Cisco Cisco Web Security Appliance S170 사용자 가이드
18-24
Cisco IronPort AsyncOS 7.5.7 for Web User Guide
Chapter 18 URL Filters
Viewing URL Filtering Activity
Step 4
In the In Time Range field, choose the defined time range to use for the URL category.
For information about defining time ranges, see
.
Step 5
In the Action field, choose the action to enact on transactions in this URL category during the defined
time range.
time range.
Step 6
In the Otherwise field, choose the action to enact on transactions in this URL category outside the
defined time range.
defined time range.
Step 7
Submit and commit your changes.
Viewing URL Filtering Activity
The Reporting > URL Categories page provides a collective display of URL statistics that includes
information about top URL categories matched and top URL categories blocked. Additionally, this page
displays category-specific data for bandwidth savings and web transactions. For detailed information
about monitoring and reporting functionality, see
information about top URL categories matched and top URL categories blocked. Additionally, this page
displays category-specific data for bandwidth savings and web transactions. For detailed information
about monitoring and reporting functionality, see
Understanding Unfiltered and Uncategorized Data
When viewing URL statistics on the Reporting > URL Categories page, it is important to understand how
to interpret the following data:
to interpret the following data:
•
URL Filtering Bypassed — This data represents policy, port, and admin user agent blocking that
occurs before URL filtering.
occurs before URL filtering.
•
Uncategorized URL — This data represents all transactions for which the URL filtering engine is
queried, but no category is matched.
queried, but no category is matched.
Access Log File
The access log file records the URL category for each transaction in the scanning verdict information
section of each entry. For more information about the access log, see
section of each entry. For more information about the access log, see
. For
a list of each URL category, see
.
Regular Expressions
Regular expressions are pattern matching descriptions that contain normal printable characters and
special characters that are used to match patterns in text strings. For example, a text string such as
“welcome” matches “welcome” or “welcomemyfriend.” When a match occurs, the function returns true.
If no match occurs, the function returns false. Actions are executed only when a pattern-matching
expression is true.
special characters that are used to match patterns in text strings. For example, a text string such as
“welcome” matches “welcome” or “welcomemyfriend.” When a match occurs, the function returns true.
If no match occurs, the function returns false. Actions are executed only when a pattern-matching
expression is true.
The Web Security appliance uses POSIX extended regular expression syntax, fully described by IEEE
POSIX 1003.2. However, the appliance does not support using a backward slash to escape a forward
slash. If you need to use a forward slash in a regular expression, type the forward slash without a
backward slash.
POSIX 1003.2. However, the appliance does not support using a backward slash to escape a forward
slash. If you need to use a forward slash in a regular expression, type the forward slash without a
backward slash.