Explorer, Mozilla Firefox, and Google Chrome. There are some applications that require Internet access but do not support proxy/WWW authentication.
Identities are matched top to bottom with the search for matches that ends on the first matched entry. For this reason, if you have Identity 1 and Identity 2 configured, and a transaction matches Identity 1, it is not checked against Identity 2.
These policies are applied against different types of traffic:
For each type of policy, it is important to remember that the logical OR principle applies. If you have multiple identities referred, then the transaction should match any of the identities that are configured.
For more granular control, use these policies. Wrongly configured identities per policy can create issues, where it is more beneficial to use several identities referenced in a policy. Remember that identities do not impact the traffic, they just identify the types of traffic for later matches in a policy.
Often times, Decryption policies use identities with authentication. While this is not wrong and is sometimes needed, the use of an identity with authentication referenced in the Decryption policy means that all transactions that match the Decryption policy are decrypted in order for authentication to take place. The decryption action might be dropped or passed through, but since there is an identity with authentication, the decryption takes place in order to later drop or pass through the traffic. This is expensive and should be avoided.
Some configurations have been observed that contain 30 or more identities and 30 or more Access policies, where all of the Access policies include all of the identities. In this case, there is no need to use this many identities if they are matched in all of the Access policies. While this does not harm the appliance operation, it creates confusion with attempts to troubleshoot and is expensive in regards to performance.
The use of custom URL categories is a powerful tool on the WSA that is usually misunderstood and misused. For example, there are configurations that contain all video sites for matches in the identity. The WSA has a built-in tool that automatically updates when video sites change URLs, which occurs frequently. Thus, it makes sense to allow the WSA to manage the URL categories automatically, and use the custom URL categories for special, not yet categorized sites.
Be very careful with regular expressions. If special character matches such as dot (.) and star(*) are used, they might prove to be very CPU and memory extensive. The WSA expands any regular expression to match it against each transaction. For example, here is a regular expression:
example.*
This expression will match any URL that contains the word example, not only the example.com domain. Avoid the use of dot and star in regular expressions and use them only as a last resort.
Here is another example of a regular expression that might create issues:
www.example.com
If you use this example in the Regular Expressions filed, it will not only match www.example.com, but also www.www3example2com.com, as the dot here means any character. If you desire to match only www.example.com, escape the dot:
www\.example\.com
In this case, there is no reason to use the Regular Expressions feature when you can include this inside the custom URL category domain with this format:
www.example.com
If more than one scanning engine is enabled, consider the option to enable adaptive scanning also. Adaptive scanning is a powerful but small engine on the WSA that pre-scans each request and determines the comprehensive engine that should be used in order to scan requests. This slightly increases performance on the WSA.