<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISR4331/K9-Zone based firewall configuration. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/isr4331-k9-zone-based-firewall-configuration/m-p/3806850#M1049201</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The command didn't work at all.&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="Capture5.PNG" style="width: 326px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/30659i81AE80BBFD2DBA59/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Capture5.PNG" alt="Capture5.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 21 Feb 2019 15:12:20 GMT</pubDate>
    <dc:creator>Beast6</dc:creator>
    <dc:date>2019-02-21T15:12:20Z</dc:date>
    <item>
      <title>ISR4331/K9-Zone based firewall configuration.</title>
      <link>https://community.cisco.com/t5/network-security/isr4331-k9-zone-based-firewall-configuration/m-p/3804448#M1049136</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cisco ISR4331/K9 Router, Cisco IOS XE Software, Version 03.16.04b.S - Extended Support Release&lt;/P&gt;&lt;P&gt;Cisco IOS Software, ISR Software (X86_64_LINUX_IOSD-UNIVERSALK9-M), Version 15.5(3)S4b, RELEASE SOFTWARE (fc1).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The router is configured with Zone-Based&amp;nbsp;Firewall configuration to handle all my customer traffic. I have created extended access-lists and associated the class-map to it, Everything is working fine but I am not able to see any hits my ACL logs. Can someone please advise.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Router Configuration:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any E_FW_OUTSIDE_TO_SLF_98_CLASS_MAP&lt;BR /&gt;match access-group name E_FW_OUTSIDE_TO_SLF_ACL_04&lt;BR /&gt;class-map type inspect match-any E_FW_SLF_TO_OUTSIDE_98_CLASS_MAP&lt;BR /&gt;match access-group name E_FW_SLF_TO_OUTSIDE_ACL_06&lt;BR /&gt;class-map type inspect match-all E_FW_INSIDE_TO_OUTSIDE_CLASS_MAP&lt;BR /&gt;match access-group name E_FW_INSIDE_TO_OUTSIDE_ACL_01&lt;BR /&gt;class-map type inspect match-any E_FW_OUTSIDE_TO_INSIDE_CLASS_MAP&lt;BR /&gt;match access-group name E_FW_OUTSIDE_TO_INSIDE_ACL_03&lt;BR /&gt;class-map type inspect match-any E_FW_INSIDE_TO_SLF_98_CLASS_MAP&lt;BR /&gt;match access-group name E_FW_INSIDE_TO_SLF_ACL_02&lt;BR /&gt;class-map type inspect match-any E_FW_SLF_TO_INSIDE_98_CLASS_MAP&lt;BR /&gt;match access-group name E_FW_SLF_TO_INSIDE_ACL_05&lt;BR /&gt;&lt;BR /&gt;policy-map type inspect E_FW_OUTSIDE_TO_INSIDE_POLICY_MAP&lt;BR /&gt;class type inspect E_FW_OUTSIDE_TO_INSIDE_CLASS_MAP&lt;BR /&gt;inspect E_FW_GLOBAL_PARAMETER_MAP&lt;BR /&gt;class class-default&lt;BR /&gt;drop log&lt;BR /&gt;policy-map type inspect E_FW_INSIDE_TO_SLF_POLICY_MAP&lt;BR /&gt;class type inspect E_FW_INSIDE_TO_SLF_98_CLASS_MAP&lt;BR /&gt;pass&lt;BR /&gt;class class-default&lt;BR /&gt;drop log&lt;BR /&gt;policy-map type inspect E_FW_INSIDE_TO_OUTSIDE_POLICY_MAP&lt;BR /&gt;class type inspect E_FW_INSIDE_TO_OUTSIDE_CLASS_MAP&lt;BR /&gt;inspect E_FW_GLOBAL_PARAMETER_MAP&lt;BR /&gt;class class-default&lt;BR /&gt;drop log&lt;BR /&gt;policy-map type inspect E_FW_SLF_TO_OUTSIDE_POLICY_MAP&lt;BR /&gt;class type inspect E_FW_SLF_TO_OUTSIDE_98_CLASS_MAP&lt;BR /&gt;pass&lt;BR /&gt;class class-default&lt;BR /&gt;drop log&lt;BR /&gt;policy-map type inspect E_FW_OUTSIDE_TO_SLF_POLICY_MAP&lt;BR /&gt;class type inspect E_FW_OUTSIDE_TO_SLF_98_CLASS_MAP&lt;BR /&gt;pass&lt;BR /&gt;class class-default&lt;BR /&gt;drop log&lt;BR /&gt;policy-map type inspect E_FW_SLF_TO_INSIDE_POLICY_MAP&lt;BR /&gt;class type inspect E_FW_SLF_TO_INSIDE_98_CLASS_MAP&lt;BR /&gt;pass&lt;BR /&gt;class class-default&lt;BR /&gt;drop log&lt;BR /&gt;&lt;BR /&gt;zone security E_FW_INSIDE_ZONE&lt;BR /&gt;description --- CUSTOMER_ZONE_ACCESS_SECURITY_ZONE&lt;BR /&gt;zone security E_FW_OUTSIDE_ZONE&lt;BR /&gt;description --- OUTSIDE ZONE_ACCESS_SECURITY_ZONE&lt;BR /&gt;&lt;BR /&gt;description --- CUSTOMER_ZONE_INTERNET_ACCESS_ZONE_PAIRING&lt;BR /&gt;service-policy type inspect E_FW_INSIDE_TO_OUTSIDE_POLICY_MAP&lt;BR /&gt;zone-pair security E_FW_ZON_PAIR_INSIDE_TO_SLF source E_FW_INSIDE_ZONE destination self&lt;BR /&gt;description --- Customer LAN to Router originated traffic&lt;BR /&gt;service-policy type inspect E_FW_INSIDE_TO_SLF_POLICY_MAP&lt;BR /&gt;zone-pair security E_FW_ZON_PAIR_OUTSIDE_TO_INSIDE source E_FW_OUTSIDE_ZONE destination E_FW_INSIDE_ZONE&lt;BR /&gt;description --- OUTSIDE ZONE_INTERNET_ACCESS_ZONE_PAIRING&lt;BR /&gt;service-policy type inspect E_FW_OUTSIDE_TO_INSIDE_POLICY_MAP&lt;BR /&gt;zone-pair security E_FW_ZON_PAIR_OUTSIDE_TO_SLF source E_FW_OUTSIDE_ZONE destination self&lt;BR /&gt;description --- Public internet to router originated traffic&lt;BR /&gt;service-policy type inspect E_FW_OUTSIDE_TO_SLF_POLICY_MAP&lt;BR /&gt;zone-pair security E_FW_ZON_PAIR_SLF_TO_INSIDE source self destination E_FW_INSIDE_ZONE&lt;BR /&gt;description --- Router originated traffic to customer LAN&lt;BR /&gt;service-policy type inspect E_FW_SLF_TO_INSIDE_POLICY_MAP&lt;BR /&gt;zone-pair security E_FW_ZON_PAIR_SLF_TO_OUTSIDE source self destination E_FW_OUTSIDE_ZONE&lt;BR /&gt;description --- Router to IPSN&lt;BR /&gt;service-policy type inspect E_FW_SLF_TO_OUTSIDE_POLICY_MAP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:49:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isr4331-k9-zone-based-firewall-configuration/m-p/3804448#M1049136</guid>
      <dc:creator>Beast6</dc:creator>
      <dc:date>2020-02-21T16:49:54Z</dc:date>
    </item>
    <item>
      <title>Re: ISR4331/K9-Zone based firewall configuration.</title>
