Cisco Cisco Web Security Appliance S380 Guía Del Usuario

Descargar
Página de 606
 
9-13
Cisco IronPort AsyncOS 7.7 for Web User Guide
 
Chapter 9      Block, Allow or Redirect Transaction Requests
Blocking Specific Applications and Protocols
Once you view the Access Policies: Protocols and User Agents: Policy_Name page, add user agent 
patterns (also called signatures) to the Block Custom User Agents section of the page.
Figure 9-6
Entering Agent Patterns to Block
Note
You can click the Example User Agent Patterns link for a list of some example user agent patterns.
 provides a list of common patterns.
This is not a comprehensive list, as signatures change occasionally, and new applications are developed. 
You can find additional signatures at various websites, including the following websites:
  •
http://www.user-agents.org/
  •
http://www.useragentstring.com/pages/useragentstring.php
  •
http://www.infosyssec.com/infosyssec/security/useragentstrings.shtml
Note
Cisco IronPort does not maintain, verify, or support the user agent listings at any of these websites.
Table 9-2
Common Application Agent Patterns 
Application
Search in Setting
HTTP Header
Signature
AOL Messenger 
Request headers 
User-Agent 
Gecko/
BearShare
Response header
Server
Bearshare
BitTorrent Request 
headers 
User-Agent 
BitTorrent
eDonkey Request 
headers
User-Agent 
e2dk
Gnutella Request 
headers
User-Agent
Gnutella 
Gnucleus
Kazaa Request 
headers
P2P-Agent
Kazaa 
 
Kazaaclient:
Kazaa
Request headers
User-Agent
KazaClient 
Kazaaclient:
Kazaa
Request headers
X-Kazaa-Network
KaZaA
Morpheus
Response header
Server
Morpheus
MSN Messenger
Request headers
User-Agent
MSN Messenger
Trillian
Request headers
User-Agent
Trillian/
Windows Messenger
Request headers
User-Agent
MSMSGS
Yahoo Messenger
Request headers
Host
msg.yahoo.com
Yahoo Messenger
Request headers
User-Agent
ymsgr