<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How firewall work with proxy in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-firewall-work-with-proxy/m-p/2213769#M350649</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mahesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PAC file define how your browser traffic is routed. There may be many entries in the pac file and you should be able to view your pac file by simply opening the path configured on you browser Internet setting using any browser. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A typical out of a PAC file will be as below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; if (shExpMatch(url, "&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://group.cisco.com*"&gt;http://group.cisco.com*&lt;/A&gt;&lt;SPAN&gt;"))&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;{&amp;nbsp; return "DIRECT"; }&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; else if(shExpMatch(url, "&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://abc.org*"&gt;https://abc.org*&lt;/A&gt;&lt;SPAN&gt;"))&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;{ return "PROXY 192.168.10.10:8080"; }&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; else if(shExpMatch(url, "&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://xyz.com/*"&gt;http://xyz.com/*&lt;/A&gt;&lt;SPAN&gt;"))&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;{ return "PROXY 192.168.100.100:80"; }&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When some on tries to browse the url "&lt;SPAN style="font-size: 10pt;"&gt;&lt;A class="jive-link-external-small" href="http://group.cisco.com"&gt;http://group.cisco.com&lt;/A&gt;&lt;SPAN&gt;" the pac file shows this should be routed directly (by pass proxy which is refered as DIRECT on the pac file configuration)..&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Likewise when user access "&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;A class="jive-link-external-small" href="https://abc.org"&gt;https://abc.org&lt;/A&gt;&lt;SPAN&gt;" the traffic would be send to proxy server &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;192.168.10.10 on port 8080. Please be aware that there may be multiple proxy servers in some organizations. Likewise when user access url "&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://xyz.com/"&gt;http://xyz.com/&lt;/A&gt;&lt;SPAN&gt;" the traffic will be directed towards 192.168.100.100 on port 80.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To answer your question when user browse google.com (not only google any browser traffic) the traffic always goes to the PAC files. PAC file then determine where to forward this traffic depending on PAC file configuration. The PAC file determine where the traffic should be routed when a http or https request comes and that is the reason why few web sites will are not working with out the proxy pac.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Najaf&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Please rate when applicable or helpful !!!&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 08 May 2013 05:28:20 GMT</pubDate>
    <dc:creator>kcnajaf</dc:creator>
    <dc:date>2013-05-08T05:28:20Z</dc:date>
    <item>
      <title>How firewall work with proxy</title>
      <link>https://community.cisco.com/t5/network-security/how-firewall-work-with-proxy/m-p/2213761#M350639</link>
      <description>&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Hi Experts,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have cisco ASA to filter traffic for internet. We are using websense as proxy server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pl's suggest which ip ( Internal user Ip's or only Websense proxy ip ) I should allow on fireall for internet access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Surya&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:37:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-firewall-work-with-proxy/m-p/2213761#M350639</guid>
      <dc:creator>suryakant.chavan</dc:creator>
      <dc:date>2019-03-12T01:37:53Z</dc:date>
    </item>
    <item>
      <title>How firewall work with proxy</title>
      <link>https://community.cisco.com/t5/network-security/how-firewall-work-with-proxy/m-p/2213762#M350640</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Surya,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can integrate the websense with ASA. Check the below link from websense. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.websense.com/support/article/t-kbarticle/Configure-PIX-Firewall-ASA-for-Websense-Integration"&gt;http://www.websense.com/support/article/t-kbarticle/Configure-PIX-Firewall-ASA-for-Websense-Integration&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hth&lt;/P&gt;&lt;P&gt;MS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 May 2013 16:36:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-firewall-work-with-proxy/m-p/2213762#M350640</guid>
      <dc:creator>mvsheik123</dc:creator>
      <dc:date>2013-05-03T16:36:04Z</dc:date>
    </item>
    <item>
      <title>How firewall work with proxy</title>
      <link>https://community.cisco.com/t5/network-security/how-firewall-work-with-proxy/m-p/2213763#M350641</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Suryakant,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If Websense is acting as proxy so all connections would be proxied from its IP. So, ASA interface acl should allow traffic from proxy server IP and not the clients IP. Because if you allow clients IP to go out through ASA and if client finds a way to disable proxy in its browser that would defeat the purpose of having a proxy as client can go directly to internet w/o proxy. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With only proxy IP in ASA acl would ensure that client gets denied on ASA even if it finds a way to disable proxy in browser.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this answers your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-&lt;/P&gt;&lt;P&gt;Sourav&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 May 2013 19:42:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-firewall-work-with-proxy/m-p/2213763#M350641</guid>
      <dc:creator>sokakkar</dc:creator>
      <dc:date>2013-05-03T19:42:32Z</dc:date>
    </item>
    <item>
      <title>Re: How firewall work with proxy</title>
