Firewall Blocking Website without manual input

Our firewall appears to be blocking a website without us setting it to block it. We only have basic threat detection enabled, but it seems the firewall did this on it's own, and we cannot find where to unblock the website.
Anyone have any tips for new users?
Thanks!

Thanks for the information.
Unfortunately you posted on the wrong forum.
I would try this one:
https://supportforums.cisco.com/community/5991/wan-routing-and-switching
or this one:
https://supportforums.cisco.com/community/6016/lan-switching-and-routing
This forum is meant for Small Business units, so you may not be reaching the right audience to get the best answers for your issue
I hope this helps

Similar Messages

  • How to have list of dates automatically updated on website, without manually changing in Muse

    Hey, I'm designing a site for a band I play drums in and was wondering how I could update the list of gigs we have, without manually editing in Muse then uploading again. Is there a way of past gigs being taken off without me manually doing it?

    I believe you are referring to events with calender on page where you can update the calender showing the dates, In case you are using third party event system then Muse will not control this but if you have created that in Muse itself then you will have to manually update it from Muse.
    If site is hosted on BC then you can use events module to render the dates and details , from site end you can plan out the events and the one expired will be removed from calender.
    Thanks,
    Sanjit

  • HT2513 Had to import Birthdays from yahoo calendar. Is there any way to move them to the iCal Birthdays calendar without manually inputing them each into Address Book?

    I used to use Yahoo Calendar to manage my birthdays and notifications of them. Yahoo screwed with something, so now I no longer get birthday notification texts to my cell. Now, I've imported my Yahoo Calendar dates in to iCal. iCal has a Birthdays "subscription" calendar which only shows birthdays entered into the Address Book. I do not have any birthdays entered into Address Book. Is there any way to select birthday entries from my other calendars and move them to the birthdays tab, or must I manually enter over 200 birthdays into Address Book?
    While I'm here, is there any way to highlight specific calendar entries and move them to a "new calendar"?
    THanks in advance for any and all help.
    -BKTru

    looks like this is not yet an option via yahoo/sbc

  • Does iPad/apple block access to some websites without my permission?

    Does iPad/apple block access to some websites without my permission?

    There is in fact no native ability in iOS to block specific web sites. All you can do is turn off Safari completely.
    As the others have suggested, either those sites are not compatible with the browser in iOS (being based on Flash or Java, or using Microsoft-proprietary components that work only in Internet Explorer, for instance), or your Internet connection is blocking the sites.
    Regards.

  • Automated vendor block on creation without user inputs

    Hi All,
    I want to block the vendor in creation without user inputs:
    Not in T-code mk01<extras<blocked data, and definiately not after creating the vendor and using t-code MK05.
    How i can change a field in table LFA1 while creating the vendor.
    the field that i want to set is LFA1-SPERM (for all purchasing Org).
    Please suggest if you have any ideas how this can be done.
    Thanks,
    Mamta

    Hi,
    Not sure your issue was solved already.
    However, if not resolved already try this
    create an explicit enhancement in include MF02KFV0
    ENHANCEMENT 3  ZFI_VENDOR_CREATE.  
    IF SY-TCODE = 'MK01''.
    LFA1-SPERM = `X`.
    ENDIF.
    ENDENHANCEMENT.
    Enhancement Spot :ES_MF02KFV0   
    Program: MF02KFV0  
    Enhancement Implementation type: Dynamic Enhancement Point
    Enhancement Implementation POint:  \IC:MF02KFV0\EX:VERBUCHUNGSAUFRUF_02\EI
    Regards
    Raja

  • Is there an extension that adds dates to google calender directly from a website without having to put it in manually

    is there an extension that puts dates directly into google calendar from a website just by clicking on it ( the website), without having to put it in manually

    Probably not
    Ones that can do some of that and Places to read and study include - iPhoto Library Manager  -  Duplicate annihilator - DeCloner
    LN

  • Without manual entry can you input a value into a numberic control?

    I am using a numeric control and a button (with a case structure) to manually input numbers into a function.  However, I also want to be able to, via a text file, enter numbers into that same numeric controller, so that I can again hit the button and have the number enter the function.

    endmile said:
    Writing to the local variable will set the value at that time, but it's still updating the value of the local variable all the time.
    What exactly do you mean by this?
    endmile said:
    But in this case, I think the simplest answer is the property node.
    That's not a valid conclusion. There is no "simplest" answer. It's all context-based. There's nothing "bad" or "evil" about local variables. In fact, they tend to be faster than writing to the "Value" property node. Let's just say that proper use depends on understanding how each operates, and once you know that, each can be used effectively.
    I hope this doesn't become another one of those "local variables vs property nodes".

