<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ZBF URL Filtering in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/zbf-url-filtering/m-p/2422141#M307713</link>
    <description>&lt;P&gt;Is it possible to exclude certian MAC addresses from the URL filtering?&amp;nbsp; I need certian people not to be blocked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 03:13:03 GMT</pubDate>
    <dc:creator>peter.williams</dc:creator>
    <dc:date>2019-03-12T03:13:03Z</dc:date>
    <item>
      <title>ZBF URL Filtering</title>
      <link>https://community.cisco.com/t5/network-security/zbf-url-filtering/m-p/2422141#M307713</link>
      <description>&lt;P&gt;Is it possible to exclude certian MAC addresses from the URL filtering?&amp;nbsp; I need certian people not to be blocked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:13:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-url-filtering/m-p/2422141#M307713</guid>
      <dc:creator>peter.williams</dc:creator>
      <dc:date>2019-03-12T03:13:03Z</dc:date>
    </item>
    <item>
      <title>ZBF URL Filtering</title>
      <link>https://community.cisco.com/t5/network-security/zbf-url-filtering/m-p/2422142#M307716</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;when configuring the access list use VLAN range 700-799 or 1100-1199, these are reserved to match on MAC addresses.&amp;nbsp; Call these to the class map which is then used in the policy map.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 700 permit 0800.0000.0001&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect CMAP&lt;/P&gt;&lt;P&gt;match access-group 700&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect PMAP&lt;/P&gt;&lt;P&gt;class type inspect CMAP&lt;/P&gt;&lt;P&gt;inspect&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This configuration will inspect all protocols as there is no specific defined protocol in the class map.&amp;nbsp; &lt;/P&gt;&lt;P&gt;-- &lt;BR /&gt;Please remember to rate and select a correct answer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Dec 2013 21:26:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-url-filtering/m-p/2422142#M307716</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2013-12-13T21:26:32Z</dc:date>
    </item>
  </channel>
</rss>