      <link>https://community.cisco.com/t5/network-security/how-firewall-work-with-proxy/m-p/2213764#M350642</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Sourav,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please explain me below line in more detail by giving an example ---&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If&amp;nbsp; Websense is acting as proxy so all connections would be proxied from its&amp;nbsp; IP. So, ASA interface acl should allow traffic from proxy server IP and&amp;nbsp; not the clients IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also when you say ASA interface ACL what does this ACL mean which interface in ASA we apply this ACL?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: mahesh parmar&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 05 May 2013 06:59:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-firewall-work-with-proxy/m-p/2213764#M350642</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-05-05T06:59:22Z</dc:date>
    </item>
    <item>
      <title>Re: How firewall work with proxy</title>
      <link>https://community.cisco.com/t5/network-security/how-firewall-work-with-proxy/m-p/2213765#M350643</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Mahesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We should apply acl on inside interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If traffic is udp base then we need to allow the traffic from both inside and outside interface, as there is no entry in state&amp;nbsp; table for upd traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks &lt;/P&gt;&lt;P&gt;Surya.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 May 2013 09:31:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-firewall-work-with-proxy/m-p/2213765#M350643</guid>
      <dc:creator>suryakant.chavan</dc:creator>
      <dc:date>2013-05-06T09:31:18Z</dc:date>
    </item>
    <item>
      <title>Re: How firewall work with proxy</title>
      <link>https://community.cisco.com/t5/network-security/how-firewall-work-with-proxy/m-p/2213766#M350644</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mahesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sure. Now, generally there would be a proxy server which will be used by clients to get to internet. Whenever a client sends a request to internet, it actually gets to the proxy server which in turn uses its IP to get to internet and get the requested site and then it delivers that to inside client, thus, essentially not allowing the client to be in direct contact with internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since all data flows through proxy now, wherein you can apply additional checks on data before delivering it to client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With all that said, proxy server attemps connection to internet on client system's behalf so it makes sense to allow traffic from proxy server IP. Consider this simple diagram:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside users--&amp;gt;Proxy Server--&amp;gt;(ASA inside/internal subnet facing interface)&lt;STRONG&gt;ASA&lt;/STRONG&gt;(outside/internet facing interface)--&amp;gt;Internet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, you can apply an access-list on inside interface of ASA to allow only specific traffic out from inside subnet. So, in this access-list you only need to allow proxy server IP to get to internet and deny the rest. If you allow the clients to access internet directly as well, it defeats the purpose of having a proxy coz clients will download content from internet which could be malicious.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In addition to that, proxy servers can also make your Internet access work more efficiently. If you access a page on a Web site, it is &lt;STRONG&gt;cached &lt;/STRONG&gt;(stored) on the proxy server. This means that the next time you go back&amp;nbsp; to that page, it normally doesn't have to load again from the Web site.&amp;nbsp; Instead it loads instantaneously from the proxy server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if that answers your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-&lt;/P&gt;&lt;P&gt;Sourav&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 May 2013 12:12:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-firewall-work-with-proxy/m-p/2213766#M350644</guid>
      <dc:creator>sokakkar</dc:creator>
      <dc:date>2013-05-06T12:12:25Z</dc:date>
    </item>
    <item>
      <title>Re: How firewall work with proxy</title>
      <link>https://community.cisco.com/t5/network-security/how-firewall-work-with-proxy/m-p/2213767#M350645</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also, we don't need to add access-list on outside even if traffic is UDP, ASA preserves state information for UDP as well so it allows replies by default. You need an access-list on outside only if you wish to allow some inbound service like you are hosting a web server or a terminal server etc. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-&lt;/P&gt;&lt;P&gt;Sourav&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 May 2013 12:13:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-firewall-work-with-proxy/m-p/2213767#M350645</guid>
      <dc:creator>sokakkar</dc:creator>
      <dc:date>2013-05-06T12:13:43Z</dc:date>
    </item>
    <item>
      <title>Re: How firewall work with proxy</title>
      <link>https://community.cisco.com/t5/network-security/how-firewall-work-with-proxy/m-p/2213768#M350646</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Sourav,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for confirming that ASA is Statefull FW as its remember both tcp/udp traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When on our internet browser we have specfied the location of PAC&amp;nbsp; file.&lt;/P&gt;&lt;P&gt;also if we have websense in the environmnet.&lt;/P&gt;&lt;P&gt;Then if user opens the internet site then how does traffic flow?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If user go to goole.com then browser points to the location of PAC file first or ASA?&lt;/P&gt;&lt;P&gt;i remember when my pc browser has no pc file location specficied i was unable to access certain websites when i put&lt;/P&gt;&lt;P&gt;the pac file location it allow me access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So do we have config some websites under pac file do those websites bypass the websense? or ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 May 2013 03:03:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-firewall-work-with-proxy/m-p/2213768#M350646</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-05-08T03:03:48Z</dc:date>
    </item>
    <item>
      <title>How firewall work with proxy</title>
