Cisco Cisco Web Security Appliance S170 Guía Del Usuario
9-11
AsyncOS 8.5 for Cisco Web Security Appliances User Guide
Chapter 9 Create Policies to Control Internet Requests
Block, Allow, or Redirect Transaction Requests
Block, Allow, or Redirect Transaction Requests
The web proxy controls web traffic based on the policies that you create for groups of transaction
requests.
requests.
•
Allow. The Web Proxy permits the connection without interruption. Allowed connections may not
have been scanned by the DVS engine.
have been scanned by the DVS engine.
•
Block. The Web Proxy does not permit the connection and instead displays an end user notification
page explaining the reason for the block.
page explaining the reason for the block.
•
Redirect. The Web Proxy does not allow the connection to the originally requested destination
server and instead connects to a different specified URL, see
server and instead connects to a different specified URL, see
.
Note
The preceding actions are final actions that the Web Proxy takes on a client request. The Monitor action
that you can configure for Access Policies is not a final action.
that you can configure for Access Policies is not a final action.
Generally, different types of policies control traffic based on the transport protocol.
Note
Decryption policy takes precedence over Access policy.
Client Applications
About Client Applications
Client Applications (such as a web browser) are used to make requests. You can define policy
membership based on client applications, and you can specify control settings and exempt client
applications from authentication, which is useful for applications that cannot prompt for credentials.
membership based on client applications, and you can specify control settings and exempt client
applications from authentication, which is useful for applications that cannot prompt for credentials.
Policy Type
Protocols
Actions Supported
HTTP
HTTPS
FTP
SOCKS
Block
Allow
Redirect
Monitor
Access
x
x
x
x
x
x
x
SOCKS
x
x
x
SAAS
x
x
Decryption
x
x
x
Data Security
x
x
x
x
x
External DLP
x
x
x
x
Outbound
Malware
Scanning
Malware
Scanning
x
x
x
x
x
Routing
x
x
x
x