User Manual

DATA SHEET
Aruba’s WebCC service bundle is a subscription-based license
available for ArubaOS controller-managed networks and Aruba
Central cloud-managed APs. WebCC complements the
application visibility and user-role based access control
included within Policy Enforcement Firewall (PEF) for Dynamic
Segmentation.
The WebCC bundle includes URL ltering, IP reputation, and
geo-location ltering. The web dictionaries are continuously
updated to provide up-to-date policy enforcement and
rate-limiting actions.
URL FILTERING
The solution involves extracting the hostnames and URLs that
users are browsing using the Aruba DPI engine.
The URLs are then looked up in a locally-cached database that
contains commonly used and recently accessed web sites. If the
user’s site is not on the list, the network makes a request for the
category, classication, and reputation of the web site from the
threat intelligence engine that classies and scores an average of
2500+ URLs per second.
WEB CONTENT CLASSIFICATION (WEBCC) BUNDLE
(URL Filtering, IP Reputation, and Geolocation Filtering)
IP REPUTATION
The IP Reputation helps augment security posture by adding
a dynamic IP reputation service to existing defenses. This
service provides a real time feed of known malicious IP
addresses broken down into 10 categories so IT security
administrators can easily identify threats by type. These
categories are: Windows Exploits, Web Attacks, Phishing,
Botnets, Denial of Service, Scanners, Proxies, Reputation,
Spam Sources, and Mobile Threats.
Internet
Sensor Network
Global Threat Databases
Security Partners
Customers (Millions)
figure 1.0_071916_webcc-dsa
THREAT INTELLIGENCE PLATFORM
URL FILTERING
83+ Site Categories, such as
Shopping, Job Search, Sports,
Pornography, as well as various
threat categories including:
Bot Nets
Malware Sites
Phishing and
Other Frauds
Proxy Avoidance
and Anonymizers
Spam URLs
Spyware and Adware
Contextual Database
Capture
Classify
Publish
Analyze
File MobileInternet
URLs (Billions)
Domains (Millions)
IPs (Billions)
Behaviors (Billions)
Apps (Millions)
Connected Sensors (Millions)
FEATURES AND BENEFITS
• Enhances policy enforcement with an expanded
library of denitions
• Deploys an automated algorithm to identify
suspicious IPs
• Examines and correlates by the IP
• Applies built-in rules to test the IP
• Determines if and how long to restrict the IP
• Releases the restrictions on the IP but keeps it
under watch

Summary of content (3 pages)