<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ZBF zone based firewall on ASR 1000 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/zbf-zone-based-firewall-on-asr-1000/m-p/3709496#M1049690</link>
    <description>&lt;P&gt;Hi Mohammed,&lt;/P&gt;
&lt;P&gt;thank you for your quick reply.&lt;/P&gt;
&lt;P&gt;It seems that the show policy-firewall sessions platform&amp;nbsp; remains empty.&lt;/P&gt;
&lt;P&gt;So the command that you are asking is obiously also empty.&lt;/P&gt;
&lt;P&gt;But that is probably because the packets are not matching on inspect rules.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The second command gives a very long output; I'm adding it in attachment.&lt;/P&gt;
&lt;P&gt;thx&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV id="ConnectiveDocSignExtentionInstalled" data-extension-version="1.0.4"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
    <pubDate>Thu, 20 Sep 2018 07:22:56 GMT</pubDate>
    <dc:creator>a.ascione</dc:creator>
    <dc:date>2018-09-20T07:22:56Z</dc:date>
    <item>
      <title>ZBF zone based firewall on ASR 1000</title>
      <link>https://community.cisco.com/t5/network-security/zbf-zone-based-firewall-on-asr-1000/m-p/3709431#M1049643</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;Group any idea how this could happen in zone based firewall:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;sh policy-map type inspect zone-pair sessions&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;Zone-pair: Guest-&amp;gt;Internet&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt; Service-policy inspect : Guest_to_Internet&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;Class-map: Guest_Protocols (match-any)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt; Match: protocol http&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt; Match: protocol https&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt; Match: protocol dns&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt; Match: protocol bootpc&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt; Match: protocol bootps&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt; Match: access-group name permitany&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt; Pass&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt; 0 packets, 0 bytes&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;Class-map: class-default (match-any)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt; Match: any&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt; Pass&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt; 2242890 packets, 1858326904 bytes&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;As you can see I get no matches on the first part of my policy map (Class-map: Guest_Protocols) although the users in the "Guest" zone are able to surf...&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;Any ideas how I could troubleshoot this ?&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;Thanks in advance for your suggestions.&lt;/FONT&gt;&lt;/P&gt;
&lt;DIV id="ConnectiveDocSignExtentionInstalled" data-extension-version="1.0.4"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:15:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-zone-based-firewall-on-asr-1000/m-p/3709431#M1049643</guid>
      <dc:creator>a.ascione</dc:creator>
      <dc:date>2020-02-21T16:15:31Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF zone based firewall on ASR 1000</title>
      <link>https://community.cisco.com/t5/network-security/zbf-zone-based-firewall-on-asr-1000/m-p/3709475#M1049674</link>
      <description>Can you get the output of the following&lt;BR /&gt;&lt;BR /&gt;show policy-firewall session platform tcp destination-port 80 detail&lt;BR /&gt;&lt;BR /&gt;show policy-firewall config platform&lt;BR /&gt;</description>
      <pubDate>Wed, 19 Sep 2018 11:01:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-zone-based-firewall-on-asr-1000/m-p/3709475#M1049674</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2018-09-19T11:01:45Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF zone based firewall on ASR 1000</title>
      <link>https://community.cisco.com/t5/network-security/zbf-zone-based-firewall-on-asr-1000/m-p/3709496#M1049690</link>
      <description>&lt;P&gt;Hi Mohammed,&lt;/P&gt;
&lt;P&gt;thank you for your quick reply.&lt;/P&gt;
&lt;P&gt;It seems that the show policy-firewall sessions platform&amp;nbsp; remains empty.&lt;/P&gt;
&lt;P&gt;So the command that you are asking is obiously also empty.&lt;/P&gt;
&lt;P&gt;But that is probably because the packets are not matching on inspect rules.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The second command gives a very long output; I'm adding it in attachment.&lt;/P&gt;
&lt;P&gt;thx&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV id="ConnectiveDocSignExtentionInstalled" data-extension-version="1.0.4"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Thu, 20 Sep 2018 07:22:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-zone-based-firewall-on-asr-1000/m-p/3709496#M1049690</guid>
      <dc:creator>a.ascione</dc:creator>
      <dc:date>2018-09-20T07:22:56Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF zone based firewall on ASR 1000</title>
      <link>https://community.cisco.com/t5/network-security/zbf-zone-based-firewall-on-asr-1000/m-p/3709721#M1049705</link>
      <description>I don't see any attachment</description>
      <pubDate>Wed, 19 Sep 2018 16:46:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-zone-based-firewall-on-asr-1000/m-p/3709721#M1049705</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2018-09-19T16:46:04Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF zone based firewall on ASR 1000</title>
      <link>https://community.cisco.com/t5/network-security/zbf-zone-based-firewall-on-asr-1000/m-p/3710183#M1049712</link>
      <description>&lt;P&gt;sorry, it is ok now I have added it to the original message.&lt;/P&gt;
&lt;P&gt;regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV id="ConnectiveDocSignExtentionInstalled" data-extension-version="1.0.4"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Thu, 20 Sep 2018 07:23:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-zone-based-firewall-on-asr-1000/m-p/3710183#M1049712</guid>
      <dc:creator>a.ascione</dc:creator>
      <dc:date>2018-09-20T07:23:39Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF zone based firewall on ASR 1000</title>
      <link>https://community.cisco.com/t5/network-security/zbf-zone-based-firewall-on-asr-1000/m-p/3717233#M1049726</link>
      <description>&lt;P&gt;The problem was solved with a reboot of the router&lt;/P&gt;
&lt;DIV id="ConnectiveDocSignExtentionInstalled" data-extension-version="1.0.4"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Tue, 02 Oct 2018 09:50:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-zone-based-firewall-on-asr-1000/m-p/3717233#M1049726</guid>
      <dc:creator>a.ascione</dc:creator>
      <dc:date>2018-10-02T09:50:56Z</dc:date>
    </item>
  </channel>
</rss>

