Cisco Cisco Web Security Appliance S670 User Guide
![Cisco](https://files.manualsbrain.com/attachments/7380d0050044647c30f5c24bbbf5d0c0b6d9bb84/common/fit/150/50/faa183d287233c52228cfea3dbc2a127fe780f60564fcb0955d9c3d1cd23/brand_logo.png)
6-19
Cisco IronPort AsyncOS 7.0 for Web User Guide
OL-23079-01
Chapter 6 Working with Policies
Tracing Policies
When you use the policy trace tool, the Web Proxy does not record the requests
in the access log or reporting database.
in the access log or reporting database.
By default, the Web Proxy simulates an HTTP GET request. However, when you
specify a file to upload in the Request Details section, the Web Proxy simulates
an HTTP POST request.
specify a file to upload in the Request Details section, the Web Proxy simulates
an HTTP POST request.
Note
The policy trace tool explicitly makes requests even if the Web Security appliance
is deployed in transparent mode.
is deployed in transparent mode.
You can trace policies on the System Administration > Policy Trace page.
To trace policies:
Step 1
Navigate to the System Administration > Policy Trace page.
Step 2
In the URL field, enter the URL in the client request to simulate.
Step 3
Optionally, in the Client IP Address field, enter the IP address of the machine to
simulate.
simulate.