Cisco Cisco Web Security Appliance S670 User Guide

Page of 784
 
Chapter 6      Working with Policies
Tracing Policies
6-18
Cisco IronPort AsyncOS 7.0 for Web User Guide
OL-23079-01
Firefox/2
 
Firefox/1
 
However, when you select “Firefox Any Versions,” AsyncOS uses the following 
regular expression:
Firefox
 
Also, you can configure the policy group membership to either match the user 
agents you define, or matching all other user agents than the ones defined.
Exempting User Agents from Authentication
To exempt a user agent from authentication:
Step 1
Create an Identity policy group with membership that is based on the user agent 
to exempt.
For more information about creating Identities, see 
.
Step 2
Do not require authentication for the Identity policy group.
Step 3
Place the Identity policy group above all other Identity policy groups that require 
authentication.
Step 4
Submit and commit your changes.
Tracing Policies
The Web Security appliance web interface includes a tool that traces a particular 
client request and details how the Web Proxy processes the request. The Web 
Proxy evaluates the request against all committed Access, Decryption, IronPort 
Data Security, Outbound Malware Scanning, and Routing Policies and calculates 
other attributes, such as the web reputation score.
The policy trace tool allows administrators to troubleshoot when end users ask 
questions about Web Proxy behavior. It simulates client requests as if they were 
made by the end users and describes Web Proxy behavior. It can be a powerful 
troubleshooting or debugging tool, especially if you have combined many of the 
advanced features available on the Web Security appliance.