Cisco Cisco Web Security Appliance S670 User Guide
C O N F I G U R I N G U R L F I L T E R S F O R D A T A S E C U R I T Y P O L I C Y G R O U P S
C H A P T E R 1 3 : U R L F I L T E R S
277
Note — If you want to block a particular URL category for HTTPS requests, choose to
decrypt that URL category in the Decryption Policy group and then choose to block the
same URL category in the Access Policy group.
decrypt that URL category in the Decryption Policy group and then choose to block the
same URL category in the Access Policy group.
4. In the Uncategorized URLs section, choose the action to take for client requests to web
sites that do not fall into a predefined or custom URL category. You can choose any action
listed in Table 13-2.
listed in Table 13-2.
5. Submit and commit your changes.
Configuring URL Filters for Data Security Policy Groups
You can configure URL filtering for user defined Data Security Policy groups and the Global
Policy Group.
Policy Group.
To configure URL filtering in a Data Security Policy group:
1. Navigate to the Web Security Manager > IronPort Data Security Policies page.
Use Global Setting
Uses the action for this category in the global Decryption Policy group.
This is the default action for user defined policy groups.
Applies to user defined policy groups only.
This is the default action for user defined policy groups.
Applies to user defined policy groups only.
Pass Through
Passes through the connection between the client and the server without
inspecting the traffic content. You might want to pass through
connections to trusted secure sites, such as well known banking and
financial institutions.
inspecting the traffic content. You might want to pass through
connections to trusted secure sites, such as well known banking and
financial institutions.
Monitor
The Web Proxy neither allows nor blocks the request. Instead, it
continues to evaluate the client request against other policy group control
settings, such as web reputation filtering.
continues to evaluate the client request against other policy group control
settings, such as web reputation filtering.
Decrypt
Allows the connection, but inspects the traffic content. The appliance
decrypts the traffic and applies Access Policies to the decrypted traffic as
if it were a plaintext HTTP connection. By decrypting the connection and
applying Access Policies, you can scan the traffic for malware. You might
want to decrypt connections to third party email providers, such as gmail
or hotmail.
For more information about how the appliance decrypts HTTPS traffic,
see “Decrypting HTTPS Traffic” on page 191.
decrypts the traffic and applies Access Policies to the decrypted traffic as
if it were a plaintext HTTP connection. By decrypting the connection and
applying Access Policies, you can scan the traffic for malware. You might
want to decrypt connections to third party email providers, such as gmail
or hotmail.
For more information about how the appliance decrypts HTTPS traffic,
see “Decrypting HTTPS Traffic” on page 191.
Drop
Drops the connection and does not pass the connection request to the
server. The appliance does not notify the user that it dropped the
connection. You might want to drop connections to third party proxies
that allow users on the network bypass the organization’s acceptable use
policies.
server. The appliance does not notify the user that it dropped the
connection. You might want to drop connections to third party proxies
that allow users on the network bypass the organization’s acceptable use
policies.
Table 13-2 URL Category Filtering for Decryption Policies (Continued)
Action
Description