Cisco Cisco Web Security Appliance S170 Guía Del Usuario
4-10
AsyncOS 9.1.1 for Cisco Web Security Appliances User Guide
Chapter 4 Intercepting Web Requests
Web Proxy Options for Intercepting Web Requests
Step 5
Commit your changes.
Web Proxy Bypassing
•
•
•
Web Proxy Bypassing for Web Requests
You can configure the Web Security appliance so that transparent requests from particular clients, or to
particular destinations, bypass the Web Proxy.
particular destinations, bypass the Web Proxy.
Bypassing the web proxy allows you to:
•
Prevent interference with non-HTTP-compliant (or proprietary) protocols that use HTTP ports but
do not work properly when they connect to a proxy server.
do not work properly when they connect to a proxy server.
•
Ensure that traffic from a particular machine inside the network, such as a malware test machine,
bypasses the Web Proxy and all its built-in security protection.
bypasses the Web Proxy and all its built-in security protection.
Bypassing only works for requests that are transparently redirected to the web proxy. The web proxy
processes all requests that clients explicitly forward to it, whether the proxy is in transparent or
forward mode.
processes all requests that clients explicitly forward to it, whether the proxy is in transparent or
forward mode.
Configuring Web Proxy Bypassing for Web Requests
Step 1
Choose Web Security Manager > Bypass Settings.
Step 2
Click Edit Bypass Settings.
Step 3
Enter the addresses for which you wish to bypass the web proxy.
Step 4
Submit and commit your changes.
Configuring Web Proxy Bypassing for Applications
Step 1
Choose Web Security Manager > Bypass Settings.
Step 2
Click Edit Application Bypass Settings.
Step 3
Select the application(s) you wish to bypass scanning for.
Step 4
Submit and commit your changes.