<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPS and Content Filtering for Hairpinned Remote VPN Users in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ips-and-content-filtering-for-hairpinned-remote-vpn-users/m-p/614654#M1027417</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Anyone have thoughts on this?  Hoping to not have to open another TAC case...I think I hit the Top 10 on Tac's list since we deployed our ASA.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 01 Feb 2007 22:36:54 GMT</pubDate>
    <dc:creator>swharvey</dc:creator>
    <dc:date>2007-02-01T22:36:54Z</dc:date>
    <item>
      <title>IPS and Content Filtering for Hairpinned Remote VPN Users</title>
      <link>https://community.cisco.com/t5/network-security/ips-and-content-filtering-for-hairpinned-remote-vpn-users/m-p/614653#M1027416</link>
      <description>&lt;P&gt;I've setup site2site and remote cisco vpn clients to terminate full (not split) vpn tunnels on our ASA5520. Does anyone know if the ASA can do IPS inspection and web url-redirection to an external content filter server (e.g. Websense server or WCCP to a Bluecoat) for these remotely connected clients for hairpinned traffic to the Internet?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:26:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-and-content-filtering-for-hairpinned-remote-vpn-users/m-p/614653#M1027416</guid>
      <dc:creator>swharvey</dc:creator>
      <dc:date>2019-03-11T09:26:53Z</dc:date>
    </item>
    <item>
      <title>Re: IPS and Content Filtering for Hairpinned Remote VPN Users</title>
      <link>https://community.cisco.com/t5/network-security/ips-and-content-filtering-for-hairpinned-remote-vpn-users/m-p/614654#M1027417</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Anyone have thoughts on this?  Hoping to not have to open another TAC case...I think I hit the Top 10 on Tac's list since we deployed our ASA.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Feb 2007 22:36:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-and-content-filtering-for-hairpinned-remote-vpn-users/m-p/614654#M1027417</guid>
      <dc:creator>swharvey</dc:creator>
      <dc:date>2007-02-01T22:36:54Z</dc:date>
    </item>
    <item>
      <title>Re: IPS and Content Filtering for Hairpinned Remote VPN Users</title>
      <link>https://community.cisco.com/t5/network-security/ips-and-content-filtering-for-hairpinned-remote-vpn-users/m-p/614655#M1027418</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I found out from our Cisco account team that the IPS will inspect non encrypted traffic from vpn connections that terminate on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm still waiting feedback on the content filter wccp/url-filter redirection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone have any input on this capability?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Feb 2007 17:28:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-and-content-filtering-for-hairpinned-remote-vpn-users/m-p/614655#M1027418</guid>
      <dc:creator>swharvey</dc:creator>
      <dc:date>2007-02-02T17:28:43Z</dc:date>
    </item>
    <item>
      <title>Re: IPS and Content Filtering for Hairpinned Remote VPN Users</title>
      <link>https://community.cisco.com/t5/network-security/ips-and-content-filtering-for-hairpinned-remote-vpn-users/m-p/614656#M1027419</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did you ever get an answer on this, specifically with WCCP redirection to a Bluecoat??  I've come across the same issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-lloyd&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 May 2007 02:44:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-and-content-filtering-for-hairpinned-remote-vpn-users/m-p/614656#M1027419</guid>
      <dc:creator>lloyd_andrew</dc:creator>
      <dc:date>2007-05-24T02:44:27Z</dc:date>
    </item>
    <item>
      <title>Re: IPS and Content Filtering for Hairpinned Remote VPN Users</title>
