Using Access Control Rules to Enforce Content Restriction
The following procedure explains how to configure access control rules to restrict content.”
|
When safe search is enabled in an access control rule, inline normalization is enabled automatically. |
Procedure
1 |
Create a decryption policy. |
2 |
Add rules for handling Safe Search traffic:
|
3 |
Set rule positions for the rules you added. Click and drag, or use the right-click menu to cut and paste. |
4 |
Create or edit an access control policy, and associate the decryption policy with the access control policy. For more information, see Associating Other Policies with Access Control. |
5 |
In the access control policy, add rules for handling Safe Search traffic:
For more information, see Configuring Application Conditions and Filters. |
6 |
Set rule positions for the access control rules you added. Click and drag, or use the right-click menu to cut and paste. |
7 |
Configure the HTTP response page that the system displays when it blocks restricted content; see Choosing HTTP Response Pages. |
8 |
Deploy configuration changes. |