Cisco Cisco Web Security Appliance S690 Guida Utente
A-11
AsyncOS 8.1 for Cisco Web Security User Guide
Appendix A Troubleshooting
Policy Problems
The policy trace output is displayed in the Results pane.
Customizing Request Details
Step 1
Expand the Advanced section within the Policy Trace page.
Step 2
Complete the fields in the Request Details pane as required:.
Step 3
Click Find Policy Match.
The policy trace output is displayed in the Results pane.
Overriding Response Details
Step 1
Expand the Advanced section within the Policy Trace page.
Step 2
Complete the fields in the Response Detail Overrides pane as required:
Table A-2
Setting
Description
Proxy Port
Select a specific proxy port to use for the trace
request to test policy membership based on proxy
port.
request to test policy membership based on proxy
port.
Client Application
Specify the client application to simulate in the
request.
request.
Time of Request
Specify the day of week and time of day to
simulate in the request.
simulate in the request.
Upload File
Choose a local file to simulate uploading in the
request.
request.
When you specify a file to upload here, the Web
Proxy simulates an HTTP POST request instead of
a GET request.
Proxy simulates an HTTP POST request instead of
a GET request.
Object Size
Enter the size of the request object in bytes. You
can enter K, M, or G to represent Kilobytes,
Megabytes, or Gigabytes.
can enter K, M, or G to represent Kilobytes,
Megabytes, or Gigabytes.
MIME Type
Enter the MIME type.
Anti-malware Scanning Verdicts
Choose whether or not to override the Webroot,
McAfee, or Sophos scanning verdicts.
McAfee, or Sophos scanning verdicts.
Table A-3
Setting
Description
URL Category
Choose whether or not to override the URL category of the transaction response.
Application
Choose an application that the Application Visibility and Control engine can
detect.
detect.