Cisco Cisco Web Security Appliance S390 Betriebsanweisung

Seite von 784
 
8-19
Cisco IronPort AsyncOS 7.0 for Web User Guide
OL-23079-01
Chapter 8      Access Policies
Blocking Specific Applications and Protocols
You block access to applications based on their agent pattern similarly for the 
different Access Policies: 
  •
User defined policies — On the Web Security Manager > Access Policies 
page, click the value in the Protocols and User Agents column for the desired 
policy. Choose Define Applications Custom Settings.
  •
Global Policy — On the Web Security Manager > Access Policies page, click 
the value in the Protocols and User Agents column for the Global Policy.
Once you view the Access Policies: Protocols and User Agents: Policy_Name 
page, add user agent patterns (also called signatures) to the Block Custom User 
Agents section of the page.
Figure 8-6
Entering Agent Patterns to Block
Note
You can click the Example User Agent Patterns link for a list of some example 
user agent patterns.
 provides a list of common patterns.
Table 8-2
Common Application Agent Patterns 
Application
Search in Setting
HTTP header
Signature
AOL Messenger 
Request headers 
User-Agent 
Gecko/
BearShare
Response header
Server
Bearshare
BitTorrent 
Request headers 
User-Agent 
BitTorrent
eDonkey 
Request headers
User-Agent 
e2dk
Gnutella 
Request headers
User-Agent
Gnutella
 
Gnucleus
Kazaa 
Request headers
P2P-Agent
Kazaa
 
Kazaaclient: