<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I would agree with both in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-vs-time-based-acl/m-p/3064629#M147244</link>
    <description>&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;I would agree with both Pulkit and Tagir. Just that instead of clear xlate, you might want to use &lt;STRONG&gt;clear local-host&amp;nbsp;&lt;/STRONG&gt; since there might be hosts having static translation. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;In my opinion, unless there is an enhancement or you might want to run a script, I would say this task has to be done manually everytime:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/A-H/cmdref1/a1.html&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;-&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;AJ&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 27 Jan 2017 13:15:45 GMT</pubDate>
    <dc:creator>Ajay Saini</dc:creator>
    <dc:date>2017-01-27T13:15:45Z</dc:date>
    <item>
      <title>Cisco ASA vs. Time-based ACL</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-vs-time-based-acl/m-p/3064624#M147226</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I'm using ACLs on a Cisco ASA 5512 to block Internet access to some hosts on my network during working hours and only allowing it during breaks.&lt;/P&gt;
&lt;P&gt;The problem is that after the break, users still can browse facebook and stream radio stations. Other websites are blocked.&lt;/P&gt;
&lt;P&gt;It takes a reboot (host's machine) to get facebook blocked again.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;How can I resolve this issue?&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:50:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-vs-time-based-acl/m-p/3064624#M147226</guid>
      <dc:creator>Burgundy Burgundy</dc:creator>
      <dc:date>2019-03-12T08:50:44Z</dc:date>
    </item>
    <item>
      <title>clea xlate</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-vs-time-based-acl/m-p/3064625#M147229</link>
      <description>&lt;P&gt;&lt;EM&gt;clea xlate&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;after brake&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;do you use time-range in ACL ? or http inspet ?&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jan 2017 11:29:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-vs-time-based-acl/m-p/3064625#M147229</guid>
      <dc:creator>Tagir Temirgaliyev</dc:creator>
      <dc:date>2017-01-27T11:29:38Z</dc:date>
    </item>
    <item>
      <title>Hi Tagir,</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-vs-time-based-acl/m-p/3064626#M147233</link>
      <description>&lt;P&gt;Hi Tagir,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Yes I use time ranges in ACL.&lt;/P&gt;
&lt;P&gt;Do I have to manually clear xlate every time?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jan 2017 11:37:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-vs-time-based-acl/m-p/3064626#M147233</guid>
      <dc:creator>Burgundy Burgundy</dc:creator>
      <dc:date>2017-01-27T11:37:29Z</dc:date>
    </item>
    <item>
      <title>Hi Burgundy,</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-vs-time-based-acl/m-p/3064627#M147236</link>
      <description>&lt;P&gt;Hi Burgundy,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Pretty good query, tried looking for the answer but it seems that for now, as per the packet flow, the ACL will not kick in if we have an established session. So the user goes through.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thus, as Tagir mentioned, "clear xlate" is an option, however that can also clear valid xlates.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Let me check further on this, give me a day or two and I will revert.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;P&gt;Pulkit&lt;/P&gt;
&lt;P&gt;Please rate helpful posts.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jan 2017 12:43:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-vs-time-based-acl/m-p/3064627#M147236</guid>
      <dc:creator>Pulkit Saxena</dc:creator>
      <dc:date>2017-01-27T12:43:13Z</dc:date>
    </item>
    <item>
      <title>Hi Pulkit,</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-vs-time-based-acl/m-p/3064628#M147238</link>
      <description>&lt;P&gt;Hi Pulkit,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks, I'd appreciate your help on that.&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jan 2017 12:51:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-vs-time-based-acl/m-p/3064628#M147238</guid>
      <dc:creator>Burgundy Burgundy</dc:creator>
      <dc:date>2017-01-27T12:51:00Z</dc:date>
    </item>
    <item>
