Cisco Cisco Web Security Appliance S170 Guía Del Usuario
A-16
AsyncOS 9.0.1 for Cisco Web Security Appliances User Guide
Appendix A Troubleshooting
Policy Problems
Step 1
Choose System Administration > Policy Trace.
Step 2
Enter the URL you wish to trace to in the Destination URL field.
Step 3
(Optional) Enter additional emulation parameters:
Step 4
Click Find Policy Match.
The Policy Trace output is displayed in the Results pane.
Note
For a Pass Through HTTPS transaction, the Policy Trace tool bypasses further scanning and no Access
policy is associated with the transaction. Similarly, for a Decrypt HTTPS transaction, the tool cannot
actually decrypt the transaction to determine the applied Access policy. In both cases, as well as for Drop
transactions, the trace results display: “Access policy: Not Applicable.”
policy is associated with the transaction. Similarly, for a Decrypt HTTPS transaction, the tool cannot
actually decrypt the transaction to determine the applied Access policy. In both cases, as well as for Drop
transactions, the trace results display: “Access policy: Not Applicable.”
Related Topics
•
•
Advanced: Request Details
You can use the settings in the Request Details pane of the Policy Trace page, Advanced section, to tune
the outbound malware scan request for this policy trace.
the outbound malware scan request for this policy trace.
To emulate...
Enter...
The client source IP used to make the request.
An IP address in the Client IP Address field.
Note
If an IP address is not specified, AsyncOS
uses localhost. Also, SGTs (security group
tags) cannot be fetched and policies based on
SGTs will not be matched.
uses localhost. Also, SGTs (security group
tags) cannot be fetched and policies based on
SGTs will not be matched.
The authentication/identification credentials
used to make the request.
used to make the request.
A user name in the User Name field, and then choose
Identity Services Engine or an authentication realm
from the Authentication/Identification drop-down list.
Identity Services Engine or an authentication realm
from the Authentication/Identification drop-down list.
Note
Only enabled option(s) are available. That is,
authentication options and the ISE option are
available only if they are both enabled.
authentication options and the ISE option are
available only if they are both enabled.
For authentication of the user you enter here, the user
must have already successfully authenticated through
the Web Security appliance.
must have already successfully authenticated through
the Web Security appliance.