How to deploy Websense with more than one switch in network?

Posted on 2009-05-21
Medium Priority
Last Modified: 2013-11-16
I manage a network of less than 50 users with a remote location that connects by VPN to our router.

I've been asked to find a solution for web monitoring, blocking, and reporting. We want to stop users from wasting time on things like Facebook, Youtube, and Instant Messaging. I'd also like to control bandwidth but not essential.

Cost is also a factor so I started to look at Websense Express.

To install Express I think one of the NICs has to be plugged into a span or mirror port on a switch. This might be a stupid question, but I have 3 switches. Does it matter which one I use?

Question by:occ_user

Accepted Solution

gengw2000 earned 225 total points
ID: 24448798
If your topology is something like: router<->switch1<->switch2<->switch3, you only need to configure port span in the first switch. The port connected to the router should be the source port, and the port connected to the monitoring computer be the target port.

This diagram might be helpful:
LVL 14

Expert Comment

by:Ehab Salem
ID: 24533719

Featured Post

We Need Your Input!

WatchGuard is currently running a beta program for our new macOS Host Sensor for our Threat Detection and Response service. We're looking for more macOS users to help provide insight and feedback to help us make the product even better. Please sign up for our beta program today!

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

When it comes to showing a 404 error page to your visitors, you do not want that generic page to show, and you especially do not want your hosting provider’s ad error page to show either. In this article, I will show you how to enable the custom 40…
In real business world data are crucial and sometimes data are shared among different information systems. Hence, an agreeable file transfer protocol need to be established.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…

622 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question