Cisco Cisco Web Security Appliance S190 Guía Del Usuario
9-10
Cisco IronPort AsyncOS 7.7 for Web User Guide
Chapter 9 Block, Allow or Redirect Transaction Requests
Controlling HTTP and Native FTP Traffic
For more information about blocking user agents, see
.
Figure 9-4
Settings for Controlling Protocols and User Agents
Note
When the HTTPS Proxy is enabled, you can only use Decryption Policies to control access to HTTPS
transactions. You cannot configure Access Policies on this page to block HTTPS connections.
transactions. You cannot configure Access Policies on this page to block HTTPS connections.
URL Categories
AsyncOS for Web allows you to configure how the appliance handles a transaction based on the URL
category of a particular HTTP or HTTPS request. Using a predefined category list, you can choose to
monitor or block content by category. You can also create custom URL categories and choose to allow,
monitor, block, warn, or redirect traffic for a website in the custom category. You can use custom URL
categories to create block and allow lists based on destination.
category of a particular HTTP or HTTPS request. Using a predefined category list, you can choose to
monitor or block content by category. You can also create custom URL categories and choose to allow,
monitor, block, warn, or redirect traffic for a website in the custom category. You can use custom URL
categories to create block and allow lists based on destination.
For information about enabling a URL filtering engine, see
. For information on configuring URL categories in Access Policies, see
.
You can also use the Access Policies > URL Categories page to filter adult content by enforcing safe
searches and site content ratings. For more information, see
searches and site content ratings. For more information, see
Applications
You can use the Access Policies > Applications Visibility and Control page to configure the Web Proxy
block or allow applications by application type or a particular application. You can also apply controls
to particular application behaviors within a particular application, such as file transfers.
block or allow applications by application type or a particular application. You can also apply controls
to particular application behaviors within a particular application, such as file transfers.
Cisco IronPort Web Usage Controls includes the Application Visibility and Control engine (AVC
engine) which allows you to apply deeper controls to particular application types. The AVC engine is an
acceptable use policy component that inspects web traffic to gain deeper understanding and control of
web traffic used for applications.
engine) which allows you to apply deeper controls to particular application types. The AVC engine is an
acceptable use policy component that inspects web traffic to gain deeper understanding and control of
web traffic used for applications.