Configuring WCCP v2 with Websense Content Gateway the Web proxy for Web Security Gateway



Similar documents
2. Are explicit proxy connections also affected by the ARM config?

Installing and Configuring Websense Content Gateway

Websense Web Security Gateway: What to do when a Web site does not load as expected

Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway

Websense Content Gateway HTTPS Configuration

Cisco AnyConnect Secure Mobility Solution Guide

Blue Coat Systems. Reference Guide. WCCP Reference Guide. For SGOS

Filtering remote users with Websense remote filtering software v7.6

Migrating your custom settings to version 7.6

Blue Coat Security First Steps Transparent Proxy Deployments

SSL Decryption: Benefits, Configuration and Best Practices

Upgrading to Websense Web Security v7.6

Securing Networks with PIX and ASA

Blue Coat Systems. Reference Guide. WCCP Reference Guide. For SGOS 5.3

Deploying with Websense Content Gateway

Network Agent Quick Start

Using Integrated Windows Authentication with Websense Content Gateway, v7.6

v7.7.3 Release Notes for Websense Content Gateway

v7.8.2 Release Notes for Websense Content Gateway

SuperLumin Nemesis. Administration Guide. February 2011

Lab Developing ACLs to Implement Firewall Rule Sets

Quick Start 4: Identifying and Troubleshooting proxy issues for Websense Web Security Gateway

8 steps to protect your Cisco router

Quick Start 5: Introducing and configuring Websense Cloud Web Security solution

Lab Configuring Access Policies and DMZ Settings

Integrated Cisco Products

WiNG 5.X How To. Policy Based Routing Cache Redirection. Part No. TME Rev. A

Deploying ACLs to Manage Network Security

Webinar Information. Title: Websense Remote Filtering Audio information: Dial-in numbers:

Hosting more than one FortiOS instance on. VLANs. 1. Network topology

Cisco Secure PIX Firewall with Two Routers Configuration Example

Cisco Firewall Technology

Monitoring Traffic Interception

Troubleshooting the Firewall Services Module

Firewall Authentication Proxy for FTP and Telnet Sessions

Cisco Configuring Commonly Used IP ACLs

Chapter 3 Using Access Control Lists (ACLs)

FIREWALLS & CBAC. philip.heimer@hh.se

QUICK START GUIDE. Cisco S170 Web Security Appliance. Web Security Appliance

WAN Optimization, Web Cache, Explicit Proxy, and WCCP. FortiOS Handbook v3 for FortiOS 4.0 MR3

Configuring Network Address Translation

Cisco S380 and Cisco S680 Web Security Appliance

School of Information Technology and Engineering (SITE) CEG 4395: Computer Network Management. Lab 4: Remote Monitoring (RMON) Operations

Transparent Cache Switching Using Brocade ServerIron and Blue Coat ProxySG

GLBP - Gateway Load Balancing Protocol

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Juniper Networks WX Series Large. Integration on Cisco

DHCP Server Port-Based Address Allocation

User and Group-Based Reporting in TRITON - Web Security: Best Practices and Troubleshooting

How to Configure an Initial Installation of the VMware ESXi Hypervisor

F-Secure Messaging Security Gateway. Deployment Guide

12. Firewalls Content

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?

Table of Contents. Configuring IP Access Lists

NetFlow Subinterface Support

F-SECURE MESSAGING SECURITY GATEWAY

Lab 5 Explicit Proxy Performance, Load Balancing & Redundancy

Quick start 6: Administering the Websense Cloud Web Security solution

IM and Presence Service Network Setup

Configure ISE Version 1.4 Posture with Microsoft WSUS

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

Configuring PA Firewalls for a Layer 3 Deployment

Lab Configure Cisco IOS Firewall CBAC on a Cisco Router

PIX/ASA 7.x with Syslog Configuration Example

Firewall Support for SIP

Configuring the BIG-IP and Check Point VPN-1 /FireWall-1

Third Party Integration

A typical router setup between WebSAMS and ITEd network is shown below for reference. DSU. Router

NAT TCP SIP ALG Support

User Service and Directory Agent: Configuration Best Practices and Troubleshooting

CSCE 465 Computer & Network Security

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

GlobalSCAPE DMZ Gateway, v1. User Guide

NEFSIS DEDICATED SERVER

INTRODUCTION TO FIREWALL SECURITY

Configuring Auto Policy-Based Routing

Emerald. Network Collector Version 4.0. Emerald Management Suite IEA Software, Inc.