      <link>https://community.cisco.com/t5/network-security/ips-and-content-filtering-for-hairpinned-remote-vpn-users/m-p/614657#M1027420</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Lloyd,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So the immediate answer is no, I never got a response on my inquiry, but I did some tests and will share the results with you. I was able to setup a Bluecoat SG on the same subnet as the internal interface of our ASA, and was able to transparently proxy/redirect web traffic for internal LAN users inside the firewall via WCCP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I then tested proxy functions from the full tunneled, hairpinned remote vpn users, but was unable to have them redirect to the Bluecoat.  I then removed/reconfigured the WCCP redirection configurations on the ASA, and associated the redirection with the outside interface (to attempt to get the remote users hairpinned traffic to WCCP proxy first).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No luck with that, however, I had to be delicate as to not break other traffic functions, so it could be that I did not properly configure the ASA. I tested this out a couple months ago and have not had a chance to revisit this yet, however, in thinking about the configuration and the process of operation, in theory the WCCP functions should be able to be configured to proxy/tranparently redirect both internal and remote vpn connected users.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One thought which I did not try was to configure WCCP instances for each interface I am attempting to proxy. So in essence, establish two separate WCCP instances between the ASA and the Blucoat.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example, my working config for an internal user subnet is as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;wccp 99 redirect-list Content-Filter-Inside&lt;/P&gt;&lt;P&gt;wccp interface inside 99 redirect in&lt;/P&gt;&lt;P&gt;access-list Content-Filter-Inside extended permit ip 10.10.99.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My thoughts are that a second redirect list could be made for the external vpn users, so there would be two redirect instances between the ASA and the BlueCoat.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Possibly something like the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;wccp 98 redirect-list Content-Filter-VPN&lt;/P&gt;&lt;P&gt;wccp interface outside 98 redirect in&lt;/P&gt;&lt;P&gt;access-list Content-Filter-VPN extended permit ip 10.10.98.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are able to test this out I would have an interest in your results.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Otherwise, anyone else care to respond with ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Scott&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 May 2007 14:58:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-and-content-filtering-for-hairpinned-remote-vpn-users/m-p/614657#M1027420</guid>
      <dc:creator>swharvey</dc:creator>
      <dc:date>2007-05-24T14:58:47Z</dc:date>
    </item>
    <item>
      <title>Re: IPS and Content Filtering for Hairpinned Remote VPN Users</title>
      <link>https://community.cisco.com/t5/network-security/ips-and-content-filtering-for-hairpinned-remote-vpn-users/m-p/614658#M1027421</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Scott for the response.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was thinking of using something like the Tunnel Default Gateway feature so that I can route VPN tunnel traffic inside and it would then be subject to WCCP redirection.  A few extra hops for traffic to go through but I'm talking about a Catalyst 3750 and an ASA 5510 so any extra latency most likely won't be noticed.  Not sure if it would work yet but I'm hoping to do a proof of concept on it next week.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/ps6635/products_white_paper0900aecd805f0bd6.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/ps6635/products_white_paper0900aecd805f0bd6.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll let you know what I find.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-lloyd&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 May 2007 17:17:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-and-content-filtering-for-hairpinned-remote-vpn-users/m-p/614658#M1027421</guid>
