Cisco Cisco Content Security Management Appliance M160 Guia Do Utilizador
D-23
Cisco IronPort AsyncOS 7.2.0 for Security Management User Guide
OL-21768-01
Appendix D Examples
Figure D-2
Delegated Administration
Set Up the Access Rules
For this example, we will set up three access rules and put these rules into access
policies as appropriate:
policies as appropriate:
•
The social networking access rule restricts access to social networking sites.
•
The weapons and violence access rule restricts access to weapons and
violence sites.
violence sites.
•
The web-based e-mail access rule restricts access to web-based e-mail.
Step 1
On the Security Management appliance, choose Management Appliance >
Centralized Services > Security Appliances.
Centralized Services > Security Appliances.
The Security Appliances page appears.