Cisco Cisco Web Security Appliance S170 사용자 가이드

다운로드
페이지 734
 
12-27
Cisco IronPort AsyncOS 7.5.7 for Web User Guide
 
Chapter 12      Decryption Policies
Logging
The uploaded root certificate is displayed in the “Custom Root Authority Certificates” section.
Step 6
Optionally, repeat steps 
 throug
 to upload additional trusted root certificates.
Step 7
Commit your changes.
Logging
HTTPS transactions in the access logs appear similar to HTTP transactions, but with slightly different 
characteristics. What gets logged depends on whether the transaction was explicitly sent or transparently 
redirected to the HTTPS Proxy:
  •
TUNNEL. This gets written to the access log when the HTTPS request was transparently redirected 
to the HTTPS Proxy. 
  •
CONNECT. This gets written to the access log when the HTTPS request was explicitly sent to the 
HTTPS Proxy.
When HTTPS traffic is decrypted, the access logs contain two entries for a transaction:
  •
TUNNEL or CONNECT depending on the type of request processed.
  •
The HTTP Method and the decrypted URL. For example, “GET https://ftp.example.com”.
The full URL is only visible when the HTTPS Proxy decrypts the traffic.