Cisco Cisco Web Security Appliance S390 Betriebsanweisung
8-19
Cisco IronPort AsyncOS 7.0 for Web User Guide
OL-23079-01
Chapter 8 Access Policies
Blocking Specific Applications and Protocols
You block access to applications based on their agent pattern similarly for the
different Access Policies:
different Access Policies:
•
User defined policies — On the Web Security Manager > Access Policies
page, click the value in the Protocols and User Agents column for the desired
policy. Choose Define Applications Custom Settings.
page, click the value in the Protocols and User Agents column for the desired
policy. Choose Define Applications Custom Settings.
•
Global Policy — On the Web Security Manager > Access Policies page, click
the value in the Protocols and User Agents column for the Global Policy.
the value in the Protocols and User Agents column for the Global Policy.
Once you view the Access Policies: Protocols and User Agents: Policy_Name
page, add user agent patterns (also called signatures) to the Block Custom User
Agents section of the page.
page, add user agent patterns (also called signatures) to the Block Custom User
Agents section of the page.
Figure 8-6
Entering Agent Patterns to Block
Note
You can click the Example User Agent Patterns link for a list of some example
user agent patterns.
user agent patterns.
Table 8-2
Common Application Agent Patterns
Application
Search in Setting
HTTP header
Signature
AOL Messenger
Request headers
User-Agent
Gecko/
BearShare
Response header
Server
Bearshare
BitTorrent
Request headers
User-Agent
BitTorrent
eDonkey
Request headers
User-Agent
e2dk
Gnutella
Request headers
User-Agent
Gnutella
Gnucleus
Kazaa
Request headers
P2P-Agent
Kazaa
Kazaaclient: