Cisco Cisco Web Security Appliance S170 Guía Del Usuario
128
I R O N P O R T A S Y N C O S 6 . 5 F O R W E B U S E R G U I D E
Configure Decryption Policy groups on the Web Security Manager > Decryption Policies
page. For more information about Decryption Policy groups, see “Decryption Policies” on
page 199.
page. For more information about Decryption Policy groups, see “Decryption Policies” on
page 199.
Routing Policies
Routing Policies determine to where to pass the client request, either to another proxy or to
the destination server. They address the question, “from where to fetch content?”
the destination server. They address the question, “from where to fetch content?”
You can use this policy type to select a group of upstream proxies configured for load
balancing or failover.
balancing or failover.
Configure Routing Policies on the Web Security Manager > Routing Policies page. For more
information about Routing Policies, see “Working with External Proxies” on page 187.
information about Routing Policies, see “Working with External Proxies” on page 187.
Access Policies
Access Policies determine whether to allow or block HTTP and decrypted HTTPS
transactions. They address the question, “to allow or block the transaction?”
transactions. They address the question, “to allow or block the transaction?”
Access Policies determine how the appliance controls access to services, applications, and
objects on the web for HTTP and decrypted HTTPS requests. The appliance uses Access
Policies to evaluate and scan HTTP requests and HTTPS requests designated for decryption.
objects on the web for HTTP and decrypted HTTPS requests. The appliance uses Access
Policies to evaluate and scan HTTP requests and HTTPS requests designated for decryption.
Configure Access Policy groups on the Web Security Manager > Access Policies page. For
more information about Access Policy groups, see “Access Policies” on page 169.
more information about Access Policy groups, see “Access Policies” on page 169.
IronPort Data Security Policies
IronPort Data Security Policies determine whether or not to block a request to upload data
using logic defined on the Web Security appliance. They address the question, “to block the
upload of data?”
using logic defined on the Web Security appliance. They address the question, “to block the
upload of data?”
The Web Proxy uses IronPort Data Security Policies to evaluate and scan HTTP requests and
decrypted HTTPS requests that have any data in the request body.
decrypted HTTPS requests that have any data in the request body.
Configure Data Security Policy groups on the Web Security Manager > IronPort Data Security
Policies page. For more information about Data Security Policy groups, see “Data Security
and External DLP Policies” on page 233.
Policies page. For more information about Data Security Policy groups, see “Data Security
and External DLP Policies” on page 233.
External DLP Policies
External DLP (data loss prevention) policies determine whether or not to block a request to
upload data using logic stored on an external DLP server. They address the question, “to block
the upload of data?”
upload data using logic stored on an external DLP server. They address the question, “to block
the upload of data?”
The Web Proxy uses External DLP Policies to evaluate HTTP requests and decrypted HTTPS
requests that have any data in the request body and send them to an external DLP server for
scanning.
requests that have any data in the request body and send them to an external DLP server for
scanning.