<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Directing traffic through McAfee SmartFilter in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/directing-traffic-through-mcafee-smartfilter/m-p/1445864#M766635</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bo,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can configure url filtering on the ASA so that the request are first sent to the filtering server before it can be processed. The ASA supports N2H2 or websense for filtering. This can be configured as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am assuming that the ip address of the filtering server is 10.0.1.1 and it is located on the inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pB1_Body1"&gt;Using N2H2, the following example filters all outbound HTTP connections except those from the 10.0.2.20 host:&lt;/P&gt;&lt;A name="wp1409812"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;hostname(config)# &lt;STRONG class="cBold"&gt;url-server (inside) vendor n2h2 host 10.0.1.1
&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1409816"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;hostname(config)# &lt;STRONG class="cBold"&gt;filter url http 0 0 0 0
&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1409820"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;hostname(config)# &lt;STRONG class="cBold"&gt;filter url except 10.0.2.20 255.255.255.255 0 0
&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;DIV class="pPreformatted"&gt;&lt;PRE class="pPreformatted"&gt;&lt;A name="wp1409822"&gt;&lt;/A&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1409823"&gt;&lt;/A&gt;&lt;P class="pB1_Body1"&gt;Using Websense, the following example filters all outbound HTTP connections except those from the 10.0.2.20 host:&lt;/P&gt;&lt;A name="wp1409826"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;hostname(config)# &lt;STRONG class="cBold"&gt;url-server (inside) vendor websense host 10.0.1.1 protocol TCP 
version 4
&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1409830"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;hostname(config)# &lt;STRONG class="cBold"&gt;filter url http 0 0 0 0
&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1409834"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;hostname(config)# &lt;STRONG class="cBold"&gt;filter url except 10.0.2.20 255.255.255.255 0 0&lt;/STRONG&gt;&lt;/PRE&gt;&lt;PRE&gt;&lt;/PRE&gt;&lt;PRE&gt;&lt;STRONG class="cBold"&gt;If you want to filter https traffic also, then we would need the following as well&lt;/STRONG&gt;&lt;/PRE&gt;&lt;PRE&gt;&lt;/PRE&gt;&lt;PRE&gt;&lt;STRONG class="cBold"&gt;filter https 0 0 0 0 0&lt;/STRONG&gt;&lt;/PRE&gt;&lt;PRE&gt;&lt;/PRE&gt;&lt;PRE&gt;&lt;STRONG class="cBold"&gt;Also, it would be best to use the "allow" keyword at the end of the filter statements, so that if the filtering server goes down, the internet access is not lost, as follows:&lt;/STRONG&gt;&lt;/PRE&gt;&lt;PRE&gt;&lt;/PRE&gt;&lt;PRE&gt;&lt;STRONG class="cBold"&gt;filter url http 0 0 0 0 allow&lt;/STRONG&gt;&lt;/PRE&gt;&lt;PRE&gt;&lt;/PRE&gt;&lt;PRE&gt;&lt;STRONG class="cBold"&gt;HTH&lt;/STRONG&gt;&lt;/PRE&gt;&lt;PRE&gt;&lt;/PRE&gt;&lt;PRE&gt;&lt;STRONG class="cBold"&gt;Ashu
&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 27 Apr 2010 20:36:12 GMT</pubDate>
    <dc:creator>astripat</dc:creator>
    <dc:date>2010-04-27T20:36:12Z</dc:date>
    <item>
      <title>Directing traffic through McAfee SmartFilter</title>
      <link>https://community.cisco.com/t5/network-security/directing-traffic-through-mcafee-smartfilter/m-p/1445863#M766623</link>
      <description>&lt;P&gt;Hello All-&lt;/P&gt;&lt;P&gt;How can I configure my ASA or router to send the web traffic to McAfee smartfilter server before the user can browse the Internet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial; "&gt;I can get out to the internet bypassing the proxy.&amp;nbsp; Now the next step is to see how I get smartfilter working&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial; "&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial; "&gt;This is what I put on my router&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial; "&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial; "&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial; "&gt;ip nat inside source list NatAccessList interface Ethernet1 overload&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial; "&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial; "&gt;ip access-list extended NatAccessList&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial; "&gt; permit ip 10.0.0.0 0.255.255.255 any&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial; "&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial; "&gt;Interface e1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial; "&gt;Ip nat outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial; "&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial; "&gt;Interface e0&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial; "&gt;Ip nat inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial; "&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial; "&gt;Bo&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:37:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/directing-traffic-through-mcafee-smartfilter/m-p/1445863#M766623</guid>
