Cisco Cisco Web Security Appliance S670 Fehlerbehebungsanleitung

Seite von 1
In What Order are Access Policies and Identities
Processed?
Document ID: 117989
Contributed by Josh Wolfer and Siddharth Rajpathak, Cisco TAC
Engineers.
Jul 17, 2014
Contents
Question
Question
In what order are Access Policies and Identities processed on the Cisco Web Security Appliance (WSA)
Environment: Cisco Web Security Appliance (WSA), all versions of AsyncOS
Access Policies and Identities are processed in a specific order on the WSA. The WSA evaluates the identities
and access policies using a "top down" rule processing approach. This means that the WSA checks identities
or access policies in a "top > down" fashion and the first match that ismade, at any point in the processing,
results in the action taken by the WSA.
Additionally, identities are evaluated first. Once a client's access matches a specific identity, the WSA checks
all access policies that are configured to use the identity that matched the client's access.
Updated: Jul 17, 2014
Document ID: 117989