Go to the table of contents Go to the previous page Go to the next page
Integrating Forcepoint URL Filtering with Cisco > Getting started with a Cisco integration
Getting started with a Cisco integration
Deployment and Installation Center | Forcepoint URL Filtering
 
Related topics:
*
*
*
How does Forcepoint URL Filtering work with Cisco products
To be managed by your web protection software, a client's Internet requests must pass through the Cisco product.
When it receives an Internet request, the Cisco product queries Filtering Service to find out if the requested website should be blocked or permitted. Filtering Service determines which policy or exception applies to the request, then uses that policy to decide whether to block or permit the request.
*
*
*
Installing Forcepoint URL Filtering
Install Forcepoint URL Filtering as directed in the Installation Guide. When installing Filtering Service, be sure to:
*
On the Integration Option screen, select Install Forcepoint URL Filtering to integrate with a third-party product or device.
*
On the Select Integration screen, select one of the following and then click Next:
*
*
*
Upgrading Forcepoint URL Filtering
When you upgrade software that is already integrated with a Cisco product, no additional Cisco configuration is necessary. See Upgrading Web Protection Solutions for upgrading instructions.
If you are upgrading your deployment and changing your Cisco product, see Migrating between integrations after installation.
Migrating between integrations after installation
 
You can change the Cisco integration product (for example, change from ASA to an IOS router) after installing web protection software without losing configuration data.
1.
Ensure that it is deployed so that it can communicate with Filtering Service.
2.
*
v7.6 - v7.8 Backup and Restore FAQ (if you are preparing to upgrade to v8.x)
*
*
*
*
*
v8.5 Backup and Restore FAQ (if you are preparing to upgrade to v8.5.x)
3.
4.
5.
6.
7.
On the Select Integration screen, select the new Cisco product, and then follow the on-screen instructions to complete the installation.
The installer adds the new integration data to the appropriate configuration files, while preserving existing configuration data.
8.
9.
*
Windows: Use the Windows Services tool to verify that Websense Filtering Service has started.
*
./WebsenseAdmin status
10.
a.
Here, <IP address> is the IP address of the management server.
b.
Click the Web module, then go to Settings > Network Agent.
c.
Position the mouse over the General option and wait a second or two for a list of IP addresses to appear.
d.
Click an IP address to open the Local Settings page for that Network Agent instance.
e.
Under Filtering Service Definition, select the IP address for the machine running Filtering Service. During the migration, the setting may have been reset to None.
f.
11.
Network Agent enhanced logging
Network Agent can also provide information for reports on bandwidth information and block HTTP(S) Internet protocols based on bandwidth consumption. However, bandwidth information is not recorded by default.
To configure Network Agent to record bandwidth information for reporting, or manage HTTP(S) or FTP requests based on bandwidth consumption:
1.
In a supported browser, navigate to http://<IP address>:9443, where <IP address> is the IP address of the management server.
2.
Select the Web module, then go to Settings > Network Agent.
3.
Position the mouse over the General option and wait a second or two for a list of IP addresses to appear.
4.
Click appropriate IP address to open the Local Settings page for a Network Agent instance.
5.
Under Network Interface Card, click the appropriate NIC monitoring the relevant traffic.
6.
Under Integration, enable the Log HTTP requests option.

Go to the table of contents Go to the previous page Go to the next page
Integrating Forcepoint URL Filtering with Cisco > Getting started with a Cisco integration
Copyright 2023 Forcepoint. All rights reserved.