<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: WSA Network Placement? in Web Security</title>
    <link>https://community.cisco.com/t5/web-security/wsa-network-placement/m-p/3696198#M7992</link>
    <description>Ok, how about this?&lt;BR /&gt;&lt;BR /&gt;Since WCCP on the FTD will not forward web-destined traffic to a DMZ &lt;BR /&gt;directly off of the FTD, will it forward it to an interface designated &lt;BR /&gt;as "outside," connecting to another edge firewall? The WSA would sit in &lt;BR /&gt;a zone hanging off of the edge firewall.&lt;BR /&gt;&lt;BR /&gt;Thank you&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Tue, 28 Aug 2018 13:58:05 GMT</pubDate>
    <dc:creator>DamianRC</dc:creator>
    <dc:date>2018-08-28T13:58:05Z</dc:date>
    <item>
      <title>WSA Network Placement?</title>
      <link>https://community.cisco.com/t5/web-security/wsa-network-placement/m-p/3695173#M7982</link>
      <description>&lt;P&gt;Currently a couple of WSAs sit on the inside network.&lt;/P&gt;
&lt;P&gt;A network redesign is underway. Relocating the WSAs to the DMZ has been mentioned. I'm failing to find information in support of this(there nothing against it either).&amp;nbsp; Why should this be done? Why shouldn't it be done? It isn't like anyone from the internet will access the appliance, but I could be missing something here.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I appreciate the assistance.&lt;/P&gt;</description>
      <pubDate>Sun, 26 Aug 2018 19:40:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/wsa-network-placement/m-p/3695173#M7982</guid>
      <dc:creator>DamianRC</dc:creator>
      <dc:date>2018-08-26T19:40:30Z</dc:date>
    </item>
    <item>
      <title>Re: WSA Network Placement?</title>
      <link>https://community.cisco.com/t5/web-security/wsa-network-placement/m-p/3695205#M7983</link>
      <description>It depends on how you get the traffic to the WSA.&lt;BR /&gt;&lt;BR /&gt;If you are using WCCP on the inside interface of an ASA, you CANNOT send the traffic through the firewall to the DMZ to the WSAs. The ASA won't let you.&lt;BR /&gt;&lt;BR /&gt;Also, the WSA has to be joined to your AD if you're using that version of transparent authentication.  I wouldn't cut those holes from the DMZ if I didn't have to....&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Sun, 26 Aug 2018 21:53:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/wsa-network-placement/m-p/3695205#M7983</guid>
      <dc:creator>Ken Stieers</dc:creator>
      <dc:date>2018-08-26T21:53:05Z</dc:date>
    </item>
    <item>
      <title>Re: WSA Network Placement?</title>
      <link>https://community.cisco.com/t5/web-security/wsa-network-placement/m-p/3695684#M7985</link>
      <description>Thank you very much for the insight.&lt;BR /&gt;&lt;BR /&gt;We currently use proxy pac files to direct web-bound traffic to the &lt;BR /&gt;WSAs. The WSAs, mind you, are currently on the same segment as the host &lt;BR /&gt;computers (the network is flat and being redesigned for segmentation).&lt;BR /&gt;&lt;BR /&gt;This really brings the proposed network design into question. In a &lt;BR /&gt;somewhat interesting approach, the FTDs will be the Firewall/Routed &lt;BR /&gt;network core. Below that are distribution/ aggregation 93180s. Below &lt;BR /&gt;that are 2960x access layer switches.&lt;BR /&gt;&lt;BR /&gt;I like the idea of not poking unnecessary holes in the DMZ. But based on &lt;BR /&gt;the planed topology, where would the WSA be best placed?&lt;BR /&gt;</description>
      <pubDate>Mon, 27 Aug 2018 17:57:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/wsa-network-placement/m-p/3695684#M7985</guid>
      <dc:creator>DamianRC</dc:creator>
      <dc:date>2018-08-27T17:57:05Z</dc:date>
    </item>
    <item>
      <title>Re: WSA Network Placement?</title>
      <link>https://community.cisco.com/t5/web-security/wsa-network-placement/m-p/3695690#M7986</link>
      <description>&lt;P&gt;With PAC files you'll be able to redirect the traffic out to the DMZ.&lt;/P&gt;
&lt;P&gt;How are you going to do authentication?&amp;nbsp; If you look at ISE-PIC (the replacement for CDA) you may be able to sent authentication info out to the WSA's.&amp;nbsp; I think you'd still have to join the WSAs&amp;nbsp;to the AD to make them completely happy...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Since the WSA is basically a stand-in for the workstation that browses the internet, I don't see it as any different than a workstation...&lt;/P&gt;</description>
