<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic wccp re-positioning on a network. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/wccp-re-positioning-on-a-network/m-p/1313431#M786740</link>
    <description>&lt;P&gt;We need some help in a discussion we are having about wccp and where it needs to be to work right. Also note that I have never done WCCP on the ASA yet so not sure if this will work. Here is the concept. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I-----RTR------ASA------CVPN3030&lt;/P&gt;&lt;P&gt;			--- DMZ&lt;/P&gt;&lt;P&gt;			--- DMZ2&lt;/P&gt;&lt;P&gt;			--- Inside&lt;/P&gt;&lt;P&gt;Above is our current layout. Wccp resides internally on the inside interface on a router just after the ASA inside interface. It works fine for users on the inside network but misses the VPN users terminated on the ASA /3030 outside interface. Thus the problem at hand. WCCP misses these users because they validate the tunnel and then just go right out to the internet. &lt;/P&gt;&lt;P&gt;SO here are the solutions we have come up with,so far. Nothing in stone.&lt;/P&gt;&lt;P&gt;I----RTR---SW---ASA--- CVPN3030&lt;/P&gt;&lt;P&gt;This is the classical way that I can think of that will work placing the wccp at the new switch with an outside interface. This places the wccp server in harms way to be hacked, but will catch the VPN users. There is one other option but not sure it will work and this is where I need help.&lt;/P&gt;&lt;P&gt; I---RTR---ASA---MRG &lt;/P&gt;&lt;P&gt;Could I do the url redirect to this port on the firewall, catch the vpn users, and the users inside too? and then people can go out to the internet? This will semi protect the wccp server too right? Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 16:32:09 GMT</pubDate>
    <dc:creator>st9n6ow77</dc:creator>
    <dc:date>2019-03-11T16:32:09Z</dc:date>
    <item>
      <title>wccp re-positioning on a network.</title>
      <link>https://community.cisco.com/t5/network-security/wccp-re-positioning-on-a-network/m-p/1313431#M786740</link>
      <description>&lt;P&gt;We need some help in a discussion we are having about wccp and where it needs to be to work right. Also note that I have never done WCCP on the ASA yet so not sure if this will work. Here is the concept. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I-----RTR------ASA------CVPN3030&lt;/P&gt;&lt;P&gt;			--- DMZ&lt;/P&gt;&lt;P&gt;			--- DMZ2&lt;/P&gt;&lt;P&gt;			--- Inside&lt;/P&gt;&lt;P&gt;Above is our current layout. Wccp resides internally on the inside interface on a router just after the ASA inside interface. It works fine for users on the inside network but misses the VPN users terminated on the ASA /3030 outside interface. Thus the problem at hand. WCCP misses these users because they validate the tunnel and then just go right out to the internet. &lt;/P&gt;&lt;P&gt;SO here are the solutions we have come up with,so far. Nothing in stone.&lt;/P&gt;&lt;P&gt;I----RTR---SW---ASA--- CVPN3030&lt;/P&gt;&lt;P&gt;This is the classical way that I can think of that will work placing the wccp at the new switch with an outside interface. This places the wccp server in harms way to be hacked, but will catch the VPN users. There is one other option but not sure it will work and this is where I need help.&lt;/P&gt;&lt;P&gt; I---RTR---ASA---MRG &lt;/P&gt;&lt;P&gt;Could I do the url redirect to this port on the firewall, catch the vpn users, and the users inside too? and then people can go out to the internet? This will semi protect the wccp server too right? Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:32:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wccp-re-positioning-on-a-network/m-p/1313431#M786740</guid>
      <dc:creator>st9n6ow77</dc:creator>
      <dc:date>2019-03-11T16:32:09Z</dc:date>
    </item>
    <item>
      <title>Re: wccp re-positioning on a network.</title>
      <link>https://community.cisco.com/t5/network-security/wccp-re-positioning-on-a-network/m-p/1313432#M786766</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can configure wccp on the ASA and this WILL cover the users who U-Turn off the ASA and go out to the internet in addition to all the users who are already on the inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;WCCP---(inside)ASA(ouside)---Internet--VPN_clients.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the documentation link to configure WCCP on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/dhcp.html#wp1094628" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/dhcp.html#wp1094628&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Oct 2009 03:56:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wccp-re-positioning-on-a-network/m-p/1313432#M786766</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2009-10-28T03:56:52Z</dc:date>
    </item>
  </channel>
</rss>

