Volume 9: Managing the Blue Coat SG Appliance
parent class (bandwidth | A class with at least one child. The parent class must share its bandwidth with its |
gain) | child classes in proportion to the minimum/maximum bandwidth values or priority |
| levels. |
passive mode data | Data connections initiated by an FTP client to an FTP server. |
connections (PASV) |
|
pipelining | See object pipelining. |
policies | Groups of rules that let you manage Web access specific to the needs of an enterprise. |
| Policies enhance SG appliance feature areas such as authentication and virus |
| scanning, and let you control |
| See also refresh policies. |
Used in policy. Allows a bypass based on the properties of the client, unlike static and | |
| dynamic bypass lists, which allow traffic to bypass the appliance based on |
| destination IP address. See also bypass lists and dynamic bypass. |
policy layer | A collection of rules created using Blue Coat CPL or with the VPM. |
pragma: no cache (PNC) | A metatag in the header of a request that requires the appliance to forward a request |
| to the origin server. This allows clients to always obtain a fresh copy (of the request?). |
proxy | Caches content, filters traffic, monitors Internet and intranet resource usage, blocks |
| specific Internet and intranet resources for individuals or groups, and enhances the |
| quality of Internet or intranet user experiences. |
| A proxy can also serve as an intermediary between a Web client and a Web server |
| and can require authentication to allow identity based policy and logging for the |
| client. |
| The rules used to authenticate a client are based on the policies you create on the SG |
| appliance, which can reference an existing security |
| IWA, and the like. |
Proxy Edition | SGOS 5 Proxy Edition. |
proxy service | The proxy service defines the ports, as well as other attributes. that are used by the |
| proxies associated with the service. |
proxy service (default) | The default proxy service is a service that intercepts all traffic not otherwise |
| intercepted by other listeners. It only has one listener whose action can be set to |
| bypass or intercept. No new listeners can be added to the default proxy service, and |
| the default listener and service cannot be deleted. Service attributes can be changed. |
public key certificate | An electronic document that encapsulates the public key of the certificate sender, |
| identifies this sender, and aids the certificate receiver to verify the identity of the |
| certificate sender. A certificate is often considered valid if it has been digitally signed |
| by a |
public virtual IP (VIP) | Maps multiple servers to one IP address and then propagates that information to the |
| public DNS servers. Typically, there is a public VIP known to the public Internet that |
| routes the packets internally to the private VIP. This enables you to “hide” your |
| servers from the Internet. |