Cisco Cisco Web Security Appliance S690 Guía Del Usuario

Descargar
Página de 486
 
20-3
AsyncOS 10.0 for Cisco Web Security Appliances User Guide
 
Chapter 20      Detecting Rogue Traffic on Non-Standard Ports
  Creating a Policy to Detect Rogue Traffic
Step 2
Click Update Now.
Creating a Policy to Detect Rogue Traffic
The actions the L4 Traffic Monitor takes depends on the L4 Traffic Monitor policies you configure
:
Step 1
Choose Web Security Manager > L4 Traffic Monitor.
Step 2
Click Edit Settings.
Step 3
On the Edit L4 Traffic Monitor Policies page, configure the L4 Traffic Monitor policies: 
a.
Define the Allow List 
b.
Add known good sites to the Allow List
Note
Do not include the Web Security appliance IP address or hostname to the Allow List 
otherwise the L4 Traffic Monitor does not block any traffic.
c.
Determine which action to perform for Suspected Malware Addresses:
Note
When you choose to block suspected malware traffic, you can also choose whether or not to 
always block ambiguous addresses. By default, ambiguous addresses are monitored.
Note
If the L4 Traffic Monitor is configured to block, the L4 Traffic Monitor and the Web Proxy 
must be configured on the same network. Use the Network > Routes page to confirm that 
all clients are accessible on routes that are configured for data traffic.
d.
Define the Additional Suspected Malware Addresses properties
Action
Description
Allow
It always allows traffic to and from known allowed and unlisted addresses
Monitor
It monitors traffic under the following circumstances:
When the Action for Suspected Malware Addresses option is set to Monitor, it 
always monitors all traffic that is not to or from a known allowed address.
When the Action for Suspected Malware Addresses option is set to Block, it 
monitors traffic to and from ambiguous addresses
Block
When the Action for Suspected Malware Addresses option is set to Block, it blocks 
traffic to and from known malware addresses