<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IKEv2 | Zone Based Firewall | VRF in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ikev2-zone-based-firewall-vrf/m-p/4394973#M1080367</link>
    <description>&lt;P&gt;Hi Rob,&amp;nbsp;&lt;BR /&gt;Thanks. Yes, I have moved on to route based VPN.&amp;nbsp;&lt;BR /&gt;I found the following document that I could define an ACL within the tunnel interface.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/214728-configure-multi-sa-virtual-tunnel-interf.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/214728-configure-multi-sa-virtual-tunnel-interf.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;What do you think of this? Do you think I can use this to define traffic between the two LAN subnets?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 28 Apr 2021 17:21:56 GMT</pubDate>
    <dc:creator>kasunrajapakse</dc:creator>
    <dc:date>2021-04-28T17:21:56Z</dc:date>
    <item>
      <title>IKEv2 | Zone Based Firewall | VRF</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-zone-based-firewall-vrf/m-p/4394226#M1080336</link>
      <description>&lt;P&gt;------------------- Cisco ASR 1000 -----------------&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto ikev2 keyring Keyring_HF_Test_AR&lt;BR /&gt;peer Peer_Test_AR&lt;BR /&gt;address 81.x.x.x&lt;BR /&gt;pre-shared-key abc123&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;crypto ikev2 proposal Proposal_HF_Test_AR&lt;BR /&gt;encryption 3des&lt;BR /&gt;integrity sha1&lt;BR /&gt;group 2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto ikev2 profile Profile_HF_Test_AR&lt;BR /&gt;match fvrf FVRF&lt;BR /&gt;match address local interface Loopback2&lt;BR /&gt;match address local 62.x.x.x&lt;BR /&gt;match identity remote address 81.x.x.x 255.255.255.255&lt;BR /&gt;authentication remote pre-share&lt;BR /&gt;authentication local pre-share&lt;BR /&gt;keyring local Keyring_HF_Test_AR&lt;/P&gt;&lt;P&gt;crypto ikev2 policy Policy_HF_Test_AR&lt;BR /&gt;match fvrf FVRF&lt;BR /&gt;proposal Proposal_HF_Test_AR&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ip access-list extended ACL_HF_Test_AR&lt;BR /&gt;10 permit ip 10.113.3.0 0.0.0.255 host 10.121.12.60&lt;BR /&gt;20 permit ip 10.113.3.0 0.0.0.255 host 10.121.36.250&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set TS_HF_Test_AR esp-3des esp-sha-hmac&lt;BR /&gt;mode tunnel&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto map CMAP_Non_BTOP 10 ipsec-isakmp&lt;BR /&gt;set peer 81.x.x.x&lt;BR /&gt;set transform-set TS_HF_Test_AR&lt;BR /&gt;set pfs group2&lt;BR /&gt;set ikev2-profile Profile_HF_Test_AR&lt;BR /&gt;match address ACL_HF_Test_AR&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;interface Loopback2&lt;BR /&gt;vrf forwarding FVRF&lt;BR /&gt;ip address 62.x.x.x 255.255.255.255&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface TenGigabitEthernet0/0/0&lt;BR /&gt;description Uplink_to_Internet&lt;BR /&gt;vrf forwarding FVRF&lt;BR /&gt;ip address 2.x.x.x 255.255.255.254&lt;BR /&gt;ip nat outside&lt;BR /&gt;ip access-group iACL in&lt;BR /&gt;zone-member security UNTRUST&lt;BR /&gt;crypto map CMAP_Non_BTOP&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto map CMAP_Non_BTOP local-address Loopback2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface Port-channel1.1760&lt;BR /&gt;encapsulation dot1Q 1760&lt;BR /&gt;vrf forwarding trust&lt;BR /&gt;ip address 10.0.22.1 255.255.255.0&lt;BR /&gt;zone-member security PO1760&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; ######### ZBF #########&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Zone-pair name UNTRUST_to_self&lt;BR /&gt;Source-Zone UNTRUST Destination-Zone self&lt;BR /&gt;service-policy Inbound_IPsec_IPTraffic-policy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Zone-pair name self_to_UNTRUST&lt;BR /&gt;Source-Zone self Destination-Zone UNTRUST&lt;BR /&gt;service-policy Inbound_IPsec_IPTraffic-policy&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;policy-map type inspect Inbound_IPsec_IPTraffic-policy&lt;BR /&gt;class type inspect Inbound_IPSec_Traffic-class&lt;BR /&gt;pass&lt;BR /&gt;class type inspect Inbound_IPTraffic-class&lt;BR /&gt;pass&lt;BR /&gt;class class-default&lt;BR /&gt;drop&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any Inbound_IPSec_Traffic-class&lt;BR /&gt;match access-group name Inbound_IPSec_Traffic&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ip access-list extended Inbound_IPSec_Traffic&lt;BR /&gt;10 permit esp any any&lt;BR /&gt;20 permit udp any any eq isakmp&lt;BR /&gt;30 permit ahp any any&lt;BR /&gt;40 permit udp any any eq non500-isakmp&lt;BR /&gt;&lt;BR /&gt;=================&lt;BR /&gt;&lt;BR /&gt;Hi Guys,&amp;nbsp;&lt;BR /&gt;My requirement is as follows.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Remote end device (&amp;nbsp;81.x.x.x ) will establish an IPSec with the Cisco ASR (&amp;nbsp;62.x.x.x).&amp;nbsp;62.x.x.x IP is configured inside Loopback 2 as shown.&amp;nbsp; I can get Phase 1 and Phase 2 up. However there is no data flow. I suspect this has something to do with the VRFs and the Zone based firewall.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Traffic is landing on Loopback 2 (which is inside vrf FVRF) and it needs to reach a destination beyond&amp;nbsp; Port-channel1.1760 (which is inside vrf trust). So I would assume that route leaking is required between these two VRFs?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Also, I have a zone pair to allow traffic from UNTRUST_to_self&amp;nbsp; &amp;amp;&amp;nbsp;self_to_UNTRUST. But if traffic beyond&amp;nbsp;Port-channel1.1760 needs to communicate, do I need to allow traffic between zone "self" and zone "PO1760"??&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;The issue is a bit complicated since this involves VRFs and ZBF.&amp;nbsp;&lt;BR /&gt;Any help / advice is appreciated.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Apr 2021 17:44:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-zone-based-firewall-vrf/m-p/4394226#M1080336</guid>
      <dc:creator>kasunrajapakse</dc:creator>
      <dc:date>2021-04-27T17:44:40Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 | Zone Based Firewall | VRF</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-zone-based-firewall-vrf/m-p/4394671#M1080350</link>
      <description>&lt;P&gt;Hi Guys,&amp;nbsp;&lt;BR /&gt;Any idea?&amp;nbsp;&lt;BR /&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Apr 2021 10:27:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-zone-based-firewall-vrf/m-p/4394671#M1080350</guid>
      <dc:creator>kasunrajapakse</dc:creator>
      <dc:date>2021-04-28T10:27:53Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 | Zone Based Firewall | VRF</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-zone-based-firewall-vrf/m-p/4394733#M1080351</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/597777"&gt;@kasunrajapakse&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You don't have the ivrf specified in the ikev2 profile configuration, this is required when using a crypto map. The default ivrf would be the fvrf.&amp;nbsp; Use "show crypto ikev2 sa" to confirm the actual ivrf.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;No you don't need to permit traffic from "self" to "PO1760", the "self" zone is for traffic to/from the router itself, not transit traffic. You would need a zone-pair from inside (PO1760) to outside (UNTRUST). If still a problem, can you enable logging on your class-default drop and provide the output.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;FYI, your encryption and DH group values used are weak and insecure, consider using something stronger.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Apr 2021 14:20:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-zone-based-firewall-vrf/m-p/4394733#M1080351</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-04-28T14:20:36Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 | Zone Based Firewall | VRF</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-zone-based-firewall-vrf/m-p/4394961#M1080364</link>
