Cisco Cisco Web Security Appliance S170 사용자 가이드

다운로드
페이지 734
C H A P T E R
 
10-1
Cisco IronPort AsyncOS 7.5.7 for Web User Guide
 
10
Access Policies
This chapter contains the following information:
  •
  •
  •
  •
  •
Access Policies Overview
AsyncOS for Web uses multiple web security features in conjunction with its Web Proxy and DVS 
engine to control web traffic, protect networks from web-based threats, and enforce organization 
acceptable use policies. You can define policies that determine which HTTP connections are allowed and 
blocked.
To configure the appliance to handle HTTP requests, perform the following tasks:
Step 1
Enable the Web Proxy. To allow or block HTTP traffic, you must first enable the Web Proxy. Usually, 
the Web Proxy is enabled during the initial setup using the System Setup Wizard. For more information, 
see 
.
Step 2
Create and configure Access Policy groups. After the Web Proxy is enabled, you create and configure 
Access Policy groups to determine how to handle each request from each user. For more information, 
see 
.
Access Policy Groups
Access Policies define how the Web Proxy handles HTTP and FTP requests and decrypted HTTPS 
connections for network users. You can apply different actions to specified groups of users. You can also 
specify which ports the Web Proxy monitors for HTTP transactions. 
Note
HTTP PUT and POST requests are handled by Outbound Malware Scanning, Cisco IronPort Data 
Security, and External DLP Policies. For more information, see 
 an