  • Should I turn of Mac firewall to allow Cyber Security firewall to work without interference ?

    Recently purchased Cyber Security Pro and that company said I need to turn off Mac firewall so it won't interfere with their firewall. Is that the right decision ?

    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it.
    The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has so far failed to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. These failures don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, and a technological fix is not going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the scam artists. If you're smarter than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software.
    ☞ Rogue websites such as Softonic and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" (AV) or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in everyemail attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It's as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • BT Blocking Website

    I have the BT HomeHub V2.1 and the way I access to the Homehub settings is [b]192.168.1.254[/b], how do I block websites using the Homehub settings without using softwares or firewall?

    I have Cyberpatrol installed on my grandchildren`s computers. It has many options including time, website and program restrictions.
    You can hide the software from the user, and it cannot be un-installed without a password.
    You can download a free trial.
    The BT parental controls are are a bit awkward to administer, but are free, but not as comprehensive as Cyberpatrol.
    OpenDNS can restrict websites, but cannot control access times.
    There are some useful help pages here, for BT Broadband customers only, on my personal website.
    BT Broadband customers - help with broadband, WiFi, networking, e-mail and phones.

  • 10.6 Server's Firewall Blocks It's Own Internet Connection

    I had this problem about two years ago when I was trying to run 10.6 on my home server (Mac mini) for the first time. Eventually I gave up, reverted the mini back to 10.5, and ram problem-free for years. When 10.7 came out, I tried to upgrade the mini to that. That didn't go well either, but mostly due to Lion missing many many features (suprise!). So I figured that 10.6's problems were fixed by now, and gave it another shot. It went fine and I've been running for about a month problem free (or so I thought). But now it's offline again. I finally found one other person on another forum that had the EXACT same problem as me. And reading this description, I realize that I have been having problems all long, I just assumed they were my ISP's problems, not my own.
    So here's what happens. The firewall in 10.6 server will "freak out". It will be running normally, then suddenly it will go haywire and block everything. And I mean everything. My computer won't even be able to get an IP via DHCP. Everything is blocked. But as soon as you stop the firewall, everything works normally. You can even modify the firewall rules, and set it up so there are NO deny rules, and EVERY connection to and from every host is set to allow. And the firewall still blocks everything. This is the same exact thing that happened 2 years ago when I first tried to run 10.6 Server on my mini. The difference is that back then, this would happen either immediatly, or within a day. This time around, with 10.6.8, it took about a month before suddenly, without any provocation, all internet connections stopped.
    I've had this happen on multiple computers. I don't do anything special, I just set up a basic firewall scheme where everything in the LAN range is allowed, and everything from "any" is allowed only to service ports I'm running. The basic gateway setup. Now I was running 10.6 Server on my laptop (for netbooting) and it would do the same thing. But because my laptop wasn't acting as a gateway, I could just turn the firewall off (you need the firewall for NAT). My mini server IS acting as a gateway, as was another mini I set up for a client of mine (that eventualy I changed over so they were running off an airport, and the mini server was just a client. But I don't want that setup at home, I want my mini to be the router).
    I have verizon Fios internet. 25/25, it's great. The ONT is in my basement, and it's plugged into the same fused outlet as our freezer. From time to time, when the power goes out, it trips that breaker and the outlet goes dead. My itnernet is gone and I have to go reset the outlet. Once I do, my mini won't get an IP from Verizon until I reboot the mini. Not once. Not twice. Usually 5-10 reboots, and suddenly it will get an IP. I always assumed this was a verizon problem. Until I read someone else's post about this same problem. Turns out, that's the firewall blocking DHCP again! If you turn the firewall off, you don't have to keep rebooting, it will grab an IP right away.
    At least I'm not crazy! So what is going on here? Does anyone have any idea what is going on with my firewall, or how I can fix it?
    Lastly, after 4.5 hours of complete inability to get an internet connection with the firewall on, it just started working again. I now have fully functional, normal internet. I find it hard to believe 10.6 has a firewall that is simply broken. I find it even harder to believe I'm imagining things, or that I've had fluke after fluke. Something is going on with 10.6 Server.

    The DNS skapegoat just doesn't make sense.
    Why would "improper" DNS cause OS X's firewall to block all network connections? Even the server's ability to make it's own DHCP connection?
    As far as a router, I don't want to use a cheap unreliable residential router. I have a home file server that, aside from running 10.6, makes a super reliable router. And port mapping aside, OS X Server's DHCP server is great to use. Rock solid. It makes no sense to run a cheap residential router when I have a home server. Then every 6-18 months, I get to deal with that router slowly failing, as my internet connection gets slower and slower. No thanks.
    So back to this firewall issue. I've talked to Apple aobut this before, and they give the same generic "DNS has to be right" answer to basically every problem I've ever had with 10.6 Server (hinting at endless CalDAV problems). But no one has every explained what that specifically means, or how something like wrong DNS (whatever that even means) can cause the firewall to block everything. This just makes no sense to me. And this especially does not explain why, after 10 reboots or so, everything just magically starts running normally.
    I just had an incedent today where I woke up to no internet. I rebooted 3 times. Each time, I either got a self-assigned IP address, or the ethernet interface would toggled between "unplugged" and "no-ip". I could turn the firewall off and the server would INSTANTLY start functioning normally. I'd happily run without a firewall, and just turn all services I'm not using off. However NAT needs the firewall, so without the firewall, the Server is the only Mac on the network that has an internet connection. So I kept rebooting and rebooting, and I think about 8 reboots later, like magic, the server came up, grabbed an IP, and everything started working normally.
    Also my IP through my ISP is dynamic, and that isn't going to change. So yes, I am trying to use OS X Server as my router on a dynamic internet connection. I've been doing this since the days of Mac OS X Server 10.1. Only 10.6 has had any problems at all.
    So really, "10.6 is more picky about DNS" isn't an answer to this problem. Or, at least, it's not a sufficient answer. I need much more information than that.

  • Check user manual input in excel BPS layouts

    I have some problems for manual input characteristics checks on an excel bps layout.
    I need to assign the value of an header characteristic to a detaild characteristic. How can I do ? I have already tried with characteristic rels. (exit, attributes, etc.) but without results.
    Thanks in advance.

    Hi Mario,
    I am quite sure, that if a char is in an P.Level, and there is a char relationship for it, the char relationship will not be called (somebody correct me if am wrong).
    So, in your case, you want to derive SALES ORG from Company code using char rel. The sales org is in the p.level, since it is in your layout. Threfore the char rel will be not called.
    If you want to have it works, do not select sales org in your level. I assume that you filter your comp code in level with a bps variable. Get this variable value (using API_SEMBPS_VARIABLE_GETDETAIL function) and assign it to char SAles org in your char rel exit. Everytimes when you save your plan data, the char rel exit will be call and sales org will be derived.
    If you want to show and derive the sales org in your layout based on selected company code, create a bps variable type exit for it, and read and derive the value from comp code variable.
    Best Regards,
    Suan Liono

  • My whishlist has changed without my input

    in itunes i discovered that my whishlist has changed without my input. all my old whishlist items are gone and two new, unknown to me have been added. has anyone had this problem?

    joanfromgreenbrae wrote:
    My website is joanhauck.com.
    Joan ~ Just a tip: Including the prefix will make your website clickable:
    http://joanhauck.com
    joanfromgreenbrae wrote:
    Also, I would have replied to Old Toad, who commented on my original question, but I can't figure out how to do it, without starting an original discussion. Can you also explain this process?  Thanks
    Make sure you're logged in to the Support Communities and display the thread you want to reply to. Then locate the particular post to reply to and click the Reply link:
    ...And there are some tutorials HERE.

  • Sophos uninstaller says "Sophos Anti-virus is not installed" but sophos still blocks websites.

