A web security appliance is inspecting inbound traffic. In which sequence is inbound https traffic inspected?
A. Decryption Policy > Access Policy > Routing Policy
B. Access Policy > Decryption Policy > Routing Policy
C. Access Policy > Routing Policy > Decryption Policy
D. Decryption Policy > Routing Policy > Access Policy
Correct answer A.
The appliance allows the connection,but inspects the traffic content. It decrypts the traffic and applies Access Policies to the decrypted traffic as if it were a plain text HTTP connection. By decrypting the connection and applying Access Policies, you can scan the traffic for malware.
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_01110.pdf
A?
i think it needs to hit the access policy first to see if the traffic is even allowed, then if it is allowed to be decrypted.
understood, thanks