Cisco Cisco Web Security Appliance S170 사용자 가이드

다운로드
페이지 606
 
28-9
Cisco IronPort AsyncOS 7.7 for Web User Guide
 
Chapter 28      Common Tasks
Automating Log File Transfers
Step 10
Navigate to the Web Security Manager > Access Policies page.
Step 11
Click Add Policy.
Step 12
In the Policy Name field, enter a name for this policy, such as 
MarketingPolicy
.
Step 13
In the Identities and Users field, choose “Select One or More Identities.”
Step 14
In the Identity field, select the Identity created in 
Step 15
Under Authorized Users and Groups for the NTLM authentication realm, choose “Selected Groups and 
Users” and then click the link next to “Groups.”
Step 16
On the Access Policies: Policy “PolicyName”: Edit Groups page, add user groups to the Authorized 
Groups section. You can do this using any of the following methods:
  •
Select a user group in the directory search list window and either double-click or click Add.
  •
Type the entire group name in the Directory Search window, and after the search is complete, click 
Add. This allows you to enter groups that do not appear in the directory search list, such as groups 
that belong to a trusted domain or groups that are not yet available in the directory.
Step 17
Click Done.
Step 18
Click Submit.
Step 19
Repeat 
 through 
 using a different Access Policy name, such as 
EngineeringPolicy
 and 
specifying different Active Directory user groups.
Step 20
On the Access Policies page, configure access control settings for each Access Policy as desired.
Step 21
Submit your changes.
Now, users from the set of users defined in 
 will have different Access Policies applied to them 
than the users defined in 
. Assuming you configure different access control settings for each 
Access Policy, each set of users will observe different behavior when accessing the web. 
Where to Find More Information
You can read the following sections for more detailed information on the steps included in this task:
  •
  •
Automating Log File Transfers
In this task, you will configure the appliance so it automatically transfers the access logs using SCP to 
a remote server every day at noon and midnight. You might want to do this if you want each log file to 
contain web access information for the same amount of time (12 hours).
For example, you use a third party tool to analyze the web data in the access logs each day, and you want 
each access log file to contain data for the exact same amount of time, 12 hours.
This task assumes you have access to an SCP server, including the host name, directory, and username.
Step 1
Navigate to the System Administration > Log Subscriptions page.
Step 2
Click the “accesslogs” link under the Log Name column.