06-17-2015 10:08 PM
Hi,
I've blocked Google and Google based websites in the Cisco Iron port WSA S300V for the users whom I don't want them to access. But still, Google, YouTube, Gmail, Google maps, Google Drive, etc., are allowed by the WSA S300V. Can anyone shed some light about this issue.
Note:I've blocked them via application filtering as well as Web filtering.
Thanks,
Ajay Sundar
06-17-2015 10:27 PM
Hi Ajay,
you mentioned that you defined policy "for some" users. Maybe the problem is particular user don't hit the right policy.
I'd first check in tracking logs which policy did user hit when he/she opened google.com.
If user hit the right policy where google is blocked then you should investigate content rules and if user didn't hit the right policy then you should investigate the identity policy issue.
You can also run simulation with Policy Trace Tool which identity policy would hit and which access policy would hit particular connection to get better view what's happening (under system administration menu in ESA).
Did you find the reason why access to gooogle etc pages are not blocked?
06-22-2015 10:30 AM
Hi Jernej,
Thank you for your reply. Since the websites like Google, YouTube, Gmail, etc, were https websites, they're not blocked in the access policy. The same is getting blocked after I created a decryption policy.
Thanks,
Ajay Sundar.N
06-22-2015 12:17 PM
Hi Ajay, now we know what is the issue :)
HTTPS decryption definitely helps to make life easier for you if you want to use these features. And it also helps you to define policy for micro apps, scan HTTPS content with AV etc.
But you should also be able to block google.com by using custom URL categories without HTTPS decryption.
For example:
- create customer URL policy: "blockGoogle"
- add one entry: ".google.com"
- define BLOCK action at access policy
Have you succeeded to block google.com without using HTTPS decryption?
06-24-2015 05:10 PM
Hi Jernej,
Yep, I had defined a custom URL category for Google.com, youtube.com, etc. Yet the websites were working in https. So, I made a decryption policy which resulted the blocking of those websites.
06-26-2015 12:48 PM
Try to make a policy trace and look the results (system administration --> policy trace).
But i think that you are having a problem with the decription policies.
11-12-2019 12:26 PM
The key is to put "." as well.
Block ".google.com" and "google.com" both and enable decryption as well for this policy.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide