Deployment and Installation Center
Websense TRITON Enterprise v7.6.x

Go to the table of contents Go to the previous page Go to the next page Go to the index
Configuring a Cisco Security Appliance > Cisco integration configuration procedure

3.
Enter enable, followed by the enable password to put the security appliance into privileged EXEC mode.
4.
Enter configure terminal to activate configure mode.
Note 
For help with individual commands, enter help followed by the command. For example, help filter shows the complete syntax for the filter command and explains each option.
5.
Use the url-server command to enable URL filtering by Websense software.
url-server (<if_name>) vendor websense host <ip_address> [timeout <seconds>] [protocol {TCP | UDP} version {1 | 4} [connections <num_conns>]]
The url-server command takes the following parameters:
(<if_name>)
In v7.0 of the Cisco security appliance software, a value for this parameter must be entered.
In v6.3.1 and earlier, <if_name> defaults to inside if not specified.
timeout <seconds>
The amount of time, in seconds, that the security appliance waits for a response before switching to the next Filtering Service that you defined as a url-server, or, if specified, going into allow mode and permitting all requests.
If a timeout interval is not specified, this parameter defaults to 30 seconds in v7.0(1) and later, and 5 seconds in earlier versions of the Cisco PIX or ASA software.
*
v7.0(1) and later: Range: 10 - 120;
Default: 30
*
v6.3: Range: 1 - 30; Default: 5
protocol {TCP | UDP} version {1 | 4}
Defines whether the Cisco security appliance should use TCP or UDP protocol to communicate with Filtering Service, and which version of the protocol to use.
TCP is the recommended and default setting. The recommended protocol version is 4. The default is 1. (Note: To send authenticated user information to Filtering Service, TCP version 4 must be selected.)
connections <num_conns>
Limits the maximum number of TCP connections permitted between the Cisco security appliance and Filtering Service.
If this parameter is not specified, it defaults to 5, which is the recommended setting.
Range: 1 - 100; Default: 5.
url-server (inside) vendor websense host 10.255.40.164 timeout 30 protocol TCP version 4 connections 5
The url-server command communicates the location of Filtering Service to the Cisco security appliance. More than one url-server command can be entered. Multiple commands allow redirection to another Filtering Service after the specified timeout period, if the first server becomes unavailable.
*
To review the current URL server rules, enter show running-config url-server (v7.0) or show url-server (v6.3).
*
To review all the filter rules, enter show running-config filter (v7.0) or show filter (v6.3).
filter url http <port>[-<port>] <local_ip> <local_mask> <foreign_ip> <foreign_mask> [allow] [cgi-truncate] [longurl-truncate | longurl-deny] [proxy-block]
filter url http 10.5.0.69 255.255.255.255 132.239.29.189 255.255.255.255
Filters the 10.5.0.69 host going to the 132.239.29.189 destination.
Using zeroes for the last two entries, <foreign_ip> and <foreign_mask>, allows access from the specified local IP address to all Web sites, as filtered by Websense software
You can enter multiple filter url commands to set up different portions of the network for filtering. Set up the smaller groups first, followed by the larger groups, to assure that all groups are filtered properly. Use a general filter url command for all computers to be filtered, and then use TRITON - Web Security to apply filtering policies to individual clients (computers, networks, users, groups, and domains [OUs]).
*
To review the current URL server rules, enter show run url-server (v7.0) or show url-server (v6.3.1).
*
To review all the filter rules, enter show run filter (v7.0) or show filter (v6.3.1).
*
If you are running v7.0 of Cisco software, enter exit to go up a level to run the show command.
Note 
The filter https command is supported in v6.3.1 and higher of the Cisco PIX Firewall/ASA software.
filter https <port> <local_ip> <local_mask> <foreign_ip> <foreign_mask> [allow]
Filters all HTTPS requests to all destinations. Filtering is applied to traffic on port 443.
filter https 443 10.5.0.69 255.255.255.255 132.239.29.189 255.255.255.255
Filters the 10.5.0.69 host going to the 132.239.29.189 destination.
Using zeroes for the last two entries, <foreign_ip> and <foreign_mask>, allows access from the specified local IP address to all Web sites, as filtered by Websense software.
You can enter multiple filter https commands to set up different portions of the network for filtering. Set up the smaller groups first, followed by the larger groups, to assure that all groups are filtered properly. Use a general filter https command for all computers to be filtered, and then use TRITON - Web Security to apply filtering policies to individual clients (computers, networks, users, groups, and domains [OUs]).
*
To review the current URL server rules, enter show run url-server (v7.0) or url-server (v6.3.1).
*
To review all the filter rules, enter show run filter (v7.0) or show filter (v6.3.1).
*
If you are running v7.0 of Cisco software, enter exit to go up a level to run the show command.
Note 
The filter ftp command is supported in v6.3.1 and higher of the Cisco PIX Firewall/ASA software.
filter ftp <port> <local_ip> <local_mask> <foreign_ip> <foreign_mask> [allow] [interact-block]
filter ftp 21 10.5.0.69 255.255.255.255 132.239.29.189 255.255.255.255
Filters the 10.5.0.69 host going to the 132.239.29.189 destination.
Using zeroes for the last two entries, <foreign_ip> and <foreign_mask>, allows access via Websense software from the specified local IP address to all Web sites.
