McAfee MAP-3300-SWG Product Guide - Page 188

HTTPS Web Categorization - McAfee GTI Web Categorization, URL Blacklisting and Whitelisting

Page 188 highlights

Overview of Web features Web Policies Table 178 Option definitions Option Definition Enable blacklist and whitelist checks for HTTPS URLs Select to compare HTTPS URLs against a list of allowed or denied URLs. HTTPS Web Categorization - McAfee GTI Web Categorization Use this page to block access to secure websites. A secure website has an address of the form: https:// www.example.com. Table 179 Option definitions Option Enable McAfee GTI web categorization for HTTPS URLs Block URLs when the action is coach Definition By default this option is enabled. The appliance is unable to read the encrypted contents of an HTTPS conversation, however it is able to use the IP address to work out whether access should be allowed to the site. By default this option is enabled. All coached sites will be blocked over HTTPS because the appliance is unable to read the encrypted contents of an HTTPS conversation so it is unable to provide the coaching functionality offered over HTTP. FAQ - Why is HTTPS access to a site not blocked, but HTTP access is blocked? It is important to understand the order in which the appliance checks HTTP access requests. The appliance looks up the URL provided by the browser. • If the site name matches a prohibited category then access to the site is blocked. • If the appliance cannot see the URL provided by the browser because it is encrypted but it can see the IP address that the browser is trying to connect to, the appliance takes this IP address and performs a DNS reverse look up to find the URL that the IP relates to. With the return from the DNS lookup the appliance will perform the same site name search as for an HTTP access request. Occasionally the site that the browser is trying to access will not have the required DNS entries. For example: • www.example.com is a known bad website • www.example.com resolves to IP address 123.123.123.124 • When doing a reverse DNS lookup for 123.123.123.124 the appliance receives either: • www.example.com - the HTTPS access can be blocked • www.anotherwebsite.com - the HTTPS access will be based on the different website name that is returned • NXDOMAIN - there is no site name to check and the appliance will do an access check based on the IP address URL Blacklisting and Whitelisting Use this page to compile lists of URLs (lists of website addresses) to which users will be denied or allowed access. This page contains the following tabs, each allowing you to define different lists: • Blacklisted URLs • Blacklisted URLs (Regex) 188 McAfee Email and Web Security Appliances 5.6.0 Product Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336

Table 178
Option definitions
Option
Definition
Enable blacklist and whitelist checks for HTTPS URLs
Select to compare HTTPS URLs against a list of allowed or
denied URLs.
HTTPS Web Categorization - McAfee GTI Web Categorization
Use this page to block access to secure websites. A secure website has an address of the form: https://
www.example.com.
Table 179
Option definitions
Option
Definition
Enable McAfee GTI web
categorization for HTTPS URLs
By default this option is enabled. The appliance is unable to read the
encrypted contents of an HTTPS conversation, however it is able to use
the IP address to work out whether access should be allowed to the site.
Block URLs when the action is
coach
By default this option is enabled. All coached sites will be blocked over
HTTPS because the appliance is unable to read the encrypted contents of
an HTTPS conversation so it is unable to provide the coaching
functionality offered over HTTP.
FAQ — Why is HTTPS access to a site not blocked, but HTTP access is blocked?
It is important to understand the order in which the appliance checks HTTP access requests. The
appliance looks up the URL provided by the browser.
If the site name matches a prohibited category then access to the site is blocked.
If the appliance cannot see the URL provided by the browser because it is encrypted but it can see
the IP address that the browser is trying to connect to, the appliance takes this IP address and
performs a DNS reverse look up to find the URL that the IP relates to. With the return from the
DNS lookup the appliance will perform the same site name search as for an HTTP access request.
Occasionally the site that the browser is trying to access will not have the required DNS entries. For
example:
www.example.com is a known bad website
www.example.com resolves to IP address 123.123.123.124
When doing a reverse DNS lookup for 123.123.123.124 the appliance receives either:
www.example.com — the HTTPS access can be blocked
www.anotherwebsite.com — the HTTPS access will be based on the different website name that
is returned
NXDOMAIN — there is no site name to check and the appliance will do an access check based
on the IP address
URL Blacklisting and Whitelisting
Use this page to compile lists of URLs (lists of website addresses) to which users will be denied or
allowed access.
This page contains the following tabs, each allowing you to define different lists:
Blacklisted URLs
Blacklisted URLs (Regex)
Overview of Web features
Web Policies
188
McAfee Email and Web Security Appliances 5.6.0 Product Guide