      <title>I would agree with both</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-vs-time-based-acl/m-p/3064629#M147244</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;I would agree with both Pulkit and Tagir. Just that instead of clear xlate, you might want to use &lt;STRONG&gt;clear local-host&amp;nbsp;&lt;/STRONG&gt; since there might be hosts having static translation. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;In my opinion, unless there is an enhancement or you might want to run a script, I would say this task has to be done manually everytime:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/A-H/cmdref1/a1.html&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;-&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;AJ&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jan 2017 13:15:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-vs-time-based-acl/m-p/3064629#M147244</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2017-01-27T13:15:45Z</dc:date>
    </item>
    <item>
      <title>I tried clear local-host, it</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-vs-time-based-acl/m-p/3064630#M147246</link>
      <description>&lt;P&gt;I tried clear local-host, it resolves the facebook issue.&lt;/P&gt;
&lt;P&gt;However it doesn't clear youtube established connections. I also tried clear xlate and clear conn... same thing.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2017 19:35:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-vs-time-based-acl/m-p/3064630#M147246</guid>
      <dc:creator>Burgundy Burgundy</dc:creator>
      <dc:date>2017-02-06T19:35:31Z</dc:date>
    </item>
    <item>
      <title>Could you please send the</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-vs-time-based-acl/m-p/3064631#M147248</link>
      <description>&lt;P&gt;Could you please send the below outputs"&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;clear the connections for a specifc inside user:&lt;/P&gt;
&lt;P&gt;clear local-host x.x.x.x&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;show xl | in x.x.x.x&lt;/P&gt;
&lt;P&gt;show conn &amp;nbsp;| in x.x.x.x&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;also, attach a packet-tracer output which will indicate if a connection is allowed.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Unless the end user is taking some other source ip address, the initial workaround should work. Please attach the outputs and we can see whats happening.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Feb 2017 14:41:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-vs-time-based-acl/m-p/3064631#M147248</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2017-02-07T14:41:36Z</dc:date>
    </item>
    <item>
      <title>Ok, I will do that.</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-vs-time-based-acl/m-p/3064632#M147250</link>
      <description>&lt;P&gt;Ok, I will do that.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I want to add something though, I think it's an issue with websites using QUIC protocol. I see udp connections to facebook and youtube that are not affected by the clear local-host command.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Feb 2017 14:54:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-vs-time-based-acl/m-p/3064632#M147250</guid>
      <dc:creator>Burgundy Burgundy</dc:creator>
      <dc:date>2017-02-07T14:54:34Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-vs-time-based-acl/m-p/3064633#M147251</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Apologies for the delay here. I checked and confirm that the time range ACL's are like any normal ACL's to prevent the session from being built. Once the session is built, the time range ACL's and normal ACL's are irrelevant. Even if you remove the ACL , the session will still to be up and running as long as there is traffic. Just that no new sessions can be formed. The same thing holds good for Time range ACL's. Once the timer expires, no new session will form but the existing session will be up and running till the traffic is there.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;P&gt;Pulkit&lt;/P&gt;</description>
      <pubDate>Tue, 07 Feb 2017 15:05:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-vs-time-based-acl/m-p/3064633#M147251</guid>
      <dc:creator>Pulkit Saxena</dc:creator>
      <dc:date>2017-02-07T15:05:52Z</dc:date>
    </item>
    <item>
      <title>"clear local-host x.x.x.x"</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-vs-time-based-acl/m-p/3064634#M147253</link>
      <description>&lt;P&gt;"clear local-host x.x.x.x" should clear all the connections for that IP. It seems that in your case, maybe when connections are made using quick protocol it is using some other ACL or policy. And I believe we are "clear local-host" for the source IP.&lt;/P&gt;
&lt;P&gt;Please share the output's that Ajay has asked, maybe we could find something additional.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;P&gt;Pulkit&lt;/P&gt;</description>
      <pubDate>Tue, 07 Feb 2017 15:12:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-vs-time-based-acl/m-p/3064634#M147253</guid>
      <dc:creator>Pulkit Saxena</dc:creator>
      <dc:date>2017-02-07T15:12:07Z</dc:date>
    </item>
  </channel>
</rss>

