Cisco Cisco Web Security Appliance S690 Guida Utente
B L O C K I N G O N P O R T 8 0
C H A P T E R 8 : A C C E S S P O L I C I E S
163
Once you view the Access Policies: Applications: Policy_Name page, add user agent patterns
(also called signatures) to the Block Custom User Agents section of the page.
(also called signatures) to the Block Custom User Agents section of the page.
Figure 8-6 Entering Agent Patterns to Block
Note — You can click the Example User Agent Patterns link for a list of some example user
agent patterns.
agent patterns.
Table 8-2 provides a list of common patterns.
Table 8-2Common Application Agent Patterns
Application
Search in Setting
HTTP header
Signature
AOL Messenger
Request headers
User-Agent
Gecko/
BearShare
Response header
Server
Bearshare
BitTorrent Request
headers
User-Agent
BitTorrent
eDonkey Request
headers
User-Agent
e2dk
Gnutella Request
headers
User-Agent
Gnutella
Gnucleus
Gnucleus
Kazaa Request
headers
P2P-Agent
Kazaa
Kazaaclient:
Kazaaclient:
Kazaa
Request headers
User-Agent
KazaClient
Kazaaclient:
Kazaaclient:
Kazaa
Request headers
X-Kazaa-Network
KaZaA
Morpheus
Response header
Server
Morpheus
MSN Messenger
Request headers
User-Agent
MSN Messenger
Enter agent patterns for the applications you want to block.
Example Patterns