Add a Security Profile for Internet Access
A security profile is a set of security controls and other settings that you can use in access rules. To add a security profile, navigate to Secure > Security Profiles.
For more information
For detailed information about each of the features you will configure in a security profile for internet access, see Security Profiles for Internet Access.
Table of Contents
Prerequisites
- Full Admin user role. For more information, see Manage Accounts.
- Familiarize yourself with the options you will configure in the profile. See Security Profiles for Internet Access.
- Configure prerequisite functionality and components that you will select in a security profile for internet access:
- Add a Do Not Decrypt List for Security Profiles
- Create the list of Threat Categories that you will choose in the security profile.
- If this is the first time you will enable Secure Malware Analytics, be prepared to carefully follow the instructions in Enable File Analysis by Cisco Secure Malware Analytics.
- (Optional) Create custom Notification Pages that Secure Access will display when rules that use this security profile match traffic that blocks access or displays a warning. Customizations can include the logo, message, and contact information of your choice.
Procedure
-
Navigate to Secure > Security Profiles.
-
Click Add Profile > Internet Access.
-
Choose Decryption settings, including a Do Not Decrypt list.
Decryption is required for most security features to work properly.
For more information about decryption, see Manage Traffic Decryption.
For guidance on which option to choose in this section, see Security Profiles for Internet Access.- Next to the Decryption setting, click Edit to modify the setting.
- Choose a decryption option.
- Enable Decryption - Encrypted traffic is intercepted, decrypted to allow inspection, then re-encrypted before being forwarded to the original destination. By default, enabling this option attempts to decrypt all encrypted traffic. To bypass decryption for some traffic, select a "Do Not Decrypt" list.
- Enable Decryption for End-User Notification Only - Decrypt traffic only to display end-user notification. Do not decrypt traffic for inspection.
Note: A root certificate is required in any situation in which the system must proxy and decrypt traffic intended for a website. - Disable Decryption - Encrypted traffic is not decrypted. Access can be controlled solely based on a destination's domain name.
- If you enabled decryption, choose a Do Not Decrypt list. For more information.
- Next to the Decryption setting, click Edit to modify the setting.
-
Enable or disable SAML Authentication.
-
Next to the SAML Authentication setting, click Edit to modify the setting.
For guidance on which option to choose, see Security Profiles for Internet Access. -
Enable or disable the setting.
-
If you enable this option, be sure that decryption is enabled in the same security profile and in any rule that uses this profile.
-
-
Configure Security and Acceptable Use Controls.
Multiple kinds of scanning and blocking can be enabled depending on your requirements.
For links to more details about each, see Security Profiles for Internet Access.
Available controls are:
-
- Click Edit beside each setting to choose options.
- Choose options:
- For Threat Categories:
Choose from existing lists of threat categories, to block access to known malicious sites and potentially risky sites, based on threat category. - For File inspection:
Choose the file inspection and analysis tool(s) to use to protect traffic that matches rules that use this security profile.
Important! If this is the first time you enable Secure Malware Analytics, you will see the option to select a sandbox region. Carefully read the instructions in Enable File Analysis by Cisco Secure Malware Analytics before saving changes.
- For File type blocking:
Choose file types to block, even if the original filename extension has been altered.
You can enable categories of file type (such as executables or video) and individual file type extensions. - For SafeSearch:
Enable this option to filter out offensive, explicit, unsafe, and harmful search results in Google, YouTube, Yahoo, and Bing.
- For Threat Categories:
- Configure End-User Notifications
Block and Warn pages will be displayed in the end-user’s web browser, based on the action configured in each rule in which the security profile is used.
For details, see Manage Notification Pages.- Next to the Notification Pages setting, click Edit.
- Choose one of the two options.
Each option includes a Block notification and a Warn notification.- System-provided Notification Pages.
- Custom Notification Pages.
- If you chose custom pages, choose the pages you want to display.
- To preview the pages you have selected, click the Preview links.
- Click Save.
- Next to the Notification Pages setting, click Edit.
Next steps
Configure functionality elsewhere in the product that is needed for your selected features to work. For example:
- Traffic decryption
Decryption requires certificates. See Certificates for Internet Decryption. - SAML user authentication:
If you will enable this option in a security profile, ensure that SAML authentication is configured for your Secure Access deployment, and enable SAML for the Cisco Secure Client roaming security module.
See Configure Integrations with SAML Identity Providers. - Notification pages
To display notification pages, you must install a Secure Access root CA certificate on all end-user devices. This may not be the same certificate you use for decrypting internet traffic.
See Certificates for Internet Decryption. - Add the security profile to one or more internet access rules.
Security Profiles for Internet Access < Add a Security Profile for Internet Access > Enable SafeSearch
Updated 2 months ago