as long as those VLANs have diffrent ip addressing
then u can control whos to be included in a such policy and whos not based on the source IP address
also u can achive it by using ACLs,class-map and policy map with http inspection using MPF on cisco ASA and block certain websites and u can exclude on or more subnets (vlan) or hosts based on the source IP
for example lets say u wanna exclude vlan 2 from http and url filltering and include anything else to be passed to CSC modul
access-list csc-acl deny tcp 192.168.2.0 255.255.255.0 any eq www
access-list csc-acl permit tcp any any eq www
match access-list csc-acl
in this case evry http traffic will be passed and inspected by the CSC except vlan 2 traffic
Table of ContentsIntroductionVersion HistoryPossible Future
UpdatesDocuments PurposeNAT Operation in ASA 8.3+ SectionsRule Types
Network Object NATTwice NAT / Manual NATRule Types used per SectionNAT
Types used with Twice NAT / Manual NAT and Network Obje...
Table of Contents Introduction:This document describes details on how
NAT-T works. Background: ESP encrypts all critical information,
encapsulating the entire inner TCP/UDP datagram within an ESP header.
ESP is an IP protocol in the same sense that TCP an...