<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Zone-Based Firewall policy - not blocking icmp in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/zone-based-firewall-policy-not-blocking-icmp/m-p/4458196#M1083259</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/286011"&gt;@ddolbel&lt;/a&gt; Yes of course they would, now that you've referenced the self zone in a zone-pair you have to control traffic in and outbound. You'll need to explictly permit the traffic you want to terminate on the router, such as IKE, IPSec etc.&lt;/P&gt;</description>
    <pubDate>Wed, 01 Sep 2021 12:43:50 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2021-09-01T12:43:50Z</dc:date>
    <item>
      <title>Zone-Based Firewall policy - not blocking icmp</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-policy-not-blocking-icmp/m-p/4458144#M1083248</link>
      <description>&lt;P&gt;Hello All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i'm hoping you can assist me, i'm trying to convert from the old ip inspect firewall rules to zone based policy's&lt;/P&gt;&lt;P&gt;I have worked out most of the setting however I can't seem to get outside icmp blocking to occur&lt;/P&gt;&lt;P&gt;I want clients inside the network to be able to ping, just not the big bad internet pinging my wan interface.&lt;/P&gt;&lt;P&gt;I have tried acl's on the in bound interface but then clients inside the network can't ping&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried adding class to match icmp and block it however that didn't work&lt;/P&gt;&lt;P&gt;here is my zone-based policy config thus far&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any INSIDE-TO-OUTSIDE-CLASS&lt;BR /&gt;match access-group name INSIDE-TO-OUTSIDE&lt;BR /&gt;class-map type inspect match-all OUTSIDE-TO-INSIDE-CLASS&lt;BR /&gt;match access-group name OUTSIDE-TO-INSIDE&lt;/P&gt;&lt;P&gt;class-map type inspect match-all OUTSIDE-ICMP-POLICY&lt;BR /&gt;match protocol icmp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;policy-map type inspect INSIDE-TO-OUTSIDE-POLICY&lt;BR /&gt;class type inspect INSIDE-TO-OUTSIDE-CLASS&lt;BR /&gt;inspect&lt;BR /&gt;class class-default&lt;BR /&gt;drop log&lt;BR /&gt;policy-map type inspect OUTSIDE-TO-INSIDE-POLICY&lt;BR /&gt;class type inspect OUTSIDE-TO-INSIDE-CLASS&lt;BR /&gt;inspect&lt;BR /&gt;class type inspect OUTSIDE-ICMP-POLICY&lt;BR /&gt;drop&lt;BR /&gt;class class-default&lt;BR /&gt;drop log&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;zone security INSIDE&lt;BR /&gt;zone security OUTSIDE&lt;BR /&gt;zone-pair security IN-TO-OUT source INSIDE destination OUTSIDE&lt;BR /&gt;service-policy type inspect INSIDE-TO-OUTSIDE-POLICY&lt;BR /&gt;zone-pair security OUT-TO-IN source OUTSIDE destination INSIDE&lt;BR /&gt;service-policy type inspect OUTSIDE-TO-INSIDE-POLICY&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ip access-list extended INSIDE-TO-OUTSIDE&lt;BR /&gt;10 permit ip any any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ip access-list extended OUTSIDE-TO-INSIDE&lt;BR /&gt;10 remark Allow Inbound Connections&lt;BR /&gt;10 remark VPN Connection&lt;BR /&gt;10 permit gre any any&lt;BR /&gt;20 permit udp any any eq non500-isakmp&lt;BR /&gt;30 permit udp any any eq isakmp&lt;BR /&gt;40 permit esp any any&lt;BR /&gt;50 permit ahp any any&lt;BR /&gt;60 permit tcp any any eq 10000&lt;BR /&gt;70 remark Internode SIP UDP 5060&lt;BR /&gt;70 permit udp host &amp;lt;removed&amp;gt; any eq 5060&lt;BR /&gt;90 remark DNS Access TCP (53)&lt;BR /&gt;90 permit tcp any any eq domain&lt;BR /&gt;100 remark DNS Access TCP (53)&lt;BR /&gt;100 permit udp any any eq domain&lt;BR /&gt;170 remark HTTPS (443) Access TCP&lt;BR /&gt;170 permit tcp any any eq 443&lt;BR /&gt;180 remark HTTPS (443) Access UDP&lt;BR /&gt;180 permit udp any any eq 443&lt;BR /&gt;190 remark NTP (123)&lt;BR /&gt;190 permit udp any any eq ntp&lt;BR /&gt;220 remark ESET ESMC Management Agent (2222) TCP&lt;BR /&gt;220 permit tcp any any eq 2222&lt;BR /&gt;260 remark Deny ICMP&lt;BR /&gt;260 deny icmp any any&lt;BR /&gt;270 deny ip 10.0.0.0 0.0.0.255 any&lt;BR /&gt;280 deny ip 172.16.0.0 0.15.255.255 any&lt;BR /&gt;290 deny ip 192.168.0.0 0.0.255.255 any&lt;BR /&gt;300 deny ip 127.0.0.0 0.255.255.255 any&lt;BR /&gt;310 deny ip host 255.255.255.255 any&lt;BR /&gt;320 deny ip host 0.0.0.0 any&lt;BR /&gt;330 deny ip any any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0/2&lt;BR /&gt;description GLECSW01_Gi1/0/1&lt;BR /&gt;ip address 10.0.1.1 255.255.255.252&lt;BR /&gt;no ip redirects&lt;BR /&gt;no ip unreachables&lt;BR /&gt;no ip proxy-arp&lt;BR /&gt;ip nbar protocol-discovery&lt;BR /&gt;ip nat inside&lt;BR /&gt;zone-member security INSIDE&lt;/P&gt;&lt;P&gt;media-type rj45&lt;BR /&gt;negotiation auto&lt;BR /&gt;no mop enabled&lt;BR /&gt;ip virtual-reassembly&lt;BR /&gt;ip virtual-reassembly-out&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface Dialer0&lt;BR /&gt;description --- FTTP PPPoE ---&lt;BR /&gt;ip address negotiated&lt;BR /&gt;no ip redirects&lt;BR /&gt;no ip unreachables&lt;BR /&gt;no ip proxy-arp&lt;BR /&gt;ip nbar protocol-discovery&lt;BR /&gt;ip nat outside&lt;BR /&gt;zone-member security OUTSIDE&lt;BR /&gt;encapsulation ppp&lt;BR /&gt;dialer pool 1&lt;BR /&gt;dialer idle-timeout 0&lt;BR /&gt;dialer persistent&lt;BR /&gt;dialer-group 1&lt;BR /&gt;no cdp enable&lt;BR /&gt;ppp authentication chap callin&lt;BR /&gt;ppp chap hostname &amp;lt;removed&amp;gt;&lt;BR /&gt;ppp chap password 7 &amp;lt;removed&amp;gt;&lt;BR /&gt;ppp ipcp dns request accept&lt;BR /&gt;ppp ipcp route default&lt;BR /&gt;ip virtual-reassembly max-reassemblies 256&lt;/P&gt;</description>
      <pubDate>Wed, 01 Sep 2021 11:24:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-policy-not-blocking-icmp/m-p/4458144#M1083248</guid>
      <dc:creator>ddolbel</dc:creator>
      <dc:date>2021-09-01T11:24:52Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-Based Firewall policy - not blocking icmp</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-policy-not-blocking-icmp/m-p/4458145#M1083249</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/286011"&gt;@ddolbel&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you want to block ping to your WAN interface (Dialer0) then you need a ZBFW zone-pair from OUTSIDE to "self" zone. The "self" zone applies to the router's interfaces. The INSIDE zone is from clients behind the router on the inside of the network.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Sep 2021 11:23:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-policy-not-blocking-icmp/m-p/4458145#M1083249</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-09-01T11:23:51Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-Based Firewall policy - not blocking icmp</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-policy-not-blocking-icmp/m-p/4458157#M1083250</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;thanks for your reply.. you have kinda lost me here the router i'm using has 2 interfaces... it sounds like i need a third zone and another interface?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Sep 2021 11:34:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-policy-not-blocking-icmp/m-p/4458157#M1083250</guid>
      <dc:creator>ddolbel</dc:creator>
      <dc:date>2021-09-01T11:34:00Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-Based Firewall policy - not blocking icmp</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-policy-not-blocking-icmp/m-p/4458163#M1083251</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/286011"&gt;@ddolbel&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You don't create the "self" zone, it already exists. The "self" zone controls traffic "to"/"from" any traffic originating or destined to the routers interface, as opposed to "through" the router. The "self" zone would control VPNs terminating against the router's interface, SSH to the router itself, pinging the router's interface etc.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You've created OUTSIDE and INSIDE zones and applied those to your interfaces. Your zone-pairs will control traffic "through" the router from OUTSIDE to INSIDE and vice versa.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;More information on self zone&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/zbfw-self-zone-integration/ta-p/3154572" target="_blank"&gt;https://community.cisco.com/t5/security-documents/zbfw-self-zone-integration/ta-p/3154572&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/network-security/zbfw-self-zone-and-default-zone/td-p/4104165" target="_blank"&gt;https://community.cisco.com/t5/network-security/zbfw-self-zone-and-default-zone/td-p/4104165&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Sep 2021 11:45:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-policy-not-blocking-icmp/m-p/4458163#M1083251</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-09-01T11:45:32Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-Based Firewall policy - not blocking icmp</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-policy-not-blocking-icmp/m-p/4458164#M1083252</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your reply and the links, I have had a look and tried the following&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;class-map type inspect match-all OUTSIDE-TO-SELF-ICMP-POLICY&lt;BR /&gt;match protocol icmp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;policy-map type inspect OUTSIDE-TO-SELF&lt;BR /&gt;class type inspect OUTSIDE-TO-SELF-ICMP-POLICY&lt;BR /&gt;inspect&lt;BR /&gt;class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;policy-map type inspect SELF-TO-OUTSIDE&lt;BR /&gt;class type inspect OUTSIDE-TO-SELF-ICMP-POLICY&lt;BR /&gt;inspect&lt;BR /&gt;class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;zone-pair security OUTSIDE-TO-SELF source OUTSIDE destination self&lt;BR /&gt;service-policy type inspect OUTSIDE-TO-SELF&lt;BR /&gt;zone-pair security SELF-TO-OUTSIDE source self destination OUTSIDE&lt;BR /&gt;service-policy type inspect SELF-TO-OUTSIDE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;however outside can still ping my wan interface&lt;/P&gt;</description>
      <pubDate>Wed, 01 Sep 2021 11:54:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-policy-not-blocking-icmp/m-p/4458164#M1083252</guid>
      <dc:creator>ddolbel</dc:creator>
      <dc:date>2021-09-01T11:54:27Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-Based Firewall policy - not blocking icmp</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-policy-not-blocking-icmp/m-p/4458168#M1083253</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/286011"&gt;@ddolbel&lt;/a&gt; use "drop" instead of "inspect".&lt;/P&gt;</description>
      <pubDate>Wed, 01 Sep 2021 11:58:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-policy-not-blocking-icmp/m-p/4458168#M1083253</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-09-01T11:58:39Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-Based Firewall policy - not blocking icmp</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-policy-not-blocking-icmp/m-p/4458170#M1083254</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ah ha!!&amp;nbsp;&lt;/P&gt;&lt;P&gt;policy-map type inspect OUTSIDE-TO-SELF&lt;BR /&gt;class type inspect OUTSIDE-TO-SELF-ICMP-POLICY&lt;BR /&gt;drop&lt;BR /&gt;class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;wan is now timing out nice!!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;do i need to do the same for this policy?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;policy-map type inspect SELF-TO-OUTSIDE&lt;BR /&gt;class type inspect OUTSIDE-TO-SELF-ICMP-POLICY&lt;BR /&gt;inspect&lt;BR /&gt;class class-default&lt;/P&gt;</description>
      <pubDate>Wed, 01 Sep 2021 12:02:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-policy-not-blocking-icmp/m-p/4458170#M1083254</guid>
      <dc:creator>ddolbel</dc:creator>
      <dc:date>2021-09-01T12:02:08Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-Based Firewall policy - not blocking icmp</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-policy-not-blocking-icmp/m-p/4458172#M1083255</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/286011"&gt;@ddolbel&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Not necessarily, if you configure drop on SELF-TO-OUTSIDE, then the router won't be able to ping outbound.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Sep 2021 12:05:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-policy-not-blocking-icmp/m-p/4458172#M1083255</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-09-01T12:05:11Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-Based Firewall policy - not blocking icmp</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-policy-not-blocking-icmp/m-p/4458176#M1083256</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;I have lost the ability to ping inside sites, would i be right in saying that i need to create a new zone pair self-to-inside?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Sep 2021 12:08:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-policy-not-blocking-icmp/m-p/4458176#M1083256</guid>