      <link>https://community.cisco.com/t5/network-security/isr4331-k9-zone-based-firewall-configuration/m-p/3806213#M1049148</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;You haven't uploaded the full configuration but you do have the zone defined on each of the interfaces?&lt;BR /&gt;&lt;BR /&gt;When using ZBFW if using an ACL inconjuction with a class-map you should be able to determine "hits" when using the command "show ip access-list", however you cannot use the log command on an ACE to get a log entry. For which traffic are you expecting to see logs for?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Instead of checking the ACL for hit counts you can use the command "show policy-firewall stats zone-pair YOUR_ZONE_NAME" which should will indicate if packets match the class-map.&lt;BR /&gt;&lt;BR /&gt;HTH&lt;/P&gt;</description>
      <pubDate>Wed, 20 Feb 2019 20:47:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isr4331-k9-zone-based-firewall-configuration/m-p/3806213#M1049148</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-02-20T20:47:10Z</dc:date>
    </item>
    <item>
      <title>Re: ISR4331/K9-Zone based firewall configuration.</title>
      <link>https://community.cisco.com/t5/network-security/isr4331-k9-zone-based-firewall-configuration/m-p/3806300#M1049162</link>
      <description>&lt;P&gt;This is my Full Config and I wasn't able to determine any hits if do "show IP access-list" no hits at all. I tried the command you mentioned but no luck. Please advise after you going through the config if anything needs to be changed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;show config&lt;BR /&gt;Using 29302 out of 33554432 bytes&lt;BR /&gt;&lt;BR /&gt;version 15.5&lt;BR /&gt;service timestamps debug datetime msec localtime&lt;BR /&gt;service timestamps log datetime msec localtime&lt;BR /&gt;service password-encryption&lt;BR /&gt;service sequence-numbers&lt;BR /&gt;no platform punt-keepalive disable-kernel-core&lt;BR /&gt;!&lt;BR /&gt;hostname Bluetide_Orange_Atlanta&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;vrf definition Mgmt-intf&lt;BR /&gt;!&lt;BR /&gt;address-family ipv4&lt;BR /&gt;exit-address-family&lt;BR /&gt;!&lt;BR /&gt;address-family ipv6&lt;BR /&gt;exit-address-family&lt;BR /&gt;no aaa new-model&lt;BR /&gt;clock timezone central -6 0&lt;BR /&gt;clock summer-time CDT recurring&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;ip name-server 204.59.152.208 57.67.127.192 57.73.127.195&lt;/P&gt;&lt;P&gt;ip domain name equant.net&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;login delay 10&lt;BR /&gt;login quiet-mode access-class 199&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;--More-- subscriber templating&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;parameter-map type inspect E_FW_GLOBAL_PARAMETER_MAP&lt;BR /&gt;max-incomplete low 20000000&lt;BR /&gt;max-incomplete high 20000000&lt;BR /&gt;one-minute low 100000000&lt;BR /&gt;one-minute high 100000000&lt;BR /&gt;tcp max-incomplete host 100000 block-time 0&lt;BR /&gt;multilink bundle-name authenticated&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;cts logging verbose&lt;BR /&gt;license udi pid ISR4331/K9 sn FDO2146149C&lt;BR /&gt;!&lt;BR /&gt;spanning-tree extend system-id&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;redundancy&lt;BR /&gt;mode none&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;vlan internal allocation policy ascending&lt;BR /&gt;!&lt;BR /&gt;track 20 ip sla 20 reachability&lt;BR /&gt;!&lt;BR /&gt;track 25 ip sla 25 reachability&lt;BR /&gt;!&lt;BR /&gt;track 99 list boolean and&lt;BR /&gt;object 20&lt;BR /&gt;object 25&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;class-map type inspect match-any E_FW_OUTSIDE_TO_SLF_98_CLASS_MAP&lt;BR /&gt;match access-group name E_FW_OUTSIDE_TO_SLF_ACL_04&lt;BR /&gt;class-map type inspect match-any E_FW_SLF_TO_OUTSIDE_98_CLASS_MAP&lt;BR /&gt;match access-group name E_FW_SLF_TO_OUTSIDE_ACL_06&lt;BR /&gt;class-map type inspect match-all E_FW_INSIDE_TO_OUTSIDE_CLASS_MAP&lt;BR /&gt;match access-group name E_FW_INSIDE_TO_OUTSIDE_ACL_01&lt;BR /&gt;class-map type inspect match-any E_FW_OUTSIDE_TO_INSIDE_CLASS_MAP&lt;BR /&gt;match access-group name E_FW_OUTSIDE_TO_INSIDE_ACL_03&lt;BR /&gt;class-map type inspect match-any E_FW_INSIDE_TO_SLF_98_CLASS_MAP&lt;BR /&gt;match access-group name E_FW_INSIDE_TO_SLF_ACL_02&lt;BR /&gt;class-map type inspect match-any E_FW_SLF_TO_INSIDE_98_CLASS_MAP&lt;BR /&gt;match access-group name E_FW_SLF_TO_INSIDE_ACL_05&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect E_FW_OUTSIDE_TO_INSIDE_POLICY_MAP&lt;BR /&gt;class type inspect E_FW_OUTSIDE_TO_INSIDE_CLASS_MAP&lt;BR /&gt;inspect E_FW_GLOBAL_PARAMETER_MAP&lt;BR /&gt;class class-default&lt;BR /&gt;drop log&lt;BR /&gt;policy-map type inspect E_FW_INSIDE_TO_SLF_POLICY_MAP&lt;BR /&gt;class type inspect E_FW_INSIDE_TO_SLF_98_CLASS_MAP&lt;BR /&gt;pass&lt;BR /&gt;class class-default&lt;BR /&gt;drop log&lt;BR /&gt;--More-- policy-map type inspect E_FW_INSIDE_TO_OUTSIDE_POLICY_MAP&lt;BR /&gt;class type inspect E_FW_INSIDE_TO_OUTSIDE_CLASS_MAP&lt;BR /&gt;inspect E_FW_GLOBAL_PARAMETER_MAP&lt;BR /&gt;class class-default&lt;BR /&gt;drop log&lt;BR /&gt;policy-map type inspect E_FW_SLF_TO_OUTSIDE_POLICY_MAP&lt;BR /&gt;class type inspect E_FW_SLF_TO_OUTSIDE_98_CLASS_MAP&lt;BR /&gt;pass&lt;BR /&gt;class class-default&lt;BR /&gt;drop log&lt;BR /&gt;policy-map type inspect E_FW_OUTSIDE_TO_SLF_POLICY_MAP&lt;BR /&gt;class type inspect E_FW_OUTSIDE_TO_SLF_98_CLASS_MAP&lt;BR /&gt;pass&lt;BR /&gt;class class-default&lt;BR /&gt;drop log&lt;BR /&gt;policy-map type inspect E_FW_SLF_TO_INSIDE_POLICY_MAP&lt;BR /&gt;class type inspect E_FW_SLF_TO_INSIDE_98_CLASS_MAP&lt;BR /&gt;pass&lt;BR /&gt;class class-default&lt;BR /&gt;drop log&lt;BR /&gt;!