      <dc:creator>bghobadi2</dc:creator>
      <dc:date>2019-03-11T17:37:57Z</dc:date>
    </item>
    <item>
      <title>Re: Directing traffic through McAfee SmartFilter</title>
      <link>https://community.cisco.com/t5/network-security/directing-traffic-through-mcafee-smartfilter/m-p/1445864#M766635</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bo,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can configure url filtering on the ASA so that the request are first sent to the filtering server before it can be processed. The ASA supports N2H2 or websense for filtering. This can be configured as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am assuming that the ip address of the filtering server is 10.0.1.1 and it is located on the inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pB1_Body1"&gt;Using N2H2, the following example filters all outbound HTTP connections except those from the 10.0.2.20 host:&lt;/P&gt;&lt;A name="wp1409812"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;hostname(config)# &lt;STRONG class="cBold"&gt;url-server (inside) vendor n2h2 host 10.0.1.1
&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1409816"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;hostname(config)# &lt;STRONG class="cBold"&gt;filter url http 0 0 0 0
&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1409820"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;hostname(config)# &lt;STRONG class="cBold"&gt;filter url except 10.0.2.20 255.255.255.255 0 0
&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;DIV class="pPreformatted"&gt;&lt;PRE class="pPreformatted"&gt;&lt;A name="wp1409822"&gt;&lt;/A&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1409823"&gt;&lt;/A&gt;&lt;P class="pB1_Body1"&gt;Using Websense, the following example filters all outbound HTTP connections except those from the 10.0.2.20 host:&lt;/P&gt;&lt;A name="wp1409826"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;hostname(config)# &lt;STRONG class="cBold"&gt;url-server (inside) vendor websense host 10.0.1.1 protocol TCP 
version 4
&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1409830"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;hostname(config)# &lt;STRONG class="cBold"&gt;filter url http 0 0 0 0
&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1409834"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;hostname(config)# &lt;STRONG class="cBold"&gt;filter url except 10.0.2.20 255.255.255.255 0 0&lt;/STRONG&gt;&lt;/PRE&gt;&lt;PRE&gt;&lt;/PRE&gt;&lt;PRE&gt;&lt;STRONG class="cBold"&gt;If you want to filter https traffic also, then we would need the following as well&lt;/STRONG&gt;&lt;/PRE&gt;&lt;PRE&gt;&lt;/PRE&gt;&lt;PRE&gt;&lt;STRONG class="cBold"&gt;filter https 0 0 0 0 0&lt;/STRONG&gt;&lt;/PRE&gt;&lt;PRE&gt;&lt;/PRE&gt;&lt;PRE&gt;&lt;STRONG class="cBold"&gt;Also, it would be best to use the "allow" keyword at the end of the filter statements, so that if the filtering server goes down, the internet access is not lost, as follows:&lt;/STRONG&gt;&lt;/PRE&gt;&lt;PRE&gt;&lt;/PRE&gt;&lt;PRE&gt;&lt;STRONG class="cBold"&gt;filter url http 0 0 0 0 allow&lt;/STRONG&gt;&lt;/PRE&gt;&lt;PRE&gt;&lt;/PRE&gt;&lt;PRE&gt;&lt;STRONG class="cBold"&gt;HTH&lt;/STRONG&gt;&lt;/PRE&gt;&lt;PRE&gt;&lt;/PRE&gt;&lt;PRE&gt;&lt;STRONG class="cBold"&gt;Ashu
&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Apr 2010 20:36:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/directing-traffic-through-mcafee-smartfilter/m-p/1445864#M766635</guid>
      <dc:creator>astripat</dc:creator>
      <dc:date>2010-04-27T20:36:12Z</dc:date>
    </item>
    <item>
      <title>Re: Directing traffic through McAfee SmartFilter</title>
      <link>https://community.cisco.com/t5/network-security/directing-traffic-through-mcafee-smartfilter/m-p/1445865#M766645</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Ashu,&lt;/P&gt;&lt;P&gt;I will get it try.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Apr 2010 12:55:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/directing-traffic-through-mcafee-smartfilter/m-p/1445865#M766645</guid>
      <dc:creator>bghobadi2</dc:creator>
      <dc:date>2010-04-28T12:55:22Z</dc:date>
    </item>
  </channel>
</rss>

