Cisco Cisco Web Security Appliance S690 Guida Utente

Pagina di 582
B L O C K I N G   O N   P O R T   8 0
C H A P T E R   8 :   A C C E S S   P O L I C I E S
 163
Once you view the Access Policies: Applications: Policy_Name page, add user agent patterns 
(also called signatures) to the Block Custom User Agents section of the page.
Figure 8-6 Entering Agent Patterns to Block
Note — You can click the Example User Agent Patterns link for a list of some example user 
agent patterns.
Table 8-2 provides a list of common patterns.
Table 8-2Common Application Agent Patterns
Application
Search in Setting
HTTP header
Signature
AOL Messenger 
Request headers 
User-Agent 
Gecko/
BearShare
Response header
Server
Bearshare
BitTorrent Request 
headers 
User-Agent 
BitTorrent
eDonkey Request 
headers
User-Agent 
e2dk
Gnutella Request 
headers
User-Agent
Gnutella
Gnucleus
Kazaa Request 
headers
P2P-Agent
Kazaa
Kazaaclient:
Kazaa
Request headers
User-Agent
KazaClient
Kazaaclient:
Kazaa
Request headers
X-Kazaa-Network
KaZaA
Morpheus
Response header
Server
Morpheus
MSN Messenger
Request headers
User-Agent
MSN Messenger
Enter agent patterns for the applications you want to block.
Example Patterns