Cisco Cisco Web Security Appliance S680 Guía Del Usuario
10-9
AsyncOS 9.1 for Cisco Web Security Appliances User Guide
Chapter 10 Create Policies to Control Internet Requests
Block, Allow, or Redirect Transaction Requests
Block, Allow, or Redirect Transaction Requests
The web proxy controls web traffic based on the policies that you create for groups of transaction requests.
•
Allow. The Web Proxy permits the connection without interruption. Allowed connections may not
have been scanned by the DVS engine.
have been scanned by the DVS engine.
•
Block. The Web Proxy does not permit the connection and instead displays an end user notification
page explaining the reason for the block.
page explaining the reason for the block.
•
Redirect. The Web Proxy does not allow the connection to the originally requested destination
server and instead connects to a different specified URL, see
server and instead connects to a different specified URL, see
.
Applications
The Application Visibility and Control (AVC) engine is an Acceptable Use
policy component that inspects Web traffic to gain deeper understanding and
control of Web traffic used for applications. The appliance allows the Web Proxy
to be configured to block or allow applications by Application Types, and by
individual applications. You can also apply controls to particular application
behaviors, such as file transfers, within a particular application. See
policy component that inspects Web traffic to gain deeper understanding and
control of Web traffic used for applications. The appliance allows the Web Proxy
to be configured to block or allow applications by Application Types, and by
individual applications. You can also apply controls to particular application
behaviors, such as file transfers, within a particular application. See
for configuration information.
Objects
Allows the Web Proxy to be configured to block file downloads based on file
characteristics, such as file size and file type. An object is, generally, any item that
can be individually selected, uploaded, downloaded and manipulated, such as:
characteristics, such as file size and file type. An object is, generally, any item that
can be individually selected, uploaded, downloaded and manipulated, such as:
•
Application: pdf, xml, zip, exe
•
Text: cmd, csv, html, javascript
•
Image: gif, jpeg, png, tiff
•
Video: mp4, Quicktime, avi, wmv
•
Audio: mp4, wav, webm, mpeg
•
Message: http, xml, rfc822, partial
•
x-world: wrl, wrz, xof, 3dmf
Note
Object blocking does not inspect inside compressed files.
Anti-Malware
and Reputation
and Reputation
Web reputation filters allow for a web-based reputation score to be assigned to a
URL to determine the probability of it containing URL-based malware.
Anti-malware scanning identifies and stops web-based malware threats.
Advanced Malware Protection identifies malware in downloaded files.
URL to determine the probability of it containing URL-based malware.
Anti-malware scanning identifies and stops web-based malware threats.
Advanced Malware Protection identifies malware in downloaded files.
The Anti-Malware and Reputation policy inherits global settings respective to
each component. Within Security Services > Anti-Malware and Reputation,
malware categories can be customized to monitor or block based on malware
scanning verdicts and web reputation score thresholds can be customized.
Malware categories can be further customized within a policy. There are also
global settings for file reputation and analysis services.
each component. Within Security Services > Anti-Malware and Reputation,
malware categories can be customized to monitor or block based on malware
scanning verdicts and web reputation score thresholds can be customized.
Malware categories can be further customized within a policy. There are also
global settings for file reputation and analysis services.
For more information, see
and
Configuring File Reputation and Analysis Features,
page 17-4
.
Option
Description