Refer to the exhibit. An engineer must create a segmentation policy in Cisco Secure Workload to block HTTP traffic. The indicated configuration was applied; however, HTTP traffic is still allowed. What should be done to meet the requirement?
The provided JSON-like policy structure shows a segmentation rule with action "BLOCK" and filters referencing the HTTPS Consumer and HTTPS Provider. However, to block HTTP, you must define the protocol explicitly in the parameters. The attribute “l4_params” is currently empty. According to Cisco Secure Workload best practices (SCAZT Section 4: Application and Data Security, Pages 88–91), Layer 4 parameters (l4_params) must be used to specify protocols such as HTTP or port 80. Without defining HTTP here, the policy does not apply to HTTP traffic.
[Reference: Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT), Section 4, Pages 88–91]
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit