Solved

bluecot proxy

Posted on 2010-08-14
2
871 Views
Last Modified: 2013-11-22
How would you determine which rules you were being accessed in a bluecoat proxy server policy?
0
Comment
Question by:coledej
2 Comments
 
LVL 10

Accepted Solution

by:
ujitnos earned 250 total points
ID: 33439568
In the VPM of the policy, create a rule for your IP and in acition tab, select "None" (select Delete) and then configure a track
Now navigate to https://<>ip address of proxy:8082/policy
There first select "Delete all policy traces".
Now access the required site from your IP nad refresh the above mentioned URL. N ow if your IP has hit the track rule, it will be shown as a link which u can click and view.
 
0
 
LVL 2

Assisted Solution

by:Ellush
Ellush earned 250 total points
ID: 33494675
The link ujitnos talks about has the name you configured in Track column (1.png)
The track object should be set to verbose (2.png)
The results can be seen at https://<>ip address of proxy:8082/policy (3.png)
You should view the output and look for MATCH at the beginning of the line - this way you would know which rules had been applied

1.png
2.png
3.png
0

Featured Post

Control application downtime with dependency maps

Visualize the interdependencies between application components better with Applications Manager's automated application discovery and dependency mapping feature. Resolve performance issues faster by quickly isolating problematic components.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

For those of you actively in the Malware fightling business, we now have available an amazing new tool in the malware wars (first recommended to me by rpggamergirl (http://www.experts-exchange.com/M_3598771.html), the Zone Advisor for the Virus and …
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…
Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now