I have Zone Based Firewall running on a 2821 router and would like to configure Url Filtering with Websence . IOS running on that device is
c2800nm-adverterprisek9-mz.150-1.M7.bin . Once you have ZBF config you cant configure url-filtering using classic way ( ip inspect ) and this has to be done using class , policy maps .
For this to to happen it is required to have match protocol http command under the class map , it wont work using the match access-group command . Following is what I configured
ip access-list extended NAT
permit ip 172.20.0.0 0.0.255.255 any
class-map type inspect match-all Inside_to_Restrict
match access-group name NAT
match protocol http
Once I put match protocol http command browsing becomes dead slow , also without using match protocol command I cant continue to configure Url Filtering . Is this a problem related to IOS where match protocol command isnt working fine . I have checked CPU utlization of Router and it was roughly near 7 percent .
I could see debug messages on which means URL filtering was working but from user end it HTTP was almost dead and website was not opening up .
After doing a lot of troubleshooting I found out that it was a problem related to match protocol http command , when ever I put this command under the class-map HTTP sessions become dead slow . We had communication with someone working with web sense devices and got to know that one more customer had to scrap ZBF for web sense to work .
I cannot apply classic url filtering ( web sense ) which requires ip inspect as router's interfaces are already configured for Zones .
We have the same problem: for some websites HTTP response is very slow when using ZBF and Websense urlfilter (6-7 minutes for JPG of ~38Kbytes). If we remove the urlfilter config then the same website loads correctly at good speed.
When using the ip inspect firewall config and urlfilter we had the same problem until we added
access-list 1 permit any
ip inspect name test http java-list 1
With that piece of config on ip inspect the inspect http and URL filter works just fine but there does not seem to be an equivalent for ZBF.
Did you find a solution to use ZBF and not have that issue without rolling back to the IP inspect config ?
Once you've expanded Cisco Secure Endpoint connector deployment to about 50% of your licensed count (check out this article that shows you how to do that), it's time to put those connectors to action i.e. convert them to Protect from Audit mode for vari...
Hello! I’m Betsy, UX Researcher, on the Cisco+ Secure Connect Now team. Nice to meet you all .We have a short survey to learn about your Zero Trust Network Access (ZTNA) journey. Whether you have, plan to, or have not implemented a ...
A set of interface access rules can cause the Cisco Adaptive Security Appliance to permit or deny a designated host to access another particular host with a specific network application (service). When there is only one client, one host and one se...
How To: Cisco ISE Captive Portals with Aruba Wireless
Authors: Adam Hollifield, Brad Johnson
IntroductionPrerequisitesMinimum RequirementsComponents UsedConfigurationAruba Wireless ControllerWLAN CreationAuthentication ConfigurationRole & Policy Confi...
Ready to learn more about SecureX? Our Cisco security expert @Juan Ponce Dominguez reviews the features and benefits of SecureX, as well as a product demo covering:
Customising SecureX dashboards to create a single pane, unified visibility