&lt;BR /&gt;zone security E_FW_INSIDE_ZONE&lt;BR /&gt;description --- CUSTOMER_ZONE_ACCESS_SECURITY_ZONE&lt;BR /&gt;zone security E_FW_OUTSIDE_ZONE&lt;BR /&gt;description --- OUTSIDE ZONE_ACCESS_SECURITY_ZONE&lt;BR /&gt;zone-pair security E_FW_ZON_PAIR_INSIDE_TO_OUTSIDE source E_FW_INSIDE_ZONE destination E_FW_OUTSIDE_ZONE&lt;BR /&gt;description --- CUSTOMER_ZONE_INTERNET_ACCESS_ZONE_PAIRING&lt;BR /&gt;service-policy type inspect E_FW_INSIDE_TO_OUTSIDE_POLICY_MAP&lt;BR /&gt;zone-pair security E_FW_ZON_PAIR_INSIDE_TO_SLF source E_FW_INSIDE_ZONE destination self&lt;BR /&gt;description --- Customer LAN to Router originated traffic&lt;BR /&gt;service-policy type inspect E_FW_INSIDE_TO_SLF_POLICY_MAP&lt;BR /&gt;zone-pair security E_FW_ZON_PAIR_OUTSIDE_TO_INSIDE source E_FW_OUTSIDE_ZONE destination E_FW_INSIDE_ZONE&lt;BR /&gt;description --- OUTSIDE ZONE_INTERNET_ACCESS_ZONE_PAIRING&lt;BR /&gt;service-policy type inspect E_FW_OUTSIDE_TO_INSIDE_POLICY_MAP&lt;BR /&gt;zone-pair security E_FW_ZON_PAIR_OUTSIDE_TO_SLF source E_FW_OUTSIDE_ZONE destination self&lt;BR /&gt;description --- Public internet to router originated traffic&lt;BR /&gt;service-policy type inspect E_FW_OUTSIDE_TO_SLF_POLICY_MAP&lt;BR /&gt;zone-pair security E_FW_ZON_PAIR_SLF_TO_INSIDE source self destination E_FW_INSIDE_ZONE&lt;BR /&gt;description --- Router originated traffic to customer LAN&lt;BR /&gt;service-policy type inspect E_FW_SLF_TO_INSIDE_POLICY_MAP&lt;BR /&gt;zone-pair security E_FW_ZON_PAIR_SLF_TO_OUTSIDE source self destination E_FW_OUTSIDE_ZONE&lt;BR /&gt;description --- Router to IPSN&lt;BR /&gt;service-policy type inspect E_FW_SLF_TO_OUTSIDE_POLICY_MAP&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto isakmp policy 20&lt;BR /&gt;encr aes 256&lt;BR /&gt;hash sha256&lt;BR /&gt;authentication pre-share&lt;BR /&gt;group 14&lt;BR /&gt;crypto isakmp key MRSKvpnBTCenc117 address X.X.X.X&lt;BR /&gt;crypto isakmp key MRSKvpnBTCenc117 address 0.0.0.0&lt;BR /&gt;crypto isakmp invalid-spi-recovery&lt;BR /&gt;crypto isakmp keepalive 10 5 periodic&lt;BR /&gt;!&lt;BR /&gt;crypto ipsec security-association replay window-size 1024&lt;BR /&gt;!&lt;BR /&gt;crypto ipsec transform-set BTC_MRSK_ESP esp-aes esp-md5-hmac&lt;BR /&gt;--More-- mode tunnel&lt;BR /&gt;!&lt;BR /&gt;crypto ipsec profile BTCcisco20&lt;BR /&gt;set security-association lifetime seconds 43200&lt;BR /&gt;set transform-set BTC_MRSK_ESP&lt;BR /&gt;set pfs group14&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface Loopback1&lt;BR /&gt;ip address 10.100.100.1 255.255.255.255&lt;BR /&gt;zone-member security E_FW_INSIDE_ZONE&lt;BR /&gt;!&lt;BR /&gt;interface Tunnel0&lt;BR /&gt;ip address X.X.1.1 255.255.255.0&lt;BR /&gt;zone-member security E_FW_INSIDE_ZONE&lt;BR /&gt;ip ospf network point-to-point&lt;BR /&gt;ip ospf mtu-ignore&lt;BR /&gt;tunnel source X.X.90.1&lt;BR /&gt;tunnel destination X.X.X.X&lt;BR /&gt;tunnel protection ipsec profile BTCcisco20&lt;BR /&gt;!&lt;BR /&gt;interface Tunnel7&lt;BR /&gt;description BTC_Maersk_Seay_VPN_IPsec&lt;BR /&gt;ip address X.X.7.1 255.255.255.0&lt;BR /&gt;ip mtu 1436&lt;BR /&gt;zone-member security E_FW_INSIDE_ZONE&lt;BR /&gt;ip ospf network point-to-point&lt;BR /&gt;ip ospf dead-interval 40&lt;BR /&gt;ip ospf retransmit-interval 10&lt;BR /&gt;ip ospf transmit-delay 10&lt;BR /&gt;ip ospf mtu-ignore&lt;BR /&gt;keepalive 3600 3&lt;BR /&gt;tunnel source GigabitEthernet0/0/1&lt;BR /&gt;tunnel mode ipsec ipv4&lt;BR /&gt;tunnel destination X.X.22.34&lt;BR /&gt;tunnel protection ipsec profile BTCcisco20&lt;BR /&gt;!&lt;BR /&gt;interface Tunnel8&lt;BR /&gt;description BTC_Maersk_Pililaau_VPN_IPsec&lt;BR /&gt;ip address X.X.8.1 255.255.255.0&lt;BR /&gt;ip mtu 1436&lt;BR /&gt;zone-member security E_FW_INSIDE_ZONE&lt;BR /&gt;ip ospf network point-to-point&lt;BR /&gt;ip ospf dead-interval 40&lt;BR /&gt;ip ospf retransmit-interval 10&lt;BR /&gt;ip ospf transmit-delay 10&lt;BR /&gt;ip ospf mtu-ignore&lt;BR /&gt;keepalive 3600 3&lt;BR /&gt;tunnel source GigabitEthernet0/0/1&lt;BR /&gt;tunnel mode ipsec ipv4&lt;BR /&gt;--More-- tunnel destination X.X.20.22&lt;BR /&gt;tunnel protection ipsec profile BTCcisco20&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0/0&lt;BR /&gt;description Management_Interface&lt;BR /&gt;no ip address&lt;BR /&gt;ip nbar protocol-discovery&lt;BR /&gt;zone-member security E_FW_INSIDE_ZONE&lt;BR /&gt;negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0/1&lt;BR /&gt;description Orange_MPLS_10.10&lt;BR /&gt;ip address 10.10.2.4 255.255.255.240&lt;BR /&gt;ip nat inside&lt;BR /&gt;zone-member security E_FW_INSIDE_ZONE&lt;BR /&gt;negotiation auto&lt;BR /&gt;vrrp 10 description MPLS_VRRP_MASTER&lt;BR /&gt;vrrp 10 ip 10.10.2.2&lt;BR /&gt;vrrp 10 timers advertise msec 300&lt;BR /&gt;vrrp 10 preempt delay minimum 10&lt;BR /&gt;vrrp 10 priority 110&lt;BR /&gt;vrrp 10 track 99 decrement 20&lt;BR /&gt;ip virtual-reassembly&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0/2&lt;BR /&gt;no ip address&lt;BR /&gt;zone-member security E_FW_OUTSIDE_ZONE&lt;BR /&gt;negotiation auto&lt;BR /&gt;ip virtual-reassembly&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0/2.700&lt;BR /&gt;encapsulation dot1Q 700 native&lt;BR /&gt;ip address X.X.90.4 255.255.255.240&lt;BR /&gt;ip nat outside&lt;BR /&gt;zone-member security E_FW_OUTSIDE_ZONE&lt;BR /&gt;vrrp 15 description INTERNET_VRRP_MASTER&lt;BR /&gt;vrrp 15 ip X.X.90.1&lt;BR /&gt;vrrp 15 timers advertise msec 300&lt;BR /&gt;vrrp 15 preempt delay minimum 10&lt;BR /&gt;vrrp 15 priority 110&lt;BR /&gt;vrrp 15 track 99 decrement 20&lt;BR /&gt;ip virtual-reassembly&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0&lt;BR /&gt;vrf forwarding Mgmt-intf&lt;BR /&gt;no ip address&lt;BR /&gt;shutdown&lt;BR /&gt;negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;no ip address&lt;BR /&gt;shutdown&lt;BR /&gt;!&lt;BR /&gt;router ospf 1881&lt;BR /&gt;network X.X.7.0 0.0.0.255 area 0&lt;BR /&gt;network X.X.8.0 0.0.0.255 area 0&lt;BR /&gt;network X.X.1.0 0.0.0.255 area 0&lt;BR /&gt;!&lt;BR /&gt;ip nat inside source static tcp X.X.20.114 443 X.X.90.18 443 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.114 514 X.X.90.18 514 extendable&lt;BR /&gt;ip nat inside source static udp X.X.20.114 514 X.X.90.18 514 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.118 443 X.X.90.19 443 extendable&lt;BR /&gt;--More-- ip nat inside source static tcp X.X.20.118 514 X.X.90.19 514 extendable&lt;BR /&gt;ip nat inside source static udp X.X.20.118 514 X.X.90.19 514 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.122 443 X.X.90.20 443 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.122 514 X.X.90.20 514 extendable&lt;BR /&gt;ip nat inside source static udp X.X.20.122 514 X.X.90.20 514 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.126 443 X.X.90.21 443 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.126 514 X.X.90.21 514 extendable&lt;BR /&gt;ip nat inside source static udp X.X.20.126 514 X.X.90.21 514 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.22.66 554 X.X.90.22 554 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.22.66 9200 X.X.90.22 9200 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.22.66 9201 X.X.90.22 9201 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.22.50 443 X.X.90.23 443 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.22.50 514 X.X.90.23 514 extendable&lt;BR /&gt;ip nat inside source static udp X.X.22.50 514 X.X.90.23 514 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.42 443 X.X.90.24 443 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.42 514 X.X.90.24 514 extendable&lt;BR /&gt;ip nat inside source static udp X.X.20.42 514 X.X.90.24 514 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.62 443 X.X.90.25 443 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.62 514 X.X.90.25 514 extendable&lt;BR /&gt;ip nat inside source static udp X.X.20.62 514 X.X.90.25 514 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.98 554 X.X.90.26 554 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.98 9200 X.X.90.26 9200 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.98 22609 X.X.90.26 22609 extendable&lt;BR /&gt;ip nat inside source static udp X.X.20.98 22609 X.X.90.26 22609 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.74 554 X.X.90.27 554 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.74 9200 X.X.90.27 9200 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.74 22609 X.X.90.27 22609 extendable&lt;BR /&gt;ip nat inside source static udp X.X.20.74 22609 X.X.90.27 22609 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.82 554 X.X.90.28 554 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.82 9200 X.X.90.28 9200 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.82 22609 X.X.90.28 22609 extendable&lt;BR /&gt;ip nat inside source static udp X.X.20.82 22609 X.X.90.28 22609 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.22.78 22609 X.X.90.29 443 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.22.78 554 X.X.90.29 554 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.22.78 9200 X.X.90.29 9200 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.22.78 22609 X.X.90.29 22609 extendable&lt;BR /&gt;ip nat inside source static udp X.X.22.78 22609 X.X.90.29 22609 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.26 554 X.X.90.30 554 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.26 9200 X.X.90.30 9200 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.26 22609 X.X.90.30 22609 extendable&lt;BR /&gt;ip nat inside source static udp X.X.20.26 22609 X.X.90.30 22609 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.21.206 443 X.X.90.31 443 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.21.206 514 X.X.90.31 514 extendable&lt;BR /&gt;ip nat inside source static udp X.X.21.206 514 X.X.90.31 514 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.158 443 X.X.90.32 443 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.158 514 X.X.90.32 514 extendable&lt;BR /&gt;ip nat inside source static udp X.X.20.158 514 X.X.90.32 514 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.58 443 X.X.90.33 443 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.58 514 X.X.90.33 514 extendable&lt;BR /&gt;ip nat inside source static udp X.X.20.58 514 X.X.90.33 514 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.21.102 554 X.X.90.34 554 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.21.102 9200 X.X.90.34 9200 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.21.102 22609 X.X.90.34 22609 extendable&lt;BR /&gt;ip nat inside source static udp X.X.21.102 22609 X.X.90.34 22609 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.70 554 X.X.90.35 554 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.70 9200 X.X.90.35 9200 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.70 22609 X.X.90.35 22609 extendable&lt;BR /&gt;ip nat inside source static udp X.X.20.70 22609 X.X.90.35 22609 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.142 554 X.X.90.36 554 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.142 9200 X.X.90.36 9200 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.142 22609 X.X.90.36 22609 extendable&lt;BR /&gt;ip nat inside source static udp X.X.20.142 22609 X.X.90.36 22609 extendable&lt;BR /&gt;--More-- ip nat inside source static tcp X.X.20.138 554 X.X.90.37 554 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.138 9200 X.X.90.37 9200 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.138 22609 X.X.90.37 22609 extendable&lt;BR /&gt;ip nat inside source static udp X.X.20.138 22609 X.X.90.37 22609 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.90 554 X.X.90.38 554 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.90 9200 X.X.90.38 9200 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.90 22609 X.X.90.38 22609 extendable&lt;BR /&gt;ip nat inside source static udp X.X.20.90 22609 X.X.90.38 22609 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.106 554 X.X.90.39 554 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.106 9200 X.X.90.39 9200 