<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Thanks - could you clarify in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/wccp-failure-packets-forwarded/m-p/2643310#M194700</link>
    <description>&lt;P&gt;Thanks - could you clarify this a bit more ?&lt;/P&gt;&lt;P&gt;At present I have a ACL for redirecting traffic to the proxy. I have outbound ACL for all traffic allowed including the proxy and internal clients.&lt;/P&gt;&lt;P&gt;My understanding is in the outbound ACL I have to have a ACL for the client to be allowed to use HTTP and also the proxy to use HTTP. If I remove the client ACL it stops the client flow-through whether going through the proxy or not.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;BR /&gt;&lt;BR /&gt;Ed&lt;/P&gt;</description>
    <pubDate>Mon, 27 Apr 2015 14:51:46 GMT</pubDate>
    <dc:creator>edw</dc:creator>
    <dc:date>2015-04-27T14:51:46Z</dc:date>
    <item>
      <title>WCCP failure - packets forwarded</title>
      <link>https://community.cisco.com/t5/network-security/wccp-failure-packets-forwarded/m-p/2643305#M194695</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've set-up WCCP which has been working great. However I have found out that when the proxy is offline that traffic is being forward out of the appliance regardless. What I want is my traffic to be filtered by the proxy and if the proxy is offline no traffic is passed ? Is this possible ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Ed&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 00:55:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wccp-failure-packets-forwarded/m-p/2643305#M194695</guid>
      <dc:creator>edw</dc:creator>
      <dc:date>2019-03-26T00:55:42Z</dc:date>
    </item>
    <item>
      <title>Hi,Not available currently</title>
      <link>https://community.cisco.com/t5/network-security/wccp-failure-packets-forwarded/m-p/2643306#M194696</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Not available currently.&lt;/P&gt;&lt;P&gt;This is the enhancement:- CSCtl20957 and will hopefully be integrated in future.&lt;/P&gt;&lt;P&gt;https://tools.cisco.com/bugsearch/bug/CSCtl20957/?reffering_site=dumpcr&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Fri, 24 Apr 2015 05:06:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wccp-failure-packets-forwarded/m-p/2643306#M194696</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2015-04-24T05:06:57Z</dc:date>
    </item>
    <item>
      <title>Thanks - unfortunately I don</title>
      <link>https://community.cisco.com/t5/network-security/wccp-failure-packets-forwarded/m-p/2643307#M194697</link>
      <description>&lt;P&gt;Thanks - unfortunately I don't have access to that bug.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What do users do at present to deal with this, just let unfiltered traffic through ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Ed&lt;/P&gt;</description>
      <pubDate>Fri, 24 Apr 2015 14:34:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wccp-failure-packets-forwarded/m-p/2643307#M194697</guid>
      <dc:creator>edw</dc:creator>
      <dc:date>2015-04-24T14:34:12Z</dc:date>
    </item>
    <item>
      <title>Hi,If you want , i can</title>
      <link>https://community.cisco.com/t5/network-security/wccp-failure-packets-forwarded/m-p/2643308#M194698</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;If you want , i can provide a Workaround for this as well.&lt;/P&gt;&lt;P&gt;You can create an outbound ACL on the Outside interface allowing only the WCCP services for the Source as WCCP server IP and denying the rest of the WCCP services traffic.&lt;/P&gt;&lt;P&gt;Also at the end , put a permit ip any any.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Fri, 24 Apr 2015 18:07:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wccp-failure-packets-forwarded/m-p/2643308#M194698</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2015-04-24T18:07:39Z</dc:date>
    </item>
    <item>
      <title>Thanks - could you clarify</title>
      <link>https://community.cisco.com/t5/network-security/wccp-failure-packets-forwarded/m-p/2643309#M194699</link>
      <description>&lt;P&gt;Thanks - could you clarify this a bit more ?&lt;/P&gt;&lt;P&gt;At present I have a ACL for redirecting traffic to the proxy. I have outbound ACL for all traffic allowed including the proxy and internal clients.&lt;/P&gt;&lt;P&gt;My understanding is in the outbound ACL I have to have a ACL for the client to be allowed to use HTTP and also the proxy to use HTTP. If I remove the client ACL it stops the client flow-through whether going through the proxy or not.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;BR /&gt;&lt;BR /&gt;Ed&lt;/P&gt;</description>
      <pubDate>Mon, 27 Apr 2015 14:50:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wccp-failure-packets-forwarded/m-p/2643309#M194699</guid>
      <dc:creator>edw</dc:creator>
      <dc:date>2015-04-27T14:50:20Z</dc:date>
    </item>
    <item>
      <title>Thanks - could you clarify</title>
      <link>https://community.cisco.com/t5/network-security/wccp-failure-packets-forwarded/m-p/2643310#M194700</link>
