Cisco Cisco Web Security Appliance S390 Betriebsanweisung

Seite von 455
 
4-10
AsyncOS 8.7 for Cisco Web Security Appliances User Guide
 
Chapter 4      Intercepting Web Requests
  Web Proxy Options for Intercepting Web Requests
Step 5
Commit your changes.
Web Proxy Bypassing
Web Proxy Bypassing for Web Requests
You can configure the Web Security appliance so that transparent requests from particular clients, or to 
particular destinations, bypass the Web Proxy. 
Bypassing the web proxy allows you to:
Prevent interference with non-HTTP-compliant (or proprietary) protocols that use HTTP ports but 
do not work properly when they connect to a proxy server.
Ensure that traffic from a particular machine inside the network, such as a malware test machine, 
bypasses the Web Proxy and all its built-in security protection.
Bypassing only works for requests that are transparently redirected to the web proxy. The web proxy 
processes all requests that clients explicitly forward to it, whether the proxy is in transparent or forward 
mode. 
Configuring Web Proxy Bypassing for Web Requests
Step 1
Choose Web Security Manager > Bypass Settings.
Step 2
Click Edit Bypass Settings.
Step 3
Enter the addresses for which you wish to bypass the web proxy.
Step 4
Submit and commit your changes.
Configuring Web Proxy Bypassing for Applications
Step 1
Choose Web Security Manager > Bypass Settings.
Step 2
Click Edit Application Bypass Settings.
Step 3
Select the application(s) you wish to bypass scanning for. 
Step 4
Submit and commit your changes.