IPrism Placement

Posted on 2004-11-25
Last Modified: 2013-11-16
I have used the IPrism filter for sometime and have just recently gone from an ISA firewall to a PIX.  I am looking for advice as to the best placement of my IPrism.  I have a Cisco 2600 router connected to the external interface of my PIX and the internal interface of the PIX connected to a 3750.  Should I place the IPrism between the 3750 and the PIX for best performance?
Question by:cisdoz2
    LVL 79

    Accepted Solution

    Your best bet will be to place the iPrism in-line right smack between the PIX inside interface and the 3750.
    Use a crossover cable between the iPrism and the  PIX, and a standard patch cable between the iPrism and the switch.

    Author Comment

    Thanks lrmoore, you make EE a valuable asset to our organization.
    LVL 79

    Expert Comment

    Glad I can help!

    Expert Comment

    On this same note: I have an IPrism and remote offices connected by to Headquarters via VPN tunnels. Any thoughts on using that same IPrism to perform URL filtering for both the HQ and remote offices?

    Each remote site has PIX 501 and HQ has PIX 506. The remote office are using VPN tunnels into a Cisco Concentrator 3005.
    LVL 79

    Expert Comment

    If the VPN 3005 has its own public IP, then yes, you can route all remote traffic through the 3005, through the iPrism, then back out through the HQ PIX 506.

    Featured Post

    Better Security Awareness With Threat Intelligence

    See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

    Join & Write a Comment

    The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
    This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
    Sending a Secure fax is easy with eFax Corporate ( First, Just open a new email message.  In the To field, type your recipient's fax number You can even send a secure international fax — just include t…
    In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…

    728 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    21 Experts available now in Live!

    Get 1:1 Help Now