Cisco Cisco Web Security Appliance S670 User Guide

Page of 784
 
5-15
Cisco IronPort AsyncOS 7.0 for Web User Guide
OL-23079-01
Chapter 5      Web Proxy Services
Bypassing the Web Proxy
Step 4
Submit and commit your changes.
Bypassing the Web Proxy
You can configure the Web Security appliance so client requests to or from 
particular addresses bypass all processing by the Web Proxy. The proxy bypass 
list only works for requests that are transparently redirected to the Web Proxy 
using an L4 switch or a WCCP v2 router. When the appliance is deployed in 
explicit forward mode, or when a client makes an explicit request to the Web 
Proxy, the request is processed by the Web Proxy.
You might want to create a proxy bypass list to accomplish any of the following:
  •
Prevent the Web Proxy from interfering with non-HTTP-compliant (or 
proprietary) protocols using HTTP ports that do not work properly when they 
connect to a proxy server. 
Data Connection 
Timeouts
Enter how long the FTP Proxy waits for more 
communication in the data connection from an idle FTP 
client or FTP server when the current transaction has not 
been completed.
For example, if an FTP client opens a data connection and 
sends only half of the request, the FTP Proxy waits for the 
amount of time specified for the client side data 
connection timeout for the rest of the request before 
closing the open connection.
  •
Client side. The maximum number of seconds the 
FTP Proxy keeps a data connection open with an idle 
client.
  •
Server side. The maximum number of seconds the 
FTP Proxy keeps a data connection open with an idle 
FTP server.
Default is 300 seconds for both client and server side data 
connection timeouts.
Table 5-2
FTP Proxy Settings (continued)
Property
Description