Cisco Cisco Web Security Appliance S660 Guida Utente

Pagina di 494
10-8
AsyncOS 9.1.1 for Cisco Web Security Appliances User Guide
 
Chapter 10      Create Policies to Control Internet Requests
  Policies
To add or edit the specified ISE Secure Group Tags (SGTs) and the specified Users, click the 
link following the appropriate label. For example, click the list of currently specified users to 
edit that list. See 
 for more 
information.
Guests – Users connected as guests and those failing authentication.
All Users – All clients, whether authenticated or not. If this option is selected, at least one 
Advanced option also must be provided.
Step 7
If you chose Select One or More Identification Profiles, a profile-selection table appears.
a.
Choose an Identification Profile from the Select Identification Profile drop-down list in the 
Identification Profiles column.
b.
Specify the Authorized Users and Groups to which this policy applies:
All Authenticated Users – All users identified through authentication or transparent 
identification.
Selected Groups and Users – Specified users and groups are used.
To add or edit the specified ISE Secure Group Tags (SGTs) and the specified Users, click the 
link following the appropriate label. For example, click the list of currently specified users to 
edit that list. See 
 for more 
information.
Guests – Users connected as guests and those failing authentication.
c.
To add a row to the profile-selection table, click Add Identification Profile. To delete a row, click 
the trash-can icon in that row.
Repeat steps (a) through (c) as necessary to add all desired Identification Profiles.