Cisco Cisco Web Security Appliance S170 Guía Del Usuario
290
I R O N P O R T A S Y N C O S 6 . 5 F O R W E B U S E R G U I D E
For more information about creating custom URL categories, see “Custom URL Categories”
on page 301.
on page 301.
Matching URLs to URL Categories
When the URL filtering engine matches a URL category to the URL in a client request, it first
evaluates the URL against the custom URL categories included in the policy group. If the URL
in the request does not match an included custom category, the URL filtering engine
compares it to the predefined URL categories. If the URL does not match any included custom
or predefined URL categories, the request is uncategorized.
evaluates the URL against the custom URL categories included in the policy group. If the URL
in the request does not match an included custom category, the URL filtering engine
compares it to the predefined URL categories. If the URL does not match any included custom
or predefined URL categories, the request is uncategorized.
Note — When determining policy group membership, a custom URL category is considered
included only when it is selected for policy group membership.
included only when it is selected for policy group membership.
For more information about uncategorized URLs, see “Uncategorized URLs” on page 289.
The URL Categories Database
The Web Security appliance collects information and maintains its own filtering categories
database. The different URL filtering engines maintain separate databases. The filtering
categories databases periodically receive updates from the IronPort update server (
database. The different URL filtering engines maintain separate databases. The filtering
categories databases periodically receive updates from the IronPort update server (
https://
update-manifests.ironport.com
). Server updates are automated, and the update
interval is set by the server as opposed to the appliance. Updates to the database occur with a
regular degree of frequency, and require no administrator intervention.
regular degree of frequency, and require no administrator intervention.
Cisco IronPort Web Usage Controls shares some database components with the Web
Reputation Filters (WBRS) database. Because of this shared information, IronPort recommends
fully participating in the SenderBase Network because it allows Cisco IronPort Web Usage
Controls to validate and categorize all URLs dynamically classified by the Dynamic Content
Analysis engine, including all URLs that could not otherwise be classified, improving overall
efficacy.
Reputation Filters (WBRS) database. Because of this shared information, IronPort recommends
fully participating in the SenderBase Network because it allows Cisco IronPort Web Usage
Controls to validate and categorize all URLs dynamically classified by the Dynamic Content
Analysis engine, including all URLs that could not otherwise be classified, improving overall
efficacy.
For information about update intervals and the IronPort update server, see “Manually
Updating Security Service Components” on page 545.
Updating Security Service Components” on page 545.