Cisco Cisco Web Security Appliance S190 Guía Del Usuario
10-18
AsyncOS 10.0 for Cisco Web Security Appliances User Guide
Chapter 10 Create Policies to Control Internet Requests
Remote Users
Step 3
Click the cell link in the URL Filtering column on the same row.
Step 4
(Optional) Add custom URL categories:
a.
Click Select Custom Categories.
b.
Choose which custom URL categories to include in this policy and click Apply.
Choose which custom URL categories the URL filtering engine should compare the client request
against. The URL filtering engine compares client requests against included custom URL
categories, and ignores excluded custom URL categories. The URL filtering engine compares the
URL in a client request to included custom URL categories before predefined URL categories.
against. The URL filtering engine compares client requests against included custom URL
categories, and ignores excluded custom URL categories. The URL filtering engine compares the
URL in a client request to included custom URL categories before predefined URL categories.
The custom URL categories included in the policy appear in the Custom URL Category Filtering
section.
section.
Step 5
Choose an action for each custom and predefined URL category.
Note
Available actions vary between custom and predefined categories and between policy types.
Step 6
In the Uncategorized URLs section, choose the action to take for client requests to web sites that do not
fall into a predefined or custom URL category.
fall into a predefined or custom URL category.
Step 7
Submit and commit your changes.
Remote Users
•
•
•
About Remote Users
Cisco AnyConnect Secure Mobility extends the network perimeter to remote endpoints, enabling the
integration of web filtering services offered by the Web Security appliance.
integration of web filtering services offered by the Web Security appliance.
Remote and mobile users use the Cisco AnyConnect Secure VPN (virtual private network)client to
establish VPN sessions with the Adaptive Security Appliance (ASA). The ASA sends web traffic to the
Web Security appliance along with information identifying the user by IP address and user name. The
Web Security appliance scans the traffic, enforces acceptable use policies, and protects the user from
security threats. The security appliance returns all traffic deemed safe and acceptable to the user.
establish VPN sessions with the Adaptive Security Appliance (ASA). The ASA sends web traffic to the
Web Security appliance along with information identifying the user by IP address and user name. The
Web Security appliance scans the traffic, enforces acceptable use policies, and protects the user from
security threats. The security appliance returns all traffic deemed safe and acceptable to the user.
When Secure Mobility is enabled, you can configure identities and policies to apply to users by
their location:
their location:
•
Remote users. These users are connected to the network from a remote location using VPN. The
Web Security appliance automatically identifies remote users when both the Cisco ASA and Cisco
AnyConnect client are used for VPN access. Otherwise, the Web Security appliance administrator
must specify remote users by configuring a range of IP addresses.
Web Security appliance automatically identifies remote users when both the Cisco ASA and Cisco
AnyConnect client are used for VPN access. Otherwise, the Web Security appliance administrator
must specify remote users by configuring a range of IP addresses.
•
Local users. These users are connected to the network either physically or wirelessly.
When the Web Security appliance integrates with a Cisco ASA, you can configure it to identify users by
an authenticated user name transparently to achieve single sign-on for remote users.
an authenticated user name transparently to achieve single sign-on for remote users.