Cisco Cisco Web Security Appliance S170 사용자 가이드

다운로드
페이지 784
 
8-15
Cisco IronPort AsyncOS 7.0 for Web User Guide
OL-23079-01
Chapter 8      Access Policies
Controlling HTTP and Native FTP Traffic
Note
When the HTTPS Proxy is enabled, you can only use Decryption Policies to 
control access to HTTPS transactions. You cannot configure Access Policies on 
this page to block HTTPS connections. 
URL Categories
AsyncOS for Web allows you to configure how the appliance handles a 
transaction based on the URL category of a particular HTTP or HTTPS request. 
Using a predefined category list, you can choose to monitor or block content by 
category. You can also create custom URL categories and choose to allow, 
monitor, block, warn, or redirect traffic for a website in the custom category. You 
can use custom URL categories to create block and allow lists based on 
destination.
For information about enabling a URL filtering engine, see 
. For information on configuring URL categories in 
Access Policies, see 
.
You can also use the Access Policies > URL Categories page to filter adult content 
by enforcing safe searches and site content ratings. For more information, see 
.
Applications
You can use the Access Policies > Applications Visibility and Control page to 
configure the Web Proxy block or allow applications by application type or a 
particular application. You can also apply controls to particular application 
behaviors within a particular application, such as file transfers.
Cisco IronPort Web Usage Controls includes the Application Visibility and 
Control engine (AVC engine) which allows you to apply deeper controls to 
particular application types. The AVC engine is an acceptable use policy 
component that inspects web traffic to gain deeper understanding and control of 
web traffic used for applications.