Hey All,
Currently, our last router before our Internet connection redirects all to our web filter. The way we do this is a simple route-map and ACL:
The ACL:
access-list 110 permit tcp 10.10.0.0 0.0.255.255 any eq www
access-list 110 permit tcp 10.20.0.0 0.0.255.255 any eq www
access-list 110 permit tcp 10.30.0.0 0.0.255.255 any eq www
access-list 110 permit tcp 10.40.0.0 0.0.255.255 any eq www
access-list 110 permit tcp 10.15.0.0 0.0.255.255 any eq www
access-list 110 permit tcp 10.42.0.0 0.0.255.255 any eq www
access-list 110 permit tcp 10.32.0.0 0.0.255.255 any eq www
access-list 110 permit tcp 10.22.0.0 0.0.255.255 any eq www
access-list 110 permit tcp 10.12.0.0 0.0.255.255 any eq www
The route-map (applied to the data VLAN):
route-map squid permit 10
match ip address 110
set ip next-hop 10.1.1.3
The way our network is set up, any web traffic that happens to flow through this router will be redirected through the web filter. Our web and e-mail servers resides on the 10.1.x.x network which is also routed by this router.
Is there a way to configure the ACL the route-map uses so that it doesn't re-route local web traffic to our web filter? Would it be as simple as adding deny statements like below?
For a given network: access-list 110 deny tcp any 10.10.0.0 0.0.255.255 eq www
For a specific host: access-list 110 den tcp any 10.1.1.99 0.0.255.255 eq www
Or is it more complicated than that?
Currently, our last router before our Internet connection redirects all to our web filter. The way we do this is a simple route-map and ACL:
The ACL:
access-list 110 permit tcp 10.10.0.0 0.0.255.255 any eq www
access-list 110 permit tcp 10.20.0.0 0.0.255.255 any eq www
access-list 110 permit tcp 10.30.0.0 0.0.255.255 any eq www
access-list 110 permit tcp 10.40.0.0 0.0.255.255 any eq www
access-list 110 permit tcp 10.15.0.0 0.0.255.255 any eq www
access-list 110 permit tcp 10.42.0.0 0.0.255.255 any eq www
access-list 110 permit tcp 10.32.0.0 0.0.255.255 any eq www
access-list 110 permit tcp 10.22.0.0 0.0.255.255 any eq www
access-list 110 permit tcp 10.12.0.0 0.0.255.255 any eq www
The route-map (applied to the data VLAN):
route-map squid permit 10
match ip address 110
set ip next-hop 10.1.1.3
The way our network is set up, any web traffic that happens to flow through this router will be redirected through the web filter. Our web and e-mail servers resides on the 10.1.x.x network which is also routed by this router.
Is there a way to configure the ACL the route-map uses so that it doesn't re-route local web traffic to our web filter? Would it be as simple as adding deny statements like below?
For a given network: access-list 110 deny tcp any 10.10.0.0 0.0.255.255 eq www
For a specific host: access-list 110 den tcp any 10.1.1.99 0.0.255.255 eq www
Or is it more complicated than that?