      <dc:creator>lloyd_andrew</dc:creator>
      <dc:date>2007-05-24T17:17:27Z</dc:date>
    </item>
    <item>
      <title>Re: IPS and Content Filtering for Hairpinned Remote VPN Users</title>
      <link>https://community.cisco.com/t5/network-security/ips-and-content-filtering-for-hairpinned-remote-vpn-users/m-p/614659#M1027422</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Lloyd,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Interesting concept and I believe it will most likely work. In thinking about the manner in which WCCP works, and the location of the Bluecoat, I can see where the Tunnel Default Gateway would ensure that the remote vpn user traffic is processed by WCCP since the remote traffic would first be passed through the firewall to the inside 3750 then back out to the firewall where WCCP kicks in.  The only caviate I see (which I may be mistaken) is that you are moving the external vpn user traffic through the firewall four times: 1)outside traffic to inside 3750, 2)inside 3750 traffic back out to asa, 3)asa wccp to Bluecoat, 4) Bluecoat wccp back to ASA)  &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The packets will be dizzy from all this! But I think the configuration should work and is less complex than attempting the two WCCP instances on the ASA and the Bluecoat that I proposed (if that is even feasible).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know if my understanding of your proposal is correct, and how your tests turn out!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Scott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 May 2007 17:57:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-and-content-filtering-for-hairpinned-remote-vpn-users/m-p/614659#M1027422</guid>
      <dc:creator>swharvey</dc:creator>
      <dc:date>2007-05-24T17:57:43Z</dc:date>
    </item>
    <item>
      <title>Re: IPS and Content Filtering for Hairpinned Remote VPN Users</title>
      <link>https://community.cisco.com/t5/network-security/ips-and-content-filtering-for-hairpinned-remote-vpn-users/m-p/614660#M1027423</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;One way I have accomplished what you are looking for with L2L VPN connections is via GRE.  If the remote device is a router, you can use GRE to create a circuit inside your network, which will allow you to hairpin the traffic back out to the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Attached is an example of the relevant configurations, and a link to a topology diagram:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Other than this, the only way I know to accomplish what you are looking for is with non-transparent proxy.  ie. configuring the user's browser to connect directly to the proxy server for all content.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://i6.photobucket.com/albums/y213/suparice/VPN_GRE_alt.jpg" target="_blank"&gt;http://i6.photobucket.com/albums/y213/suparice/VPN_GRE_alt.jpg&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Following message will have the config example, this message is too long &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Aug 2007 13:46:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-and-content-filtering-for-hairpinned-remote-vpn-users/m-p/614660#M1027423</guid>
      <dc:creator>NotMeHere</dc:creator>
      <dc:date>2007-08-21T13:46:17Z</dc:date>
    </item>
    <item>
      <title>Re: IPS and Content Filtering for Hairpinned Remote VPN Users</title>
