Cisco Cisco Web Security Appliance S680 Guía Del Usuario
Chapter 6 Working with Policies
Tracing Policies
6-18
Cisco IronPort AsyncOS 7.1 for Web User Guide
OL-23207-01
Firefox/2
Firefox/1
However, when you select “Firefox Any Versions,” AsyncOS uses the following
regular expression:
regular expression:
Firefox
Also, you can configure the policy group membership to either match the user
agents you define, or matching all other user agents than the ones defined.
agents you define, or matching all other user agents than the ones defined.
Exempting User Agents from Authentication
To exempt a user agent from authentication:
Step 1
Create an Identity policy group with membership that is based on the user agent
to exempt.
to exempt.
For more information about creating Identities, see
Step 2
Do not require authentication for the Identity policy group.
Step 3
Place the Identity policy group above all other Identity policy groups that require
authentication.
authentication.
Step 4
Submit and commit your changes.
Tracing Policies
The Web Security appliance web interface includes a tool that traces a particular
client request and details how the Web Proxy processes the request. The Web
Proxy evaluates the request against all committed Access, Decryption, IronPort
Data Security, Outbound Malware Scanning, and Routing Policies and calculates
other attributes, such as the web reputation score.
client request and details how the Web Proxy processes the request. The Web
Proxy evaluates the request against all committed Access, Decryption, IronPort
Data Security, Outbound Malware Scanning, and Routing Policies and calculates
other attributes, such as the web reputation score.
The policy trace tool allows administrators to troubleshoot when end users ask
questions about Web Proxy behavior. It simulates client requests as if they were
made by the end users and describes Web Proxy behavior. It can be a powerful
troubleshooting or debugging tool, especially if you have combined many of the
advanced features available on the Web Security appliance.
questions about Web Proxy behavior. It simulates client requests as if they were
made by the end users and describes Web Proxy behavior. It can be a powerful
troubleshooting or debugging tool, especially if you have combined many of the
advanced features available on the Web Security appliance.