Cisco Cisco Web Security Appliance S680 Guía Del Usuario
8-15
Cisco IronPort AsyncOS 7.1 for Web User Guide
OL-23207-01
Chapter 8 Access Policies
Controlling HTTP and Native FTP Traffic
Note
When the HTTPS Proxy is enabled, you can only use Decryption Policies to
control access to HTTPS transactions. You cannot configure Access Policies on
this page to block HTTPS connections.
control access to HTTPS transactions. You cannot configure Access Policies on
this page to block HTTPS connections.
URL Categories
AsyncOS for Web allows you to configure how the appliance handles a
transaction based on the URL category of a particular HTTP or HTTPS request.
Using a predefined category list, you can choose to monitor or block content by
category. You can also create custom URL categories and choose to allow,
monitor, block, warn, or redirect traffic for a website in the custom category. You
can use custom URL categories to create block and allow lists based on
destination.
transaction based on the URL category of a particular HTTP or HTTPS request.
Using a predefined category list, you can choose to monitor or block content by
category. You can also create custom URL categories and choose to allow,
monitor, block, warn, or redirect traffic for a website in the custom category. You
can use custom URL categories to create block and allow lists based on
destination.
For information about enabling a URL filtering engine, see
. For information on configuring URL categories in
.
You can also use the Access Policies > URL Categories page to filter adult content
by enforcing safe searches and site content ratings. For more information, see
by enforcing safe searches and site content ratings. For more information, see
Applications
You can use the Access Policies > Applications Visibility and Control page to
configure the Web Proxy block or allow applications by application type or a
particular application. You can also apply controls to particular application
behaviors within a particular application, such as file transfers.
configure the Web Proxy block or allow applications by application type or a
particular application. You can also apply controls to particular application
behaviors within a particular application, such as file transfers.
Cisco IronPort Web Usage Controls includes the Application Visibility and
Control engine (AVC engine) which allows you to apply deeper controls to
particular application types. The AVC engine is an acceptable use policy
component that inspects web traffic to gain deeper understanding and control of
web traffic used for applications.
Control engine (AVC engine) which allows you to apply deeper controls to
particular application types. The AVC engine is an acceptable use policy
component that inspects web traffic to gain deeper understanding and control of
web traffic used for applications.