      <link>https://community.cisco.com/t5/network-security/ips-and-content-filtering-for-hairpinned-remote-vpn-users/m-p/614661#M1027424</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Configuration example:&lt;/P&gt;&lt;P&gt;==========================&lt;/P&gt;&lt;P&gt;START Remote Router&lt;/P&gt;&lt;P&gt;==========================&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; hash md5&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt;crypto isakmp key ahstest1 address 4.4.4.4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set TranSet esp-des esp-md5-hmac&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto map SecureVPN 10 ipsec-isakmp&lt;/P&gt;&lt;P&gt; set peer 4.4.4.4&lt;/P&gt;&lt;P&gt; set transform-set TranSet&lt;/P&gt;&lt;P&gt; match address 102&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Tunnel0&lt;/P&gt;&lt;P&gt; description Tunnel To 6513-R1&lt;/P&gt;&lt;P&gt; ip address 172.31.200.202 255.255.255.252&lt;/P&gt;&lt;P&gt; ip mtu 1395&lt;/P&gt;&lt;P&gt; ip ospf mtu-ignore&lt;/P&gt;&lt;P&gt; tunnel source 172.31.125.125&lt;/P&gt;&lt;P&gt; tunnel destination 172.31.200.142&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Tunnel1&lt;/P&gt;&lt;P&gt; description Tunnel To 6513-R2&lt;/P&gt;&lt;P&gt; ip address 172.31.200.206 255.255.255.252&lt;/P&gt;&lt;P&gt; ip mtu 1395&lt;/P&gt;&lt;P&gt; ip ospf mtu-ignore&lt;/P&gt;&lt;P&gt; tunnel source 172.31.125.125&lt;/P&gt;&lt;P&gt; tunnel destination 172.31.200.143&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Loopback0&lt;/P&gt;&lt;P&gt; ip address 172.31.125.125 255.255.255.255&lt;/P&gt;&lt;P&gt; ip ospf mtu-ignore&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0&lt;/P&gt;&lt;P&gt; description Outside&lt;/P&gt;&lt;P&gt; ip address 4.4.4.2 255.255.255.0&lt;/P&gt;&lt;P&gt; no ip redirects&lt;/P&gt;&lt;P&gt; no ip proxy-arp&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt; crypto map SecureVPN&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet1&lt;/P&gt;&lt;P&gt; description LAN ACCESS PORT - VLAN2&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet2&lt;/P&gt;&lt;P&gt; description LAN ACCESS PORT - VLAN2&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet3&lt;/P&gt;&lt;P&gt; description LAN ACCESS PORT - VLAN2&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet4&lt;/P&gt;&lt;P&gt; description LAN ACCESS PORT - VLAN2&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; description LAN&lt;/P&gt;&lt;P&gt; ip address 10.99.99.1 255.255.255.0&lt;/P&gt;&lt;P&gt; no ip redirects&lt;/P&gt;&lt;P&gt; no ip proxy-arp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Async1&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;router ospf 100&lt;/P&gt;&lt;P&gt; router-id 172.31.125.125&lt;/P&gt;&lt;P&gt; log-adjacency-changes&lt;/P&gt;&lt;P&gt; auto-cost reference-bandwidth 1000&lt;/P&gt;&lt;P&gt; area 0 authentication message-digest&lt;/P&gt;&lt;P&gt; passive-interface Vlan2&lt;/P&gt;&lt;P&gt; passive-interface FastEthernet0&lt;/P&gt;&lt;P&gt; network 10.99.99.0 0.0.0.255 area 2&lt;/P&gt;&lt;P&gt; network 172.31.200.200 0.0.0.3 area 0&lt;/P&gt;&lt;P&gt; network 172.31.200.204 0.0.0.3 area 0&lt;/P&gt;&lt;P&gt; maximum-paths 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip route 67.109.188.0 255.255.252.0 4.4.4.1&lt;/P&gt;&lt;P&gt;ip route 140.221.8.88 255.255.255.255 4.4.4.1&lt;/P&gt;&lt;P&gt;ip route 172.31.200.142 255.255.255.255 4.4.4.1&lt;/P&gt;&lt;P&gt;ip route 172.31.200.143 255.255.255.255 4.4.4.1&lt;/P&gt;&lt;P&gt;ip route 192.5.41.40 255.255.255.255 4.4.4.1&lt;/P&gt;&lt;P&gt;ip route 192.5.41.41 255.255.255.255 4.4.4.1&lt;/P&gt;&lt;P&gt;ip tacacs source-interface Vlan2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;logging source-interface Vlan2&lt;/P&gt;&lt;P&gt;access-list 102 permit gre host 172.31.125.125 host 172.31.200.142&lt;/P&gt;&lt;P&gt;access-list 102 permit gre host 172.31.125.125 host 172.31.200.143&lt;/P&gt;&lt;P&gt;access-list 102 permit ip host 172.31.125.125 host 172.31.200.142&lt;/P&gt;&lt;P&gt;access-list 102 permit ip