Re: hasn't anyone out here worked with cut-through proxy
This is used to evaluate policy for the specific user. The mechanism by which the PIX firewall sends authenticated usernames to Websense relies upon the PIX having already authenticated the user through the cut-through proxy feature. The PIX functionality of passing authenticated usernames to Websense is only available when the PIX is configured to use the TCP version 4 protocol with Websense.
Table of ContentsIntroductionVersion HistoryPossible Future
UpdatesDocuments PurposeNAT Operation in ASA 8.3+ SectionsRule Types
Network Object NATTwice NAT / Manual NATRule Types used per SectionNAT
Types used with Twice NAT / Manual NAT and Network Obje...
[toc:faq]Introduction:This document describes details on how NAT-T
works.Background:ESP encrypts all critical information, encapsulating
the entire inner TCP/UDP datagram within an ESP header. ESP is an IP
protocol in the same sense that TCP and UDP are I...