High-level deployment diagrams

Applies to In this topic
Forcepoint Web Security, v8.5.x Forcepoint URL Filtering deployment diagram
Forcepoint URL Filtering, v8.5.x Forcepoint Web Security deployment diagram

Forcepoint URL Filtering deployment diagram

The illustration below shows components distributed across multiple servers in a typical deployment.

All of the enforcement components, except for the optional transparent identification agents, may reside on a Windows or Linux server, or a Forcepoint appliance.

For evaluation or very small (low traffic) deployments, all components, plus an instance of SQL Server Express (installed by the Forcepoint Security Installer, in certain cases) may reside on a single Windows server.

For more information about the core components that make up a deployment, see Deploying core web protection components

Forcepoint Web Security deployment diagram

This illustration shows a basic software-based deployment. Note that the illustration is intended to show the general distribution of components and does not include network details (such as segmenting, internal firewalls, routing, switching, and so forth).

Content Gateway and other enforcement components, except for the optional transparent identification agents, may also reside on a Forcepoint appliance.

For more information about the core components that make up a deployment, see:
  • Deploying core web protection components
  • Content Gateway Deployment
If you have purchased the Web Security Hybrid module, also see:
  • Deploying Forcepoint Web Security Hybrid Module components