F5 BIG-IP SSL Orchestrator Training Lab > All SSL Orchestrator Lab Guides > [Archived] SSL Orchestrator v7 (Agility 2020) Training Labs > SSL Orchestrator v7 - SSLO 201: Real World Use Cases / Putting It to Use (Agility | 2 hours) > 2. Managing Security Services & Service Chains Source | Edit on
2.1. Scenario¶
With the increase in the number of security incidents that have made the news lately, your organization has updated its security policy to log all user traffic flowing through SSL Orchestrator, irrespective of whether the traffic will be inspected or bypassed. A new appropriately sized Cisco Firepower has been purchased and has been cabled to the SSL Orchestrator device. As the Administrator of SSL Orchestrator, your manager is asking you to do the following:
- In addition to sending Internet-bound traffic to a Squid proxy, this traffic now needs to be copied to a Cisco Firepower
- Traffic that was previously bypassed and sent directly to the Internet (skipping the Squid proxy) needs to be copied to the Cisco Firepower
2.2. Lab Overview¶
This lab assumes familiarity with SSL Orchestrator. This lab is pre-configured with the following Security Policy:
By the end of this module you will have modified the existing Security Policy to satisfy the requirements from the scenario described.