      <description>&lt;P&gt;Thanks - could you clarify this a bit more ?&lt;/P&gt;&lt;P&gt;At present I have a ACL for redirecting traffic to the proxy. I have outbound ACL for all traffic allowed including the proxy and internal clients.&lt;/P&gt;&lt;P&gt;My understanding is in the outbound ACL I have to have a ACL for the client to be allowed to use HTTP and also the proxy to use HTTP. If I remove the client ACL it stops the client flow-through whether going through the proxy or not.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;BR /&gt;&lt;BR /&gt;Ed&lt;/P&gt;</description>
      <pubDate>Mon, 27 Apr 2015 14:51:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wccp-failure-packets-forwarded/m-p/2643310#M194700</guid>
      <dc:creator>edw</dc:creator>
      <dc:date>2015-04-27T14:51:46Z</dc:date>
    </item>
    <item>
      <title>Thanks - could you clarify</title>
      <link>https://community.cisco.com/t5/network-security/wccp-failure-packets-forwarded/m-p/2643311#M194701</link>
      <description>&lt;P&gt;Thanks - could you clarify this a bit more ?&lt;/P&gt;&lt;P&gt;At present I have a ACL for redirecting traffic to the proxy. I have outbound ACL for all traffic allowed including the proxy and internal clients.&lt;/P&gt;&lt;P&gt;My understanding is in the outbound ACL I have to have a ACL for the client to be allowed to use HTTP and also the proxy to use HTTP. If I remove the client ACL it stops the client flow-through whether going through the proxy or not.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;BR /&gt;&lt;BR /&gt;Ed&lt;/P&gt;</description>
      <pubDate>Mon, 27 Apr 2015 14:54:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wccp-failure-packets-forwarded/m-p/2643311#M194701</guid>
      <dc:creator>edw</dc:creator>
      <dc:date>2015-04-27T14:54:13Z</dc:date>
    </item>
    <item>
      <title>Hi,I think the ACL you are</title>
      <link>https://community.cisco.com/t5/network-security/wccp-failure-packets-forwarded/m-p/2643312#M194702</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I think the ACL you are pointing at is the ACL on the Inside interface.&lt;/P&gt;&lt;P&gt;I was recommending to put an acl on the Outside interface in the OUT direction and only allow the traffic out only from the source which is the IP address of the proxy.&lt;/P&gt;&lt;P&gt;So something like this:-&lt;/P&gt;&lt;P&gt;access-list wccp-fail-close permit tcp host &amp;lt;wccp server ip&amp;gt; any eq 443&lt;/P&gt;&lt;P&gt;access-list wccp-fail-close permit tcp host &amp;lt;wccp server ip&amp;gt; any eq 80&lt;/P&gt;&lt;P&gt;access-list wccp-fail-close deny tcp any any eq 443&lt;/P&gt;&lt;P&gt;access-list wccp-fail-close deny tcp any any eq 80&lt;/P&gt;&lt;P&gt;access-list wccp-fail-close permit ip any any&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Tue, 28 Apr 2015 04:17:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wccp-failure-packets-forwarded/m-p/2643312#M194702</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2015-04-28T04:17:28Z</dc:date>
    </item>
    <item>
      <title>Thanks - sorry about the</title>
      <link>https://community.cisco.com/t5/network-security/wccp-failure-packets-forwarded/m-p/2643313#M194703</link>
      <description>&lt;P&gt;Thanks - sorry about the duplicate replies, my browser went nuts.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My understanding for this is that I can only have one ACL per interface ? I currently have inbound ACLs on three interfaces. One per interface. Would I have to change my outside interface (internet facing) to have a ACL which is in the OUT direction and lose my IN direction ACL ?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Ed&lt;/P&gt;</description>
      <pubDate>Tue, 28 Apr 2015 13:12:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wccp-failure-packets-forwarded/m-p/2643313#M194703</guid>
      <dc:creator>edw</dc:creator>
      <dc:date>2015-04-28T13:12:47Z</dc:date>
    </item>
    <item>
      <title>Hi,This Outbound ACL that you</title>
      <link>https://community.cisco.com/t5/network-security/wccp-failure-packets-forwarded/m-p/2643314#M194704</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;This Outbound ACL that you are referring to is on which interface ? Inside ? Correct ?&lt;/P&gt;&lt;P&gt;I was recommending you an ACL in OUT direction on the outside interface where the connection will be sourced from the proxy IP to the internet.&lt;/P&gt;&lt;P&gt;If you have an ACL on the inside for the Outbound traffic , that would not affect the traffic or this workaround.&lt;/P&gt;&lt;P&gt;You can check the order in which the ACL are used using Packet Tracer:-&lt;/P&gt;&lt;P&gt;https://supportforums.cisco.com/document/29601/troubleshooting-access-problems-using-packet-tracer&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Tue, 28 Apr 2015 13:40:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wccp-failure-packets-forwarded/m-p/2643314#M194704</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2015-04-28T13:40:03Z</dc:date>
    </item>
  </channel>
</rss>

