<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Centralized Content Filtering with ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/centralized-content-filtering-with-asa/m-p/1520166#M417331</link>
    <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was wondering whether it is feasible to install one ASA with CSC-SSM-20 module and licence for 500 users in HQ, enable it to talk with Microsoft AD and funcion as a proxy for Content Filtering for remote sites and mobile users. Basically what we what to achieve is the users in remote sites authenticate with AD over VPN and before going out to surfe web throught their local ISP would need go through content filtering in the HQ on ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In that case all the Internet traffic from remote site would need to go out through the ISP in HQ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another solution is to implement Content Filtering with TrendMicro on 800 routers in each site but the license wise it would be very expensive for 60+ sites.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for any suggestions.&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 12:09:35 GMT</pubDate>
    <dc:creator>remi-reszka</dc:creator>
    <dc:date>2020-02-21T12:09:35Z</dc:date>
    <item>
      <title>Centralized Content Filtering with ASA</title>
      <link>https://community.cisco.com/t5/network-security/centralized-content-filtering-with-asa/m-p/1520166#M417331</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was wondering whether it is feasible to install one ASA with CSC-SSM-20 module and licence for 500 users in HQ, enable it to talk with Microsoft AD and funcion as a proxy for Content Filtering for remote sites and mobile users. Basically what we what to achieve is the users in remote sites authenticate with AD over VPN and before going out to surfe web throught their local ISP would need go through content filtering in the HQ on ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In that case all the Internet traffic from remote site would need to go out through the ISP in HQ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another solution is to implement Content Filtering with TrendMicro on 800 routers in each site but the license wise it would be very expensive for 60+ sites.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for any suggestions.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 12:09:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/centralized-content-filtering-with-asa/m-p/1520166#M417331</guid>
      <dc:creator>remi-reszka</dc:creator>
      <dc:date>2020-02-21T12:09:35Z</dc:date>
    </item>
    <item>
      <title>Re: Centralized Content Filtering with ASA</title>
      <link>https://community.cisco.com/t5/network-security/centralized-content-filtering-with-asa/m-p/1520167#M417332</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So from what you are saying you will have the ASA terminate your VPN for remote users and then you want the ASA with its CSC to do URL filtering based on AD. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well that would work only if all your web traffic from your users was hitting the ASA (U-turning it). If you are doing split tunneling for web it will not work because the ASA doesn't see the browsing traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it makes sense.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Nov 2010 20:02:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/centralized-content-filtering-with-asa/m-p/1520167#M417332</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-11-16T20:02:52Z</dc:date>
    </item>
    <item>
      <title>Re: Centralized Content Filtering with ASA</title>
      <link>https://community.cisco.com/t5/network-security/centralized-content-filtering-with-asa/m-p/1520168#M417333</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It makes sense. All the web traffic from the remote office will need to go through ASA in HQ to take full advantage of CSC. Thanks very much for your input, I am going to reward you with some points.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Nov 2010 21:16:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/centralized-content-filtering-with-asa/m-p/1520168#M417333</guid>
      <dc:creator>remi-reszka</dc:creator>
      <dc:date>2010-11-16T21:16:24Z</dc:date>
    </item>
    <item>
      <title>Re: Centralized Content Filtering with ASA</title>
      <link>https://community.cisco.com/t5/network-security/centralized-content-filtering-with-asa/m-p/1520169#M417334</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Haha, thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Good luck setting it up,&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Nov 2010 21:37:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/centralized-content-filtering-with-asa/m-p/1520169#M417334</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-11-16T21:37:28Z</dc:date>
    </item>
  </channel>
</rss>

