Cisco Cisco Web Security Appliance S170 사용자 가이드
A-11
AsyncOS 8.6 for Cisco Web Security Appliances User Guide
Appendix A Troubleshooting
Policy Problems
Note
When you use the policy trace tool, the Web Proxy does not record the requests in the access log or
reporting database.
reporting database.
Tracing Client Requests
Step 1
Choose System Administration > Policy Trace.
Step 2
Enter the URL you wish to trace to in the Destination URL field.
Step 3
(Optional) Enter additional emulation parameters:
Step 4
Click Find Policy Match.
The policy trace output is displayed in the Results pane.
Related Topics
•
•
Advanced: Request Details
You can use the settings in the Request Details pane of the Policy Trace page, Advanced section, to tune
the outbound malware scan request for this policy trace.
the outbound malware scan request for this policy trace.
Step 1
Expand the Advanced section on the Policy Trace page.
Step 2
Complete the fields in the Request Details pane as required:
To emulate...
Enter...
The client source IP used to make the request.
An IP address in the Client IP Address field.
Note
If an IP address is not specified, AsyncOS
uses localhost.
uses localhost.
The authentication credentials used to make the
request.
request.
A user name in the User Name field, and then choose
an authentication realm from the drop-down list.
an authentication realm from the drop-down list.
For authentication of the user you enter here, the user
must have already successfully authenticated through
the Web Security appliance.
must have already successfully authenticated through
the Web Security appliance.
Setting
Description
Proxy Port
Select a specific proxy port to use for the trace request to test policy
membership based on proxy port.
membership based on proxy port.
Specify the to simulate in the request.
Time of Request
Specify the Date and Time of day to simulate in the request.