Cisco Cisco Web Security Appliance S170 Guía Del Usuario
Chapter 21 L4 Traffic Monitor
Configuring the L4 Traffic Monitor
21-10
Cisco IronPort AsyncOS 7.0 for Web User Guide
OL-23079-01
Note
If the L4 Traffic Monitor is configured to block, the L4 Traffic Monitor
and the Web Proxy must be configured on the same network. Use the
Network > Routes page to confirm that all clients are accessible on routes
that are configured for data traffic.
and the Web Proxy must be configured on the same network. Use the
Network > Routes page to confirm that all clients are accessible on routes
that are configured for data traffic.
Step 4
Submit and commit your changes.
Valid Formats
When you add addresses to the Allow List or Additional Suspected Malware
Addresses properties, separate multiple entries with whitespace or commas. You
can enter addresses in any of the following formats:
Addresses properties, separate multiple entries with whitespace or commas. You
can enter addresses in any of the following formats:
Additional
Suspected Malware
Addresses
(optional)
Suspected Malware
Addresses
(optional)
Enter zero or more known addresses that the L4 Traffic
Monitor should consider as a possible malware. For a list
of valid address formats you can use, see
Monitor should consider as a possible malware. For a list
of valid address formats you can use, see
.
If you choose to block suspected malware addresses, the
L4 Traffic Monitor will either block or monitor these
addresses depending on whether it determines them to be
known malware addresses or ambiguous addresses. For
definitions of ambiguous and known malware addresses,
see
L4 Traffic Monitor will either block or monitor these
addresses depending on whether it determines them to be
known malware addresses or ambiguous addresses. For
definitions of ambiguous and known malware addresses,
see
.
If you choose to monitor suspected malware addresses, it
will monitor these addresses.
will monitor these addresses.
Note: Adding internal IP addresses to the Additional
Suspected Malware Addresses list causes legitimate
destination URLs to show up as malware in L4 Traffic
Monitor reports. To avoid this type of erroneous reporting,
do not enter internal IP addresses in the “Additional
Suspected Malware Addresses” field on the Web Security
Manager > L4 Traffic Monitor Policies page.
Suspected Malware Addresses list causes legitimate
destination URLs to show up as malware in L4 Traffic
Monitor reports. To avoid this type of erroneous reporting,
do not enter internal IP addresses in the “Additional
Suspected Malware Addresses” field on the Web Security
Manager > L4 Traffic Monitor Policies page.
Table 21-1
L4 Traffic Monitor Policies
Property
Description