    Hi, I downloaded the free (trial?) version and didn't like it blocking websites. I dragged the app to the trash and, of course, it didn't uninstall. Looked it up and got a (I think there are more than one) remove tool for sophos but it says it can't find sophos on my MAC. Yet, when browsing the internet, sophos still blocks websites. Any suggestions? I'm a little frustrated.  Thanks in advance, Willie

    Hi Willie,
    Sorry you're having trouble. If you uninstall by dragging the app to the trash instead of using the remove sophos tool, this sort of thing unfortunately tends to happen.  
    One thing I wanted to mention is that if you don't want Sophos to block websites, you can actually disable the web filtering feature. All you have to do is click the sheild icon > preferences > web protection and toggle the switch to 'off.'
    Another question, I was just curious if you were having trouble with Sophos blocking sites that you thought were safe? We should only block you from accessing malicious websites, so if we were interferring with accessing "regular" sites, you can let us know which sites were incorrectly blocked, and we'll take another look at it.
    All that said, if you just want to remove Sophos there's a couple things you can do.
    1. Restart your mac, reinstall Sophos, and then once it's working properly, use the 'Remove Sophos Antivirus' app to remove it
    2. Manually remove Sophos 
    - Open Activity Monitor and stop any processes with "Sophos" in the name
    - Open Finder, and remove everything in the following list:  
    /Library/Sophos Anti-Virus
    /Library/LaunchDaemos/com.sophos.* 
    /Library/LaunchAgents/com.sophos.* 
    /Library/Preferences/com.sophos.* 
    /Library/Logs/Sophos Anti-Virus.log 
    /Applications/Sophos Anti-Virus.app 
    /Applications/Sophos Remove.app 
    /var/db/receipts/com.sophos.*  
    Note: You'll need administrative rights to remove most of those files. Then reboot, to ensure everything is cleared from memory too. Then run through the list again, to ensure you got everything.   
    Warning: Be cautious when deleting things in some of those directories. Not everything in there is related to our software - our files contain the name "Sophos".
    Hope that helps, let me know if you have any trouble! 

  • Is it possible to block websites on Firefox (i.e. Facebook)

    I can't figure out how or if I can temporarily block websites.

    Firefox doesn't have any means of doing that, but you could either use your Firewall to block it, or install an add-on like this one: https://addons.mozilla.org/en-US/firefox/addon/foxfilter/ or possibly this one: http://www1.k9webprotection.com/
    Incidentally, your Flash player is out of date which exposes your system to exploits. See: http://www.adobe.com/support/security/bulletins/apsb11-12.html Update link at the foot of the page.

  • IP Restrictions not taking effect until the Azure Website is manually restarted

    Hi,
    We are trying to limit IPs that connect to an Azure website using "system.webServer/security/ipSecurity". It appears that this restriction only works after the Azure website is manually restarted.
    Our web.config file looks like this:
    <system.webServer>
    <security>
     <ipSecurity allowUnlisted="false" denyAction="NotFound">
       <clear />
       <add allowed="true" ipAddress="xxxx.xxxx.xxxx.xxxx" />
     </ipSecurity>
    </security>
      </system.webServer>
    Has anyone experienced the same issue? If we don't restart the site, any IPs can access our site.  Is there a way to enable IP whitelisting without having to restart the Azure website?
    Thank you,
    Jonas

    Well yes, you have to restart the website in order for your changes to reflect in the site.
    And what is it you're trying to do? Put all the allowed ip addresses and restart it once and you're good to go. However if you need to add new ip addresses daily, then that can be an issue.

Maybe you are looking for

  • Atraso no envio de emails após alteração de fuso do sistema

    Após aplicarmos as notas 1074444/926290/741734 devido a ums reclamação do cliente sobre a coleta de estatisticas estarem defazadas,  notamos que os emails tem ficado retidos na tcode SOST com o fuso horário CET. Com isso os emails que deveriam ser en

  • Unable to create a first Domain in JDI CMS system

    Hello All, I have installed JDI and configured SLD and everything seems to be working properly.  However, when I go into the CMS service (http://localhost:devinf) and try to create a domain it tells me I am creatinga customer domain and will not be a

  • Why do I have question marks in the finder window header?

    Ever since I upgraded my MacBook Pro to Lion I've noticed a large question mark in the finder window header. There is a smaller one beneath it, and they're both located just to the left of the search window.

  • (little) bug in apex : for the apex team

    Hi, I have two applications in one workspace, both having some LOV´s. If I show from shared components the LOV´s of the first application it return several LOV´s If I do the same for the second application (having a smaller number of LOV´s) the reset

  • BADI for FBL3N/FAGLL03

    Dear all, Is there a badi for FBL3N/FAGLL03. actually the problem is that when i excecute these transactions the customer field is empty.the client requirement is that they want the customer number there.The problem is that when i pass that document