Cisco Cisco Web Security Appliance S370 Guía Del Usuario

Descargar
Página de 450
 
10-10
AsyncOS 9.1 for Cisco Web Security Appliances User Guide
 
Chapter 10      Create Policies to Control Internet Requests
  Client Applications
Note
The preceding actions are final actions that the Web Proxy takes on a client request. The Monitor action 
that you can configure for Access Policies is not a final action. 
Generally, different types of policies control traffic based on the transport protocol. 
Note
Decryption policy takes precedence over Access policy.
Client Applications
About Client Applications
Client Applications (such as a web browser) are used to make requests. You can define policy 
membership based on client applications, and you can specify control settings and exempt client 
applications from authentication, which is useful for applications that cannot prompt for credentials.
Using Client Applications in Policies
Defining Policy Membership Using Client Applications
Step 1
Choose a policy type from the Web Security Manager menu.
Step 2
Click a policy name in the policies table.
Step 3
Expand the Advanced section and click the link in the Client Applications field.
Policy Type
Protocols
Actions Supported
HTTP
HTTPS
FTP
SOCKS
Block
Allow
Redirect
Monitor
Access
x
x
x
x
x
x
x
SOCKS
x
x
x
SAAS
x
x
Decryption
x
x
x
Data Security
x
x
x
x
x
External  DLP
x
x
x
x
Outbound 
Malware 
Scanning
x
x
x
x
x
Routing
x
x
x
x