Cisco Cisco Web Security Appliance S170 사용자 가이드

다운로드
페이지 734
 
10-12
Cisco IronPort AsyncOS 7.5.7 for Web User Guide
Chapter 10      Access Policies
Blocking Specific Applications and Protocols
For more information, see 
Blocking Specific Applications and Protocols
You can configure how the appliance manages some kinds of applications based on the port being used:
  •
Port 80. You can control how the Web Security appliance manages these applications using Access 
Policies, but only as they are accessed via HTTP tunneling on port 80.
  •
Ports other than 80. You can block these applications on other ports by using the L4 Traffic 
Monitor.
Use the Web Security Manager > Access Policies page to manage access and monitoring for these types 
of applications on a more granular (per policy) level. Use the L4 Traffic Monitor to manage access and 
monitoring on a more global basis.
Blocking on Port 80
To block access to these types of applications where port 80 is used, you can use the Web Security 
Manager > Access Policies page. The Access Policies page provides several methods for blocking 
access. You can block access by clicking on any of the following columns for a particular policy group:
  •
Protocols and User Agents
  •
URL Categories
  •
Objects
You can block access to predefined URL categories such as "Chat and Instant Messaging" and "Peer File 
Transfer", or create your own custom URL categories. You can block specific applications based on their 
“agent patterns” or signatures.
You can apply some or all of these methods on various Access Policies by creating additional Access 
Policy groups. For details on how to create additional Access Policy groups, see 
Policy: Protocols and User Agents
You can create a rule that blocks a particular user agent based on its pattern using Regular Expressions. 
You block access to applications based on their agent pattern similarly for the different Access Policies: 
  •
User defined policies — On the Web Security Manager > Access Policies page, click the value in 
the Protocols and User Agents column for the desired policy. Choose Define Applications Custom 
Settings.
  •
Global Policy — On the Web Security Manager > Access Policies page, click the value in the 
Protocols and User Agents column for the Global Policy.
Once you view the Access Policies: Protocols and User Agents: Policy_Name page, add user agent 
patterns (also called signatures) to the Block Custom User Agents section of the page.