Is it possible to construct a CPL that enforces broad isolation while also allowing traffic from specified isolated sites to be bypassed?
Administrators using Cloud SWG to enable users to access internet sites are encountering a persistent issue despite employing a mix of WSS Agents and explicit access methods.
To effectively bypass a single site from isolation, it can be added to the isolation conditions with a meticulous configuration. Below is an example that illustrates a scenario where the intent is to isolate all sites possessing a risk level of 7-10, with a notable exception for "myriskysite.com" (presuming it also holds a risk level within the 7-10 range). Additionally, the ".com" domain is to be bypassed from isolation:
;; Begin Template
#if enforcement=wss
define condition Isolation_CondWebIsolationMatchCriteriaWebAccess
url.threat_risk.level=7..10 url.domain=!"myriskysite.com"
url.category=!("Malicious Outbound Data/Botnets","Suspicious")
;url.domain="malicious.com"
;authenticated=yes
;client.address=192.168.10.0/24
;authenticated=yes url.category=("Malicious Outbound Data/Botnets")
end
define condition Isolation_CondWebIsolationMatchCriteriaForwarding
server_url.threat_risk.level=7..10 server_url.domain=!"myriskysite.com"
server_url.category=!("Malicious Outbound Data/Botnets","Suspicious")
;server_url.domain="malicious.com"
;authenticated=yes
;client.address=192.168.10.0/24
;authenticated=yes url.category=("Malicious Outbound Data/Botnets")
end
; This should be conditioned but is required for Isolation
<SSL-Intercept> condition=Isolation_CondWebIsolationMatchCriteriaWebAccess
ssl.forward_proxy(https)
#endif
;; End Template
If we have a group of domains that we want to bypass, or IP subnets to exempt from isolation, we could add the following CPL:
;; Begin Template
#if enforcement=wss
define category domain_iso_exemptions
myriskysite1.com
myriskysite2.com
end
define subnet client_ip_iso_exemptions
192.168.10.125
end
define condition Isolation_CondWebIsolationMatchCriteriaWebAccess
url.threat_risk.level=7..10 url.category=!("domain_iso_exemptions")
;url.category=("Malicious Outbound Data/Botnets","Suspicious")
;url.domain="malicious.com"
;authenticated=yes
client.address=192.168.10.0/24 client.address=!client_ip_iso_exemptions
;authenticated=yes url.category=("Malicious Outbound Data/Botnets")
end
define condition Isolation_CondWebIsolationMatchCriteriaForwarding
server_url.threat_risk.level=7..10 server_url.category=!("domain_iso_exemptions")
; server_url.category=("Malicious Outbound Data/Botnets","Suspicious") server_url.category=!("domain_iso_exemptions")
;server_url.domain="malicious.com"
;authenticated=yes
client.address=192.168.10.0/24 client.address=!client_ip_iso_exemptions
;authenticated=yes url.category=("Malicious Outbound Data/Botnets")
end
; This should be conditioned but is required for Isolation
<SSL-Intercept> condition=Isolation_CondWebIsolationMatchCriteriaWebAccess
ssl.forward_proxy(https)
#endif
;; End Template