hi
Just wondering if anyone has configured cut-through proxy on the ASA?
Got a couple of questions on it- first, if I use http for the auth, will the end user browse to the firewall first, authenticate, and then have access through? second, will I need to nat their IPs (ie do I have to create a nat pool for them) or can they keep their real IPs?
And finally, is it pretty easy to setup? it looks it, from what i can see from the book, but would be nice to hear it from someone who's done it.
Thanks.
Just wondering if anyone has configured cut-through proxy on the ASA?
Got a couple of questions on it- first, if I use http for the auth, will the end user browse to the firewall first, authenticate, and then have access through? second, will I need to nat their IPs (ie do I have to create a nat pool for them) or can they keep their real IPs?
And finally, is it pretty easy to setup? it looks it, from what i can see from the book, but would be nice to hear it from someone who's done it.
Thanks.