Cisco Cisco Web Security Appliance S680 Guía Del Usuario
390
I R O N P O R T A S Y N C O S 6 . 3 F O R W E B U S E R G U I D E
• All ports except proxy ports. Monitors all TCP ports except the following ports for for
rogue activity.
-
Ports configured in the “HTTP Ports to Proxy” property on the Security Services >
Proxy Settings page (usually port 80).
Proxy Settings page (usually port 80).
-
Ports configured in the “Transparent HTTPS Ports to Proxy” property on the
Security Services > HTTPS Proxy page (usually port 443).
Security Services > HTTPS Proxy page (usually port 443).
5. Submit and commit the changes.
Updating L4 Traffic Monitor Anti-Malware Rules
To update the L4 Traffic Monitor anti-malware rules:
1. Navigate to the Security Services > L4 Traffic Monitor page.
2. Click Update Now.
The Web Security appliance contacts the component update server and updates the L4
Traffic Monitor anti-malware rules. For more information about the component update
server, see “Manually Updating Security Service Components” on page 525.
Traffic Monitor anti-malware rules. For more information about the component update
server, see “Manually Updating Security Service Components” on page 525.
Configuring L4 Traffic Monitor Policies
When the L4 Traffic Monitor is enabled, you can configure how it should manage traffic over
the configured TCP ports. It can perform the following actions on traffic over the TCP ports:
the configured TCP ports. It can perform the following actions on traffic over the TCP ports:
• Allow
• Monitor
• Block
For more information about how the L4 Traffic Monitor handles traffic, see “How the L4
Traffic Monitor Works” on page 387.
Traffic Monitor Works” on page 387.
The actions the L4 Traffic Monitor takes depends on the L4 Traffic Monitor policies you
configure.
configure.
To configure L4 Traffic Monitor policies:
1. Navigate to the Web Security Manager > L4 Traffic Monitor page.
2. Click Edit Settings.