      <description>&lt;P&gt;Hi Rob,&amp;nbsp;&lt;BR /&gt;I have slightly changed my design as per the following guide. It looks promising. But I can't define an ACL that should match the interesting traffic. I should be able to config an ACL to define the local and remote LAN subnets that I want to communicate with.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Any help on this? Thank you very much for looking in to this.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-architecture-implementation/214938-configuring-ikev2-vrf-aware-svti.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-architecture-implementation/214938-configuring-ikev2-vrf-aware-svti.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;crypto ikev2 proposal Proposal_HF_Test_AR&lt;BR /&gt;encryption 3des&lt;BR /&gt;integrity sha1&lt;BR /&gt;group 2&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;crypto ikev2 policy Policy_HF_Test_AR&lt;BR /&gt;match fvrf FVRF&lt;BR /&gt;match address local 6.x.x.x&lt;BR /&gt;proposal Proposal_HF_Test_AR&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;crypto ikev2 keyring Keyring_HF_Test_AR&lt;BR /&gt;peer Peer_Test_AR&lt;BR /&gt;address 8.x.x.x&lt;BR /&gt;pre-shared-key abc123&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;crypto ikev2 profile IKEv2_Profile_HF_Test_AR&lt;BR /&gt;match fvrf FVRF&lt;BR /&gt;match address local interface Loopback2&lt;BR /&gt;match address local 6.x.x.x&lt;BR /&gt;match identity remote address 8.x.x.x 255.255.255.255&lt;BR /&gt;authentication remote pre-share&lt;BR /&gt;authentication local pre-share&lt;BR /&gt;keyring local Keyring_HF_Test_AR&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;crypto ipsec transform-set TS_HF_Test_AR esp-3des esp-sha-hmac&lt;BR /&gt;mode tunnel&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;crypto ipsec profile IPsec_Profile_HF_Test_AR&lt;BR /&gt;set transform-set TS_HF_Test_AR&lt;BR /&gt;set ikev2-profile IKEv2_Profile_HF_Test_AR&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;interface Tunnel 1&lt;BR /&gt;vrf forwarding trust&lt;BR /&gt;ip unnumbered Port-channel1.1760&lt;BR /&gt;zone-member security IPSEC&lt;BR /&gt;tunnel source Loopback 2&lt;BR /&gt;tunnel vrf FVRF&lt;BR /&gt;tunnel protection ipsec profile IPsec_Profile_HF_Test_AR&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;interface Loopback 2&lt;BR /&gt;vrf forwarding FVRF&lt;BR /&gt;ip address 6.x.x.x 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;ip route vrf trust 192.168.10.100 255.255.255.255 Tunnel 1&lt;/P&gt;</description>
      <pubDate>Wed, 28 Apr 2021 17:04:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-zone-based-firewall-vrf/m-p/4394961#M1080364</guid>
      <dc:creator>kasunrajapakse</dc:creator>
      <dc:date>2021-04-28T17:04:23Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 | Zone Based Firewall | VRF</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-zone-based-firewall-vrf/m-p/4394966#M1080366</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/597777"&gt;@kasunrajapakse&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You are getting confused, you've defined a tunnel interface so you are now using a route based VPN. You don't define an ACL to identify interesting traffic, you need to create static routes or use a routing protocol - you peer/route over the tunnel interface.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Examples of FlexVPN &lt;A href="https://www.cisco.com/c/en/us/support/security/flexvpn/products-configuration-examples-list.html" target="_self"&gt;here&lt;/A&gt; and &lt;A href="https://integratingit.wordpress.com/category/cisco/flexvpn/" target="_self"&gt;here&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Apr 2021 17:11:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-zone-based-firewall-vrf/m-p/4394966#M1080366</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-04-28T17:11:47Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 | Zone Based Firewall | VRF</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-zone-based-firewall-vrf/m-p/4394973#M1080367</link>
      <description>&lt;P&gt;Hi Rob,&amp;nbsp;&lt;BR /&gt;Thanks. Yes, I have moved on to route based VPN.&amp;nbsp;&lt;BR /&gt;I found the following document that I could define an ACL within the tunnel interface.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/214728-configure-multi-sa-virtual-tunnel-interf.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/214728-configure-multi-sa-virtual-tunnel-interf.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;What do you think of this? Do you think I can use this to define traffic between the two LAN subnets?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Apr 2021 17:21:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-zone-based-firewall-vrf/m-p/4394973#M1080367</guid>
      <dc:creator>kasunrajapakse</dc:creator>
      <dc:date>2021-04-28T17:21:56Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 | Zone Based Firewall | VRF</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-zone-based-firewall-vrf/m-p/4394976#M1080368</link>
      <description>&lt;P&gt;I am aware of Multi-SA, but that's not what you've configured. Multi-SA is used as a replacement for crypto map and used when you are peering with a device that is using crypto map.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What device are you peering with and how is it configured? If the other device is a crypto map you can use my suggestion in the first reply to get the crypto map with VRF working or configure multi-SA. If you control both ends then just use a standard FlexVPN route based VPN.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Apr 2021 17:26:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-zone-based-firewall-vrf/m-p/4394976#M1080368</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-04-28T17:26:59Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 | Zone Based Firewall | VRF</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-zone-based-firewall-vrf/m-p/4395060#M1080376</link>
      <description>&lt;P&gt;Hi Rob,&amp;nbsp;&lt;BR /&gt;Thank you for the above comment / feedback.&amp;nbsp;&lt;BR /&gt;The peering device is a non cisco and uses policy based VPN.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;-&lt;BR /&gt;However, Going back to your 1st comment, I didn't have any iVRF configured in the&amp;nbsp;&lt;SPAN&gt;ikev2 profile. So I have done that now.&lt;BR /&gt;I can now see both my vrfs (FVRF &amp;amp; trust). However there is no traffic flow yet. I can see crypto ipsec sa up, but no encrypt/decrypt packets.&amp;nbsp; But having done that, I can see the remote subnet&amp;nbsp;10.121.36.250 learned to my inside vrf (trust)&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASR100#show crypto ikev2 sa&lt;/P&gt;&lt;P&gt;Tunnel-id Local Remote fvrf/ivrf Status&lt;BR /&gt;1 62.x.x.x/500 81.x.x.x/500 FVRF/trust READY&lt;BR /&gt;Encr: 3DES, PRF: SHA1, Hash: SHA96, DH Grp:2, Auth sign: PSK, Auth verify: PSK&lt;BR /&gt;Life/Active Time: 86400/318 sec&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;ASR1000#show ip route vrf trust | inc 10.121.36&lt;BR /&gt;S 10.121.36.250/32 [1/0] via 81.x.x.x, TenGigabitEthernet0/0/0&lt;BR /&gt;ASR1000#&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Could it be the Zone Based Firewall blocking traffic between the interfaces ??&lt;BR /&gt;My traffic flow is as follows.&amp;nbsp;&lt;BR /&gt;Remote Traffic &amp;gt;&amp;gt;&amp;gt;&amp;nbsp;&lt;SPAN&gt;TenGigabitEthernet0/0/0 &amp;gt;&amp;gt;&amp;gt; Loopback 2 (VPN end point) &amp;gt;&amp;gt;&amp;gt;Port-channel1.1760 (LAN side).&lt;BR /&gt;=======&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASR1000#show crypto ipsec sa&lt;/P&gt;&lt;P&gt;interface: TenGigabitEthernet0/0/0&lt;BR /&gt;Crypto map tag: CMAP_Non_BTOP, local addr 62.x.x.x&lt;/P&gt;&lt;P&gt;protected vrf: trust&lt;BR /&gt;local ident (addr/mask/prot/port): (10.113.3.0/255.255.255.0/0/0)&lt;BR /&gt;remote ident (addr/mask/prot/port): (10.121.12.60/255.255.255.255/0/0)&lt;BR /&gt;current_peer 81.x.x.x port 500&lt;BR /&gt;PERMIT, flags={origin_is_acl,}&lt;BR /&gt;#pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0&lt;BR /&gt;#pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0&lt;BR /&gt;#pkts compressed: 0, #pkts decompressed: 0&lt;BR /&gt;#pkts not compressed: 0, #pkts compr. failed: 0&lt;BR /&gt;#pkts not decompressed: 0, #pkts decompress failed: 0&lt;BR /&gt;#send errors 0, #recv errors 0&lt;/P&gt;&lt;P&gt;local crypto endpt.: 62.x.x.x, remote crypto endpt.: 81.x.x.x&lt;BR /&gt;plaintext mtu 1446, path mtu 1500, ip mtu 1500, ip mtu idb TenGigabitEthernet0/0/0&lt;BR /&gt;current outbound spi: 0xDF44B6(14632118)&lt;BR /&gt;PFS (Y/N): N, DH group: none&lt;/P&gt;&lt;P&gt;inbound esp sas:&lt;BR /&gt;spi: 0x5712FCB2(1460862130)&lt;BR /&gt;transform: esp-3des esp-sha-hmac ,&lt;BR /&gt;in use settings ={Tunnel, }&lt;BR /&gt;conn id: 6297, flow_id: HW:4297, sibling_flags FFFFFFFF80000048, crypto map: CMAP_Non_BTOP&lt;BR /&gt;sa timing: remaining key lifetime (k/sec): (1843200/3512)&lt;BR /&gt;IV size: 8 bytes&lt;BR /&gt;replay detection support: Y&lt;BR /&gt;Status: ACTIVE(ACTIVE)&lt;/P&gt;&lt;P&gt;inbound ah sas:&lt;/P&gt;&lt;P&gt;inbound pcp sas:&lt;/P&gt;&lt;P&gt;outbound esp sas:&lt;BR /&gt;spi: 0xDF44B6(14632118)&lt;BR /&gt;transform: esp-3des esp-sha-hmac ,&lt;BR /&gt;in use settings ={Tunnel, }&lt;BR /&gt;conn id: 6298, flow_id: HW:4298, sibling_flags FFFFFFFF80000048, crypto map: CMAP_Non_BTOP&lt;BR /&gt;sa timing: remaining key lifetime (k/sec): (1843200/3512)&lt;BR /&gt;IV size: 8 bytes&lt;BR /&gt;replay detection support: Y&lt;BR /&gt;Status: ACTIVE(ACTIVE)&lt;/P&gt;&lt;P&gt;outbound ah sas:&lt;/P&gt;&lt;P&gt;outbound pcp sas:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Apr 2021 19:40:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-zone-based-firewall-vrf/m-p/4395060#M1080376</guid>
      <dc:creator>kasunrajapakse</dc:creator>
      <dc:date>2021-04-28T19:40:36Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 | Zone Based Firewall | VRF</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-zone-based-firewall-vrf/m-p/4395065#M1080377</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/597777"&gt;@kasunrajapakse&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Possibly. Did you look at my comment in the first response about creating zone-pair from inside to outside and vice versa if necessary?&lt;/P&gt;
&lt;P&gt;If you want to confirm that it is a ZBFW issue disable it, test and work from there.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I see you have NAT enabled, ensure you "deny" traffic between the networks defined in the crypto ACL to ensure this traffic is not natted.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you've a security zone defined on the outside interface don't also have an interface ACL, just include that as part of the self to untrust/outside policy.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Apr 2021 19:52:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-zone-based-firewall-vrf/m-p/4395065#M1080377</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-04-28T19:52:04Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 | Zone Based Firewall | VRF</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-zone-based-firewall-vrf/m-p/4395384#M1080392</link>
      <description>&lt;P&gt;Thanks Rob,&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I'm in the process of making the "LAN &amp;gt;&amp;gt; WAN" zone pair. Do you think the following could work? Do I need to allow IPSec traffic from LAN &amp;gt;&amp;gt; WAN as well?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;PO1760 = LAN&lt;BR /&gt;UNTRUST = WAN&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;zone-pair security PO1760_to_UNTRUST source PO1760 destination UNTRUST&lt;BR /&gt;service-policy type inspect PO1760_to_UNTRUST_Traffic_Policy&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;policy-map type inspect PO1760_to_UNTRUST_Traffic_Policy&lt;/P&gt;&lt;P&gt;class type inspect PO1760_to_UNTRUST_Traffic_Class&lt;BR /&gt;pass&lt;BR /&gt;class class-default&lt;BR /&gt;drop&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any PO1760_to_UNTRUST_Traffic_Class&lt;BR /&gt;match protocol icmp&lt;BR /&gt;match protocol tcp&lt;BR /&gt;match protocol udp&lt;/P&gt;</description>