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.106 22609 X.X.90.39 22609 extendable&lt;BR /&gt;ip nat inside source static udp X.X.20.106 22609 X.X.90.39 22609 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.110 554 X.X.90.40 554 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.110 9200 X.X.90.40 9200 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.110 22609 X.X.90.40 22609 extendable&lt;BR /&gt;ip nat inside source static udp X.X.20.110 22609 X.X.90.40 22609 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.21.222 554 X.X.90.41 554 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.21.222 9200 X.X.90.41 9200 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.21.222 22609 X.X.90.41 22609 extendable&lt;BR /&gt;ip nat inside source static udp X.X.21.222 22609 X.X.90.41 22609 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.102 554 X.X.90.42 554 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.102 9200 X.X.90.42 9200 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.102 22609 X.X.90.42 22609 extendable&lt;BR /&gt;ip nat inside source static udp X.X.20.102 22609 X.X.90.42 22609 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.94 554 X.X.90.43 554 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.94 9200 X.X.90.43 9200 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.94 22609 X.X.90.43 22609 extendable&lt;BR /&gt;ip nat inside source static udp X.X.20.94 22609 X.X.90.43 22609 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.86 554 X.X.90.44 554 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.86 9200 X.X.90.44 9200 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.86 22609 X.X.90.44 22609 extendable&lt;BR /&gt;ip nat inside source static udp X.X.20.86 22609 X.X.90.44 22609 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.21.242 554 X.X.90.50 554 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.21.242 9200 X.X.90.50 9200 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.21.242 22609 X.X.90.50 22609 extendable&lt;BR /&gt;ip nat inside source static udp X.X.21.242 22609 X.X.90.50 22609 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.22.26 1610 X.X.90.51 1610 extendable&lt;BR /&gt;ip nat inside source static udp X.X.22.26 1610 X.X.90.51 1610 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.22.26 1611 X.X.90.51 1611 extendable&lt;BR /&gt;ip nat inside source static udp X.X.22.26 1611 X.X.90.51 1611 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.22.22 1610 X.X.90.52 1610 extendable&lt;BR /&gt;ip nat inside source static udp X.X.22.22 1610 X.X.90.52 1610 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.22.22 1611 X.X.90.52 1611 extendable&lt;BR /&gt;ip nat inside source static udp X.X.22.22 1611 X.X.90.52 1611 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.22.58 1610 X.X.90.53 1610 extendable&lt;BR /&gt;ip nat inside source static udp X.X.22.58 1610 X.X.90.53 1610 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.22.58 1611 X.X.90.53 1611 extendable&lt;BR /&gt;ip nat inside source static udp X.X.22.58 1611 X.X.90.53 1611 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.22.18 1610 X.X.90.54 1610 extendable&lt;BR /&gt;ip nat inside source static udp X.X.22.18 1610 X.X.90.54 1610 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.22.18 1611 X.X.90.54 1611 extendable&lt;BR /&gt;ip nat inside source static udp X.X.22.18 1611 X.X.90.54 1611 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.22.54 1610 X.X.90.55 1610 extendable&lt;BR /&gt;ip nat inside source static udp X.X.22.54 1610 X.X.90.55 1610 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.22.54 1611 X.X.90.55 1611 extendable&lt;BR /&gt;ip nat inside source static udp X.X.22.54 1611 X.X.90.55 1611 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.78 554 X.X.90.56 554 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.78 9200 X.X.90.56 9200 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.20.78 22609 X.X.90.56 22609 extendable&lt;BR /&gt;ip nat inside source static udp X.X.20.78 22609 X.X.90.56 22609 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.22.122 554 X.X.90.57 554 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.22.122 9200 X.X.90.57 9200 extendable&lt;BR /&gt;--More-- ip nat inside source static tcp X.X.22.122 22609 X.X.90.57 22609 extendable&lt;BR /&gt;ip nat inside source static udp X.X.22.122 22609 X.X.90.57 22609 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.22.126 554 X.X.90.58 554 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.22.126 9200 X.X.90.58 9200 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.22.126 22609 X.X.90.58 22609 extendable&lt;BR /&gt;ip nat inside source static udp X.X.22.126 22609 X.X.90.58 22609 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.22.134 554 X.X.90.59 554 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.22.134 9200 X.X.90.59 9200 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.22.134 22609 X.X.90.59 22609 extendable&lt;BR /&gt;ip nat inside source static udp X.X.22.134 22609 X.X.90.59 22609 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.22.98 443 X.X.90.60 443 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.22.98 514 X.X.90.60 514 extendable&lt;BR /&gt;ip nat inside source static udp X.X.22.98 514 X.X.90.60 514 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.22.130 554 X.X.90.61 554 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.22.130 9200 X.X.90.61 9200 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.22.130 22609 X.X.90.61 22609 extendable&lt;BR /&gt;ip nat inside source static udp X.X.22.130 22609 X.X.90.61 22609 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.21.142 554 X.X.90.62 554 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.21.142 9200 X.X.90.62 9200 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.21.142 22609 X.X.90.62 22609 