Cisco Cisco Web Security Appliance S160 Guía Del Usuario
16-11
AsyncOS 10.0 for Cisco Web Security Appliances User Guide
Chapter 16 Prevent Loss of Sensitive Data
Controlling Upload Requests Using External DLP Policies
Step 3
(Optional) You can add another DLP server by clicking Add Row and entering the DLP Server
information in the new fields provided.
information in the new fields provided.
Step 4
Submit and Commit Changes.
Controlling Upload Requests Using External DLP Policies
Once the Web Proxy receives the upload request headers, it has the information necessary to decide if
the request should go to the external DLP system for scanning. The DLP system scans the request and
returns a verdict to the Web Proxy, either block or monitor (evaluate the request against the Access
Policies).
the request should go to the external DLP system for scanning. The DLP system scans the request and
returns a verdict to the Web Proxy, either block or monitor (evaluate the request against the Access
Policies).
Step 1
Choose Web Security Manager > External Data Loss Prevention.
Step 2
Click the link under the Destinations column for the policy group you want to configure.
Step 3
Under the Edit Destination Settings section, choose “Define Destinations Scanning Custom Settings.”
Step 4
In the Destination to scan section, choose one of the following options:
•
Do not scan any uploads. No upload requests are sent to the configured DLP system(s) for
scanning. All upload requests are evaluated against the Access Policies.
scanning. All upload requests are evaluated against the Access Policies.
•
Scan all uploads. All upload requests are sent to the configured DLP system(s) for scanning. The
upload request is blocked or evaluated against the Access Policies depending on the DLP system
scanning verdict.
upload request is blocked or evaluated against the Access Policies depending on the DLP system
scanning verdict.
•
Scan uploads to specified custom URL categories only. Upload requests that fall in specific
custom URL categories are sent to the configured DLP system for scanning. The upload request is
blocked or evaluated against the Access Policies depending on the DLP system scanning verdict.
Click Edit custom categories list to select the URL categories to scan.
custom URL categories are sent to the configured DLP system for scanning. The upload request is
blocked or evaluated against the Access Policies depending on the DLP system scanning verdict.
Click Edit custom categories list to select the URL categories to scan.
Step 5
Submit and Commit Changes.
Maximum
Simultaneous
Connections
Simultaneous
Connections
Specifies the maximum number of simultaneous ICAP request connections
from the Web Security appliance to each configured external DLP server. The
Failure Handling setting on this page applies to any request which exceeds this
limit.
from the Web Security appliance to each configured external DLP server. The
Failure Handling setting on this page applies to any request which exceeds this
limit.
Default is 25.
Failure Handling
Choose whether upload requests are blocked or allowed (passed to Access
Policies for evaluation) when the DLP server fails to provide a timely response.
Policies for evaluation) when the DLP server fails to provide a timely response.
Default is allow (“Permit all data transfers to proceed without scanning”).
Trusted Root
Certificate
Certificate
Browse to and select the trusted-root certificate for the certificate(s) provided
with the External DLP Servers, and then click Upload File. See
with the External DLP Servers, and then click Upload File. See
for additional information.
Invalid Certificate
Options
Options
Specify how various invalid certificates are handled: Drop or Monitor.
Server Certificates
This section displays all DLP server certificates currently available on
the appliance.
the appliance.
Setting
Description