      <pubDate>Thu, 29 Apr 2021 11:53:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-zone-based-firewall-vrf/m-p/4395384#M1080392</guid>
      <dc:creator>kasunrajapakse</dc:creator>
      <dc:date>2021-04-29T11:53:02Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 | Zone Based Firewall | VRF</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-zone-based-firewall-vrf/m-p/4395411#M1080393</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/597777"&gt;@kasunrajapakse&lt;/a&gt; Looks ok&lt;/P&gt;</description>
      <pubDate>Thu, 29 Apr 2021 12:29:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-zone-based-firewall-vrf/m-p/4395411#M1080393</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-04-29T12:29:22Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 | Zone Based Firewall | VRF</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-zone-based-firewall-vrf/m-p/4395550#M1080398</link>
      <description>&lt;P&gt;Hi Rob,&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Zone pairs added to allow traffic from LAN to WAN. But no luck.&amp;nbsp;&lt;BR /&gt;When i check IPSec sa on the ASR - I see the following.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;#pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0&lt;BR /&gt;#pkts decaps: 16, #pkts decrypt: 16, #pkts verify: 16&lt;BR /&gt;&lt;BR /&gt;Number of decaps matches the encaps on the remote end. So I think the packet is coming to the ASR ands decrypted. But for some reason it's not encapsulating the packets back and replying (This is my understanding )&lt;BR /&gt;I don't see anything useful on the debugs either.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Running out of options to do.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Apr 2021 15:01:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-zone-based-firewall-vrf/m-p/4395550#M1080398</guid>
      <dc:creator>kasunrajapakse</dc:creator>
      <dc:date>2021-04-29T15:01:34Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 | Zone Based Firewall | VRF</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-zone-based-firewall-vrf/m-p/4395555#M1080399</link>
      <description>&lt;P&gt;If there are no encaps, that router is not sending outbound traffic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you have a zone-pair from OUTSIDE to INSIDE as well?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Did you check NAT configuration like I previously suggested?&lt;/P&gt;
&lt;P&gt;Did you remove ZBFW configuration for testing to confirm that isn't blocking the traffic?&lt;/P&gt;
&lt;P&gt;Or enable logging on your class-default drop?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Generate oubound traffic, then check the policy-map for hits "show policy-map type inspect zone-pair &amp;lt;NAME&amp;gt;"&lt;/P&gt;</description>
      <pubDate>Thu, 29 Apr 2021 15:28:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-zone-based-firewall-vrf/m-p/4395555#M1080399</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-04-29T15:28:13Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 | Zone Based Firewall | VRF</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-zone-based-firewall-vrf/m-p/4397997#M1080533</link>
      <description>&lt;P&gt;Hi Rob,&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Sorry for the late reply (I have been away)&amp;nbsp;&lt;BR /&gt;Thank you for all your help. Adding the zone from &lt;SPAN&gt;OUTSIDE to INSIDE worked. The IPSec is working now.&amp;nbsp;&lt;BR /&gt;Thank you again for your help!&lt;BR /&gt;&lt;BR /&gt;Cheers!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 May 2021 09:17:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-zone-based-firewall-vrf/m-p/4397997#M1080533</guid>
      <dc:creator>kasunrajapakse</dc:creator>
      <dc:date>2021-05-05T09:17:41Z</dc:date>
    </item>
  </channel>
</rss>

