The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
Book Contents Book ContentsUser Guide for AsyncOS 14.0 for Cisco Web Security Appliances - GD (General Deployment)
This topic contains the following sections:
When the user creates a web request the configured Web Security Appliance intercepts the requests and manages the process of which the request travels to get to its final outcome, be that accessing a particular web site, an email or even accessing an online application. In configuring the Web Security Appliance policies are created to define the criteria and actions of requests made by the user.
Policies are the means by which the Web Security Appliance identifies and controls web requests. When a client sends a web request to a server, the Web Proxy receives the request, evaluates it, and determines to which policy it belongs. Actions defined in the policy are then applied to the request.
The Web Security Appliance uses multiple policy types to manage different aspects of web requests. Policy types might fully manage transactions by themselves or pass transactions along to other policy types for additional processing. Policy types can be groups by the functions they perform, such as access, routing, or security.
AsyncOS evaluates transactions based on policies before it evaluates external dependencies to avoid unnecessary external communication from the appliance. For example, if a transaction is blocked based on a policy that blocks uncategorized URLs, the transaction will not fail based on a DNS error.
The following diagram depicts the flow of an intercepted Web request as it is processed by the appliance.
Also see the following diagrams depicting various transaction processing flows:
Task List for Managing Web Requests through Policies
Links to Related Topics and Procedures
Set up and sequence Authentication Realms
(For upstream proxies) Create a proxy group.
(Optional) Create Custom Client Applications
(Optional) Create Custom URL Categories
Create Identification Profiles
(Optional) Create time ranges to Limit Access by Time of Day
Create and Order Policies
If you want to use Active Directory user objects to manage web requests, do not use primary groups as criteria. Active Directory user objects do not contain the primary group.
Block, allow or redirect inbound HTTP, FTP, and decrypted HTTPS traffic.
Access policies also manage inbound encrypted HTTPS traffic if the HTTPS proxy is disabled.
Allow or block SOCKS communication requests.
Allow or deny access to a Software as a Service (SaaS) application.
Use single sign-on to authenticate users and increase security by allowing access to applications to be quickly disabled.
To use the single sign-on feature of policies you must configure the Web Security Appliance as an identity provider and upload or generate a certificate and key for SaaS.
Encrypted HTTPS Management
Decrypt, pass through, or drop HTTPS connections.
AsyncOS passes decrypted traffic to Access policies for further processing.
Manage data uploads to the web. Data Security policies scan outbound traffic to ensure it complies to company rules for data uploads, based on its destination and content. Unlike External DLP policies, which redirect outbound traffic to external servers for scanning, Data Security policies use the Web Security Appliance to scan and evaluate traffic.
External DLP (Data Loss Prevention)
Send outbound traffic to servers running 3rd-party DLP systems, which scan it for adherence to company rules for data uploads. Unlike Data Security policies, which also manage data uploads, External DLP policies move scanning work away from the Web Security Appliance , which frees resources on the appliance and leverages any additional functionality offered by 3rd-party software.
Outbound Malware Scanning
Block, monitor, or allow requests to upload data that may contain malicious data.
Prevent malware that is already present on your network from being transmitted to external networks.
Direct web traffic through upstream proxies or direct it to destination servers. You might want to redirect traffic through upstream proxies to preserve your existing network design, to off-load processing from the Web Security Appliance , or to leverage additional functionality provided by 3rd-party proxy systems.
If multiple upstream proxies are available, the Web Security Appliance can use load balancing techniques to distribute data to them.
Retian the client's source IP address, change it to the web proxy IP, or a custom IP using IP Spooing profile.
Each policy type uses a policy table to store and manage its policies. Each policy table comes with a predefined, global policy, which maintains default actions for a policy type. Additional, user-defined policies are created and added to the policy table as required. Policies are processed in the order in which they are listed in the policy table.
Individual policies define the user-request types they manage, and the actions they perform on those requests. Each policy definition has two main sections:
The order in which policies are listed in a policy table determines the priority with which they are applied to Web requests. Web requests are checked against policies beginning at the top of the table and ending at the first policy matched. Any policies below that point in the table are not processed.
If no user-defined policy is matched against a Web request, then the global policy for that policy type is applied. Global policies are always positioned last in Policy tables and cannot be re-ordered.
The following diagram depicts the flow of a client request through the Access policies table.
In the Policy Settings section, use the Enable Identity check box to enable this policy, or to quickly disable it without deleting it.
Assign a unique policy Name .
A Description is optional.
From the Insert Above drop-down list, choose where this policy is to appear in the table.
In the Policy Expires area, check the Set Expiration for Policy check box to set the expiry time for the policy. Enter the date and time for the policy expiration that you want to set. The policies are automatically disabled once they exceed the set expiry time.
System checks the policies every minute to disable the policies which get expired during the minute. For example, if a policy is set to expire at 11:00, at maximum it will be disabled by 11:01.
