Cisco Cisco Web Security Appliance S670 安装指南
22
You can also define several other policy types to enforce your
organization’s acceptable use policies by controlling access to
the Internet. For example, you can define policies for decrypting
HTTPS transactions and other polices that control upload
requests.
organization’s acceptable use policies by controlling access to
the Internet. For example, you can define policies for decrypting
HTTPS transactions and other polices that control upload
requests.
For information about configuring policies on the Cisco S380
and Cisco S680 appliance, see the “Working with Policies”
chapter in the Cisco IronPort AsyncOS for Web User Guide.
and Cisco S680 appliance, see the “Working with Policies”
chapter in the Cisco IronPort AsyncOS for Web User Guide.
Reporting
You can view statistics about blocked and monitored web traffic
on your network by viewing reports available in the web
interface. You can view reports about the top URL categories
blocked, client activity, system status, and more.
on your network by viewing reports available in the web
interface. You can view reports about the top URL categories
blocked, client activity, system status, and more.
More Information
There are other features that you may want to configure for
your Cisco S380 and Cisco S680 appliance. For more
information about configuring feature keys, end user
notifications, logging, and for details about other available web
security appliance features, see the Cisco S380 and Cisco S680
Web Security Appliance documentation.
your Cisco S380 and Cisco S680 appliance. For more
information about configuring feature keys, end user
notifications, logging, and for details about other available web
security appliance features, see the Cisco S380 and Cisco S680
Web Security Appliance documentation.