<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IOS Content filtering problem in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ios-content-filtering-problem/m-p/1414190#M769149</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm having trouble with ZFW and url filtering. If I set it up according to documentation it blocks every website, however if I remove the urlfilter from the policy, everything works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;parameter-map type urlfilter websense-parmap&lt;BR /&gt; exclusive-domain deny .aaaaa.xx&lt;BR /&gt; exclusive-domain deny .bbbbb.xx&lt;/P&gt;&lt;P&gt;exclusive-domain deny .ccccc.xx&lt;/P&gt;&lt;P&gt;exclusive-domain deny .ddddd.xx&lt;/P&gt;&lt;P&gt;exclusive-domain deny .eeeee.xx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any SMTP_TRAFFIC&lt;BR /&gt; match protocol smtp&lt;BR /&gt;class-map type inspect match-any HTTP_TRAFFIC&lt;BR /&gt; match protocol http&lt;BR /&gt;class-map type inspect match-any class-router-to-outside&lt;BR /&gt; match protocol icmp&lt;BR /&gt; match protocol tcp&lt;BR /&gt; match protocol udp&lt;BR /&gt;class-map type inspect match-any class-outside-to-router&lt;BR /&gt; match protocol isakmp&lt;BR /&gt; match protocol ipsec-msft&lt;BR /&gt; match access-group name PROT_ESP&lt;BR /&gt;class-map type inspect match-any class-inside-to-outside&lt;BR /&gt; match protocol https&lt;BR /&gt; match protocol ftp&lt;BR /&gt; match protocol imap&lt;BR /&gt; match protocol imaps&lt;BR /&gt; match protocol pop3&lt;BR /&gt; match protocol pop3s&lt;BR /&gt; match protocol pptp&lt;BR /&gt; match protocol dns&lt;BR /&gt; match protocol user-tcp-8005&lt;BR /&gt; match protocol user-tcp-21000&lt;BR /&gt; match protocol user-tcp-49600&lt;BR /&gt; match protocol ssh&lt;BR /&gt; match protocol ica&lt;BR /&gt; match protocol icmp&lt;BR /&gt; match protocol ntp&lt;BR /&gt; match protocol user-tcp-5910&lt;BR /&gt; match protocol user-tcp-4081&lt;BR /&gt; match protocol user-tcp-10010&lt;BR /&gt; match protocol user-tcp-2222&lt;BR /&gt; match protocol lotusnote&lt;BR /&gt; match protocol user-tcp-8080&lt;BR /&gt; match protocol user-tcp-1353&lt;BR /&gt;class-map type inspect match-any class-outside-to-inside&lt;BR /&gt; match protocol smtp&lt;BR /&gt; match protocol mysql&lt;BR /&gt; match protocol pptp&lt;BR /&gt; match protocol user-tcp-7711&lt;BR /&gt; match protocol user-tcp-5910&lt;BR /&gt; match protocol user-tcp-5911&lt;BR /&gt; match protocol user-tcp-4081&lt;BR /&gt; match protocol user-udp-5910&lt;BR /&gt; match protocol user-udp-5911&lt;BR /&gt;class-map type inspect match-any GRE_TRAFFIC&lt;BR /&gt; match access-group name PROT_GRE&lt;BR /&gt;class-map type inspect match-all SMTP_SERVER_TRAFFIC&lt;BR /&gt; match protocol smtp&lt;BR /&gt; match access-group 100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect policy-router-to-outside&lt;BR /&gt; class type inspect class-router-to-outside&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt;policy-map type inspect policy-outside-to-router&lt;BR /&gt; class type inspect class-outside-to-router&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;policy-map type inspect policy-outside-to-inside&lt;BR /&gt; class type inspect GRE_TRAFFIC&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt; class type inspect class-outside-to-inside&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;policy-map type inspect policy-inside-to-outside&lt;BR /&gt; class type inspect SMTP_SERVER_TRAFFIC&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt; class type inspect GRE_TRAFFIC&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt; class type inspect class-inside-to-outside&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt; class type inspect HTTP_TRAFFIC&lt;BR /&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;&amp;nbsp; urlfilter websense-parmap&lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; drop log&lt;BR /&gt;!&lt;BR /&gt;zone security inside&lt;BR /&gt;zone security outside&lt;BR /&gt;zone-pair security zp-outside-to-inside source outside destination inside&lt;BR /&gt; service-policy type inspect policy-outside-to-inside&lt;BR /&gt;zone-pair security zp-inside-to-outside source inside destination outside&lt;BR /&gt; service-policy type inspect policy-inside-to-outside&lt;BR /&gt;zone-pair security zp-router-to-outside source self destination outside&lt;BR /&gt; service-policy type inspect policy-router-to-outside&lt;BR /&gt;zone-pair security zp-outside-to-router source outside destination self&lt;BR /&gt; service-policy type inspect policy-outside-to-router&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended PROT_ESP&lt;BR /&gt; permit esp any any&lt;BR /&gt;ip access-list extended PROT_GRE&lt;BR /&gt; permit gre any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 100 permit ip host 10.1.28.1 any&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 16:50:03 GMT</pubDate>
    <dc:creator>tgregorics</dc:creator>
    <dc:date>2019-03-11T16:50:03Z</dc:date>
    <item>
      <title>IOS Content filtering problem</title>
      <link>https://community.cisco.com/t5/network-security/ios-content-filtering-problem/m-p/1414190#M769149</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm having trouble with ZFW and url filtering. If I set it up according to documentation it blocks every website, however if I remove the urlfilter from the policy, everything works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;parameter-map type urlfilter websense-parmap&lt;BR /&gt; exclusive-domain deny .aaaaa.xx&lt;BR /&gt; exclusive-domain deny .bbbbb.xx&lt;/P&gt;&lt;P&gt;exclusive-domain deny .ccccc.xx&lt;/P&gt;&lt;P&gt;exclusive-domain deny .ddddd.xx&lt;/P&gt;&lt;P&gt;exclusive-domain deny .eeeee.xx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any SMTP_TRAFFIC&lt;BR /&gt; match protocol smtp&lt;BR /&gt;class-map type inspect match-any HTTP_TRAFFIC&lt;BR /&gt; match protocol http&lt;BR /&gt;class-map type inspect match-any class-router-to-outside&lt;BR /&gt; match protocol icmp&lt;BR /&gt; match protocol tcp&lt;BR /&gt; match protocol udp&lt;BR /&gt;class-map type inspect match-any class-outside-to-router&lt;BR /&gt; match protocol isakmp&lt;BR /&gt; match protocol ipsec-msft&lt;BR /&gt; match access-group name PROT_ESP&lt;BR /&gt;class-map type inspect match-any class-inside-to-outside&lt;BR /&gt; match protocol https&lt;BR /&gt; match protocol ftp&lt;BR /&gt; match protocol imap&lt;BR /&gt; match protocol imaps&lt;BR /&gt; match protocol pop3&lt;BR /&gt; match protocol pop3s&lt;BR /&gt; match protocol pptp&lt;BR /&gt; match protocol dns&lt;BR /&gt; match protocol user-tcp-8005&lt;BR /&gt; match protocol user-tcp-21000&lt;BR /&gt; match protocol user-tcp-49600&lt;BR /&gt; match protocol ssh&lt;BR /&gt; match protocol ica&lt;BR /&gt; match protocol icmp&lt;BR /&gt; match protocol ntp&lt;BR /&gt; match protocol user-tcp-5910&lt;BR /&gt; match protocol user-tcp-4081&lt;BR /&gt; match protocol user-tcp-10010&lt;BR /&gt; match protocol user-tcp-2222&lt;BR /&gt; match protocol lotusnote&lt;BR /&gt; match protocol user-tcp-8080&lt;BR /&gt; match protocol user-tcp-1353&lt;BR /&gt;class-map type inspect match-any class-outside-to-inside&lt;BR /&gt; match protocol smtp&lt;BR /&gt; match protocol mysql&lt;BR /&gt; match protocol pptp&lt;BR /&gt; match protocol user-tcp-7711&lt;BR /&gt; match protocol user-tcp-5910&lt;BR /&gt; match protocol user-tcp-5911&lt;BR /&gt; match protocol user-tcp-4081&lt;BR /&gt; match protocol user-udp-5910&lt;BR /&gt; match protocol user-udp-5911&lt;BR /&gt;class-map type inspect match-any GRE_TRAFFIC&lt;BR /&gt; match access-group name PROT_GRE&lt;BR /&gt;class-map type inspect match-all SMTP_SERVER_TRAFFIC&lt;BR /&gt; match protocol smtp&lt;BR /&gt; match access-group 100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect policy-router-to-outside&lt;BR /&gt; class type inspect class-router-to-outside&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt;policy-map type inspect policy-outside-to-router&lt;BR /&gt; class type inspect class-outside-to-router&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;policy-map type inspect policy-outside-to-inside&lt;BR /&gt; class type inspect GRE_TRAFFIC&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt; class type inspect class-outside-to-inside&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;policy-map type inspect policy-inside-to-outside&lt;BR /&gt; class type inspect SMTP_SERVER_TRAFFIC&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt; class type inspect GRE_TRAFFIC&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt; class type inspect class-inside-to-outside&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt; class type inspect HTTP_TRAFFIC&lt;BR /&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;&amp;nbsp; urlfilter websense-parmap&lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; drop log&lt;BR /&gt;!&lt;BR /&gt;zone security inside&lt;BR /&gt;zone security outside&lt;BR /&gt;zone-pair security zp-outside-to-inside source outside destination inside&lt;BR /&gt; service-policy type inspect policy-outside-to-inside&lt;BR /&gt;zone-pair security zp-inside-to-outside source inside destination outside&lt;BR /&gt; service-policy type inspect policy-inside-to-outside&lt;BR /&gt;zone-pair security zp-router-to-outside source self destination outside&lt;BR /&gt; service-policy type inspect policy-router-to-outside&lt;BR /&gt;zone-pair security zp-outside-to-router source outside destination self&lt;BR /&gt; service-policy type inspect policy-outside-to-router&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended PROT_ESP&lt;BR /&gt; permit esp any any&lt;BR /&gt;ip access-list extended PROT_GRE&lt;BR /&gt; permit gre any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 100 permit ip host 10.1.28.1 any&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:50:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-content-filtering-problem/m-p/1414190#M769149</guid>
      <dc:creator>tgregorics</dc:creator>
      <dc:date>2019-03-11T16:50:03Z</dc:date>
    </item>
    <item>
      <title>Re: IOS Content filtering problem</title>
      <link>https://community.cisco.com/t5/network-security/ios-content-filtering-problem/m-p/1414191#M769184</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Figured it out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"allow-mode on" was missing from my parameter map.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Dec 2009 13:21:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-content-filtering-problem/m-p/1414191#M769184</guid>
      <dc:creator>tgregorics</dc:creator>
      <dc:date>2009-12-18T13:21:31Z</dc:date>
    </item>
  </channel>
</rss>

