Solved

bluecot proxy

Posted on 2010-08-14
2
873 Views
Last Modified: 2013-11-22
How would you determine which rules you were being accessed in a bluecoat proxy server policy?
0
Comment
Question by:coledej
2 Comments
 
LVL 10

Accepted Solution

by:
ujitnos earned 250 total points
ID: 33439568
In the VPM of the policy, create a rule for your IP and in acition tab, select "None" (select Delete) and then configure a track
Now navigate to https://<>ip address of proxy:8082/policy
There first select "Delete all policy traces".
Now access the required site from your IP nad refresh the above mentioned URL. N ow if your IP has hit the track rule, it will be shown as a link which u can click and view.
 
0
 
LVL 2

Assisted Solution

by:Ellush
Ellush earned 250 total points
ID: 33494675
The link ujitnos talks about has the name you configured in Track column (1.png)
The track object should be set to verbose (2.png)
The results can be seen at https://<>ip address of proxy:8082/policy (3.png)
You should view the output and look for MATCH at the beginning of the line - this way you would know which rules had been applied

1.png
2.png
3.png
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

These are on the increase and getting more common these days. Users who use the Google search engine may complain of having their search redirected to unwanted sites, regardless of what browser is used. This happens when the system is infected with…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question