      <link>https://community.cisco.com/t5/network-security/how-firewall-work-with-proxy/m-p/2213769#M350649</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mahesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PAC file define how your browser traffic is routed. There may be many entries in the pac file and you should be able to view your pac file by simply opening the path configured on you browser Internet setting using any browser. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A typical out of a PAC file will be as below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; if (shExpMatch(url, "&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://group.cisco.com*"&gt;http://group.cisco.com*&lt;/A&gt;&lt;SPAN&gt;"))&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;{&amp;nbsp; return "DIRECT"; }&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; else if(shExpMatch(url, "&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://abc.org*"&gt;https://abc.org*&lt;/A&gt;&lt;SPAN&gt;"))&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;{ return "PROXY 192.168.10.10:8080"; }&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; else if(shExpMatch(url, "&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://xyz.com/*"&gt;http://xyz.com/*&lt;/A&gt;&lt;SPAN&gt;"))&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;{ return "PROXY 192.168.100.100:80"; }&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When some on tries to browse the url "&lt;SPAN style="font-size: 10pt;"&gt;&lt;A class="jive-link-external-small" href="http://group.cisco.com"&gt;http://group.cisco.com&lt;/A&gt;&lt;SPAN&gt;" the pac file shows this should be routed directly (by pass proxy which is refered as DIRECT on the pac file configuration)..&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Likewise when user access "&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;A class="jive-link-external-small" href="https://abc.org"&gt;https://abc.org&lt;/A&gt;&lt;SPAN&gt;" the traffic would be send to proxy server &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;192.168.10.10 on port 8080. Please be aware that there may be multiple proxy servers in some organizations. Likewise when user access url "&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://xyz.com/"&gt;http://xyz.com/&lt;/A&gt;&lt;SPAN&gt;" the traffic will be directed towards 192.168.100.100 on port 80.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To answer your question when user browse google.com (not only google any browser traffic) the traffic always goes to the PAC files. PAC file then determine where to forward this traffic depending on PAC file configuration. The PAC file determine where the traffic should be routed when a http or https request comes and that is the reason why few web sites will are not working with out the proxy pac.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Najaf&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Please rate when applicable or helpful !!!&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 May 2013 05:28:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-firewall-work-with-proxy/m-p/2213769#M350649</guid>
      <dc:creator>kcnajaf</dc:creator>
      <dc:date>2013-05-08T05:28:20Z</dc:date>
    </item>
    <item>
      <title>How firewall work with proxy</title>
      <link>https://community.cisco.com/t5/network-security/how-firewall-work-with-proxy/m-p/2213770#M350652</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Najaf,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So How is PAC file linked to websense?&lt;/P&gt;&lt;P&gt;When traffic goes to PAC file does it also have configuration to redirect traffic to Websense or ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 May 2013 03:33:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-firewall-work-with-proxy/m-p/2213770#M350652</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-05-09T03:33:26Z</dc:date>
    </item>
    <item>
      <title>How firewall work with proxy</title>
      <link>https://community.cisco.com/t5/network-security/how-firewall-work-with-proxy/m-p/2213771#M350654</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mahesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The PAC file will have the information of the proxy server. It looks like in your case your are using the websense as you proxy server. On the sample configuration which i have shared you can see &lt;SPAN style="font-size: 10pt;"&gt; "return "PROXY x.x.x.x " where x.x.x.x is the proxy server ip address.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;You will have much understanding once you view your PAC file and co-relate with your proxy ip address.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Hope that helps.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Najaf&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;EM style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;Please rate when applicable or helpful !!!&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 May 2013 03:38:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-firewall-work-with-proxy/m-p/2213771#M350654</guid>
      <dc:creator>kcnajaf</dc:creator>
      <dc:date>2013-05-09T03:38:32Z</dc:date>
    </item>
    <item>
      <title>How firewall work with proxy</title>
      <link>https://community.cisco.com/t5/network-security/how-firewall-work-with-proxy/m-p/2213772#M350656</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Najaf,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks for explanation and replying to all the questions.&lt;/P&gt;&lt;P&gt;Seems i can not give any rating as this question is already answered.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&amp;nbsp; &lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 May 2013 03:47:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-firewall-work-with-proxy/m-p/2213772#M350656</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-05-09T03:47:14Z</dc:date>
    </item>
    <item>
      <title>How firewall work with proxy</title>
      <link>https://community.cisco.com/t5/network-security/how-firewall-work-with-proxy/m-p/2213773#M350658</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No problem mate..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Najaf&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 May 2013 03:54:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-firewall-work-with-proxy/m-p/2213773#M350658</guid>
      <dc:creator>kcnajaf</dc:creator>
      <dc:date>2013-05-09T03:54:36Z</dc:date>
    </item>
    <item>
      <title>Re: How firewall work with proxy</title>
      <link>https://community.cisco.com/t5/network-security/how-firewall-work-with-proxy/m-p/3892686#M350660</link>
      <description>&lt;P&gt;How to make rule in Asa for Direct connection.if pac is not used, users can browse internet at ease.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jul 2019 11:24:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-firewall-work-with-proxy/m-p/3892686#M350660</guid>
      <dc:creator>UgithaJayamanna3953</dc:creator>
      <dc:date>2019-07-18T11:24:24Z</dc:date>
    </item>
  </channel>
</rss>

