User Guide

548
IRONPORT ASYNCOS 6.3 FOR WEB USER GUIDE
P1 and P2 ports 31, 46
WCCP router 31, 46
content filtering
IronPort Data Security Policies 227
control settings
Decryption Policies 207
creating
Access Policies 154
authentication realms 344
authentication sequences 347
Decryption Policies 203
External DLP Policies 221
Identities 138
IronPort Data Security Policies 221
log subscriptions 431
Routing Policies 175
time ranges 116
user agent based policies 118
credential encryption
certificate and key 364
HTTPS requests 364
overview 363
cryptography
certificate authority 184
cipher 184
ciphertext 184
cleartext 184
digital certificate 184
digital signature 184
key 184
overview 184
plaintext 184
private key 185
public key 184
public key infrastructure 185
root certificate 185
self-signed certificate 185
symmetric key 185
CSS
in end-user notification pages 258
custom certificate authority
importing 211
custom fields
access and W3C logs 459
custom text 503
at login 503
custom URL categories
overview 281
redirecting traffic 284
customizing
log files 450
D
data interfaces
configuring 465
overview 30
data loss prevention
see Data Security Policies
see External DLP Policies
Data Security logs
overview 234
Data Security Policies
configuring 225
content 227
creating 221
flow diagram 226
logging 234
membership 219
minimum request size 214
Monitor action 217
overview 214
protocol of request 222
proxy port of request 223
subnet of request 223
upload request definition 216
URL category of request 223
URL filters 226
user agent of request 224
Web Reputation 227
Data Security Policy groups
see also policy groups
datasecurityconfig
CLI command 214
debugging
policy groups 121
decrypting
HTTPS traffic 180
overview 191
decrypting HTTPS traffic
configuring Decryption Policies 181
overview 191
Decryption Policies
blocking 190
control settings 207
controlling traffic 207
creating 203
cryptography 184
decrypting traffic 181, 191