<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA with CSC-SSM in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-with-csc-ssm/m-p/540571#M423605</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry Lorenz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did not answer your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can filter and block URLs using the CSC-SSM. But the blocking feature is only globally for all traffic which will be passed into the CSC using the modular policy framework on the ASA like described in my other post. Websense/N2H2 is a step more than the filtering using a CSC module. It provides a possibility to filter user based. Example: a standard user has no rights to open a website like ebay.com but the managers can open it. That config is not possible using CSC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you can live with a globally defined filtering rule for all users the CSC is right for you. If you use a more complex filtering you should use Websense/N2H2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But in the Websense/N2H2 case you have to use a Server in conjunction with your ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But there are although the other nice features of a CSC-SSM.&lt;/P&gt;&lt;P&gt;- Antivirus&lt;/P&gt;&lt;P&gt;- Antispam&lt;/P&gt;&lt;P&gt;- Antispy&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope i could help you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Greets Patrik&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 21 Dec 2006 07:33:15 GMT</pubDate>
    <dc:creator>Patrik Bolt</dc:creator>
    <dc:date>2006-12-21T07:33:15Z</dc:date>
    <item>
      <title>ASA with CSC-SSM</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-csc-ssm/m-p/540566#M423599</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a ASA 5510 with a CSC-SSM and i have special question concerning the CSC features.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like to use a different set of CSC features for two types of traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;gt; Standard Workplaces (Source Subnet 1), URL blocking, threath/virus protection&lt;/P&gt;&lt;P&gt;--&amp;gt; Management Workplaces (Source Subnet 2), only threath/virus protection&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can that configured like that?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I didn't find any possibility. Because the CSC is like a blackbox in that the the features can enabled/disaled only globally. I pass the traffic to the CSC based on a ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anybody know if there is a solution for that?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks Patrik Bolt&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 09:07:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-csc-ssm/m-p/540566#M423599</guid>
      <dc:creator>patrick.bolt</dc:creator>
      <dc:date>2020-02-21T09:07:51Z</dc:date>
    </item>
    <item>
      <title>Re: ASA with CSC-SSM</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-csc-ssm/m-p/540567#M423601</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you purchased the Plus level of the CSC SSM license in addition to the Base License, you can also:&lt;/P&gt;&lt;P&gt;Reduce spam and protect against phishing fraud in your SMTP and POP3 traffic&lt;/P&gt;&lt;P&gt;Set up content filters that enable you to allow or prohibit email traffic containing key words or phrases&lt;/P&gt;&lt;P&gt;Block URLs that you do not want employees to access, or URLs that are known to have hidden or malicious purposes&lt;/P&gt;&lt;P&gt;Filter URL traffic according to predefined categories that you allow/disallow, such as adult/mature content, games, chat/instant messaging, or gambling sites.&lt;/P&gt;&lt;P&gt;With Trend Micro InterScan for Cisco CSC SSM, you do not have to install separate applications for virus protection, spyware blocking, spam detection, or content filtering?all of these functions are available in a single package. Trend Micro InterScan for Cisco CSC SSM provides protection for major traffic protocols?SMTP, HTTP, and FTP, as well as POP3 traffic, to ensure that employees don't accidentally introduce viruses from their personal email accounts. And, the application is easy to maintain. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Aug 2006 13:21:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-csc-ssm/m-p/540567#M423601</guid>
      <dc:creator>wong34539</dc:creator>
      <dc:date>2006-08-29T13:21:27Z</dc:date>
    </item>
    <item>
      <title>Re: ASA with CSC-SSM</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-csc-ssm/m-p/540568#M423602</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks. But that was not my question. I know the features of CSC-SSM with plus license. The goal is to differentiate between different source traffic types and apply a URL blocker or not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After intense reading of the technical references i know that Websense / N2H2 is the solution for my goal.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Greets Patrik&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Aug 2006 10:08:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-csc-ssm/m-p/540568#M423602</guid>
      <dc:creator>patrick.bolt</dc:creator>
      <dc:date>2006-08-30T10:08:13Z</dc:date>
    </item>
    <item>
      <title>Re: ASA with CSC-SSM</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-csc-ssm/m-p/540569#M423603</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am currently working on a ASA5520 with CSC SSM on it. Im trying to test URL blocking, but Im not sucessful. Is it absolutely necessary to have Websense or N2H2 to successfully filter or block URLs? I want to know if ASA CSC SSM can to the URL blocking by itself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lorenz&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Dec 2006 06:23:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-csc-ssm/m-p/540569#M423603</guid>
      <dc:creator>l.tating</dc:creator>
      <dc:date>2006-12-21T06:23:59Z</dc:date>
    </item>
    <item>
      <title>Re: ASA with CSC-SSM</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-csc-ssm/m-p/540570#M423604</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Lorenz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are different things to configure when using CSC-SSM. first the CSC module must have a LAN connection with a dedicated cable and a own IP Adddress. Second you have to define the traffic which must be passed to the CSC. Third you must configure the CSC itself (webfrontend on the CSC IP).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below you can see my CSC config. I pass only traffic defined in the ACL's to the CSC module. You can althoug use the default-class if you like.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The key part used is the modular policy framework.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you read that, you have a real understanding of the stuff &lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_guide_book09186a008054c15c.html" target="_blank"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_guide_book09186a008054c15c.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Greetz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Patrik&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list csc_out extended permit tcp LAN 255.255.252.0 any eq www&lt;/P&gt;&lt;P&gt;access-list csc_out extended permit tcp LAN 255.255.252.0 any eq smtp&lt;/P&gt;&lt;P&gt;access-list csc_out extended permit tcp LAN 255.255.252.0 any eq ftp&lt;/P&gt;&lt;P&gt;access-list csc_in extended permit tcp any PUBLIC 255.255.255.192 eq www&lt;/P&gt;&lt;P&gt;access-list csc_in extended permit tcp any PUBLIC 255.255.255.192 eq smtp inactive&lt;/P&gt;&lt;P&gt;access-list csc_in extended permit tcp any PUBLIC 255.255.255.192 eq pop3 inactive&lt;/P&gt;&lt;P&gt;access-list csc_in extended permit tcp any PUBLIC 255.255.255.192 eq ftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;' which traffic&lt;/P&gt;&lt;P&gt;class-map global-class&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;class-map csc_in_class&lt;/P&gt;&lt;P&gt; match access-list csc_in&lt;/P&gt;&lt;P&gt;class-map csc_out_class&lt;/P&gt;&lt;P&gt; match access-list csc_out&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;' what happens to the traffic&lt;/P&gt;&lt;P&gt;policy-map csc_out_policy&lt;/P&gt;&lt;P&gt; description Outbound Traffic Policy&lt;/P&gt;&lt;P&gt; class csc_out_class&lt;/P&gt;&lt;P&gt;  csc fail-open&lt;/P&gt;&lt;P&gt;policy-map global-policy&lt;/P&gt;&lt;P&gt; class global-class&lt;/P&gt;&lt;P&gt;  inspect sqlnet&lt;/P&gt;&lt;P&gt;  inspect netbios&lt;/P&gt;&lt;P&gt;  inspect pptp&lt;/P&gt;&lt;P&gt;  inspect ftp&lt;/P&gt;&lt;P&gt;  inspect dns&lt;/P&gt;&lt;P&gt;  inspect icmp error&lt;/P&gt;&lt;P&gt;  inspect icmp&lt;/P&gt;&lt;P&gt;policy-map csc_in_policy&lt;/P&gt;&lt;P&gt; description Inbound Traffic Policy&lt;/P&gt;&lt;P&gt; class csc_in_class&lt;/P&gt;&lt;P&gt;  csc fail-open&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;' bind the policy to an interface&lt;/P&gt;&lt;P&gt;service-policy global-policy global&lt;/P&gt;&lt;P&gt;service-policy csc_in_policy interface outside&lt;/P&gt;&lt;P&gt;service-policy csc_out_policy interface inside&lt;/P&gt;&lt;P&gt;service-policy csc_out_policy interface dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Dec 2006 07:20:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-csc-ssm/m-p/540570#M423604</guid>
      <dc:creator>Patrik Bolt</dc:creator>
      <dc:date>2006-12-21T07:20:58Z</dc:date>
    </item>
    <item>
      <title>Re: ASA with CSC-SSM</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-csc-ssm/m-p/540571#M423605</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry Lorenz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did not answer your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can filter and block URLs using the CSC-SSM. But the blocking feature is only globally for all traffic which will be passed into the CSC using the modular policy framework on the ASA like described in my other post. Websense/N2H2 is a step more than the filtering using a CSC module. It provides a possibility to filter user based. Example: a standard user has no rights to open a website like ebay.com but the managers can open it. That config is not possible using CSC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you can live with a globally defined filtering rule for all users the CSC is right for you. If you use a more complex filtering you should use Websense/N2H2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But in the Websense/N2H2 case you have to use a Server in conjunction with your ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But there are although the other nice features of a CSC-SSM.&lt;/P&gt;&lt;P&gt;- Antivirus&lt;/P&gt;&lt;P&gt;- Antispam&lt;/P&gt;&lt;P&gt;- Antispy&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope i could help you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Greets Patrik&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Dec 2006 07:33:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-csc-ssm/m-p/540571#M423605</guid>
