DRAG DROP -
Drag and drop the Cisco WSA methods from the left onto the correct deployment modes on the right.
Select and Place:
You could use an explicit setting (browser config/PAC/WPAD) or transparent (WCCP/PBR) to point to the first proxy and then the first proxy will route based on category to one of the two upstream proxies based on your policy configuration.
What causes authentication failures on a Cisco WSA when LDAP is used for authentication?
Refer to the exhibit. Which statement about the transaction log is true?
Which two features can be used with an upstream and downstream Cisco WSA web proxy to have the upstream WSA identify users by their client IP address?