What is used to configure WSA as an explicit proxy?
Click on the arrows to vote for the correct answer
A. B. C. D.B.
https://www.cisco.com/c/en/us/support/docs/security/web-security-appliance/117940-qa-wsa-00.htmlTo configure the Cisco Web Security Appliance (WSA) as an explicit proxy, the recommended method is to use the web browser's proxy settings to redirect HTTP and HTTPS traffic to the WSA. This allows for granular control over user access and activity, including web filtering, malware protection, and data loss prevention.
The answer that describes the method used to configure WSA as an explicit proxy is B - Network settings from user browser.
When configuring the WSA as an explicit proxy, you will need to ensure that the following steps are followed:
Configure the network settings on the WSA: The WSA needs to be configured with an IP address and subnet mask on the same subnet as the client machines.
Enable transparent authentication: Transparent authentication allows users to authenticate with the WSA automatically, without being prompted for credentials.
Configure proxy settings in the web browser: In the web browser's settings, configure the HTTP and HTTPS proxy settings to point to the IP address and port number of the WSA.
Install WSA's SSL certificate: The WSA uses SSL decryption to inspect encrypted traffic. You will need to install the WSA's SSL certificate on client machines to avoid certificate errors.
Option A - IP Spoofing from router, involves manipulating the source IP address of traffic to appear to come from a different device, and is not used to configure WSA as an explicit proxy.
Option C - WCCP redirection from firewall, involves configuring the firewall to redirect traffic to the WSA using the Web Cache Communication Protocol (WCCP), and is an alternative method to configure WSA as a proxy.
Option D - Auto redirection using PBR from switch, involves using policy-based routing (PBR) to redirect traffic to the WSA, and is not used to configure WSA as an explicit proxy.