You will receive an email prior to three days of the policy expiry and another one upon policy expiry.
You can set the policy expiration time through Cisco Content Security Management Appliances as well. The policies will get expired after the set expiry time but will not be shown as disabled in the Cisco Content Security Management Appliances GUI.
Once you set the policy expiration feature, the expiry happens based on the appliance's local time settings.
In the Policy Member Definition section, specify how user and group membership is defined: from the Identification Profiles and Users list, choose one of the following:
If you chose All Identification Profile s:
If you chose Select One or More Identification Profiles , a profile-selection table appears.
Repeat steps (a) through (c) as necessary to add all desired Identification Profiles.
Expand the Advanced section to define additional group membership criteria. (This step may be optional depending on selection in the Policy Member Definition section. Also, some of the following options will not be available, depending on the type of policy you are configuring.) .
Select the protocols to which this policy will apply. All others means any protocol not selected. If the associated identification profile applies to specific protocols, this policy applies to those same protocols
Applies this policy only to traffic using specific ports to access the web proxy. Enter one or more port numbers, separating multiple ports with commas.
For explicit forward connections, this is the port configured in the browser.
For transparent connections, this is the same as the destination port.
Applies this policy only to traffic on specific subnets. Select Specify subnets and enter the specific subnets, separated by commas.
Leave Use subnets from selected Identities selected if you do not want additional filtering by subnet.
You can apply time ranges for policy membership:
You can restrict policy membership by specific destinations (URLs) and by categories of URLs. Select all desired custom and predefined categories. See Creating and Editing Custom URL Categories for information about custom categories.
You can select specific user agents, and define custom agents using regular expressions, as part of membership definition for this policy.
To change the list of Secure Group Tags (SGTs) assigned to a particular Identification Profile in a policy, click the link following the ISE Secure Group Tags label in the Selected Groups and Users list on the Add/Edit Policy page. (See Creating a Policy.) This link is either “No tags entered,” or it is a list of currently assigned tags. The link opens the Add/Edit Secure Group Tags page.
All SGTs currently assigned to this policy are listed in the Authorized Secure Group Tags section. All SGTs available from the connected ISE server are listed in the Secure Group Tag Search section.
To add one or more SGTs to the Authorized Secure Group Tags list, select the desired entries in the Secure Group Tag Search section, and then click Add .
To remove one or more SGTs from the Authorized Secure Group Tags list, select those entries and then click Delete .
Click Done to return to the Add/Edit Group page.
Related Topics
You can configure how the web proxy forwards the web traffic and the requests the source IP address by configuring the routing destination and IP spoofing profile in routing policies.
To configure an upstream proxy group for a routing policy in Security Management appliance, save the configuration file of the Web Security Appliance and import it on the Security Management appliance. Otherwise, the Security Management appliance shows the upstream proxy as "Not Found" and the routing policy will be disabled after the config push.
Choose Web Security Manager > Routing Policies.
On the Routing Policies page, click the link under Routing Destination column for the routing policy that you want to configure the upstream proxy group.
Choose an appropriate upstream proxy group for the selected policy from the following:
Use Global Policy Settings
The web proxy uses the settings defined in the Global Policy. This is the default action for user defined policy groups. By default, the routing destination for Global Routing Policy is set as Direct Connection.
Applies to user defined policy groups only.
The web proxy forwards web traffic directly to its destination web server.
Custom upstream proxy group
The web proxy redirects the web traffic to an external upstream proxy group. For more information about creating upstream proxy groups, see Upstream Proxies.
On the Routing Policies page, click the link under IP Spoofing column for the routing policy that you want to configure the IP spofing profile.
Choose an appropriate IP spoofing profile for the selected policy from the following:
Use Global Policy Settings
The web proxy uses the settings defined in the Global Policy. This is the default action for user defined policy groups. By default, the IP spoofing is disabled for the Global Routing Policy.
Applies to user defined policy groups only.
Do No Use IP Spoofing
The web proxy changes the request source IP address to match its own address to increase security.
The web proxy retains the source address so that it appears to originate from the source client rather than from the Web Security Appliance .
Custom spoofing profile name
The web proxy changes the request source IP address to custom IP defined in the selected custom IP spoofing profile name.
Submit and Commit your changes.
Related Topics
Each row in a table of policies represents a policy definition, and each column displays current contains a link to a configuration page for that element of the policy.
Protocols and User Agents
Used to control policy access to protocols and configure blocking for particular client applications, such as instant messaging clients, web browsers, and Internet phone services. You can also configure the appliance to tunnel HTTP CONNECT requests on specific ports. With tunneling enabled, the appliance passes HTTP traffic through specified ports without evaluating it.
AsyncOS for Web allows you to configure how the appliance handles a transaction based on the URL category of a particular HTTP or HTTPS request. Using a predefined category list, you can choose to block, monitor, warn, or set quota-based or time-based filters.
