Cisco Cisco Web Security Appliance S190 Guía Del Usuario
C O N T R O L L I N G H T T P A N D N A T I V E F T P T R A F F I C
C H A P T E R 8 : A C C E S S P O L I C I E S
157
C O N T R O L L I N G H T T P A N D N A T I V E F T P TR A F F I C
After the Web Proxy assigns an HTTP, native FTP, or decrypted HTTPS request to an Access
Policy group, the request inherits the control settings of that policy group. The control settings
of the Access Policy group determine whether the appliance allows, blocks, or redirects the
connection.
Policy group, the request inherits the control settings of that policy group. The control settings
of the Access Policy group determine whether the appliance allows, blocks, or redirects the
connection.
Configure control settings for Access Policy groups on the Web Security Manager > Access
Policies page.
Policies page.
Figure 8-2 shows where you can configure control settings for the Access Policy groups.
Figure 8-2 Creating Secure Access Policies
You can configure the following settings to determine what action to take on the request:
• Applications. For more information, see “Applications” on page 159.
• URL Categories. For more information, see “URL Categories” on page 159.
• Objects. For more information, see “Object Blocking” on page 160.
• Web Reputation and Anti-Malware Filtering. For more information, see “Web Reputation
After an Access Policy group is assigned to a request, the control settings for the policy group
are evaluated to determine whether to allow, block, or redirect the request. For more
information about assigning an Access Policy group to a request, see “Policy Group
Membership” on page 113.
are evaluated to determine whether to allow, block, or redirect the request. For more
information about assigning an Access Policy group to a request, see “Policy Group
Membership” on page 113.
Figure 8-3 on page 158 shows how the Web Proxy determines which action to take on a
request after it has assigned a particular Access Policy to the request.
request after it has assigned a particular Access Policy to the request.