Cisco Cisco Web Security Appliance S160 Guía Del Usuario
![Cisco](https://files.manualsbrain.com/attachments/7380d0050044647c30f5c24bbbf5d0c0b6d9bb84/common/fit/150/50/faa183d287233c52228cfea3dbc2a127fe780f60564fcb0955d9c3d1cd23/brand_logo.png)
10-2
AsyncOS 10.0 for Cisco Web Security Appliances User Guide
Chapter 10 Create Policies to Control Internet Requests
Overview of Policies: Control Intercepted Internet Requests
Intercepted HTTP/HTTPS Request Processing
The following diagram depicts the flow of an intercepted Web request as it is processed by the appliance.
Figure 10-1
HTTP/HTTPS Transaction Flow
Also see the following diagrams depicting various transaction processing flows:
•
•
•
•
•
•