Cisco Cisco Web Security Appliance S170 사용자 가이드

다운로드
페이지 734
 
6-13
Cisco IronPort AsyncOS 7.5.7 for Web User Guide
 
Chapter 6      Web Proxy Services
Bypassing Application Scanning
Using WCCP with the Proxy Bypass List
When the Web Security appliance is configured to use a WCCP v2 router, you must ensure that all WCCP 
services defined in the Web Security appliance use the same forwarding and return method (either L2 or 
GRE) to work properly with the proxy bypass list. If the forwarding and return methods do not match, 
some WCCP enabled routers will act inconsistently.
For more information, see 
.
Bypassing Application Scanning
To bypass an application from Web Proxy scanning:
Step 1
Navigate to the Web Security Manager > Bypass Settings page.
Step 2
Click Edit Application Bypass Settings.
The Edit Application Scanning Bypass Settings page appears.
Figure 6-4
Application Scanning Bypass Settings Page
Step 3
Enable Bypass Scanning for the application to bypass.
Step 4
Submit and commit your changes.
Proxy Usage Agreement
You can configure the Web Security appliance to inform users that it is filtering and monitoring their 
web activity. The appliance does this by displaying an end-user acknowledgement page when a user first 
accesses a browser after a certain period of time. When the end-user acknowledgement page appears, 
users must click a link to access the original site requested or any other website. For more information 
about end-user acknowledgement pages, see 
.
Configuring Client Applications to Use the Web Proxy
Web browsers and other user agents sometimes need to know how to connect to the Web Proxy in order 
to access the World Wide Web. When you deploy the Web Security appliance in explicit forward mode, 
you must configure client applications so they use the Web Proxy. If you deploy the appliance in 
transparent mode, you can choose whether or not to configure client applications to explicitly use the 
Web Proxy. 
You can configure client applications to explicitly use the Web Proxy by using any of the following 
configuration methods: