Scansafe Web Sec
Scansafe Web Sec
The Cisco Cloud Web Security feature provides content scanning of HTTP and secure HTTP (HTTPS)
traffic and malware protection services to web traffic. The feature helps devices transparently redirect HTTP
and HTTPS traffic to the Cisco Web Security cloud.
This module describes the Cisco Cloud Web Security feature and how to configure it. This module also
describes the Cloud Web Security Tower Telemetry and Default User-Group Support for Authentication
features.
Security Configuration Guide: Zone-Based Policy Firewall, Cisco IOS Release 15M&T
1
Cisco Cloud Web Security
Restrictions for Cisco Cloud Web Security
• When you enable content scanning on an interface that has WAAS configured.
• When the network connection from a branch office to the Internet is over a Multiprotocol Label Switching
(MPLS) cloud.
Security Configuration Guide: Zone-Based Policy Firewall, Cisco IOS Release 15M&T
2
Cisco Cloud Web Security
Whitelists
clients from malware. Servers use credentials such as private IP addresses, usernames, and user groups to
identify and authenticate users and redirect the traffic for content scanning.
This feature enables branch offices to intelligently redirect web traffic to the cloud to enforce security and
acceptable use of policies over the web traffic. A device authenticates and identifies users who make web
traffic requests by using configured authentication and authorization methods such as user credentials
(usernames and user groups) available in the traffic that the device redirects to Cisco Cloud Web Security.
Cisco Cloud Web Security uses the user credentials to determine the policies that need to be applied to specific
users and for user-based reporting. Cisco Cloud Web Security supports all authentication methods such as
HTTP Basic, Web Authorization Proxy, and Windows NT LAN Manager (NTLM) (passive or explicit).
A device that cannot determine a client’s credentials uses a default user group name to identify all clients who
are connected to a specific interface on that device. Prior to CSCty48221, the user group that was configured
using the user-group command in parameter-map type inspect configuration mode had precedence over any
default user group that was configured using the user-group default command in interface configuration
mode. With the fix for CSCty48221, a device selects a user group in the following order:
• Authentication methods.
• User group configured using the user-group default command on an interface.
• User group configured using the user-group command in parameter-map type inspect configuration
mode. Configure the parameter-map type content-scan global command before configuring the
user-group command.
You can configure a device in such a way that the approved web traffic does not get scanned by Cisco Cloud
Web Security. Instead, the traffic goes directly to the originally requested web server. Clients are any devices
that connect to a device, either directly or indirectly. When a client sends an HTTP or HTTPS request, the
device receives the request, authenticates the user, and retrieves the group name from the authentication server.
The device identifies the user and then consults the whitelist database to determine whether to send the HTTP
or HTTPS client response to Cisco Cloud Web Security.
You can configure primary and backup Cisco Cloud Web Security proxy servers. The device regularly polls
each of these proxy servers to check their availability.
Whitelists
A whitelist is an approved list of entities that are provided a particular privilege, service, mobility, access, or
recognition. Whitelisting means to grant access. You can configure a device in such a way that the approved
web traffic does not get redirected to Cisco Cloud Web Security for scanning. When you bypass Cisco Cloud
Web Security content scanning, the device retrieves the content directly from the originally requested web
server without contacting Cisco Cloud Web Security. Once the device receives a response from the web server,
the device sends the data to the client. This process is called whitelisting of web traffic.
You can bypass content scanning based on the following client web traffic properties:
• IP address—You can bypass content scanning for web traffic that matches a configured numbered or
named access control list (ACL). Use this method for traffic that is sent to trusted sites, such as intranet
servers.
• HTTP-based header fields—You can bypass scanning for web traffic that matches a configured HTTP
header field. You can match the host and user agent header fields. Use this method for user agents that
do not function properly when scanned or to disable the scanning of traffic that is intended for trusted
hosts, such as third-party partners.
Security Configuration Guide: Zone-Based Policy Firewall, Cisco IOS Release 15M&T
3
Cisco Cloud Web Security
Cisco Cloud Web Security Headers
Telemetry is an automated communications process in which measurements are made and data that is collected
at remote sites is transmitted to receiving equipment for monitoring.
The device on which the Cisco Cloud Web Security feature is configured is monitored, and data is generated
periodically. Because most of these devices do not have a large amount of memory or a secondary storage,
the generated data is exported to an external device. For the Cisco Cloud Web Security feature, the generated
data is stored in the Cloud Web Security tower. The device connects to a URL hosted by the Cloud Web
Security tower by using the HTTP POST method to periodically send telemetry data. This method is called
out-of-band telemetry.
Because the Cloud Web Security tower does not have information about all whitelisted traffic, a connector
(a persistent, out-of-band secure channel between the device and the Cloud Web Security tower) periodically
sends all exception rules configured on the device to the tower. Just like telemetry, the connector makes a
POST request and pushes all exception rules to a URL. This URL is separate from the telemetry URL.
The Cloud Web Security tower monitors the TCP session between the client browser and the tower and the
TCP session between the tower and the device. The tower also collects debug information at HTTP and TCP
levels. The tower also collects information and statistics about the parent HTTP session and all subordinate
sessions created by the main URL. The TCP session statistics include retransmission count, window update
count, window size, duplicate acknowledgments (ACKs), and time stamps of segment arrival and departure.
