Cisco Cisco Web Security Appliance S670 Guía Del Usuario
10-16
AsyncOS 9.1.1 for Cisco Web Security Appliances User Guide
Chapter 10 Create Policies to Control Internet Requests
Time Ranges and Quotas
Exempting Client Applications from Authentication
Time Ranges and Quotas
You can apply time ranges and time and volume quotas to access policies and decryption policies to
restrict when a user has access, as well as their maximum connection time or data volume (also referred
to as a “bandwidth quota”).
restrict when a user has access, as well as their maximum connection time or data volume (also referred
to as a “bandwidth quota”).
•
•
Time Ranges for Policies and Acceptable Use Controls
Time ranges are defined periods of time during which policies and acceptable use controls apply.
Note
You cannot use time ranges to define the times at which users must authenticate. Authentication
requirements are defined in Identification Profiles, which do not support time ranges.
requirements are defined in Identification Profiles, which do not support time ranges.
•
Creating a Time Range
Step 1
Choose Web Security Manager > Define Time Ranges and Quotas.
Step 2
Click Add Time Range.
Step 3
Enter a name for the time range.
Step 4
Choose a Time Zone option:
•
Use Time Zone Setting From Appliance – Use the same time zone as the Web Security appliance.
•
Specify Time Zone for this Time Range – Define a different time zone, either as a GMT Offset, or
as a region, country and a specific time zone in that country.
as a region, country and a specific time zone in that country.
Step 5
Check one or more Day of Week check boxes.
Step 6
Select a Time of Day option:
•
All Day – Use the full 24-hour period.
Step
Task
Link
Step 1
Create an Identification Profile that does not
require authentication.
require authentication.
Step 2
Set the Identification Profile membership as the client
application to exempt.
application to exempt.
Step 3
Place the Identification Profile above all other Identification
Profiles in the policies table that require authentication.
Profiles in the policies table that require authentication.