      <dc:creator>Patrik Bolt</dc:creator>
      <dc:date>2006-12-21T07:33:15Z</dc:date>
    </item>
    <item>
      <title>Re: ASA with CSC-SSM</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-csc-ssm/m-p/540572#M423606</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Patrick,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for the CLI configuration hints. Have you configured URL blocking without the use of N2H2 or Websense? I know blocking URL one by one is a quite cumbersome task, but for simplicity I want to know if it can be done on the ASA box alone. Were you successful in doing the blocking by the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You responses are greatly appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lorenz&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Dec 2006 07:33:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-csc-ssm/m-p/540572#M423606</guid>
      <dc:creator>l.tating</dc:creator>
      <dc:date>2006-12-21T07:33:57Z</dc:date>
    </item>
    <item>
      <title>Re: ASA with CSC-SSM</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-csc-ssm/m-p/540573#M423607</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Patrik,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looks like our email missed each other. I will try again to reconfigure the ASA and set the modular policies carefully. By the way, Im using 7.2.1 for the Main System and CSC-SSM-10 for the CSC. my ASDM is 5.2.1. I will let you know immediately the result of my tests. Maybe within an hour.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lorenz&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Dec 2006 07:39:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-csc-ssm/m-p/540573#M423607</guid>
      <dc:creator>l.tating</dc:creator>
      <dc:date>2006-12-21T07:39:32Z</dc:date>
    </item>
    <item>
      <title>Re: ASA with CSC-SSM</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-csc-ssm/m-p/540574#M423608</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Lorenz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, the ASA does the URL blocking alone without any Websense or N2H2 Server. And it works well in my network since some months.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Patrik&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Dec 2006 08:33:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-csc-ssm/m-p/540574#M423608</guid>
      <dc:creator>Patrik Bolt</dc:creator>
      <dc:date>2006-12-21T08:33:19Z</dc:date>
    </item>
    <item>
      <title>Re: ASA with CSC-SSM</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-csc-ssm/m-p/540575#M423609</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Patrik,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The license needs to be updated and hence the CSC to be activated. I will get back when there are results probably after Dec.26. we will have our vacation quite long weekend here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your time.&lt;/P&gt;&lt;P&gt;Lorenz&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Dec 2006 08:49:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-csc-ssm/m-p/540575#M423609</guid>
      <dc:creator>l.tating</dc:creator>
      <dc:date>2006-12-22T08:49:52Z</dc:date>
    </item>
    <item>
      <title>Re: ASA with CSC-SSM</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-csc-ssm/m-p/540576#M423610</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Lorenz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If it helps. I have the ASA with a CSC-SSM and these additional licenses.&lt;/P&gt;&lt;P&gt;- CSC-SSM User Upgrade&lt;/P&gt;&lt;P&gt;- CSC-SSM Plus License (URL blocking, Anti phisihing ...)&lt;/P&gt;&lt;P&gt;- ASA Security Plus (if you need multiple contexts or failover ..)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nice holidays&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Greets from Switzerland Patrik&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Dec 2006 09:11:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-csc-ssm/m-p/540576#M423610</guid>
      <dc:creator>Patrik Bolt</dc:creator>
      <dc:date>2006-12-22T09:11:00Z</dc:date>
    </item>
    <item>
      <title>Re: ASA with CSC-SSM</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-csc-ssm/m-p/540577#M423611</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Patrik,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Happy New Year 2007!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Im still waiting for one of our group responsible for communicating license matters to Cisco. If I can get the CSC-SSM Plus activated, I can get back to you as soon as possible, and hopefully get same results as you have. For the mean time, im also working on other features of the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Lorenz&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Jan 2007 02:58:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-csc-ssm/m-p/540577#M423611</guid>
      <dc:creator>l.tating</dc:creator>
      <dc:date>2007-01-03T02:58:54Z</dc:date>
    </item>
  </channel>
</rss>