Security Configuration Guide: Zone-Based Policy Firewall, Cisco IOS Release 15M&T
4
Cisco Cloud Web Security
Default User-Group Support for Authentication
For the Default User-Group Support for Authentication feature, the Windows NT LAN Manager (NTLM)
acts as the authentication module and updates the user-group database (IP and user-group bindings) with the
user-group string that is received as authorization data from the authentication, authorization, and accounting
(AAA) or Lightweight Directory Access Protocol (LDAP) servers. Port access control lists (PACLs) perform
access control of the web traffic. If no PACL is configured on a port, unauthenticated user traffic is allowed.
Even if a user fails the NTLM authentication, the user can be given default access based on your PACL
configuration. You can configure a PACL to permit unauthorized users access to the Cloud Web Security
tower by using the permit command.
The various modules interact with each other to enable the default user-group support, as follows:
• ACL module—Controls port access based on the configured policy.
• Content-Scan—Forwards web traffic from clients to the Cloud Web Security tower for content scanning.
• IP admission or NTLM module—Intercepts the traffic destined to port 80 and port 443 and authenticates
users with the Microsoft Active Directory server.
• User-Group database—Maintains the IP and user-group bindings that are received from the LDAP server
as part of the authorization data. This database is updated by the IP admission module after the
authentication.
Security Configuration Guide: Zone-Based Policy Firewall, Cisco IOS Release 15M&T
5
Cisco Cloud Web Security
How to Configure Cisco Cloud Web Security
1. enable
2. configure terminal
3. parameter-map type content-scan global
4. server scansafe primary ipv4 ip-address port http port-number https port-number
5. server scansafe secondary ipv4 ip-address port http port-number https port-number
6. license 7 license-key
7. source interface type number
8. timeout server seconds
9. timeout session-inactivity seconds
10. user-group group-name username username
11. server scansafe on-failure block-all
12. user-group exclude username
13. exit
14. interface type number
15. content-scan out
16. ip virtual-reassembly in
17. ip virtual-reassembly out
18. end
19. show content-scan
DETAILED STEPS
Example:
Device# configure terminal
Security Configuration Guide: Zone-Based Policy Firewall, Cisco IOS Release 15M&T
6
Cisco Cloud Web Security
Configuring Cisco Cloud Web Security
Step 4 server scansafe primary ipv4 ip-address port http port-number https Configures a Cisco Cloud Web Security
port-number primary server for content scanning.
• The default Cisco Cloud Web
Example: Security port for the proxied HTTP
Device(config-profile)# server scansafe primary ipv4 [Link]
port http 8080 https 8080 and HTTPS traffic is 8080.
• You can use either the HTTP port or
the HTTPS port or both.
Step 5 server scansafe secondary ipv4 ip-address port http port-number https Configures a Cisco Cloud Web Security
port-number secondary server for content scanning.
• The default Cisco Cloud Web
Example: Security port for the proxied HTTP
Device(config-profile)# server scansafe secondary ipv4 [Link]
port http 8080 https 8080 and HTTPS traffic is 8080.
• You can use either the HTTP port or
the HTTPS port or both.
Step 7 source interface type number Configures the source interface for content
scan redirection.
Example:
Device(config-profile)# source interface fastethernet 0/2
Example:
Device(config-profile)# user-group marketing username superuser
Security Configuration Guide: Zone-Based Policy Firewall, Cisco IOS Release 15M&T
7
Cisco Cloud Web Security
Configuring Cisco Cloud Web Security
Example:
Device(config-profile)# user-group exclude marketing
Example:
Device(config-if)# ip virtual-reassembly out
Example:
Device# show content-scan
Security Configuration Guide: Zone-Based Policy Firewall, Cisco IOS Release 15M&T
8
Cisco Cloud Web Security
Enabling Out-of-Band Telemetry
Example
The following is sample output from the show content-scan history command:
Device# show content-scan history 6
SUMMARY STEPS
1. enable
2. configure terminal
3. parameter-map type content-scan global
4. out-of-band telemetry interval interval
5. end
DETAILED STEPS
Example:
Device# configure terminal
Step 3 parameter-map type content-scan global Configures a global content-scan parameter map and enters
parameter-map type inspect configuration.
Example:
Device(config)# parameter-map type content-scan
global
Security Configuration Guide: Zone-Based Policy Firewall, Cisco IOS Release 15M&T
9
Cisco Cloud Web Security
Configuration Examples for Cisco Cloud Web Security
Security Configuration Guide: Zone-Based Policy Firewall, Cisco IOS Release 15M&T
10
Cisco Cloud Web Security
Additional References for Cisco Cloud Web Security
Firewall commands
• Cisco IOS Security Command Reference: Commands A
to C
• Cisco IOS Security Command Reference: Commands D
to L
• Cisco IOS Security Command Reference: Commands M
to R
• Cisco IOS Security Command Reference: Commands S
to Z
Cisco Cloud Web Security solution guide Cisco ISR Web Security with Cisco ScanSafe Solution Guide
Technical Assistance
Description Link
The Cisco Support and Documentation website [Link]
provides online resources to download documentation,
software, and tools. Use these resources to install and
configure the software and to troubleshoot and resolve
technical issues with Cisco products and technologies.
Access to most tools on the Cisco Support and
Documentation website requires a [Link] user ID
and password.
Security Configuration Guide: Zone-Based Policy Firewall, Cisco IOS Release 15M&T
11
Cisco Cloud Web Security
Feature Information for Cisco Cloud Web Security
Default User-Group 15.3(3)M The Default User-Group Support for Authentication feature redirects
Support for unauthorized web traffic to the Cloud Web Security server for
Authentication content scanning.
Security Configuration Guide: Zone-Based Policy Firewall, Cisco IOS Release 15M&T
12