host 172.31.125.125 host 172.31.200.143&lt;/P&gt;&lt;P&gt;access-list 187 remark *** DENY SPOOFING&lt;/P&gt;&lt;P&gt;access-list 187 deny   ip 10.0.0.0 0.255.255.255 any&lt;/P&gt;&lt;P&gt;access-list 187 deny   ip 172.16.0.0 0.15.255.255 any&lt;/P&gt;&lt;P&gt;access-list 187 deny   ip 192.168.0.0 0.0.255.255 any&lt;/P&gt;&lt;P&gt;access-list 187 deny   ip 0.0.0.0 0.255.255.255 any&lt;/P&gt;&lt;P&gt;access-list 187 deny   ip 224.0.0.0 0.255.255.255 any&lt;/P&gt;&lt;P&gt;access-list 187 deny   ip host 207.65.222.200 any&lt;/P&gt;&lt;P&gt;access-list 187 remark *** END DENY SPOOFING&lt;/P&gt;&lt;P&gt;access-list 187 remark .&lt;/P&gt;&lt;P&gt;access-list 187 remark *** START PERMISSIONS VPN&lt;/P&gt;&lt;P&gt;access-list 187 permit esp host 4.4.4.4 any&lt;/P&gt;&lt;P&gt;access-list 187 permit ip host 4.4.4.4 any&lt;/P&gt;&lt;P&gt;access-list 187 remark *** END PERMISSIONS VPN&lt;/P&gt;&lt;P&gt;access-list 187 remark ..&lt;/P&gt;&lt;P&gt;access-list 187 remark *** START PERMISSIONS EST&lt;/P&gt;&lt;P&gt;access-list 187 permit tcp any any established&lt;/P&gt;&lt;P&gt;access-list 187 deny   ip any any log&lt;/P&gt;&lt;P&gt;==========================&lt;/P&gt;&lt;P&gt;END Remote Router&lt;/P&gt;&lt;P&gt;==========================&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Aug 2007 13:48:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-and-content-filtering-for-hairpinned-remote-vpn-users/m-p/614661#M1027424</guid>
      <dc:creator>NotMeHere</dc:creator>
      <dc:date>2007-08-21T13:48:28Z</dc:date>
    </item>
    <item>
      <title>Re: IPS and Content Filtering for Hairpinned Remote VPN Users</title>
      <link>https://community.cisco.com/t5/network-security/ips-and-content-filtering-for-hairpinned-remote-vpn-users/m-p/614662#M1027425</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;==========================&lt;/P&gt;&lt;P&gt;Core Device 1&lt;/P&gt;&lt;P&gt;==========================&lt;/P&gt;&lt;P&gt;interface Loopback1&lt;/P&gt;&lt;P&gt; description Loopback For GRE Tunnel To 1720&lt;/P&gt;&lt;P&gt; ip address 172.31.200.142 255.255.255.255&lt;/P&gt;&lt;P&gt; ip ospf mtu-ignore&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Tunnel0&lt;/P&gt;&lt;P&gt; description Tunnel To 1720 Int T0&lt;/P&gt;&lt;P&gt; ip address 172.31.200.201 255.255.255.252&lt;/P&gt;&lt;P&gt; ip mtu 1395&lt;/P&gt;&lt;P&gt; ip ospf mtu-ignore&lt;/P&gt;&lt;P&gt; tunnel source 172.31.200.142&lt;/P&gt;&lt;P&gt; tunnel destination 172.31.125.125&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;router ospf 100&lt;/P&gt;&lt;P&gt; router-id 172.31.200.140&lt;/P&gt;&lt;P&gt; log-adjacency-changes&lt;/P&gt;&lt;P&gt; auto-cost reference-bandwidth 1000&lt;/P&gt;&lt;P&gt; area 0 authentication message-digest&lt;/P&gt;&lt;P&gt; network 172.31.200.140 0.0.0.0 area 0&lt;/P&gt;&lt;P&gt; network 172.31.200.142 0.0.0.0 area 0&lt;/P&gt;&lt;P&gt; network 172.31.200.200 0.0.0.3 area 0&lt;/P&gt;&lt;P&gt; maximum-paths 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip route 172.31.125.125 255.255.255.255 ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;==========================&lt;/P&gt;&lt;P&gt;End Core Device 1&lt;/P&gt;&lt;P&gt;==========================&lt;/P&gt;&lt;P&gt;==========================&lt;/P&gt;&lt;P&gt;Core Device 2&lt;/P&gt;&lt;P&gt;==========================&lt;/P&gt;&lt;P&gt;interface Loopback1&lt;/P&gt;&lt;P&gt; description Loopback For GRE Tunnel To ARTP-806-R1&lt;/P&gt;&lt;P&gt; ip address 172.31.200.143 255.255.255.255&lt;/P&gt;&lt;P&gt; ip ospf mtu-ignore&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Tunnel0&lt;/P&gt;&lt;P&gt; description Tunnel To 1720 Int T1&lt;/P&gt;&lt;P&gt; ip address 172.31.200.205 255.255.255.252&lt;/P&gt;&lt;P&gt; ip mtu 1395&lt;/P&gt;&lt;P&gt; ip ospf mtu-ignore&lt;/P&gt;&lt;P&gt; tunnel source 172.31.200.143&lt;/P&gt;&lt;P&gt; tunnel destination 172.31.125.125&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;router ospf 100&lt;/P&gt;&lt;P&gt; router-id 