Cisco Cisco Web Security Appliance S170 ユーザーガイド
Cisco IronPort AsyncOS 7.1 for Web User Guide
OL-23207-01
Chapter 8 Access Policies
Blocking Specific Applications and Protocols
You block access to applications based on their agent pattern similarly for the
different Access Policies:
different Access Policies:
•
User defined policies — On the Web Security Manager > Access Policies
page, click the value in the Protocols and User Agents column for the desired
policy. Choose Define Applications Custom Settings.
page, click the value in the Protocols and User Agents column for the desired
policy. Choose Define Applications Custom Settings.
•
Global Policy — On the Web Security Manager > Access Policies page, click
the value in the Protocols and User Agents column for the Global Policy.
the value in the Protocols and User Agents column for the Global Policy.
Once you view the Access Policies: Protocols and User Agents: Policy_Name
page, add user agent patterns (also called signatures) to the Block Custom User
Agents section of the page.
page, add user agent patterns (also called signatures) to the Block Custom User
Agents section of the page.
Figure 8-6
Entering Agent Patterns to Block
Note
You can click the Example User Agent Patterns link for a list of some example
user agent patterns.
user agent patterns.
provides a list of common patterns.
Table 8-2
Common Application Agent Patterns
Application
Search in Setting
HTTP header
Signature
AOL Messenger
Request headers
User-Agent
Gecko/
BearShare
Response header
Server
Bearshare
BitTorrent Request
headers
User-Agent
BitTorrent
eDonkey Request
headers
User-Agent
e2dk
Gnutella Request
headers
User-Agent
Gnutella
Gnucleus
Gnucleus
Kazaa Request
headers
P2P-Agent
Kazaa
Kazaaclient:
Kazaaclient: