<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Use time range to activate rules in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/use-time-range-to-activate-rules/m-p/3367371#M962013</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am trying to use a timerange to setup a any any block on my inside interface. This appears to work pretty well as when the time starts it is not possible to start a new connection. However existing connections appear to not get dropped.&amp;nbsp; For instance a secure connection to out netscalers at work (from my home) will stay functional.&amp;nbsp; What am I missing? or what do I need to do to terminate these existing connections?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thnks for your help!!&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 15:38:33 GMT</pubDate>
    <dc:creator>paddy.d</dc:creator>
    <dc:date>2020-02-21T15:38:33Z</dc:date>
    <item>
      <title>Use time range to activate rules</title>
      <link>https://community.cisco.com/t5/network-security/use-time-range-to-activate-rules/m-p/3367371#M962013</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am trying to use a timerange to setup a any any block on my inside interface. This appears to work pretty well as when the time starts it is not possible to start a new connection. However existing connections appear to not get dropped.&amp;nbsp; For instance a secure connection to out netscalers at work (from my home) will stay functional.&amp;nbsp; What am I missing? or what do I need to do to terminate these existing connections?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thnks for your help!!&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:38:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/use-time-range-to-activate-rules/m-p/3367371#M962013</guid>
      <dc:creator>paddy.d</dc:creator>
      <dc:date>2020-02-21T15:38:33Z</dc:date>
    </item>
    <item>
      <title>Re: Use time range to activate rules</title>
      <link>https://community.cisco.com/t5/network-security/use-time-range-to-activate-rules/m-p/3367837#M962015</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Adding a deny access rule only blocks the new connections that will be initiated, it does not drop any existing connections. Thats the way ASA is designed, for existing connections, interface acl check is bypassed. Only when you clear the connections, this new time based acl will come into effect for all the connections.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;clear conn will do the needful but that is a manual step, maybe you can try a EEM script to add the clear conn command then followed by the time based acl addition. We have to make sure that there not much time difference between clear conn and acl addition else the connection initiated between this time will survive the acl.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Similar discussion:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportforums.cisco.com/t5/firewalling/asa5520-acl-established-connections-problem/td-p/1874604" target="_blank"&gt;https://supportforums.cisco.com/t5/firewalling/asa5520-acl-established-connections-problem/td-p/1874604&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;EEM script:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/adaptive-security-appliance-asa-software/117883-config-eem-00.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/adaptive-security-appliance-asa-software/117883-config-eem-00.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please rate helpful posts.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;AJ&lt;/P&gt;</description>
      <pubDate>Wed, 18 Apr 2018 05:48:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/use-time-range-to-activate-rules/m-p/3367837#M962015</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2018-04-18T05:48:29Z</dc:date>
    </item>
    <item>
      <title>Re: Use time range to activate rules</title>
      <link>https://community.cisco.com/t5/network-security/use-time-range-to-activate-rules/m-p/3367939#M962017</link>
      <description>&lt;P&gt;Thanks for the explanation!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I guess it saves a lot of processing to do it this way and that is better for for the performance en throughput.&amp;nbsp; I will have a go with eem.&amp;nbsp; I have not used that before so should be interesting.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks again&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Patrick&lt;/P&gt;</description>
      <pubDate>Wed, 18 Apr 2018 08:57:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/use-time-range-to-activate-rules/m-p/3367939#M962017</guid>
      <dc:creator>paddy.d</dc:creator>
      <dc:date>2018-04-18T08:57:56Z</dc:date>
    </item>
  </channel>
</rss>

