Guest

Preview Tool

Cisco Bug: CSCul84561 - Ability to bypass Tower for HTTPS sites for Transparent Traffic

Last Modified

Jan 17, 2019

Products (1)

  • Cisco Web Security Appliance

Known Affected Releases

7.5.7-048 8.0.6-119 8.0.7-142 8.0.7-150 9.1.1-074

Description (partial)

Symptom:
Unable to send traffic using DIRECT CONNECTION for HTTPS sites in cloud connector mode when traffic is sent transparently to the WSA using WCCP.

Conditions:
When you would like to bypass ScanSafe Towers for HTTPS sites while traffic is forwarded transparently using WCCP to the WSA.

Related Community Discussions

<key>CSCul84561</key> - Ability to bypass Tower for HTTPS sites for Transparent Traffic
We use the WSAv in connector mode and transparent (wccp) to get traffic to the towers for hundreds of customers. We have to have two processes to exclude traffic from towers: 1. HTTP - use the Wsa web UI policy (preferred) 2. HTTPS - cli ASA firewall and exclude from wccp policy Extremely inefficient, high impact and annoying. Would be great if this could be done from the WSA UI.  Cisco-is this planned to be addressed soon? This is a major CON of the WSA connector. And yes I know it works in explicit ...
Latest activity: Feb 04, 2016
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.