How to integrate Cisco ISR with Websense, small office

Posted on 2011-10-11
Last Modified: 2012-05-12
I have a Websense Policy broker at home office and a remote site with a Cisco 2811 ISR.  I would like to configure the router to white list/black list consulting with the Websense Policy broker.  Is this possible and can you point me to how to configure this?  Is there a special software feature required to be on the ISR in order to do this?  Currently running: (C2800NM-ADVIPSERVICESK9-M), Version 12.4(22)T3
Question by:amigan_99
    LVL 8

    Expert Comment

    Are you wanting to filter the users from the remote site to the Websense Installation at the home site? If so the only way would be to setup Hybrid Filtering using Websense Web Security Gateway Anywhere to filter remote locations.

    LVL 1

    Accepted Solution

    I want to filter users at a remote site from being able to reach restricted sites as defined in the Websense Policy Broker.  And I want to do this without having a server (with websense filtering software) at the site.  I want the router to reference the Websense Policy Broker at HQ office for the pass/no pass.  This appears to be available per the URL below.  Any insight?
    LVL 1

    Author Closing Comment

    This is the install information I was seeking.

    Featured Post

    PRTG Network Monitor: Intuitive Network Monitoring

    Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

    Join & Write a Comment

    As a financial services provider, your business is impacted by two of the strictest federal regulations on record: the Sarbanes-Oxley Act and the Gramm-Leach-Bliley Act. Correctly implementing faxing into your organization to provide secure, real-ti…
    This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
    Here's a very brief overview of the methods PRTG Network Monitor ( offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
    In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor ( If you're interested in additional methods for monitoring bandwidt…

    729 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    20 Experts available now in Live!

    Get 1:1 Help Now