Using Access Control Rules to Enforce Content Restriction
The following procedure explains how to configure access control rules to restrict content.”
Note | When safe search is enabled in an access control rule, inline normalization is enabled automatically. |
Procedure
Step 1 | Create a decryption policy. |
Step 2 | Add rules for handling Safe Search traffic:
|
Step 3 | Set rule positions for the rules you added. Click and drag, or use the right-click menu to cut and paste. |
Step 4 | Create or edit an access control policy, and associate the decryption policy with the access control policy. For more information, see Associating Other Policies with Access Control. |
Step 5 | In the access control policy, add rules for handling Safe Search traffic:
For more information, see Configuring Application Conditions and Filters. |
Step 6 | Set rule positions for the access control rules you added. Click and drag, or use the right-click menu to cut and paste. |
Step 7 | Configure the HTTP response page that the system displays when it blocks restricted content; see Choosing HTTP Response Pages. |
Step 8 | Deploy configuration changes. |