<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Deployment Method Questions in Web Security</title>
    <link>https://community.cisco.com/t5/web-security/deployment-method-questions/m-p/1243427#M684</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;I&gt;&lt;B&gt;1. The appliance can be deployed using WCCPv2 or a L4 switch, I understand that with WCCP traffic will be redirected to the appliance. Should this be all traffic or should it be http and/or https traffic only? &lt;/B&gt;&lt;/I&gt;&lt;BR /&gt;&lt;BR /&gt;WCCP requires the specification of up to 8 ports to redirect. At a minimum you would need to redirect port 80. If you intend to do HTTPS proxy as well, you'd need to redirect port 443 as well as 80.&lt;BR /&gt;&lt;BR /&gt;&lt;I&gt;&lt;B&gt;The other method is to simply connect it to a L4 switch and the guide provides no explanation of how this works. How is this accomplished? Is it feasible to configure WCCP on the L4 switch and redirect traffic to the appliance as well?&lt;/B&gt;&lt;/I&gt;&lt;BR /&gt;&lt;BR /&gt;Each L4 switch will need it's own customized configuration, in order to redirect traffic. On a Cisco switch, you'd need to use policy based routing. &lt;BR /&gt;&lt;BR /&gt;It's an either / or situation. You would use either WCCP or L4 policy based routing, never together. &lt;BR /&gt;&lt;BR /&gt;If your switch supports WCCP, I'd highly recommend using it over policy based routing. &lt;BR /&gt;&lt;BR /&gt;&lt;I&gt;&lt;B&gt;2. L4 traffic monitoring can be accomplished by using a span port, network tap or a hub. If I am to also enforce blocking and not just monitoring it says that the Web proxy and the L4 monitor must be on the same network. I don't understand, why is this so? Does the L4 traffic monitor port need an IP address?&lt;/B&gt;&lt;/I&gt;&lt;BR /&gt;&lt;BR /&gt;the L4TM interfaces (T1/T2) are passive listening ports. They just see where your clients are accessing. In order to block this traffic, the L4TM will use the proxy interface (M1 or P1) in order to send a TCP RST packet to the offending client and server. &lt;BR /&gt;&lt;BR /&gt;If the P1 interface is not on the same network as the L4TM passive ports, the RST sent out P1 will never get to the client.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 11 Jun 2009 00:41:23 GMT</pubDate>
    <dc:creator>jowolfer</dc:creator>
    <dc:date>2009-06-11T00:41:23Z</dc:date>
    <item>
      <title>Deployment Method Questions</title>
      <link>https://community.cisco.com/t5/web-security/deployment-method-questions/m-p/1243426#M683</link>
      <description>&lt;P&gt;After going through the deployment section of the user guide to try and have a better understanding of how to deploy the appliance, I find myself needing some answers, if I were to deploy the device as a transparent proxy. I hope someone can oblige.&lt;BR /&gt;&lt;BR /&gt;1. The appliance can be deployed using WCCPv2 or a L4 switch, I understand that with WCCP traffic will be redirected to the appliance. Should this be all traffic or should it be http and/or https traffic only? The other method is to simply connect it to a L4 switch and the guide provides no explanation of how this works. How is this accomplished? Is it feasible to configure WCCP on the L4 switch and redirect traffic to the appliance as well?&lt;BR /&gt;&lt;BR /&gt;2. L4 traffic monitoring can be accomplished by using a span port, network tap or a hub. If I am to also enforce blocking and not just monitoring it says that the Web proxy and the L4 monitor must be on the same network. I don't understand, why is this so? Does the L4 traffic monitor port need an IP address?&lt;BR /&gt;&lt;BR /&gt;Thanks a lot and I hope someone can help.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jun 2009 22:58:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/deployment-method-questions/m-p/1243426#M683</guid>
      <dc:creator>Kelvin Willacey</dc:creator>
      <dc:date>2009-06-09T22:58:38Z</dc:date>
    </item>
    <item>
      <title>Re: Deployment Method Questions</title>