      <pubDate>Mon, 27 Aug 2018 18:10:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/wsa-network-placement/m-p/3695690#M7986</guid>
      <dc:creator>Ken Stieers</dc:creator>
      <dc:date>2018-08-27T18:10:29Z</dc:date>
    </item>
    <item>
      <title>Re: WSA Network Placement?</title>
      <link>https://community.cisco.com/t5/web-security/wsa-network-placement/m-p/3695751#M7987</link>
      <description>In the current scheme, the WSAs permit traffic to proceed without &lt;BR /&gt;authentication. This may be because open LDAP is used for directory &lt;BR /&gt;services. Are we missing much with this design?&lt;BR /&gt;&lt;BR /&gt;This makes sense. However, since there will likely be multiple segments, &lt;BR /&gt;each of which with internet access, the WSA would need to be somewhere &lt;BR /&gt;accessible to all. I'm beginning to think an "Internet-Services-Zone" &lt;BR /&gt;off of the Firwall-Core would fit the bill.&lt;BR /&gt;</description>
      <pubDate>Mon, 27 Aug 2018 19:22:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/wsa-network-placement/m-p/3695751#M7987</guid>
      <dc:creator>DamianRC</dc:creator>
      <dc:date>2018-08-27T19:22:05Z</dc:date>
    </item>
    <item>
      <title>Re: WSA Network Placement?</title>
      <link>https://community.cisco.com/t5/web-security/wsa-network-placement/m-p/3695763#M7988</link>
      <description>OHHH.  Yeah, in that case with OpenLDAP, you don't have the issue with the WSA joining an AD, so you'd just have to have a hole for the WSA to talk to your LDAP boxes, which would be cleaner.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;We have a segment between the core and the firewall, that's where the WSAs and Email Security Appliances sit.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 27 Aug 2018 19:34:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/wsa-network-placement/m-p/3695763#M7988</guid>
      <dc:creator>Ken Stieers</dc:creator>
      <dc:date>2018-08-27T19:34:05Z</dc:date>
    </item>
    <item>
      <title>Re: WSA Network Placement?</title>
      <link>https://community.cisco.com/t5/web-security/wsa-network-placement/m-p/3696198#M7992</link>
      <description>Ok, how about this?&lt;BR /&gt;&lt;BR /&gt;Since WCCP on the FTD will not forward web-destined traffic to a DMZ &lt;BR /&gt;directly off of the FTD, will it forward it to an interface designated &lt;BR /&gt;as "outside," connecting to another edge firewall? The WSA would sit in &lt;BR /&gt;a zone hanging off of the edge firewall.&lt;BR /&gt;&lt;BR /&gt;Thank you&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 28 Aug 2018 13:58:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/wsa-network-placement/m-p/3696198#M7992</guid>
      <dc:creator>DamianRC</dc:creator>
      <dc:date>2018-08-28T13:58:05Z</dc:date>
    </item>
    <item>
      <title>Re: WSA Network Placement?</title>
      <link>https://community.cisco.com/t5/web-security/wsa-network-placement/m-p/3697082#M7997</link>
      <description>No, WCCP can't forward traffic "through" the firewall.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Is your DMZ between the inside interface of an outer firewall and the outside interface of the inner fw?&lt;BR /&gt;&lt;BR /&gt;You could use WCCP off of either of those (I'd do the WCCP on the inside interface of the outer firewall)&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Ken&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 29 Aug 2018 15:31:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/wsa-network-placement/m-p/3697082#M7997</guid>
      <dc:creator>Ken Stieers</dc:creator>
      <dc:date>2018-08-29T15:31:56Z</dc:date>
    </item>
    <item>
      <title>Re: WSA Network Placement?</title>
      <link>https://community.cisco.com/t5/web-security/wsa-network-placement/m-p/3697142#M7999</link>
      <description>Thanks, Ken.&lt;BR /&gt;&lt;BR /&gt;The "DMZ" is a Zone off of the outside FW. Not directly between the &lt;BR /&gt;outside and inside FWs. Now that you mention it, and based on some &lt;BR /&gt;additional reading, I might be better off using policy based forwarding &lt;BR /&gt;on the edge firewall. All 80 and 443 traffic would be forced to the&amp;nbsp; &lt;BR /&gt;"DMZ" where the WSAs resides, then out to the internet.&lt;BR /&gt;&lt;BR /&gt;My goal is to eliminate the proxy pac files, if possible.&lt;BR /&gt;</description>
      <pubDate>Wed, 29 Aug 2018 16:17:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/wsa-network-placement/m-p/3697142#M7999</guid>
      <dc:creator>DamianRC</dc:creator>
      <dc:date>2018-08-29T16:17:56Z</dc:date>
    </item>
  </channel>
</rss>

