<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: A Simple Question about Cut Through Proxy in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/a-simple-question-about-cut-through-proxy/m-p/1610344#M569112</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Scott,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The cut through proxy feature creates an authenticated session between the source IP address and the authenticated username. Therefore, if one user logs in to the Citrix server and successfully authenticates, all connections from that server's IP address will be considered authenticated as well. You can see these sessions in the 'show uauth' output on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 24 Jan 2011 16:40:29 GMT</pubDate>
    <dc:creator>mirober2</dc:creator>
    <dc:date>2011-01-24T16:40:29Z</dc:date>
    <item>
      <title>A Simple Question about Cut Through Proxy</title>
      <link>https://community.cisco.com/t5/network-security/a-simple-question-about-cut-through-proxy/m-p/1610343#M569111</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;We are looking at using Cut Through Proxy authentication, but I have a question about shared computers, ie Citrix. How does the firewall open up access once the user is authenticated? Is it by host MAC address, in which case would open up the Citrix server to have the same access as the user which authenticated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If anyone can shed some light on this it would be appreciatd.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Scott&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:38:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/a-simple-question-about-cut-through-proxy/m-p/1610343#M569111</guid>
      <dc:creator>tdhb..hiq</dc:creator>
      <dc:date>2019-03-11T19:38:58Z</dc:date>
    </item>
    <item>
      <title>Re: A Simple Question about Cut Through Proxy</title>
      <link>https://community.cisco.com/t5/network-security/a-simple-question-about-cut-through-proxy/m-p/1610344#M569112</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Scott,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The cut through proxy feature creates an authenticated session between the source IP address and the authenticated username. Therefore, if one user logs in to the Citrix server and successfully authenticates, all connections from that server's IP address will be considered authenticated as well. You can see these sessions in the 'show uauth' output on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Jan 2011 16:40:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/a-simple-question-about-cut-through-proxy/m-p/1610344#M569112</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2011-01-24T16:40:29Z</dc:date>
    </item>
    <item>
      <title>Re: A Simple Question about Cut Through Proxy</title>
      <link>https://community.cisco.com/t5/network-security/a-simple-question-about-cut-through-proxy/m-p/1610345#M569113</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Mike.&lt;/P&gt;&lt;P&gt;I thought something like that would be the case, but I could not find in the Cisco docs.&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;Scott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Jan 2011 19:32:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/a-simple-question-about-cut-through-proxy/m-p/1610345#M569113</guid>
      <dc:creator>tdhb..hiq</dc:creator>
      <dc:date>2011-01-24T19:32:21Z</dc:date>
    </item>
  </channel>
</rss>