      <link>https://community.cisco.com/t5/web-security/deployment-method-questions/m-p/1243427#M684</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;I&gt;&lt;B&gt;1. The appliance can be deployed using WCCPv2 or a L4 switch, I understand that with WCCP traffic will be redirected to the appliance. Should this be all traffic or should it be http and/or https traffic only? &lt;/B&gt;&lt;/I&gt;&lt;BR /&gt;&lt;BR /&gt;WCCP requires the specification of up to 8 ports to redirect. At a minimum you would need to redirect port 80. If you intend to do HTTPS proxy as well, you'd need to redirect port 443 as well as 80.&lt;BR /&gt;&lt;BR /&gt;&lt;I&gt;&lt;B&gt;The other method is to simply connect it to a L4 switch and the guide provides no explanation of how this works. How is this accomplished? Is it feasible to configure WCCP on the L4 switch and redirect traffic to the appliance as well?&lt;/B&gt;&lt;/I&gt;&lt;BR /&gt;&lt;BR /&gt;Each L4 switch will need it's own customized configuration, in order to redirect traffic. On a Cisco switch, you'd need to use policy based routing. &lt;BR /&gt;&lt;BR /&gt;It's an either / or situation. You would use either WCCP or L4 policy based routing, never together. &lt;BR /&gt;&lt;BR /&gt;If your switch supports WCCP, I'd highly recommend using it over policy based routing. &lt;BR /&gt;&lt;BR /&gt;&lt;I&gt;&lt;B&gt;2. L4 traffic monitoring can be accomplished by using a span port, network tap or a hub. If I am to also enforce blocking and not just monitoring it says that the Web proxy and the L4 monitor must be on the same network. I don't understand, why is this so? Does the L4 traffic monitor port need an IP address?&lt;/B&gt;&lt;/I&gt;&lt;BR /&gt;&lt;BR /&gt;the L4TM interfaces (T1/T2) are passive listening ports. They just see where your clients are accessing. In order to block this traffic, the L4TM will use the proxy interface (M1 or P1) in order to send a TCP RST packet to the offending client and server. &lt;BR /&gt;&lt;BR /&gt;If the P1 interface is not on the same network as the L4TM passive ports, the RST sent out P1 will never get to the client.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Jun 2009 00:41:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/deployment-method-questions/m-p/1243427#M684</guid>
      <dc:creator>jowolfer</dc:creator>
      <dc:date>2009-06-11T00:41:23Z</dc:date>
    </item>
    <item>
      <title>Re: Deployment Method Questions</title>
      <link>https://community.cisco.com/t5/web-security/deployment-method-questions/m-p/1243428#M685</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks a lot for your response, I know understand why it has to be in the same network I don't understand how it would work. Is it that in a multiple vlan environment a remote span vlan has to be setup for the L4TM port so that it can see all the traffic and ensure that both it and the P1 port are in the same vlan?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Jun 2009 22:10:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/deployment-method-questions/m-p/1243428#M685</guid>
      <dc:creator>Kelvin Willacey</dc:creator>
      <dc:date>2009-06-11T22:10:47Z</dc:date>
    </item>
    <item>
      <title>Re: Deployment Method Questions</title>
      <link>https://community.cisco.com/t5/web-security/deployment-method-questions/m-p/1243429#M686</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Multiple VLANs will work fine as long as the P1 interface has a route to the clients, so that the TCP RST is received.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 13 Jun 2009 00:38:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/deployment-method-questions/m-p/1243429#M686</guid>
      <dc:creator>jowolfer</dc:creator>
      <dc:date>2009-06-13T00:38:14Z</dc:date>
    </item>
    <item>
      <title>Re: Deployment Method Questions</title>
