[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Time-Range

Posted on 2013-06-05
6
Medium Priority
?
164 Views
Last Modified: 2013-07-10
Hi experts,

I created a policy-map to block some websites and it works well, and I created a time-range for every day start from 8 to 4, but I don't know how to include this time range in my policy-map.

Thanks
0
Comment
Question by:lexmark1
  • 4
  • 2
6 Comments
 
LVL 65

Expert Comment

by:btan
ID: 39225307
0
 

Author Comment

by:lexmark1
ID: 39225533
Hi Dear,
Thanks for reply but I want to include my time-range in my existing class-policy to do time for website blocking not time for web surfing.

Thanks
0
 
LVL 65

Assisted Solution

by:btan
btan earned 1500 total points
ID: 39225628
Would it be simply be done in access list instead
uration

ip access-list extended RESTRICTED_SITES

deny ip 172.16.30.0 0.0.0.127 66.220.144.0 0.0.15.255 time-range OFFICE_HRS
deny ip 172.16.30.0 0.0.0.127 204.74.64.0 0.0.63.255 time-range OFFICE_HRS
deny ip 172.16.30.0 0.0.0.127 69.63.176.0 0.0.15.255 time-range OFFICE_HRS
deny ip 172.16.30.0 0.0.0.127 69.171.224.0 0.0.31.255 time-range OFFICE_HRS
permit ip any any
0
 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

 
LVL 65

Expert Comment

by:btan
ID: 39225669
Probably this is a better one
https://supportforums.cisco.com/thread/2070269
0
 

Author Comment

by:lexmark1
ID: 39268093
Hi breadtan,

Is there any way to apply time-range in my exist class-map without accees-list?

Thanks
0
 
LVL 65

Accepted Solution

by:
btan earned 1500 total points
ID: 39269037
so far time-range need access-list  (in base licence)

http://www.cisco.com/en/US/products/sw/secursw/ps1018/products_tech_note09186a00800a5b9a.shtml#timebasedtimerange

Time-Based ACLs Using Time Ranges

Time-based ACLs were introduced in Cisco IOS Software Release 12.0.1.T. While similar to extended ACLs in function, they allow for access control based on time. A time range is created that defines specific times of the day and week in order to implement time-based ACLs. The time range is identified by a name and then referenced by a function. Therefore, the time restrictions are imposed on the function itself. The time range relies on the router system clock. The router clock can be used, but the feature works best with Network Time Protocol (NTP) synchronization.

http://www.cisco.com/en/US/docs/switches/lan/catalyst2950/software/release/12.1_19_ea1/configuration/guide/swacl.html#wp1071539
http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/acl_objects.html#wp1525991
0

Featured Post

Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Last month Marc Laliberte, WatchGuard’s Senior Threat Analyst, contributed reviewed the three major email authentication anti-phishing technology standards: SPF, DKIM, and DMARC. Learn more in part 2 of the series originally posted in Cyber Defense …
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses
Course of the Month19 days, 14 hours left to enroll

872 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question