Cisco Cisco Web Security Appliance S170 Guía Del Usuario
C O N F I G U R I N G T H E U R L F I L T E R I N G E N G I N E
C H A P T E R 1 4 : U R L F I L T E R S
291
C O N F I G U R I N G T H E U R L F I L T E RI N G E N G I N E
To apply predefined category settings to policy groups and configure custom settings to
manage web transactions, you must first enable and choose a URL filtering engine, either the
Cisco IronPort Web Usage Controls URL filtering engine or the IronPort URL Filters. By
default, the Cisco IronPort Web Usage Controls URL filtering engine is enabled in the System
Setup Wizard.
manage web transactions, you must first enable and choose a URL filtering engine, either the
Cisco IronPort Web Usage Controls URL filtering engine or the IronPort URL Filters. By
default, the Cisco IronPort Web Usage Controls URL filtering engine is enabled in the System
Setup Wizard.
When you enable URL filtering, you can choose the default action the Web Proxy should use
when the URL filtering engine is unavailable, either monitor or block.
when the URL filtering engine is unavailable, either monitor or block.
To configure the URL filtering engine:
1. Navigate to the Security Services > Acceptable Use Controls page.
2. Click Edit Global Settings.
The Edit Acceptable Use Controls Settings page appears.
3. Verify the Enable Acceptable Use Controls property is enabled.
4. In the Acceptable Use Controls Service area, choose which URL filtering engine to
enable, either IronPort URL Filters or Cisco IronPort Web Usage Controls.
5. If you enable Cisco IronPort Web Usage Controls, choose whether or not to enable the
Dynamic Content Analysis Engine.
For more information on the Dynamic Content Analysis Engine, see “Dynamic Content
Analysis Engine” on page 288.
Analysis Engine” on page 288.
6. Choose the default action the Web Proxy should use when the URL filtering engine is
unavailable, either Monitor or Block. Default is Monitor.
7. Submit and commit your changes.