![]() ![]() # ALTERNATIVE WAY TO SET UP THE POLICY TRACE USING THE CPL CODE (STEP 8-9) #Īdd CPL code by creating a new CPL layer in the Web Visual Policy Manager and pasting the customized code:Ĭlient.address=x.x.x.x stination(Trace1) trace.request(yes)Ĭlient.address=10.0.200.1 stination(Trace1) trace.request(yes)Ĭlient.address= 10.0.200.1 stination(Trace1) trace.request(yes) Destination: Any or specified url as with previous rule.Please go to the SSL-Intercept layer of yours and create the URL with the same scheme as previously: If you have chosen to SSL-Intercept the URL that is being blocked in your Policy, we need to make one more change. The Web Access trace should look like this: Trace1, tick trace level at trace enabled, then click 2xOK. In the Trace field, please right-click on Track > Set… > New… > Trace. Name the trace ex. In the Action field please right-click and Delete. This will make the rule transparent to other defined rules as we don't need to allow/deny but just track behavior. You can specify the destination with Request URL: or you can leave it as blank (it will collect all the requests from PC) ![]() Put the IP of endpoint client & subnet 255.255.255.255 and click Add, Close, OK Then click on Source > Set… > Add New… > Client IP address/subnet. In the Web Visual Policy Manager window, please click on Add Layer and choose the Web Access layer and name it DEBUG
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |