Cisco Cisco Web Security Appliance S170 Guía Del Usuario
16-5
Cisco IronPort AsyncOS 7.1 for Web User Guide
OL-23207-01
Chapter 16 URL Filters
Configuring the URL Filtering Engine
The URL Categories Database
The Web Security appliance collects information and maintains its own filtering
categories database. The different URL filtering engines maintain separate
databases. The filtering categories databases periodically receive updates from the
IronPort update server (
categories database. The different URL filtering engines maintain separate
databases. The filtering categories databases periodically receive updates from the
IronPort update server (
https://update-manifests.ironport.com
). Server
updates are automated, and the update interval is set by the server as opposed to
the appliance. Updates to the database occur with a regular degree of frequency,
and require no administrator intervention.
the appliance. Updates to the database occur with a regular degree of frequency,
and require no administrator intervention.
Cisco IronPort Web Usage Controls shares some database components with the
Web Reputation Filters (WBRS) database. Because of this shared information,
Cisco recommends fully participating in the SenderBase Network because it
allows Cisco IronPort Web Usage Controls to validate and categorize all URLs
dynamically classified by the Dynamic Content Analysis engine, including all
URLs that could not otherwise be classified, improving overall efficacy.
Web Reputation Filters (WBRS) database. Because of this shared information,
Cisco recommends fully participating in the SenderBase Network because it
allows Cisco IronPort Web Usage Controls to validate and categorize all URLs
dynamically classified by the Dynamic Content Analysis engine, including all
URLs that could not otherwise be classified, improving overall efficacy.
For information about update intervals and the IronPort update server, see
The URL categories database includes many different factors and sources of data
internal to Cisco and from the Internet. One of the factors occasionally
considered, heavily modified from the original, is information from the Open
Directory Project.
internal to Cisco and from the Internet. One of the factors occasionally
considered, heavily modified from the original, is information from the Open
Directory Project.
Configuring the URL Filtering Engine
To apply predefined category settings to policy groups and configure custom
settings to manage web transactions, you must first enable and choose a URL
filtering engine, either the Cisco IronPort Web Usage Controls URL filtering
engine or the IronPort URL Filters. By default, the Cisco IronPort Web Usage
Controls URL filtering engine is enabled in the System Setup Wizard.
settings to manage web transactions, you must first enable and choose a URL
filtering engine, either the Cisco IronPort Web Usage Controls URL filtering
engine or the IronPort URL Filters. By default, the Cisco IronPort Web Usage
Controls URL filtering engine is enabled in the System Setup Wizard.
When you enable URL filtering, you can choose the default action the Web Proxy
should use when the URL filtering engine is unavailable, either monitor or block.
should use when the URL filtering engine is unavailable, either monitor or block.
To configure the URL filtering engine: