Cisco Cisco Web Security Appliance S170 Guida Utente

Pagina di 450
 
4-10
AsyncOS 9.1 for Cisco Web Security Appliances User Guide
 
Chapter 4      Intercepting Web Requests
  Client Options for Redirecting Web Requests
Ensure that traffic from a particular machine inside the network, such as a malware test machine, 
bypasses the Web Proxy and all its built-in security protection.
Bypassing only works for requests that are transparently redirected to the web proxy. The web proxy 
processes all requests that clients explicitly forward to it, whether the proxy is in transparent or 
forward mode. 
Configuring Web Proxy Bypassing for Web Requests
Step 1
Choose Web Security Manager > Bypass Settings.
Step 2
Click Edit Bypass Settings.
Step 3
Enter the addresses for which you wish to bypass the web proxy.
Step 4
Submit and commit your changes.
Configuring Web Proxy Bypassing for Applications
Step 1
Choose Web Security Manager > Bypass Settings.
Step 2
Click Edit Application Bypass Settings.
Step 3
Select the application(s) you wish to bypass scanning for. 
Step 4
Submit and commit your changes.
Web Proxy Usage Agreement
You can configure the Web Security appliance to inform users that it is filtering and monitoring their 
web activity. The appliance does this by displaying an end-user acknowledgment page when a user first 
accesses a browser after a certain period of time. When the end-user acknowledgment page appears, 
users must click a link to access the original site requested or any other website. 
Related Topics
Client Options for Redirecting Web Requests
If you choose to have clients explicitly forward requests to the web proxy, you must also decide how to 
configure the clients to do this. Choose from the following methods:
Configure Clients Using Explicit Settings. Configure clients with the web proxy hostname and 
port number. See individual client documentation for details on how to do this.
Note
The web proxy port uses port numbers 80 and 3128 by default. Clients can use either port.