Cisco Cisco Web Security Appliance S170 사용자 가이드

다운로드
페이지 734
 
18-24
Cisco IronPort AsyncOS 7.5.7 for Web User Guide
Chapter 18      URL Filters
Viewing URL Filtering Activity
Step 4
In the In Time Range field, choose the defined time range to use for the URL category. 
For information about defining time ranges, see 
.
Step 5
In the Action field, choose the action to enact on transactions in this URL category during the defined 
time range.
Step 6
In the Otherwise field, choose the action to enact on transactions in this URL category outside the 
defined time range.
Step 7
Submit and commit your changes.
Viewing URL Filtering Activity
The Reporting > URL Categories page provides a collective display of URL statistics that includes 
information about top URL categories matched and top URL categories blocked. Additionally, this page 
displays category-specific data for bandwidth savings and web transactions. For detailed information 
about monitoring and reporting functionality, see 
Understanding Unfiltered and Uncategorized Data
When viewing URL statistics on the Reporting > URL Categories page, it is important to understand how 
to interpret the following data:
  •
URL Filtering Bypassed — This data represents policy, port, and admin user agent blocking that 
occurs before URL filtering. 
  •
Uncategorized URL — This data represents all transactions for which the URL filtering engine is 
queried, but no category is matched.
Access Log File
The access log file records the URL category for each transaction in the scanning verdict information 
section of each entry. For more information about the access log, see 
. For 
a list of each URL category, see 
.
Regular Expressions
Regular expressions are pattern matching descriptions that contain normal printable characters and 
special characters that are used to match patterns in text strings. For example, a text string such as 
“welcome” matches “welcome” or “welcomemyfriend.” When a match occurs, the function returns true. 
If no match occurs, the function returns false. Actions are executed only when a pattern-matching 
expression is true.
The Web Security appliance uses POSIX extended regular expression syntax, fully described by IEEE 
POSIX 1003.2. However, the appliance does not support using a backward slash to escape a forward 
slash. If you need to use a forward slash in a regular expression, type the forward slash without a 
backward slash.