I am attempting to allow a single host to NOT be sent to the Ironport. It's a Linux box that needs to get to download.opensuse.org. I've tried adding an access list for that host, to an inet host via any IP. The traffice still goes to the Ironport as validated by a query for crendentials from the Ironport. I've found some other methods, to no avail.
Well the few setups of ASA + Ironport that I have seen uses an WCCP ACL on the ASA which already can define which traffic is forwarded to Ironport and which simply bypasses it and goes straight out of the ASA.
Those that need to bypass Ironport are specified in the top of the ACL with "deny" statements.
access-list WCCP line 1 deny ip host host
access-list WCCP line 1 deny ip host any
I am not sure if this was what you were looking to do.
Table of ContentsIntroductionVersion HistoryPossible Future
UpdatesDocuments PurposeNAT Operation in ASA 8.3+ SectionsRule Types
Network Object NATTwice NAT / Manual NATRule Types used per SectionNAT
Types used with Twice NAT / Manual NAT and Network Obje...
[toc:faq]Introduction:This document describes details on how NAT-T
works.Background:ESP encrypts all critical information, encapsulating
the entire inner TCP/UDP datagram within an ESP header. ESP is an IP
protocol in the same sense that TCP and UDP are I...