Redirection of traffic to Cisco Cloud Web Security (any deployment methodology or connector)
User account with "Full Access" or "Admin (No forensic)" role permissions to create rules stated in the steps below on the ScanCenter Portal
How to block less-known or the latest web browsers using Cisco Cloud Web Security?
On many occasions business needs and audit requirements require us to only allow certain web browsers on corporate end points. The biggest challenge with this requirement is blocking uncommon or less known or at times latest version of popular browsers. We have pre-defined filter options for browsers like FireFox, IE and Chrome. But, in order to block browsers like Opera, Safari, SeaMonkey, NetSurf, Lunascape, etc we need to create a filter using the Custom User Agent field.
Firstly, we need to create a Filter to be used in a Policy/Rule. Go to,
Web Filtering >> Management >> Filter >> "Create Filter" >> Custom User Agents
In order to block browsers, we need to identity the User-Agent String of the browser we wish to block.
The same can be identified by running a packet analyzer tool like WireShark or Ethereal. Request a URL in the browser while we capturing traffic, in the HTTP GET Request, we can get the user-string for this browser.
GET / HTTP/1.1
Host: www.cisco.comMozilla/5.0 (Windows NT 5.2; RW; rv:7.0a1) Gecko/20091211 SeaMonkey/9.23a1pre
We can also use inbuilt "http.user_agent" filter in WireShark to filter out the relevant packet.
Once we have the User-Agent, we can use the same in the Custom User Agents field while creating the filter. We need to ensure that user-agent string are added in separate lines for multiple browsers. Refer to the snapshot below :
Next step would be to use this filter as a part of every policy (multiple filters) or just the first policy. This will again depend on allowed rules (if any), rule structure and desired results.
If we use the PolicyTrace Utility from the same browser when traffic is going via Cisco Cloud Web Security service, the following will be seen:
Evaluating rule 'Block_Unknown_browser_policy'.
Taking block action because of userAgent 'Mozilla/5.0 (Macintosh; <snip> 10.9; rv:29.0) Gecko/20100101 <snip>/29.0;'
Example/Use Case :
With each release or update patch for web browsers, the user-agent string is often changed. Recently, Microsoft made quite a few changes to the user-agent string structure for Internet Explorer 11. Hence, blocking browsers with short development cycles and update intervals would be difficult to accomplish using pre-defined filters. The procedure outlined above would be hence useful to achieve desired results.
Common User-Agent String to block internet explorer 11 :
Mozilla/5.0 (Windows NT 6.3; Trident/7.0; rv:11.0) like Gecko
Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko
Mozilla/5.0 (Windows NT 6.3; Win64, x64; Trident/7.0; Touch; rv:11.0) like Gecko
Mozilla/5.0 (Windows NT 6.3; WOW64; Trident/7.0; Touch; rv:11.0) like Gecko