Cisco Cisco Web Security Appliance S690 Guía Del Usuario

Descargar
Página de 486
 
9-14
AsyncOS 10.0 for Cisco Web Security Appliances User Guide
 
Chapter 9      Classify URLs for Policy Application
  Creating and Editing Custom and External URL Categories
Step 5
In the Predefined URL Category Filtering section, choose one of the following actions for each category:
Use Global Settings
Monitor
Block
Step 6
In the Uncategorized URLs section, choose the action to take for upload requests to web sites that do not 
fall into a predefined or custom URL category. This setting also determines the default action for new 
and merged categories resulting from URL category set updates. 
Step 7
Submit and Commit Changes.
Creating and Editing Custom and External URL Categories
You can create custom and external live-feed URL categories that describe specific host names and IP 
addresses. In addition, you can edit and delete existing URL categories. When you include these custom 
URL categories in the same Access, Decryption, or Cisco Data Security Policy group and assign different 
actions to each category, the action of the higher included custom URL category takes precedence. 
Note
You can use no more than five External Live Feed files in these URL category definitions, and each file 
should contain no more than 1000 entries. Increasing the number of external feed entries causes 
performance degradation.
Note
The Web Security appliance uses the first four characters of custom URL category names preceded by 
“c_” in the access logs. Consider the custom URL category name if you use Sawmill to parse the access 
logs. If the first four characters of the custom URL category include a space, Sawmill cannot properly 
parse the access log entry. Instead, only use supported characters in the first four characters. If you want 
to include the full name of a custom URL category in the access logs, add the %XF format specifier to 
the access logs. 
 
Allow 
Always allows upload requests for web sites in this category. Applies to custom URL 
categories only.
Allowed requests bypass all further data security scanning and the request is 
evaluated against Access Policies.
Only use this setting for trusted web sites. You might want to use this setting for 
internal sites. 
Monitor
The Web Proxy neither allows nor blocks the request. Instead, it continues to 
evaluate the upload request against other policy group control settings, such as web 
reputation filtering.
Block
The Web Proxy denies transactions that match this setting.
Action
Description