Cisco Cisco Web Security Appliance S660 Mode D'Emploi

Page de 432
 
A-9
Cisco AsyncOS for Web User Guide
 
Appendix A      Troubleshooting
  Policy Problems
HTTPS and FTP over HTTP Requests Match only Access Policies that Do Not Require Authentication
Configure the appliance to use IP addresses as the surrogate when credential encryption is enabled.
When credential encryption is enabled and configured to use cookies as the surrogate type, 
authentication does not work with HTTPS or FTP over HTTP requests. This is because the Web Proxy 
redirects clients to the Web Proxy itself for authentication using an HTTPS connection if credential 
encryption is enabled. After successful authentication, the Web Proxy redirects clients back to the 
original website. In order to continue to identify the user, the Web Proxy must use a surrogate (either the 
IP address or a cookie). However, using a cookie to track users results in the following behavior if 
requests use HTTPS or FTP over HTTP: 
HTTPS. The Web Proxy must resolve the user identity before assigning a Decryption Policy (and 
therefore, decrypt the transaction), but it cannot obtain the cookie to identify the user unless it 
decrypts the transaction. 
FTP over HTTP. The dilemma with accessing FTP servers using FTP over HTTP is similar to 
accessing HTTPS sites. The Web Proxy must resolve the user identity before assigning an Access 
Policy, but it cannot set the cookie from the FTP transaction. 
Therefore, HTTPS and FTP over HTTP requests will match only Access Policies that do not require 
authentication. Typically, they match the global Access Policy because it never requires authentication.
User Matches Global Policy for HTTPS and FTP over HTTP Requests
When the appliance uses cookie-based authentication, the Web Proxy does not get cookie information 
from clients for HTTPS and FTP over HTTP requests. Therefore, it cannot get the user name from the 
cookie. 
HTTPS and FTP over HTTP requests still match the Identity according to the other membership criteria, 
but the Web Proxy does not prompt clients for authentication even if the Identity requires authentication. 
Instead, the Web Proxy sets the user name to NULL and considers the user as unauthenticated. 
Then, when the unauthenticated request is evaluated against a policy, it matches only a policy that 
specifies “All Identities” and apply to “All Users.” Typically, this is the global policy, such as the global 
Access Policy.
User Assigned Incorrect Access Policy 
Clients on your network use Network Connectivity Status Indicator (NCSI) 
Web Security appliance uses NTLMSSP authentication. 
Identity uses IP based surrogates
A user might be identified using the machine credentials instead of the user’s own credentials, and as a 
result, might be assigned to an incorrect Access Policy.
Workaround:
Reduce the surrogate timeout value for machine credentials.
Step 1
Use the advancedproxyconfig > authentication CLI command.
Step 2
Enter the surrogate timeout for machine credentials.