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

PT Activity 8.1.2: Network Discovery and Documentation Topology Diagram

DMZ Network Visibility with Wireshark June 15, 2010

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?

Troubleshooting the Firewall Services Module

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

How To Block On A Network With A Group Control On A Router On A Linux Box On A Pc Or Ip Access Group On A Pnet 2 On A 2G Router On An Ip Access-Group On A Ip Ip-Control On A Net

Cisco Local Director Abstract. Stephen Gill Revision: 1.0, 04/18/2001

Configuring Network Address Translation (NAT)

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Accelerating SaaS Applications with F5 AAM and SSL Forward Proxy

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Configuring Role-Based Access Control

ProCurve Networking. Hardening ProCurve Switches. Technical White Paper

SSL Enforcer Documentation

Configuring Trend Micro Content Security

Configuring Network Address Translation

ExamPDF. Higher Quality,Better service!

Security Technology: Firewalls and VPNs

SSL VPN Server Guide. Access Manager 3.2 SP2. June 2013

Configuring Server Load Balancing

Transcription:

Configuring WCCP v2 with Websense Content Gateway the Web proxy for Web Security Gateway Webinar December 2011 web security data security email security 2011 Websense, Inc. All rights reserved.

Webinar Presenter Greg Didier Title: Support Specialist Accomplishments: 9 years supporting Websense products Qualifications: Technical Support Mentor Product Trainer 2

Goals and Objectives Why WCCP WCCP features Router configuration Content Gateway configuration Router demonstrations Troubleshooting tips Best practices 3

WCCP v2 Interception WCCP v2 devices intercept traffic, usually on ports 80 and 443, and redirect it to the proxy ARM module receives the traffic and readdresses it to Content Gateway, which performs security functions Acting on behalf of the client now, the traffic is readdressed by ARM, restoring the origin server IP address and port number Traffic exits network with proxy as source IP address ARM Redirection Rule Client Requests http 80 WCCP v2 https 443 ARM http 8080 https 8070 Processing Analytics Content Gateway Origin Server Proxy 4

WCCP v2 Features Multiple routers in a proxy cluster Multiple ports per service group Multiple service groups per protocol Dynamic load distribution in a proxy cluster through assignment method HASH or MASK, and weight Packet Return Method and Packet Forward Method negotiation Only negotiates when method is not stipulated by router MD5 password security per service group Multicast mode 5

Transparent Interception Strategies Employing transparent proxies: A Layer 4 switch Policy-Based Routing (PBR) Software Routing A router or switch that supports WCCP v2 Cisco IOS-based routers are the most common Terms WCCP Server, the WCCP redirection device WCCP Client, the Content Gateway proxy Service Group, defines the type of traffic to be intercepted ARM, Adaptive Redirection Module modifies packet header 6

WCCP v2 Setup Overview Configure the WCCP Server Configure the WCCP Client (Content Gateway) to work with WCCP Server Service groups must match exactly Validate configuration 7

WCCP v2 Setup Step one Configure the WCCP Server 8

Configure the WCCP Server Set WCCP version 2 Create a standard ACL for the Group List Specifies what WCCP Clients are allowed to participate in a given service group Increases security Create an extended ACL for the Redirect List Identifies the interesting traffic to be redirected Enable WCCP globally Set Service Group ID Establish password for security Must match corresponding password on the Content Gateway Enable WCCP on the appropriate interface Interface where WCCP redirection is applied 9

Configure the WCCP Server Telnet demonstration 1. Set WCCP version 2 ip wccp version 2 2. Standard ACL for the Group List ip access-list standard 3. Extended ACL for Redirect List ip access-list extended 4. Enable WCCP globally ip wccp <#> redirect-list <name> group-list <name> password <pwd> 5. Enable interface int vlan <#> ip wccp <#> redirect in Demonstration 10

Configure the WCCP Server WCCP Server is now configured and waiting A WCCP Client to advertizing with Here_I_Am packets The WCCP Server will respond with I_See_You packets The WCCP Client sends its configured Service Group data Negotiation starts Service Group ID Password check Only allows proxies identified in the group-list Determines data exchange method (L2 or GRE) Etc. A successful negotiation results in a Service Group 11

WCCP v2 Setup Step two Configure Content Gateway to work with WCCP Server 12

Configure Content Gateway Enable ARM Enable WCCP v2 Define the WCCP service group Restart Content Gateway proxy 13

Enable ARM ARM inspects incoming packets and readdresses them to Content Gateway for processing Must be enabled Configure > My Proxy > Basic > General For WCCP, there must be a redirection rule for every port in every active service group Configure > Networking > ARM > General If prompted, do not restart proxy Demonstration 14

Enable WCCP v2 WCCP must be enabled Must be enabled Configure > My Proxy > Basic > General If prompted, do not restart proxy Specify the WCCP network interface Configure > Networking > WCCP > General This interface communicates with the WCCP routers Used by all service groups Must be set on each node in the cluster the value is not propagated Demonstration 15

Define WCCP Service Group Every WCCP service group redirecting traffic must have a corresponding service group defined for it in Content Gateway Service groups need only be configured once within the cluster Except the enabled/disabled setting and the weight setting, if used, which must be set on each node Service Group information Router information Mode negotiation Advanced settings -parameters used to distribute intercepted traffic among multiple nodes in a cluster Assignment method, Weight, and Reverse Service Group ID Restart Content Gateway Configure > My Proxy > Basic > General > Restart Demonstration 16

WCCP v2 Setup Overview Step three Validate configuration 17

Validate Configuration Is the Service Group formed? sh ip wccp 0 sh ip wccp 0 detail sh ip wccp 0 view 18

Validate Configuration Examine statistics It may take up to a minute for the router to report that a new proxy server has joined a service group In Monitor > My Proxy > Summary, check that Objects Served is increasing 19

Validate Configuration WCCP v2 statistics 20

Validate Configuration Are reports showing new user activity? Test client workstation Is traffic blocked? http://testdatabasewebsense.com Demonstration 21

Router Troubleshooting Informational commands sh ip wccp <#> <detail or view> sh ip access-list <name> sh run sh run include wccp sh run int vlan 10 sh logging sh debugging Enable WCCP debugging terminal monitor debug ip wccp packets debug ip wccp events Disable WCCP debugging no debug ip wccp packets no debug ip wccp events terminal no monitor 22

Best Practice Tips Standard service group web-cache not supported Characteristics of the web cache service are known by both the router and cache engines Websense only supports dynamic service groups Dynamic services are defined by the first web cache to join the service group The cache instructs the router which protocol or ports to intercept, and how to distribute the traffic WCCP command options ip wccp {web-cache service-number} [group-list access-list] [redirect-list access-list] [group-address groupaddress] [password [0-7] password] 23

Best Practice Tips Changing established service groups 1. Disable WCCP on all Content Gateway nodes 2. Remove interface configuration 3. Remove or change the global configuration Redirect/Group Lists on WCCP Server Forward/Return/Assignment Method on Content Gateway 4. Reapply new global and interface configurations 5. Re-register Content Gateway nodes 24

Best Practice Tips Inbound redirections should be used whenever possible to reduce CPU overhead For Routers: Use GRE Forward/Return Use HASH assignment For Switches: Use L2 Forward/Return Method when possible Use MASK assignment 25

Best Practice Tips Difference with a Cisco switch Not much difference in configuration syntax Leverage hardware use as much as possible Use inbound redirection Use Mask assignment User L2 Forward/Return methods L2 requires layer-2 adjacency between WCCP Client and WCCP Server 26

Best Practice Tips Difference with a Cisco ASA Quite different, if possible leverage WCCP elsewhere Limitations: Cannot use IP Spoofing Cannot redirect traffic from one security zone to another Cannot employ ARM bypass in WCG Causes a WCCP redirect loop For configuration: Use GRE Forward/Return methods Use Hash assignment Use specific Layer 4 statements in the redirect list ACL Good: permit tcp 10.212.8.8 255.255.255.248 any eq www Bad: permit ip 10.212.8.8 255.255.255.248 any 27

