Go to the table of contents Go to the previous page Go to the next page
Integrating Web Security with Cisco > Cisco integration configuration procedure
Cisco integration configuration procedure
Deployment and Installation Center | Web Security Solutions | Version 7.7.x
 
Configuration procedure
To configure your security appliance to send Internet requests to Websense software for filtering:
1.
2.
3.
Enter enable, followed by the enable password to put the security appliance into privileged EXEC mode.
4.
Enter configure terminal to activate configure mode.
 
Note 
For help with individual commands, enter help followed by the command. For example, help filter shows the complete syntax for the filter command and explains each option.
5.
Use the url-server command to enable URL filtering by Websense software.
url-server (<if_name>) vendor websense host <ip_address> [timeout <seconds>] [protocol {TCP | UDP} version {1 | 4} [connections <num_conns>]]
The url-server command takes the following parameters:
In v6.3.1 and earlier, <if_name> defaults to inside if not specified.
TCP is the recommended and default setting. The recommended protocol version is 4. The default is 1. (Note: To send authenticated user information to Filtering Service, TCP version 4 must be selected.)
If this parameter is not specified, it defaults to 5, which is the recommended setting.
Example:
url-server (inside) vendor websense host 10.255.40.164 timeout 30 protocol TCP version 4 connections 5
The url-server command communicates the location of Filtering Service to the Cisco security appliance. More than one url-server command can be entered. Multiple commands allow redirection to another Filtering Service after the specified timeout period, if the first server becomes unavailable.
6.
*
To review the current URL server rules, enter show running-config url-server (v7.0) or show url-server (v6.3).
*
To review all the filter rules, enter show running-config filter (v7.0) or show filter (v6.3).
To configure HTTP request filtering, use the following command:
filter url http <port>[-<port>] <local_ip> <local_mask> <foreign_ip> <foreign_mask> [allow] [cgi-truncate] [longurl-truncate | longurl-deny] [proxy-block]
For an explanation of the filter url parameters, see Parameters for the filter commands.
Examples:
 
Using zeroes for the last two entries, <foreign_ip> and <foreign_mask>, allows access from the specified local IP address to all Web sites, as filtered by Websense software
You can enter multiple filter url commands to set up different portions of the network for filtering. Set up the smaller groups first, followed by the larger groups, to assure that all groups are filtered properly. Use a general filter url command for all computers to be filtered, and then use TRITON - Web Security to apply filtering policies to individual clients (computers, networks, users, groups, and domains [OUs]).
See the TRITON - Web Security Help for information about implementing filtering policies.
7.
*
To review the current URL server rules, enter show run url-server (v7.0) or show url-server (v6.3.1).
*
To review all the filter rules, enter show run filter (v7.0) or show filter (v6.3.1).
*
If you are running v7.0 of Cisco software, enter exit to go up a level to run the show command.
 
Note 
The filter https command is supported in v6.3.1 and higher of the Cisco PIX Firewall/ASA software.
 
To configure HTTPS request filtering, use the following command:
filter https <port> <local_ip> <local_mask> <foreign_ip> <foreign_mask> [allow]
For an explanation of the filter https parameters, see Parameters for the filter commands.
Examples:
Using zeroes for the last two entries, <foreign_ip> and <foreign_mask>, allows access from the specified local IP address to all Web sites, as filtered by Websense software.
You can enter multiple filter https commands to set up different portions of the network for filtering. Set up the smaller groups first, followed by the larger groups, to assure that all groups are filtered properly. Use a general filter https command for all computers to be filtered, and then use TRITON - Web Security to apply filtering policies to individual clients (computers, networks, users, groups, and domains [OUs]).
See the TRITON - Web Security Help for information about implementing filtering policies.
8.
*
To review the current URL server rules, enter show run url-server (v7.0) or url-server (v6.3.1).
*
To review all the filter rules, enter show run filter (v7.0) or show filter (v6.3.1).
*
If you are running v7.0 of Cisco software, enter exit to go up a level to run the show command.
 
