Cisco Cisco Web Security Appliance S170 사용자 가이드

다운로드
페이지 734
 
10-10
Cisco IronPort AsyncOS 7.5.7 for Web User Guide
Chapter 10      Access Policies
Controlling HTTP and Native FTP Traffic
For more information about blocking user agents, see 
Figure 10-4
Settings for Controlling Protocols and User Agents
Note
When the HTTPS Proxy is enabled, you can only use Decryption Policies to control access to HTTPS 
transactions. You cannot configure Access Policies on this page to block HTTPS connections. 
URL Categories
AsyncOS for Web allows you to configure how the appliance handles a transaction based on the URL 
category of a particular HTTP or HTTPS request. Using a predefined category list, you can choose to 
monitor or block content by category. You can also create custom URL categories and choose to allow, 
monitor, block, warn, or redirect traffic for a website in the custom category. You can use custom URL 
categories to create block and allow lists based on destination.
For information about enabling a URL filtering engine, see 
. For information on configuring URL categories in Access Policies, see 
.
You can also use the Access Policies > URL Categories page to filter adult content by enforcing safe 
searches and site content ratings. For more information, see 
Applications
You can use the Access Policies > Applications Visibility and Control page to configure the Web Proxy 
block or allow applications by application type or a particular application. You can also apply controls 
to particular application behaviors within a particular application, such as file transfers.
Cisco IronPort Web Usage Controls includes the Application Visibility and Control engine (AVC 
engine) which allows you to apply deeper controls to particular application types. The AVC engine is an 
acceptable use policy component that inspects web traffic to gain deeper understanding and control of 
web traffic used for applications.