Integrating Forcepoint URL Filtering with Cisco > Getting started with a Cisco integration
|
|
On the Integration Option screen, select Install Forcepoint URL Filtering to integrate with a third-party product or device.
|
|
1.
|
|
v7.6 - v7.8 Backup and Restore FAQ (if you are preparing to upgrade to v8.x)
|
|
v8.5 Backup and Restore FAQ (if you are preparing to upgrade to v8.5.x)
|
4.
|
Remove Filtering Service. See Removing web protection components for instructions.
|
6.
|
7.
|
On the Select Integration screen, select the new Cisco product, and then follow the on-screen instructions to complete the installation.
|
|
Windows: Use the Windows Services tool to verify that Websense Filtering Service has started.
|
|
Linux: Navigate to the web protection installation directory (/opt/Websense, by default), and use the following command to verify that Websense Filtering Service is running:
|
a.
|
Use a supported browser (see System requirements for this version) to go to https://<IP address>:9443.
|
b.
|
c.
|
Position the mouse over the General option and wait a second or two for a list of IP addresses to appear.
|
d.
|
Click an IP address to open the Local Settings page for that Network Agent instance.
|
e.
|
Under Filtering Service Definition, select the IP address for the machine running Filtering Service. During the migration, the setting may have been reset to None.
|
1.
|
In a supported browser, navigate to http://<IP address>:9443, where <IP address> is the IP address of the management server.
|
2.
|
3.
|
Position the mouse over the General option and wait a second or two for a list of IP addresses to appear.
|
4.
|
Click appropriate IP address to open the Local Settings page for a Network Agent instance.
|
5.
|
Under Network Interface Card, click the appropriate NIC monitoring the relevant traffic.
|
6.
|
Under Integration, enable the Log HTTP requests option.
|
Integrating Forcepoint URL Filtering with Cisco > Getting started with a Cisco integration
|