High-level deployment diagrams
Applies to | In this topic |
---|---|
Forcepoint Web Security, v8.5.x | Forcepoint URL Filtering deployment diagram |
Forcepoint URL Filtering, v8.5.x | Forcepoint Web Security deployment diagram |
Forcepoint URL Filtering deployment diagram
The illustration below shows components distributed across multiple servers in a typical deployment.
All of the enforcement components, except for the optional transparent identification agents, may reside on a Windows or Linux server, or a Forcepoint appliance.
For evaluation or very small (low traffic) deployments, all components, plus an instance of SQL Server Express (installed by the Forcepoint Security Installer, in certain cases) may reside on a single Windows server.
For more information about the core components that make up a deployment, see Deploying core web protection components
Forcepoint Web Security deployment diagram
This illustration shows a basic software-based deployment. Note that the illustration is intended to show the general distribution of components and does not include network details (such as segmenting, internal firewalls, routing, switching, and so forth).
Content Gateway and other enforcement components, except for the optional transparent identification agents, may also reside on a Forcepoint appliance.
- Deploying core web protection components
- Content Gateway Deployment
- Deploying Forcepoint Web Security Hybrid Module components