Cisco Cisco Web Security Appliance S390 Betriebsanweisung

Seite von 494
11-2
AsyncOS 9.1.1 for Cisco Web Security Appliances User Guide
 
Chapter 11      Create Decryption Policies to Control HTTPS Traffic
  Managing HTTPS Traffic through Decryption Policies Best Practices
Managing HTTPS Traffic through Decryption Policies Task Overview
Managing HTTPS Traffic through Decryption Policies 
Best Practices
Create fewer, more general Decryption Policy groups that apply to all users or fewer, larger groups 
of users on the network. Then, if you need to apply more granular control to decrypted HTTPS 
traffic, use more specific Access Policy groups. 
Decryption Policies 
The appliance can perform any of the following actions on an HTTPS connection request:
All actions except Monitor are final actions the Web Proxy applies to a transaction. A final action is an 
action that causes the Web Proxy to stop evaluating the transaction against other control settings. For 
example, if a Decryption Policy is configured to monitor invalid server certificates, the Web Proxy makes 
Step
Task List for Managing HTTPS Traffic 
through Decryption Policies
Links to Related Topics and Procedures
1
Enabling the HTTPS proxy
2
Upload or Generate a certificate and key
3
Configuring Decryption options
5
(Optional) Configure invalid certificate 
handling
6
(Optional) Enabling real-time 
revocation status checking
7
(Optional) Manage trusted and blocked 
certificates
Option
Description
Monitor
Monitor is an intermediary action that indicates the Web Proxy should continue 
evaluating the transaction against the other control settings to determine which final 
action to ultimately apply.
Drop
The appliance drops the connection and does not pass the connection request to the 
server. The appliance does not notify the user that it dropped the connection. 
Pass through The appliance passes through the connection between the client and the server without 
inspecting the traffic content.
Decrypt
The appliance allows the connection, but inspects the traffic content. It decrypts the 
traffic and applies Access Policies to the decrypted traffic as if it were a plaintext HTTP 
connection. By decrypting the connection and applying Access Policies, you can scan 
the traffic for malware.