Note 
The filter ftp command is supported in v6.3.1 and higher of the Cisco PIX Firewall/ASA software.
To configure FTP request filtering, use the following command:
filter ftp <port> <local_ip> <local_mask> <foreign_ip> <foreign_mask> [allow] [interact-block]
For an explanation of the filter ftp parameters, see Parameters for the filter commands.
Examples:
 
Using zeroes for the last two entries, <foreign_ip> and <foreign_mask>, allows access via Websense software from the specified local IP address to all Web sites.
You can enter multiple filter ftp commands to set up different portions of the network for filtering. Set up the smaller groups first, followed by the larger groups, to assure that all groups are filtered properly. Use a general filter ftp command for all computers to be filtered, and then use TRITON - Web Security to apply filtering policies to individual clients (computers, networks, users, groups, and domains [OUs]).
See the TRITON - Web Security Help for information about implementing filtering policies.
9.
filter {url | https | ftp} except <local_ip> <local_mask> <foreign_ip> <foreign_mask>
This command allows you to bypass Websense filtering for traffic coming from, or going to a specified IP address or addresses.
For example, suppose that the following filter command was entered to cause all HTTP requests to be forwarded to Filtering Service:
filter url http 0 0 0 0
You could then enter:
filter url except 10.1.1.1 255.255.255.255 0 0
This would allow any outbound HTTP traffic from the IP address 10.1.1.1 to go unfiltered.
10.
Configure the security appliance to handle long URLs using the url-block url-mempool and url-block url-size commands:
 
Note 
The url-block commands are supported in v6.2 and higher of the Cisco PIX Firewall/ASA software.
a.
To specify the amount of memory assigned to the URL buffer, enter:
url-block url-mempool <memory_pool_size>
Here, <memory_pool_size> is the size of the buffer in KB. You can enter a value from 2 to 10240. The recommended value is 1500.
b.
url-block url-size <long_url_size>
Here, <long_url_size> is the maximum URL size in KB. You can enter a value from 2 to 4. The recommended value is 4.
11.
Configure the URL response block buffer using the url-block block command to prevent replies from the Web server from being dropped in high-traffic situations.
 
Note 
The url-block commands are supported in v6.2 and higher of the Cisco PIX Firewall/ASA software.
On busy networks, the lookup response from Filtering Service may not reach the security appliance before the response arrives from the Web server.
The HTTP response buffer in the security appliance must be large enough to store Web server responses while waiting for a filtering decision from the Filtering Service.
To configure the block buffer limit, use the following command:
url-block block <block_buffer_limit>
 
Here, <block_buffer_limit> is the number of 1550-byte blocks to be buffered. You can enter a value from 1 to 128.
*
To view the current configuration for all 3 url-block commands, enter show running-config url-block (v7.0) or show url-block (v6.3).
*
Enter show url-block block statistics to see how the current buffer configuration is functioning. The statistics include the number of pending packets held and the number dropped. The clear url-block block statistics command clears the statistics.
12.
For example, if you entered the following to enable filtering:
filter url http 10.0.0.0 255.0.0.0 0 0
Enter the following to disable filtering:
no filter url http 10.0.0.0 255.0.0.0 0 0
Repeat for each filter command issued, as appropriate.
13.
*
copy run start
*
exit
write memory
Websense software is ready to filter Internet requests after the Websense Master Database is downloaded and the software is activated within the Cisco security appliance. See the TRITON - Web Security Help for information about configuring Websense software and downloading the Master Database.
Parameters for the filter commands
The parameters used by the filter http, filter https, and filter ftp commands include the following. Note that some of the parameters listed do not apply to all 3 commands.
http <port>[-<port>]
Note:
In Cisco software versions 5.3 to 6.3, it is not mandatory to enter http before the port number; you can either enter http (to use port 80), or you can enter a port number.
<port>
<local_ip>
<local_mask>
Network mask of the local_ip address (the IP address requesting access).
<foreign_ip>
<foreign_mask>
Network mask of the foreign_ip address (the IP address to which access is requested).
*
Enter longurl-truncate to send only the host name or IP address to Filtering Service.
*
Enter longurl-deny to deny the request without sending it to Filtering Service.

Go to the table of contents Go to the previous page Go to the next page
Integrating Web Security with Cisco > Cisco integration configuration procedure
Copyright 2016 Forcepoint LLC. All rights reserved.