172.31.200.141&lt;/P&gt;&lt;P&gt; log-adjacency-changes&lt;/P&gt;&lt;P&gt; auto-cost reference-bandwidth 1000&lt;/P&gt;&lt;P&gt; area 0 authentication message-digest&lt;/P&gt;&lt;P&gt; network 172.31.200.141 0.0.0.0 area 0&lt;/P&gt;&lt;P&gt; network 172.31.200.143 0.0.0.0 area 0&lt;/P&gt;&lt;P&gt; network 172.31.200.204 0.0.0.3 area 0&lt;/P&gt;&lt;P&gt; maximum-paths 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip route 172.31.125.125 255.255.255.255 ASA&lt;/P&gt;&lt;P&gt;==========================&lt;/P&gt;&lt;P&gt;End Core Device 2&lt;/P&gt;&lt;P&gt;==========================&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Aug 2007 13:49:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-and-content-filtering-for-hairpinned-remote-vpn-users/m-p/614662#M1027425</guid>
      <dc:creator>NotMeHere</dc:creator>
      <dc:date>2007-08-21T13:49:01Z</dc:date>
    </item>
    <item>
      <title>Re: IPS and Content Filtering for Hairpinned Remote VPN Users</title>
      <link>https://community.cisco.com/t5/network-security/ips-and-content-filtering-for-hairpinned-remote-vpn-users/m-p/614663#M1027426</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I had a setup like in a previous job with the only difference that I was using Websense. I had a pair of PIX515E running version 7.X in Active/Standby. With Websense I was able to filter the web content for the remote vpn clients.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Aug 2007 14:04:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-and-content-filtering-for-hairpinned-remote-vpn-users/m-p/614663#M1027426</guid>
      <dc:creator>rigoberto.cintron</dc:creator>
      <dc:date>2007-08-21T14:04:13Z</dc:date>
    </item>
    <item>
      <title>Re: IPS and Content Filtering for Hairpinned Remote VPN Users</title>
      <link>https://community.cisco.com/t5/network-security/ips-and-content-filtering-for-hairpinned-remote-vpn-users/m-p/614664#M1027427</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Paul for looking at this and considering possible solutions.  Unfortunatley all the remote sites are ASA5505's, so GRE with the router example is out, and honestly I'm not a proponent of bringing the traffic all the way inside to reroute it back out the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your comment about pointing the users browsers to a proxy would work aslo, but we are wanting transparent proxy services, hence our investigations into WCCP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's a thought/question:  Could a WCCP capable content filter (Bluecoat, Webwasher, etc) be setup on a separate interface from the inside and outside interfaces (say for example, a dedicated proxy interface), then a WCCP redirects be pointed to that interface for both the outside and inside source requests?  This could then redirect both internal and external (vpn) users to the content filter, and would not have to bring outside traffic up inside for filtering.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thoughts on this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Scott&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Aug 2007 18:35:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-and-content-filtering-for-hairpinned-remote-vpn-users/m-p/614664#M1027427</guid>
      <dc:creator>swharvey</dc:creator>
      <dc:date>2007-08-22T18:35:42Z</dc:date>
    </item>
    <item>
      <title>IPS and Content Filtering for Hairpinned Remote VPN Users</title>
      <link>https://community.cisco.com/t5/network-security/ips-and-content-filtering-for-hairpinned-remote-vpn-users/m-p/614665#M1027428</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Anyone get this working?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Apr 2013 03:39:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-and-content-filtering-for-hairpinned-remote-vpn-users/m-p/614665#M1027428</guid>
      <dc:creator>Steven Williams</dc:creator>
      <dc:date>2013-04-11T03:39:51Z</dc:date>
    </item>
  </channel>
</rss>

