Cisco Cisco Web Security Appliance S170 ユーザーガイド

ページ / 466
 
10-9
AsyncOS 8.8 for Cisco Web Security Appliances User Guide
 
Chapter 10      Create Policies to Control Internet Requests
  Block, Allow, or Redirect Transaction Requests
Block, Allow, or Redirect Transaction Requests
The web proxy controls web traffic based on the policies that you create for groups of transaction requests.
Allow. The Web Proxy permits the connection without interruption. Allowed connections may not 
have been scanned by the DVS engine. 
Block. The Web Proxy does not permit the connection and instead displays an end user notification 
page explaining the reason for the block.
Redirect. The Web Proxy does not allow the connection to the originally requested destination 
server and instead connects to a different specified URL, see 
.
Note
The preceding actions are final actions that the Web Proxy takes on a client request. The Monitor action 
that you can configure for Access Policies is not a final action. 
Objects
Allows the Web Proxy to be configured to block file downloads based on file 
characteristics, such as file size and file type. An object is, generally, any item that 
can be individually selected, uploaded, downloaded and manipulated, such as:
Application: pdf, xml, zip, exe
Text: cmd, csv, html, javascript
Image: gif, jpeg, png, tiff
Video: mp4, Quicktime, avi, wmv
Audio: mp4, wav, webm, mpeg
Message: http, xml, rfc822, partial
x-world: wrl, wrz, xof, 3dmf
Note
Object blocking does not inspect inside compressed files. 
Anti-Malware and 
Reputation
Web reputation filters allow for a web-based reputation score to be assigned to a 
URL to determine the probability of it containing URL-based malware. 
Anti-malware scanning identifies and stops web-based malware threats. 
Advanced Malware Protection identifies malware in downloaded files. 
The Anti-Malware and Reputation policy inherits global settings respective to 
each component. Within Security Services > Anti-Malware and Reputation
malware categories can be customized to monitor or block based on malware 
scanning verdicts and web reputation score thresholds can be customized. 
Malware categories can be further customized within a policy. There are also 
global settings for file reputation and analysis services. 
For more information, see 
 and 
Option
Description