extendable&lt;BR /&gt;ip nat inside source static udp X.X.21.142 22609 X.X.90.62 22609 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.21.142 37777 X.X.90.62 37777 extendable&lt;BR /&gt;ip nat inside source static tcp X.X.21.142 37778 X.X.90.62 37778 extendable&lt;BR /&gt;ip nat inside source static udp X.X.21.142 37778 X.X.90.62 37778 extendable&lt;BR /&gt;ip nat inside source list NAT_ACL interface GigabitEthernet0/0/2.700 overload&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;no ip http server&lt;BR /&gt;no ip http secure-server&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 X.X.90.2&lt;BR /&gt;ip route 10.10.2.0 255.255.255.240 10.10.2.1&lt;BR /&gt;ip route 10.40.1.0 255.255.255.0 10.10.2.1&lt;BR /&gt;ip route 10.96.1.0 255.255.255.0 10.10.2.1&lt;BR /&gt;ip route X.X.90.16 255.255.255.240 10.10.2.1&lt;BR /&gt;ip route X.X.90.32 255.255.255.240 10.10.2.1&lt;BR /&gt;ip route X.X.90.48 255.255.255.240 10.10.2.1&lt;BR /&gt;ip route X.X.90.64 255.255.255.240 10.10.2.1&lt;BR /&gt;ip route X.X.20.0 255.255.255.0 10.10.2.1&lt;BR /&gt;ip route X.X.21.0 255.255.255.0 10.10.2.1&lt;BR /&gt;ip route X.X.22.0 255.255.255.0 10.10.2.1&lt;BR /&gt;ip ssh port 2222 rotary 1&lt;BR /&gt;ip ssh version 2&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended E_FW_INSIDE_TO_OUTSIDE_ACL_01&lt;BR /&gt;permit ip X.X.20.0 0.0.0.255 any log&lt;BR /&gt;permit ip X.X.21.0 0.0.0.255 any&lt;BR /&gt;permit ip X.X.22.0 0.0.0.255 any&lt;BR /&gt;permit ip X.X.90.16 0.0.0.15 any&lt;BR /&gt;permit ip X.X.90.32 0.0.0.15 any&lt;BR /&gt;permit ip X.X.90.48 0.0.0.15 any&lt;BR /&gt;permit ip X.X.90.64 0.0.0.15 any&lt;BR /&gt;deny udp any any eq 10001 log&lt;BR /&gt;ip access-list extended E_FW_INSIDE_TO_SLF_ACL_02&lt;BR /&gt;permit tcp any eq 2222 any&lt;BR /&gt;permit tcp any eq 22609 any&lt;BR /&gt;permit udp host 10.10.2.2 any&lt;BR /&gt;permit udp host 10.10.2.4 any&lt;BR /&gt;permit ip host 10.40.1.250 any&lt;BR /&gt;permit icmp host 57.216.254.148 any&lt;BR /&gt;permit icmp host 57.216.254.145 any&lt;BR /&gt;permit icmp host 57.209.227.205 any&lt;BR /&gt;permit icmp host 57.209.227.206 any&lt;BR /&gt;--More-- permit icmp host 10.10.2.1 any&lt;BR /&gt;permit icmp X.X.20.0 0.0.0.255 any&lt;BR /&gt;permit icmp X.X.21.0 0.0.0.255 any&lt;BR /&gt;permit icmp X.X.22.0 0.0.0.255 any&lt;BR /&gt;permit udp X.X.20.0 0.0.0.255 any&lt;BR /&gt;permit udp X.X.21.0 0.0.0.255 any&lt;BR /&gt;permit udp X.X.22.0 0.0.0.255 any&lt;BR /&gt;permit udp X.X.1.0 0.0.0.255 any&lt;BR /&gt;permit tcp X.X.1.0 0.0.0.255 any&lt;BR /&gt;permit ospf host X.X.8.2 host X.X.8.1&lt;BR /&gt;permit icmp host X.X.8.2 host X.X.8.1&lt;BR /&gt;permit icmp host X.X.8.2 10.10.7.0 0.0.0.255&lt;BR /&gt;permit udp X.X.8.0 0.0.0.255 any&lt;BR /&gt;permit esp host X.X.20.22 host 10.10.2.2&lt;BR /&gt;permit icmp X.X.90.16 0.0.0.15 any&lt;BR /&gt;permit icmp X.X.90.32 0.0.0.15 any&lt;BR /&gt;permit icmp X.X.90.48 0.0.0.15 any&lt;BR /&gt;permit icmp X.X.90.64 0.0.0.15 any&lt;BR /&gt;permit udp X.X.90.16 0.0.0.15 any&lt;BR /&gt;permit udp X.X.90.32 0.0.0.15 any&lt;BR /&gt;permit udp X.X.90.48 0.0.0.15 any&lt;BR /&gt;permit udp X.X.90.64 0.0.0.15 any&lt;BR /&gt;permit ip host 10.10.2.1 any&lt;BR /&gt;permit ospf host X.X.7.2 host X.X.7.1&lt;BR /&gt;permit icmp host X.X.7.2 host X.X.7.1&lt;BR /&gt;permit icmp host X.X.7.2 10.10.7.0 0.0.0.255&lt;BR /&gt;permit udp X.X.7.0 0.0.0.255 any&lt;BR /&gt;permit esp host X.X.22.34 host 10.10.2.2&lt;BR /&gt;permit icmp host X.X.1.2 host X.X.1.1&lt;BR /&gt;permit icmp 10.10.5.0 0.0.0.255 any&lt;BR /&gt;ip access-list extended E_FW_OUTSIDE_TO_INSIDE_ACL_03&lt;BR /&gt;permit tcp any eq 5060 any&lt;BR /&gt;permit udp any eq 5060 any&lt;BR /&gt;permit udp any range 1000 1100 any&lt;BR /&gt;permit tcp any eq 465 any&lt;BR /&gt;permit icmp host X.X.90.2 any&lt;BR /&gt;permit ip host 206.16.60.70 X.X.20.0 0.0.0.255&lt;BR /&gt;permit ip host 206.16.60.70 X.X.21.0 0.0.0.255&lt;BR /&gt;permit ip host 206.16.60.70 X.X.22.0 0.0.0.255&lt;BR /&gt;permit tcp host 54.84.182.84 X.X.20.0 0.0.0.255&lt;BR /&gt;permit tcp host 54.84.182.84 X.X.21.0 0.0.0.255&lt;BR /&gt;permit tcp host 54.84.182.84 X.X.22.0 0.0.0.255&lt;BR /&gt;permit icmp host 72.198.133.5 any&lt;BR /&gt;permit ip host 70.186.254.52 any&lt;BR /&gt;permit ip host 50.58.27.183 any&lt;BR /&gt;permit tcp host 72.215.150.212 X.X.22.0 0.0.0.255&lt;BR /&gt;permit icmp host 72.215.150.212 any&lt;BR /&gt;permit ip host 72.215.150.212 X.X.22.0 0.0.0.255&lt;BR /&gt;permit udp any range 10002 20000 any&lt;BR /&gt;permit ip host 12.109.9.58 X.X.21.0 0.0.0.255&lt;BR /&gt;permit ip host 209.163.240.162 X.X.21.0 0.0.0.255&lt;BR /&gt;permit ip host 166.166.130.13 X.X.21.0 0.0.0.255&lt;BR /&gt;permit ip host 98.198.144.47 X.X.21.0 0.0.0.255&lt;BR /&gt;permit ip host 12.35.94.3 X.X.21.0 0.0.0.255&lt;BR /&gt;permit tcp host 12.109.9.58 X.X.21.0 0.0.0.255&lt;BR /&gt;permit tcp host 209.163.240.162 X.X.21.0 0.0.0.255&lt;BR /&gt;permit tcp host 166.166.130.13 X.X.21.0 0.0.0.255&lt;BR /&gt;permit tcp host 98.198.144.47 X.X.21.0 0.0.0.255&lt;BR /&gt;permit tcp host 12.35.94.3 X.X.21.0 0.0.0.255&lt;BR /&gt;permit udp host 12.109.9.58 X.X.21.0 0.0.0.255 eq 37778&lt;BR /&gt;permit udp host 209.163.240.162 X.X.21.0 0.0.0.255 eq 37778&lt;BR /&gt;permit udp host 166.166.130.13 X.X.21.0 0.0.0.255 eq 37778&lt;BR /&gt;--More-- permit udp host 98.198.144.47 X.X.21.0 0.0.0.255 eq 37778&lt;BR /&gt;permit udp host 12.35.94.3 X.X.21.0 0.0.0.255 eq 37778&lt;BR /&gt;permit tcp any range 37777 37778 any&lt;BR /&gt;permit tcp host 12.109.9.58 X.X.21.0 0.0.0.255 eq www&lt;BR /&gt;permit tcp host 209.163.240.162 X.X.21.0 0.0.0.255 eq www&lt;BR /&gt;permit tcp host 166.166.130.13 X.X.21.0 0.0.0.255 eq www&lt;BR /&gt;permit tcp host 98.198.144.47 X.X.21.0 0.0.0.255 eq www&lt;BR /&gt;permit tcp host 12.35.94.3 X.X.21.0 0.0.0.255 eq www&lt;BR /&gt;ip access-list extended E_FW_OUTSIDE_TO_SLF_ACL_04&lt;BR /&gt;permit ip host 70.186.254.52 any&lt;BR /&gt;permit udp host 98.188.216.148 any&lt;BR /&gt;permit udp host X.X.X.X eq isakmp any&lt;BR /&gt;permit udp host 50.58.27.183 eq 5060 any&lt;BR /&gt;permit tcp host 98.188.216.149 eq 8880 any&lt;BR /&gt;permit tcp host 72.198.133.5 eq 8880 any&lt;BR /&gt;permit tcp host 206.16.60.70 any&lt;BR /&gt;permit ip host X.X.X.X any log&lt;BR /&gt;permit icmp 70.188.92.0 0.0.0.255 any&lt;BR /&gt;deny ip X.X.20.0 0.0.0.255 any&lt;BR /&gt;deny ip X.X.21.0 0.0.0.255 any&lt;BR /&gt;deny ip X.X.22.0 0.0.0.255 any&lt;BR /&gt;deny ip X.X.90.16 0.0.0.15 any&lt;BR /&gt;deny ip X.X.90.32 0.0.0.15 any&lt;BR /&gt;deny ip X.X.90.48 0.0.0.15 any&lt;BR /&gt;deny ip X.X.90.64 0.0.0.15 any&lt;BR /&gt;deny ip 10.96.1.0 0.0.0.255 any&lt;BR /&gt;deny ip 10.0.0.0 0.255.255.255 any&lt;BR /&gt;deny ip 192.168.0.0 0.0.255.255 any&lt;BR /&gt;deny ip 224.0.0.0 31.255.255.255 any&lt;BR /&gt;deny ip 127.0.0.0 0.255.255.255 any&lt;BR /&gt;deny ip 169.254.0.0 0.0.255.255 any&lt;BR /&gt;deny ip 77.0.0.0 0.255.255.255 any&lt;BR /&gt;permit ip host X.X.90.3 any&lt;BR /&gt;permit ip host X.X.90.2 any&lt;BR /&gt;deny ip X.X.0.0 0.15.255.255 any&lt;BR /&gt;ip access-list extended E_FW_SLF_TO_INSIDE_ACL_05&lt;BR /&gt;permit tcp any eq 2222 any&lt;BR /&gt;permit ip host 10.10.2.2 any&lt;BR /&gt;permit ip host 10.10.2.4 any&lt;BR /&gt;permit icmp host X.X.8.1 10.10.4.0 0.0.0.255&lt;BR /&gt;permit ip host 10.10.2.2 host X.X.20.22&lt;BR /&gt;permit ip host X.X.90.1 any&lt;BR /&gt;permit ip host X.X.90.4 any&lt;BR /&gt;permit ip host X.X.1.1 host X.X.1.2&lt;BR /&gt;permit icmp host X.X.7.1 10.10.5.0 0.0.0.255&lt;BR /&gt;ip access-list extended E_FW_SLF_TO_OUTSIDE_ACL_06&lt;BR /&gt;permit tcp any eq 2222 any&lt;BR /&gt;permit udp any eq snmp any&lt;BR /&gt;permit ip host X.X.90.1 any&lt;BR /&gt;permit ip host X.X.90.4 any&lt;BR /&gt;permit icmp host 10.10.2.2 host 50.58.27.183&lt;BR /&gt;permit icmp host 10.10.2.2 host 54.84.182.84&lt;BR /&gt;permit icmp host 10.10.2.2 host 70.186.254.52&lt;BR /&gt;permit icmp host 10.10.2.4 host 50.58.27.183&lt;BR /&gt;permit icmp host 10.10.2.4 host 54.84.182.84&lt;BR /&gt;permit icmp host 10.10.2.4 host 70.186.254.52&lt;BR /&gt;permit icmp host 10.10.2.4 host 72.215.150.212&lt;BR /&gt;deny udp any any eq 10001&lt;BR /&gt;ip access-list extended NAT_ACL&lt;BR /&gt;permit ip X.X.90.16 0.0.0.15 any&lt;BR /&gt;permit ip X.X.90.32 0.0.0.15 any&lt;BR /&gt;permit ip X.X.90.48 0.0.0.15 any&lt;BR /&gt;--More-- permit ip X.X.90.64 0.0.0.15 any&lt;BR /&gt;permit ip X.X.20.0 0.0.0.255 any&lt;BR /&gt;permit ip X.X.21.0 0.0.0.255 any&lt;BR /&gt;permit ip X.X.22.0 0.0.0.255 any&lt;BR /&gt;!&lt;BR /&gt;ip sla 20&lt;BR /&gt;icmp-echo 10.10.2.1&lt;BR /&gt;ip sla schedule 20 life forever start-time now&lt;BR /&gt;ip sla 25&lt;BR /&gt;icmp-echo X.X.90.2&lt;BR /&gt;ip sla schedule 25 life forever start-time now&lt;BR /&gt;logging history alerts&lt;BR /&gt;logging source-interface GigabitEthernet0/0/2.700&lt;BR /&gt;access-list 199 deny tcp any any eq telnet&lt;BR /&gt;access-list 199 deny tcp any any eq www log&lt;BR /&gt;access-list 199 deny tcp any any eq 22&lt;BR /&gt;access-list 199 permit ip any any&lt;BR /&gt;access-list 199 remark -- ACL restricting 22/23, redirect to ssh port 2222&lt;BR /&gt;!&lt;BR /&gt;snmp-server community !BTC RO&lt;BR /&gt;snmp-server community BTC117 RW&lt;BR /&gt;snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart&lt;BR /&gt;snmp-server enable traps vrrp&lt;BR /&gt;snmp-server enable traps call-home message-send-fail server-fail&lt;BR /&gt;snmp-server enable traps tty&lt;BR /&gt;snmp-server enable traps ospf state-change&lt;BR /&gt;snmp-server enable traps ospf errors&lt;BR /&gt;snmp-server enable traps ospf retransmit&lt;BR /&gt;snmp-server enable traps ospf lsa&lt;BR /&gt;snmp-server enable traps ospf cisco-specific state-change nssa-trans-change&lt;BR /&gt;snmp-server enable traps ospf cisco-specific state-change shamlink interface&lt;BR /&gt;snmp-server enable traps ospf cisco-specific state-change shamlink neighbor&lt;BR /&gt;snmp-server enable traps ospf cisco-specific errors&lt;BR /&gt;snmp-server enable traps ospf cisco-specific retransmit&lt;BR /&gt;snmp-server enable traps ospf cisco-specific lsa&lt;BR /&gt;snmp-server enable traps config-copy&lt;BR /&gt;snmp-server enable traps config&lt;BR /&gt;snmp-server enable traps config-ctid&lt;BR /&gt;snmp-server enable traps fru-ctrl&lt;BR /&gt;snmp-server enable traps entity&lt;BR /&gt;snmp-server enable traps event-manager&lt;BR /&gt;snmp-server enable traps ipmulticast&lt;BR /&gt;snmp-server enable traps mvpn&lt;BR /&gt;snmp-server enable traps trustsec-sxp conn-srcaddr-err msg-parse-err conn-config-err binding-err conn-up conn-down binding-expn-fail oper-nodeid-change binding-conflict&lt;BR /&gt;snmp-server enable traps c3g&lt;BR /&gt;snmp-server enable traps bulkstat collection transfer&lt;/P&gt;</description>
      <pubDate>Thu, 21 Feb 2019 15:05:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isr4331-k9-zone-based-firewall-configuration/m-p/3806300#M1049162</guid>
      <dc:creator>Beast6</dc:creator>
      <dc:date>2019-02-21T15:05:22Z</dc:date>
    </item>
    <item>
      <title>Re: ISR4331/K9-Zone based firewall configuration.</title>
      <link>https://community.cisco.com/t5/network-security/isr4331-k9-zone-based-firewall-configuration/m-p/3806307#M1049191</link>
      <description>Did that command not work or were there no hits at all?&lt;BR /&gt;Try just "show policy-firewall stats zone-pair" this should display the output for all zone-pairs, please upload the output for review.&lt;BR /&gt;&lt;BR /&gt;You should edit the configuration above, to remove your passwords - level 7 passwords are easily cracked.</description>
      <pubDate>Wed, 20 Feb 2019 22:56:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isr4331-k9-zone-based-firewall-configuration/m-p/3806307#M1049191</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-02-20T22:56:09Z</dc:date>
