Cisco Cisco Web Security Appliance S690 User Guide

Page of 606
 
4-12
Cisco IronPort AsyncOS 7.7 for Web User Guide
Chapter 4      Installation and Configuration
System Setup Wizard
Step 1
Configure the Security Services options, using the reference information in 
; then clicNext.
Table 4-8
Security Options in System Setup Wizard 
Option
Description
Global Policy 
Default Action
Choose whether to block or monitor all web traffic by default after the System 
Setup Wizard completes. When you choose to block all traffic, the Global 
Access Policy blocks all proxied protocols, such as HTTP, HTTPS, and FTP. 
When you choose monitor, no proxied protocols are blocked. You can change 
this behavior later by editing the Protocols and User Agents settings for the 
Global Access Policy. 
You might want to block all traffic with the Global Access Policy until you can 
define appropriately restrictive user-defined Access Policies and then edit the 
Global Access Policy as necessary.
L4 Traffic Monitor
Choose whether the Layer-4 Traffic Monitor should monitor or block layer 4 
traffic.
The L4 Traffic Monitor detects rogue traffic across all network ports and stops 
malware attempts to bypass port 80.
You might choose to monitor traffic when you evaluate the Web Security 
appliance, and block traffic when you purchase and use the appliance.
For more information, see 
Acceptable Use 
Controls
Choose whether or not to enable Acceptable Use Controls so you can use URL 
filtering. URL filtering allows you to control user access based on the category 
of a URL in a request. Enable this option when you want to restrict users from 
accessing particular types of websites. 
For more information, see 
.
Reputation Filtering Choose whether or not to enable Web Reputation filtering for the Global Policy 
Group. When you create custom Access Policy groups, you can choose whether 
or not to enable Web Reputation filtering.
Web Reputation Filters is a security feature that analyzes web server behavior 
and assigns a reputation score to a URL to determine the likelihood that it 
contains URL-based malware.
Enable this option when you want to identify suspicious activity and stop 
malware attacks before they occur. 
For more information, see 
.