Cisco Cisco Web Security Appliance S170 사용자 가이드
A-8
AsyncOS 10.0 for Cisco Web Security Appliances User Guide
Appendix A Troubleshooting
HTTPS/Decryption/Certificate Problems
Alert: Battery Relearn Timed Out (RAID Event) on 380 or 680 Hardware
This alert may or may not indicate a problem. The battery relearn timeout, in itself, does not mean there
is any problem with the RAID controller. The controller can recover in the subsequent relearn. Please
monitor your email for any other RAID alerts for the next 48 hours, to ensure that this is not the
side-effect of any other problem. If you do not see any other RAID-type alerts from the system, then you
can safely ignore this alert.
is any problem with the RAID controller. The controller can recover in the subsequent relearn. Please
monitor your email for any other RAID alerts for the next 48 hours, to ensure that this is not the
side-effect of any other problem. If you do not see any other RAID-type alerts from the system, then you
can safely ignore this alert.
HTTPS/Decryption/Certificate Problems
•
•
•
•
•
•
Also see:
–
–
–
Accessing HTTPS Sites Using Routing Policies with URL Category Criteria
For transparently redirected HTTPS requests, the Web Proxy must contact the destination server to
determine the server name and therefore the URL category in which it belongs. Due to this, when the
Web Proxy evaluates Routing Policy Group membership, it cannot yet know the URL category of an
HTTPS request because it has not yet contacted the destination server. If the Web Proxy does not know
the URL category, it cannot match the transparent HTTPS request to a Routing Policy that uses a URL
category as membership criteria.
determine the server name and therefore the URL category in which it belongs. Due to this, when the
Web Proxy evaluates Routing Policy Group membership, it cannot yet know the URL category of an
HTTPS request because it has not yet contacted the destination server. If the Web Proxy does not know
the URL category, it cannot match the transparent HTTPS request to a Routing Policy that uses a URL
category as membership criteria.
As a result, transparently redirected HTTPS transactions only match Routing Policies that do not
define Routing Policy Group membership criteria by URL category. If all user-defined Routing Policies
define their membership by URL category, transparent HTTPS transactions match the Default Routing
Policy Group.
define Routing Policy Group membership criteria by URL category. If all user-defined Routing Policies
define their membership by URL category, transparent HTTPS transactions match the Default Routing
Policy Group.