Cisco Cisco Web Security Appliance S170 Guía Del Usuario
Chapter 6 Working with Policies
Policy Types
6-4
Cisco IronPort AsyncOS 7.0 for Web User Guide
OL-23079-01
All other policies you create must specify an Identity.
Configure Identities on the Web Security Manager > Identities page. For more
information about Identities, see
information about Identities, see
.
Decryption Policies
Decryption Policies determine whether or not an HTTPS connection should be
decrypted, passed through, or dropped. They address the question, “to decrypt or
not to decrypt?”
decrypted, passed through, or dropped. They address the question, “to decrypt or
not to decrypt?”
The appliance uses Decryption Policies to evaluate HTTPS requests. The
Decryption Policy group that applies to an HTTPS request determines whether the
appliance drops the connection, passes it through without decryption, or decrypts
the connection and subsequently evaluate the decrypted request and response
against the defined Access Policy groups.
Decryption Policy group that applies to an HTTPS request determines whether the
appliance drops the connection, passes it through without decryption, or decrypts
the connection and subsequently evaluate the decrypted request and response
against the defined Access Policy groups.
Configure Decryption Policy groups on the Web Security Manager > Decryption
Policies page. For more information about Decryption Policy groups, see
Policies page. For more information about Decryption Policy groups, see
Routing Policies
Routing Policies determine to where to pass the client request, either to another
proxy or to the destination server. They address the question, “from where to fetch
content?”
proxy or to the destination server. They address the question, “from where to fetch
content?”
You can use this policy type to select a group of upstream proxies configured for
load balancing or failover.
load balancing or failover.
Configure Routing Policies on the Web Security Manager > Routing Policies
page. For more information about Routing Policies, see
page. For more information about Routing Policies, see
.
Access Policies
Access Policies determine whether to allow or block HTTP and decrypted HTTPS
transactions. They address the question, “to allow or block the transaction?”
transactions. They address the question, “to allow or block the transaction?”