<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Allow mode on for ASA? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/allow-mode-on-for-asa/m-p/1432137#M628847</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The equivalent functionality on the ASA is to use the 'allow' keyword when you setup the 'filter url' command that passes traffic to the filtering server. Here is the command reference for it:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/ef.html#wp1933061"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/ef.html#wp1933061&lt;/A&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="1" cellpadding="3" cellspacing="0" id="wp1933067table1933065" style="width: 80%;"&gt;&lt;TBODY&gt;&lt;TR align="left" valign="top"&gt;&lt;SPAN class="content"&gt;&lt;/SPAN&gt;&lt;TD&gt;&lt;P class="pB1_Body1"&gt;
&lt;STRONG class="cCN_CmdName"&gt;allow&lt;/STRONG&gt;
&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;A name="wp1933069"&gt;&lt;/A&gt;&lt;P class="pB1_Body1"&gt;
When the server is unavailable, let outbound connections pass through 
the security appliance without filtering. If you omit this option, and 
if the N2H2 or Websense server goes off line, the security appliance 
stops outbound port 80 (Web) traffic until the N2H2 or Websense server 
is back on line.
&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 06 Aug 2010 13:54:16 GMT</pubDate>
    <dc:creator>mirober2</dc:creator>
    <dc:date>2010-08-06T13:54:16Z</dc:date>
    <item>
      <title>Allow mode on for ASA?</title>
      <link>https://community.cisco.com/t5/network-security/allow-mode-on-for-asa/m-p/1432136#M628846</link>
      <description>&lt;P&gt;We are setting up a websense url-filter for our location. We have the following set up for our routers that are doing auth-proxy and we have no issues with this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip inspect name websenseinternet http urlfilter&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip urlfilter urlf-server-log&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip urlfilter server vendor websense 172.20.63.75&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip urlfilter allow-mode on&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These commands suit my company's needs no problem. We had to put the allow-mode on becasue the server locked up one day and the routers were denying all internet traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My question, is there any allow-mode on commands for pix/asa devices? Any help will be greatly appreciated.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:22:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-mode-on-for-asa/m-p/1432136#M628846</guid>
      <dc:creator>pugs17211721</dc:creator>
      <dc:date>2019-03-11T18:22:02Z</dc:date>
    </item>
    <item>
      <title>Re: Allow mode on for ASA?</title>
      <link>https://community.cisco.com/t5/network-security/allow-mode-on-for-asa/m-p/1432137#M628847</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The equivalent functionality on the ASA is to use the 'allow' keyword when you setup the 'filter url' command that passes traffic to the filtering server. Here is the command reference for it:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/ef.html#wp1933061"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/ef.html#wp1933061&lt;/A&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="1" cellpadding="3" cellspacing="0" id="wp1933067table1933065" style="width: 80%;"&gt;&lt;TBODY&gt;&lt;TR align="left" valign="top"&gt;&lt;SPAN class="content"&gt;&lt;/SPAN&gt;&lt;TD&gt;&lt;P class="pB1_Body1"&gt;
&lt;STRONG class="cCN_CmdName"&gt;allow&lt;/STRONG&gt;
&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;A name="wp1933069"&gt;&lt;/A&gt;&lt;P class="pB1_Body1"&gt;
When the server is unavailable, let outbound connections pass through 
the security appliance without filtering. If you omit this option, and 
if the N2H2 or Websense server goes off line, the security appliance 
stops outbound port 80 (Web) traffic until the N2H2 or Websense server 
is back on line.
&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Aug 2010 13:54:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-mode-on-for-asa/m-p/1432137#M628847</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2010-08-06T13:54:16Z</dc:date>
    </item>
    <item>
      <title>Re: Allow mode on for ASA?</title>
      <link>https://community.cisco.com/t5/network-security/allow-mode-on-for-asa/m-p/1432138#M628848</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, even pix/ASA have allow mode. At the end of "filter" statement you need&lt;/P&gt;&lt;P&gt;to add "allow" keyword which will ensure that the firewall will forward&lt;/P&gt;&lt;P&gt;traffic when the filtering server is unavailable.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration&lt;/P&gt;&lt;P&gt;_example09186a008088517b.shtml&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Aug 2010 13:55:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-mode-on-for-asa/m-p/1432138#M628848</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-08-06T13:55:11Z</dc:date>
    </item>
  </channel>
</rss>

