Cisco Cisco Web Security Appliance S170 사용자 가이드

다운로드
페이지 734
 
12-23
Cisco IronPort AsyncOS 7.5.7 for Web User Guide
 
Chapter 12      Decryption Policies
Controlling HTTPS Traffic
Step 8
Submit your changes.
Step 9
Configure Decryption Policy group control settings to define how the Web Proxy handles transactions.
The new policy group automatically inherits global policy group settings until you configure options for 
each control setting. For more information, see 
Step 10
Submit and commit your changes.
Controlling HTTPS Traffic
After the Web Security appliance assigns an HTTPS connection request to a Decryption Policy group, 
the connection request inherits the control settings of that policy group. The control settings of the 
Decryption Policy group determine whether the appliance decrypts, drops, or passes through the 
connection. For more information about the actions the appliance can take on an HTTPS request, see 
Configure control settings for Decryption Policy groups on the Web Security Manager > Decryption 
Policies page.
 shows where you can configure control settings for the Decryption Policy groups.
Figure 12-8
Decryption Policies Table
You can configure the following settings to determine what action to take on the HTTPS connection:
User Agents
Choose whether or not to define policy group membership by the user agent used 
in the client request. You can select some commonly defined browsers, or define 
your own using regular expressions. Choose whether this policy group should apply 
to the selected user agents or to any user agent that is not in the list of selected user 
agents.
For more information on creating user agent based policies, see 
.
Note: If the Identity associated with this policy group defines Identity membership 
by this advanced setting, the setting is not configurable at the non-Identity policy 
group level.
User Location
Choose whether or not to define policy group membership by user location, either 
remote or local. 
This option only appears when the Secure Mobility Solution is enabled. For more 
information, see 
.
Table 12-2
Decryption Policy Group Advanced Options (continued)
Advanced Option
Description