You can also create custom URL categories and then choose to block, redirect, allow, monitor, warn, or apply quota-based or time-based filters for Websites in the custom categories. See Creating and Editing Custom URL Categories for information about creating custom URL categories.
In addition, you can add exceptions to blocking of embedded or referred content.
The Application Visibility and Control engine (AVC) engine is an Acceptable Use policy component that inspects Web traffic to gain deeper understanding and control of Web traffic used for applications. The appliance allows the Web Proxy to be configured to block or allow applications by Application Types, and by individual applications. You can also apply controls to particular application behaviors, such as file transfers, within a particular application. See Managing Access to Web Applications for configuration information.
These options let you configure the Web Proxy to block file downloads based on file characteristics, such as file size , file type , and MIME type . An object is, generally, any item that can be individually selected, uploaded, downloaded and manipulated . See Access Policies: Blocking Objects for information about specifying blocked objects.
Anti-Malware and Reputation
Web reputation filters allow for a web-based reputation score to be assigned to a URL to determine the probability of it containing URL-based malware. Anti-malware scanning identifies and stops web-based malware threats. Advanced Malware Protection identifies malware in downloaded files.
The Anti-Malware and Reputation policy inherits global settings respective to each component. Within Security Services > Anti-Malware and Reputation , malware categories can be customized to monitor or block based on malware scanning verdicts and web reputation score thresholds can be customized. Malware categories can be further customized within a policy. There are also global settings for file reputation and analysis services.
HTTP ReWrite Profile
You can configure custom header profiles for HTTP requests and can create multiple headers under a header rewrite profile. The header rewrite profile feature enables the appliance to pass the user and group information to another upstream device after successful authentication. The upstream proxy considers the user as authenticated, bypasses further authentication, and provides access to the user based on the defined access policies.
Deletes the created policy.
You can use the options on the Access Policies: Objects page to block file downloads based on file characteristics, such as file size, file type, and MIME type. An object is, generally, any item that can be individually selected, uploaded, downloaded and manipulated.
You can specify a number of types of objects to be blocked by each individual Access policy, and by the Global policy. These object types include Archives, Document Types, Executable Code, Web Page Content, and so on.
On the Access Policies page ( Web Security Manager > Access Policies ), click the link in the Objects column of the row representing the policy you wish to edit.
Choose the desired type of object blocking for this Access policy:
If you chose Define Custom Objects Blocking Settings in the previous step, select and deselect object-blocking options on the Access Policies: Objects page as needed.
Object Size
You can block objects based on their download size:
Block Object Type
Expand this section to select types of Archive files that are to be blocked. This list includes Archive types such as ARC, BinHex, and StuffIt.
Expand this section to select whether to Allow , Block , or Inspect specific types of Inspectable Archive files. Inspectable Archives are archive or compressed files that the Web Security Appliance can inflate to inspect each of the contained files in order to apply the file-type block policy. The Inspectable Archives list includes archive types such as 7zip, Microsoft CAB, RAR, and TAR.
The following points apply to archive inspection:
See Archive Inspection Settings for information about configuring archive inspection.
Expand this section to select types of text documents to be blocked. This list includes document types such as FrameMaker, Microsoft Office, and PDF.
Expand this section to select types of executable code to be blocked. The list includes Java Applet, UNIX Executable and Windows Executable.
Types of installers to be blocked; the list includes UNIX/LINUX Packages.
Types of media files to be blocked. The list includes Audio, Video and Photographic Image Processing Formats (TIFF/PSD).
This list includes BitTorrent Links ( .torrent ).
Web Page Content
This list includes Flash and Images.
This list includes Calendar Data.
Custom MIME Types
You can define additional objects/files to be blocked based on MIME type.
Enter one or more MIME types in the Block Custom MIME Types field, one per line.
You can Allow, Block, or Inspect specific types of Inspectable Archives for individual Access policies. Inspectable Archives are archive or compressed files that the Web Security Appliance can inflate to inspect each of the contained files in order to apply the file-type block policy. See Access Policies: Blocking Objects for more information about configuring archive inspection for individual Access policies.
During archive inspection, nested objects are written to disk for examination. The amount of disk space that can be occupied at any given time during file inspection is 1 GB. Any archive file exceeding this maximum disk-use size will be marked unscannable.
The Web Security Appliance ’s Acceptable Use Controls page provides system-wide Inspectable Archives Settings; that is, these settings apply to archive extraction and inspection whenever enabled in an Access policy.
Choose Security Services > Acceptable Use Controls .
Click the Edit Archives Settings button.
Edit the Inspectable Archives Settings as needed.
Submit and Commit Changes .
The web proxy controls web traffic based on the policies that you create for groups of transaction requests.
Generally, different types of policies control traffic based on the transport protocol.