Cisco Cisco Web Security Appliance S670 User Guide

Page of 606
 
11-23
Cisco IronPort AsyncOS 7.7 for Web User Guide
 
Chapter 11      Processing HTTPS Traffic
Logging
Related topics
  •
Removing Certificates from the Trusted List
Step 1
Select Security Services HTTPS Proxy.
Step 2
Click Manage Trusted Root Certificates.
Step 3
Select the Override Trust checkbox corresponding to the certificate you wish to remove from the list.
Step 4
Submit and Commit your changes.
Logging
HTTPS transactions in the access logs appear similar to HTTP transactions, but with slightly different 
characteristics. What gets logged depends on whether the transaction was explicitly sent or transparently 
redirected to the HTTPS Proxy:
  •
TUNNEL. This gets written to the access log when the HTTPS request was transparently redirected 
to the HTTPS Proxy. 
  •
CONNECT. This gets written to the access log when the HTTPS request was explicitly sent to the 
HTTPS Proxy.
When HTTPS traffic is decrypted, the access logs contain two entries for a transaction:
  •
TUNNEL or CONNECT depending on the type of request processed.
  •
The HTTP Method and the decrypted URL. For example, “GET https://ftp.example.com”.
The full URL is only visible when the HTTPS Proxy decrypts the traffic.