      <link>https://community.cisco.com/t5/web-security/deployment-method-questions/m-p/1243430#M687</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;B&gt;Each L4 switch will need it's own customized configuration, in order to redirect traffic. On a Cisco switch, you'd need to use policy based routing. &lt;BR /&gt;&lt;BR /&gt;It's an either / or situation. You would use either WCCP or L4 policy based routing, never together. &lt;BR /&gt;&lt;BR /&gt;If your switch supports WCCP, I'd highly recommend using it over policy based routing. &lt;BR /&gt;&lt;BR /&gt;the L4TM interfaces (T1/T2) are passive listening ports. They just see where your clients are accessing. In order to block this traffic, the L4TM will use the proxy interface (M1 or P1) in order to send a TCP RST packet to the offending client and server. &lt;BR /&gt;&lt;BR /&gt;If the P1 interface is not on the same network as the L4TM passive ports, the RST sent out P1 will never get to the client.&lt;/B&gt;&lt;/PRE&gt;&lt;BR /&gt;&lt;BR /&gt;Interesting.  This isn't my understanding of the L4 Monitor.  This is from the admin guide:&lt;BR /&gt;&lt;BR /&gt;&lt;I&gt;L4 Traffic Monitor (L4TM) deployment is independent of the Web Proxy deployment. When&lt;BR /&gt;connecting and deploying the L4 Traffic Monitor, consider the following:&lt;BR /&gt;• Physical connection. You can choose how to connect the L4 Traffic Monitor to the&lt;BR /&gt;network. For more information, see “Connecting the L4 Traffic Monitor” on page 27.&lt;BR /&gt;• Network address translation (NAT). When configuring the L4 Traffic Monitor, connect it&lt;BR /&gt;at a point in your network where it can see as much network traffic as possible before&lt;BR /&gt;getting out of your egress firewall and onto the Internet. It is important that the L4 Traffic&lt;BR /&gt;Monitor be ‘logically’ connected after the proxy ports and before any device that performs&lt;BR /&gt;network address translation (NAT) on client IP addresses.&lt;BR /&gt;• L4 Traffic Monitor action setting. The default setting for the L4 Traffic Monitor is monitor&lt;BR /&gt;only. After setup, if you configure the L4 Traffic Monitor to monitor and block suspicious&lt;BR /&gt;traffic, ensure that the L4 Traffic Monitor and the Web Proxy are configured on the same&lt;BR /&gt;network so that all clients are accessible on routes that are configured for data traffic.&lt;/I&gt;&lt;BR /&gt;&lt;BR /&gt;It wouldn't make much sense in my mind to do the L4 without the proxy as you would have no way of gathering user info etc.  Also, my understanding is that the L4 monitor is for malware - not category-based blocking. &lt;BR /&gt;&lt;BR /&gt;Last, I don't believe any of this requires policy based routing at all.  The proxy uses WCCP or explicitly forwarded browsers.  The L4 monitor uses a SPAN port or similar - generally sniffing traffic going to the firewall at the point of ingress.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Jun 2009 02:02:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/deployment-method-questions/m-p/1243430#M687</guid>
      <dc:creator>scraig84_ironport</dc:creator>
      <dc:date>2009-06-17T02:02:30Z</dc:date>
    </item>
    <item>
      <title>Re: Deployment Method Questions</title>
      <link>https://community.cisco.com/t5/web-security/deployment-method-questions/m-p/1243431#M688</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;scraig84,&lt;BR /&gt;&lt;BR /&gt;You're confusing the difference between using an L4 switch (PBR) to route client HTTP traffic to the WSA proxy versus the Layer 4 traffic monitor (L4TM) functionality within the WSA. &lt;BR /&gt;&lt;BR /&gt;The WSA proxy can receive HTTP traffic from clients via one of the following methods: &lt;BR /&gt;&lt;BR /&gt;WCCP&lt;BR /&gt;L4 Switch PBR&lt;BR /&gt;Explicit browser configuration (includes .pac files)&lt;BR /&gt;&lt;BR /&gt;The L4TM is a completely separate service that promiscuously sniffs traffic to learn DNS values, match IP black/white lists, and TCP RST 'bad' traffic'.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Jun 2009 01:20:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/deployment-method-questions/m-p/1243431#M688</guid>
      <dc:creator>jowolfer</dc:creator>
      <dc:date>2009-06-18T01:20:23Z</dc:date>
    </item>
  </channel>
</rss>