You can enter multiple filter ftp commands to set up different portions of the network for filtering. Set up the smaller groups first, followed by the larger groups, to assure that all groups are filtered properly. Use a general filter ftp command for all computers to be filtered, and then use TRITON - Web Security to apply filtering policies to individual clients (computers, networks, users, groups, and domains [OUs]).
9.
After entering commands to define filtering for HTTP, HTTPS, and FTP requests, you can define any required exceptions to these filtering rules by adding the except parameter to the filter command:
filter {url | https | ftp} except <local_ip> <local_mask> <foreign_ip> <foreign_mask>
10.
Configure the security appliance to handle long URLs using the url-block url-mempool and url-block url-size commands:
Note 
The url-block commands are supported in v6.2 and higher of the Cisco PIX Firewall/ASA software.
a.
Increase the size of the security appliance's internal buffer to handle long URL strings. If the URL buffer size is set too low, some Web pages may not display.
url-block url-mempool <memory_pool_size>
Here, <memory_pool_size> is the size of the buffer in KB. You can enter a value from 2 to 10240. The recommended value is 1500.
url-block url-size <long_url_size>
Here, <long_url_size> is the maximum URL size in KB. You can enter a value from 2 to 4. The recommended value is 4.
11.
Configure the URL response block buffer using the url-block block command to prevent replies from the Web server from being dropped in high-traffic situations.
Note 
The url-block commands are supported in v6.2 and higher of the Cisco PIX Firewall/ASA software.
On busy networks, the lookup response from Filtering Service may not reach the security appliance before the response arrives from the Web server.
The HTTP response buffer in the security appliance must be large enough to store Web server responses while waiting for a filtering decision from the Filtering Service.
url-block block <block_buffer_limit>
Here, <block_buffer_limit> is the number of 1550-byte blocks to be buffered. You can enter a value from 1 to 128.
*
To view the current configuration for all 3 url-block commands, enter show running-config url-block (v7.0) or show url-block (v6.3).
*
Enter show url-block block statistics to see how the current buffer configuration is functioning. The statistics include the number of pending packets held and the number dropped. The clear url-block block statistics command clears the statistics.
*
exit
write memory
Websense software is ready to filter Internet requests after the Websense Master Database is downloaded and the software is activated within the Cisco security appliance. See the Websense Installation Guide and the TRITON - Web Security Help for information about configuring Websense software and downloading the Master Database.
The parameters used by the filter http, filter https, and filter ftp commands include the following. Note that some of the parameters listed do not apply to all 3 commands.
http <port>[-<port>]
Defines which port number, or range of port numbers, the security appliance watches for HTTP requests. If you do not specify a port number, port 80 is used by default.
The option to set a custom Web port or port range is only available in v5.3 and higher of Cisco software.
Note:
In Cisco software versions 5.3 to 6.3, it is not mandatory to enter http before the port number; you can either enter http (to use port 80), or you can enter a port number.
<port>
filter https
filter ftp
Defines the port number the security appliance watches for https or ftp requests.
<local_ip>
filter http
filter https
filter ftp
You can set this address to 0.0.0.0 (or in shortened form, 0) to specify all internal clients. This address is the source for all connections to be filtered.
<local_mask>
filter http
filter https
filter ftp
Network mask of the local_ip address (the IP address requesting access).
You can use 0.0.0.0 (or in shortened form, 0) to specify all hosts within the local network.
<foreign_ip>
filter http
filter https
filter ftp
You can use 0.0.0.0 (or in shortened form, 0) to specify all external destinations.
<foreign_mask>
filter http
filter https
filter ftp
Network mask of the foreign_ip address (the IP address to which access is requested).
Always specify a mask value. You can use 0.0.0.0 (or in shortened form, 0) to specify all hosts within the external network.
filter http
filter https
filter ftp
Lets outbound connections pass through the security appliance without filtering when Filtering Service is unavailable.
If you omit this option, and Filtering Service becomes unavailable, the security appliance stops all outbound HTTP, HTTPS, or FTP traffic until Filtering Service is available again.
Sends CGI scripts to Filtering Service as regular URLs. When a URL has a parameter list starting with a question mark (?), such as a CGI script, the URL is truncated. All characters after, and including the question mark, are removed before sending the URL to Filtering Service.
Prevents users from connecting to the FTP server through an interactive FTP client.
An interactive FTP client allows users to change directories without entering the complete directory path, so Filtering Service cannot tell if the user is requesting something that should be blocked.
[longurl-
truncate | longurl-deny]
Specify how to handle URLs that are longer than the URL buffer size limit.
*
Enter longurl-truncate to send only the host name or IP address to Filtering Service.
*
Enter longurl-deny to deny the request without sending it to Filtering Service.
Enter this parameter to prevent users from connecting to an HTTP proxy server.


Go to the table of contents Go to the previous page Go to the next page Go to the index
Configuring a Cisco Security Appliance > Cisco integration configuration procedure