Router Telnet Commands Redirect workstation (10.212.2.215) Enable config t ip wccp version 2 ip access-list standard TST permit host 10.212.1.52 ip access-list extended R_TST deny ip host 10.212.1.52 any deny ip any 10.0.0.0 0.255.255.255 deny ip any 172.16.0.0 0.15.255.255 deny ip any 192.168.0.0 0.0.255.255 Permit ip host 10.212.2.215 any ip wccp 0 group-list TST redirect-list R_TST password tst int vlan 10 ip wccp 0 redirect in end 28

Router Telnet Commands Redirect network range and proxy range Enable config t ip wccp version 2 ip access-list standard TST permit ip 10.212.8.8 0.0.0.7 ip access-list extended R_TST deny ip host 10.212.1.52 any deny ip any 10.0.0.0 0.255.255.255 deny ip any 172.16.0.0 0.15.255.255 deny ip any 192.168.0.0 0.0.255.255 permit ip 10.212.0.0 0.0.255.255 any ip wccp 0 group-list TST redirect-list R_TST password tst int vlan 10 ip wccp 0 redirect in end 29

Best Practice Tips Negotiation Mode The WCCP Client advertizes to the WCCP Server Router should stipulate the data exchange method Packet Forward / Return Methods: The mode selected should match the capabilities of the WCCP Server L2 Requires the router or switch be Layer 2-adjacent In the same subnet as Content Gateway GRE Overcomes L2 obstacle by adding a second Layer 3 header Routers typically support only one method Typically, forward and return methods should match Packet Forward from redirection device to proxy Packet Return from proxy to redirection device Hash and Mask Assignment Method: Parameters used to distribute intercepted traffic among multiple proxies 30

Presentation References These links correlate to the presentation outline How WCCP v2 interception works (slide 5) WCCP v2 supported features (slide 6) Transparent interception strategies (slide 7) Transparent interception with WCCP v2 devices (slide 8) Install and configure your WCCP v2 devices (slide 8) Configuring WCCP v2 routers (slide 10) Configuring service groups on the WCCP device (slides 11-12) Enabling WCCP processing for a service group (slides 11-12) Enabling WCCP v2 security on the router (slides 11-12) 31

Presentation References These links correlate to the presentation outline Configure Content Gateway to work with WCCP devices (13-14) Enabling the ARM (slide 15) Enabling WCCP v2 in Content Gateway (slide 16) Enabling WCCP in Content Gateway Manager (slide 16) Specifying the WCCP network interface (slide 16) Configuring service groups in Content Gateway Manager (17) Restarting Content Gateway (see step 9) (slide 17) Validate the configuration with test traffic (slide 18) 32

WCCP References Web Cache Control Protocol (WCCP), Version 2 (V1.7.6) Websense Content Gateway v7.6 Help document Configuring WCCP v2 for Websense Content Gateway Past Webinar: Common Configuration Methods for the Websense Content Gateway WCCP configuration starts 28 minutes into this webinar Past Webinar: Achieving rapid success with WCCP and Web Security Gateway IP spoofing 33

Support Online Resources Knowledge Base Search or browse the knowledge base for documentation, downloads, top knowledge base articles, and solutions specific to your product. Support Forums Share questions, offer solutions and suggestions with experienced Websense Customers regarding product Best Practices, Deployment, Installation, Configuration, and other product topics. Tech Alerts Subscribe to receive product-specific alerts that automatically notify you anytime Websense issues new releases, critical hot-fixes, or other technical information. ask.websense.com Create and manage support service requests using our online portal.

Webinar Announcement Title: Identifying and resolving logging issues when reports are blank Date: January 18th, 2012 Webinar Update Time: 8:30 AM PDT (GMT -8) How to register: http://www.websense.com/content/ SupportWebinars.aspx 35

Customer Training Options To find Websense classes offered by Authorized Training Partners in your area, visit: http://www.websense.com/findaclass Websense Training Partners also offer classes online and onsite at your location. For more information, please send email to: readiness@websense.com