Cisco Cisco Web Security Appliance S170 Guida Utente
9-13
Cisco IronPort AsyncOS 7.7 for Web User Guide
Chapter 9 Block, Allow or Redirect Transaction Requests
Blocking Specific Applications and Protocols
Once you view the Access Policies: Protocols and User Agents: Policy_Name page, add user agent
patterns (also called signatures) to the Block Custom User Agents section of the page.
patterns (also called signatures) to the Block Custom User Agents section of the page.
Figure 9-6
Entering Agent Patterns to Block
Note
You can click the Example User Agent Patterns link for a list of some example user agent patterns.
This is not a comprehensive list, as signatures change occasionally, and new applications are developed.
You can find additional signatures at various websites, including the following websites:
You can find additional signatures at various websites, including the following websites:
•
http://www.user-agents.org/
•
http://www.useragentstring.com/pages/useragentstring.php
•
http://www.infosyssec.com/infosyssec/security/useragentstrings.shtml
Note
Cisco IronPort does not maintain, verify, or support the user agent listings at any of these websites.
Table 9-2
Common Application Agent Patterns
Application
Search in Setting
HTTP Header
Signature
AOL Messenger
Request headers
User-Agent
Gecko/
BearShare
Response header
Server
Bearshare
BitTorrent Request
headers
User-Agent
BitTorrent
eDonkey Request
headers
User-Agent
e2dk
Gnutella Request
headers
User-Agent
Gnutella
Gnucleus
Gnucleus
Kazaa Request
headers
P2P-Agent
Kazaa
Kazaaclient:
Kazaa
Request headers
User-Agent
KazaClient
Kazaaclient:
Kazaaclient:
Kazaa
Request headers
X-Kazaa-Network
KaZaA
Morpheus
Response header
Server
Morpheus
MSN Messenger
Request headers
User-Agent
MSN Messenger
Trillian
Request headers
User-Agent
Trillian/
Windows Messenger
Request headers
User-Agent
MSMSGS
Yahoo Messenger
Request headers
Host
msg.yahoo.com
Yahoo Messenger
Request headers
User-Agent
ymsgr