Cisco Cisco Web Security Appliance S670 User Guide

Page of 784
 
6-19
Cisco IronPort AsyncOS 7.0 for Web User Guide
OL-23079-01
Chapter 6      Working with Policies
Tracing Policies
When you use the policy trace tool, the Web Proxy does not record the requests 
in the access log or reporting database.
By default, the Web Proxy simulates an HTTP GET request. However, when you 
specify a file to upload in the Request Details section, the Web Proxy simulates 
an HTTP POST request.
Note
The policy trace tool explicitly makes requests even if the Web Security appliance 
is deployed in transparent mode.
You can trace policies on the System Administration > Policy Trace page.
To trace policies: 
Step 1
Navigate to the System Administration > Policy Trace page.
Step 2
In the URL field, enter the URL in the client request to simulate.
Step 3
Optionally, in the Client IP Address field, enter the IP address of the machine to 
simulate.