<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco cloud base firewall/ScanSafe in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-cloud-base-firewall-scansafe/m-p/1970664#M410178</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our organization uses a Cisco cloud based firewall/ScanSafe for internet access/content filter.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We moved away from the previous method of an ISA Firewall using pac files.&lt;/P&gt;&lt;P&gt;In the old system we had AD security groups to grant access to the ISA.&amp;nbsp; With the current Cisco solution the internet is wide open and we trust ScanSafe as secure content filter.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The issue I am now running into is that I now have employees that should not have internet access at all (and didn't under the old system) that now have discovered that they do in fact have internet access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to find a solution to this from a client side (hopefully to be implemented as&amp;nbsp; GPO)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We only use internet explorer as our browser.&amp;nbsp; As long as I have the "Automatically detect settings" selected nothing else I do will matter, and they get full internet access.&lt;/P&gt;&lt;P&gt;I have tried setting up a proxy server and setting it to 127.0.0.1 but I either succesfully deny internet access, but it will also deny intranet access, which I can not do because all of there time card/HR/company news is all web based.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So the question is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anybody know of any client side settings that will deny internet access but still allow local intranet access?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 23:32:13 GMT</pubDate>
    <dc:creator>kmonagatos</dc:creator>
    <dc:date>2019-03-11T23:32:13Z</dc:date>
    <item>
      <title>Cisco cloud base firewall/ScanSafe</title>
      <link>https://community.cisco.com/t5/network-security/cisco-cloud-base-firewall-scansafe/m-p/1970664#M410178</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our organization uses a Cisco cloud based firewall/ScanSafe for internet access/content filter.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We moved away from the previous method of an ISA Firewall using pac files.&lt;/P&gt;&lt;P&gt;In the old system we had AD security groups to grant access to the ISA.&amp;nbsp; With the current Cisco solution the internet is wide open and we trust ScanSafe as secure content filter.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The issue I am now running into is that I now have employees that should not have internet access at all (and didn't under the old system) that now have discovered that they do in fact have internet access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to find a solution to this from a client side (hopefully to be implemented as&amp;nbsp; GPO)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We only use internet explorer as our browser.&amp;nbsp; As long as I have the "Automatically detect settings" selected nothing else I do will matter, and they get full internet access.&lt;/P&gt;&lt;P&gt;I have tried setting up a proxy server and setting it to 127.0.0.1 but I either succesfully deny internet access, but it will also deny intranet access, which I can not do because all of there time card/HR/company news is all web based.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So the question is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anybody know of any client side settings that will deny internet access but still allow local intranet access?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:32:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-cloud-base-firewall-scansafe/m-p/1970664#M410178</guid>
      <dc:creator>kmonagatos</dc:creator>
      <dc:date>2019-03-11T23:32:13Z</dc:date>
    </item>
    <item>
      <title>Cisco cloud base firewall/ScanSafe</title>
      <link>https://community.cisco.com/t5/network-security/cisco-cloud-base-firewall-scansafe/m-p/1970665#M410179</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How do you redirect your internet traffic towards the Cisco ScanSafe cloud?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are a few methods you can use, but please kindly advise how you redirect and we can assist accordingly.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jul 2012 06:16:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-cloud-base-firewall-scansafe/m-p/1970665#M410179</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-07-18T06:16:32Z</dc:date>
    </item>
    <item>
      <title>Cisco cloud base firewall/ScanSafe</title>
      <link>https://community.cisco.com/t5/network-security/cisco-cloud-base-firewall-scansafe/m-p/1970666#M410180</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; From a client side we just set the computers to "Automatically detect settings" no other configuration is needed.&lt;/P&gt;&lt;P&gt;Our internet traffice is basically open, it is just scanned by Cisco's ScanSafe content filter (and antivirus/malware)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm the client side engineer, the infrastructure is handled by a seperate company.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jul 2012 14:31:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-cloud-base-firewall-scansafe/m-p/1970666#M410180</guid>
      <dc:creator>kmonagatos</dc:creator>
      <dc:date>2012-07-18T14:31:24Z</dc:date>
    </item>
    <item>
      <title>Cisco cloud base firewall/ScanSafe</title>
      <link>https://community.cisco.com/t5/network-security/cisco-cloud-base-firewall-scansafe/m-p/1970667#M410181</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If the client side is set to "Automatically detect settings", most probably PAC file is being used.&lt;/P&gt;&lt;P&gt;If you have user granularity implemented for your ScanSafe solution, then you can configure Rule under the ScanSafe portal to block internet access for certain group/users. This is settings to be configured under Scansafe solution.&lt;/P&gt;&lt;P&gt;Alternatively, if those users have specific ip address and/or connected to a specific subnet, then you can configure those filtering under your router/firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Other solution would be to remove default gateway on the client's PC, and just have static route configured to access internal resources/intranet. This will ensure that they don't have access to the internet since there is no default gateway.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jul 2012 14:40:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-cloud-base-firewall-scansafe/m-p/1970667#M410181</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-07-18T14:40:09Z</dc:date>
    </item>
  </channel>
</rss>