    </item>
    <item>
      <title>Re: ISR4331/K9-Zone based firewall configuration.</title>
      <link>https://community.cisco.com/t5/network-security/isr4331-k9-zone-based-firewall-configuration/m-p/3806850#M1049201</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The command didn't work at all.&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="Capture5.PNG" style="width: 326px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/30659i81AE80BBFD2DBA59/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Capture5.PNG" alt="Capture5.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Feb 2019 15:12:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isr4331-k9-zone-based-firewall-configuration/m-p/3806850#M1049201</guid>
      <dc:creator>Beast6</dc:creator>
      <dc:date>2019-02-21T15:12:20Z</dc:date>
    </item>
    <item>
      <title>Re: ISR4331/K9-Zone based firewall configuration.</title>
      <link>https://community.cisco.com/t5/network-security/isr4331-k9-zone-based-firewall-configuration/m-p/3806855#M1049217</link>
      <description>What IOS version are you running?&lt;BR /&gt;What license do you have?&lt;BR /&gt;&lt;BR /&gt;Perhaps the command has change on your version, please show me the output of:-&lt;BR /&gt;show policy-firewall stats ?&lt;BR /&gt;</description>
      <pubDate>Thu, 21 Feb 2019 15:15:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isr4331-k9-zone-based-firewall-configuration/m-p/3806855#M1049217</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-02-21T15:15:42Z</dc:date>
    </item>
    <item>
      <title>Re: ISR4331/K9-Zone based firewall configuration.</title>
      <link>https://community.cisco.com/t5/network-security/isr4331-k9-zone-based-firewall-configuration/m-p/3806982#M1049234</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cisco IOS XE Software, Version 03.16.04b.S - Extended Support Release&lt;BR /&gt;Cisco IOS Software, ISR Software (X86_64_LINUX_IOSD-UNIVERSALK9-M), Version 15.5 (3)S4b, RELEASE SOFTWARE (fc1).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can see the results of "show policy-firewall stats" in the document attached.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Feb 2019 17:13:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isr4331-k9-zone-based-firewall-configuration/m-p/3806982#M1049234</guid>
      <dc:creator>Beast6</dc:creator>
      <dc:date>2019-02-21T17:13:44Z</dc:date>
    </item>
    <item>
      <title>Re: ISR4331/K9-Zone based firewall configuration.</title>
      <link>https://community.cisco.com/t5/network-security/isr4331-k9-zone-based-firewall-configuration/m-p/3806992#M1049245</link>
      <description>&lt;P&gt;Perhaps it's this command on your version:- &lt;EM&gt;&lt;STRONG&gt;show policy-map type inspect zone-pair&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;From there you should be able to determine matches against your class-maps&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/security/s1/sec-s1-cr-book/sec-cr-s5.html#wp1895165714" target="_self"&gt;https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/security/s1/sec-s1-cr-book/sec-cr-s5.html#wp1895165714&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Feb 2019 17:22:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isr4331-k9-zone-based-firewall-configuration/m-p/3806992#M1049245</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-02-21T17:22:53Z</dc:date>
    </item>
    <item>
      <title>Re: ISR4331/K9-Zone based firewall configuration.</title>
      <link>https://community.cisco.com/t5/network-security/isr4331-k9-zone-based-firewall-configuration/m-p/3807025#M1049254</link>
      <description>&lt;P&gt;Perfect that worked, I can see all the matches against my class-maps.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Feb 2019 17:53:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isr4331-k9-zone-based-firewall-configuration/m-p/3807025#M1049254</guid>
      <dc:creator>Beast6</dc:creator>
      <dc:date>2019-02-21T17:53:16Z</dc:date>
    </item>
    <item>
      <title>Re: ISR4331/K9-Zone based firewall configuration.</title>
      <link>https://community.cisco.com/t5/network-security/isr4331-k9-zone-based-firewall-configuration/m-p/3809381#M1049265</link>
      <description>&lt;P&gt;Hi, &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;we were thinking to get rid of this IOS XE and replace it with a new Cisco IOS Router what would be the best replacement? considering the 4331 specifications and configuration?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Mon, 25 Feb 2019 20:51:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isr4331-k9-zone-based-firewall-configuration/m-p/3809381#M1049265</guid>
      <dc:creator>Beast6</dc:creator>
      <dc:date>2019-02-25T20:51:37Z</dc:date>
    </item>
    <item>
      <title>Re: ISR4331/K9-Zone based firewall configuration.</title>
      <link>https://community.cisco.com/t5/network-security/isr4331-k9-zone-based-firewall-configuration/m-p/3809425#M1049269</link>
      <description>Why do you plan on replacing the 4331 router with another router? The Cisco 4331 router is still a modern and supported router. A new router would support the same features as the 4331 router, the only reason to replace the router with another router would be if you need to support more throughput, additional interfaces etc&lt;BR /&gt;&lt;BR /&gt;Do you require additional features? Perhaps a firewall might be more appropriate.</description>
      <pubDate>Mon, 25 Feb 2019 22:03:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isr4331-k9-zone-based-firewall-configuration/m-p/3809425#M1049269</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-02-25T22:03:29Z</dc:date>
    </item>
  </channel>
</rss>