      <dc:creator>ddolbel</dc:creator>
      <dc:date>2021-09-01T12:08:22Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-Based Firewall policy - not blocking icmp</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-policy-not-blocking-icmp/m-p/4458179#M1083257</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/286011"&gt;@ddolbel&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Correct, As soon as you configure one zone-pair that involves the Self-Zone traffic from any zone to the Self or from the Self to any zone will be filtered. So you'll also need to create another for INSIDE to self.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Sep 2021 12:12:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-policy-not-blocking-icmp/m-p/4458179#M1083257</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-09-01T12:12:47Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-Based Firewall policy - not blocking icmp</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-policy-not-blocking-icmp/m-p/4458187#M1083258</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks for the info, I have created the new zones&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;class-map type inspect match-all SELF-TO-INSIDE&lt;BR /&gt;match access-group name SELF-TO-INSIDE&lt;BR /&gt;class-map type inspect match-all INSIDE-TO-SELF&lt;BR /&gt;match access-group name INSIDE-TO-SELF&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;policy-map type inspect INSIDE-TO-SELF&lt;BR /&gt;class type inspect INSIDE-TO-SELF&lt;BR /&gt;inspect&lt;BR /&gt;class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;policy-map type inspect SELF-TO-INSIDE&lt;BR /&gt;class type inspect SELF-TO-INSIDE&lt;BR /&gt;inspect&lt;BR /&gt;class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;zone-pair security INSIDE-TO-SELF source INSIDE destination self&lt;BR /&gt;service-policy type inspect INSIDE-TO-SELF&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;zone-pair security SELF-TO-INSIDE source self destination INSIDE&lt;BR /&gt;service-policy type inspect SELF-TO-INSIDE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ip access-list extended SELF-TO-INSIDE&lt;BR /&gt;10 permit ip any any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ip access-list extended INSIDE-TO-SELF&lt;BR /&gt;10 permit ip any any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;now my ipsec tunnels have gone down.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Sep 2021 12:35:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-policy-not-blocking-icmp/m-p/4458187#M1083258</guid>
      <dc:creator>ddolbel</dc:creator>
      <dc:date>2021-09-01T12:35:42Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-Based Firewall policy - not blocking icmp</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-policy-not-blocking-icmp/m-p/4458196#M1083259</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/286011"&gt;@ddolbel&lt;/a&gt; Yes of course they would, now that you've referenced the self zone in a zone-pair you have to control traffic in and outbound. You'll need to explictly permit the traffic you want to terminate on the router, such as IKE, IPSec etc.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Sep 2021 12:43:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-policy-not-blocking-icmp/m-p/4458196#M1083259</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-09-01T12:43:50Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-Based Firewall policy - not blocking icmp</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-policy-not-blocking-icmp/m-p/4458199#M1083261</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i figured that so i created the following&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any OUTSIDE-TO-SELF-REMOTE-SITES-POLICY&lt;BR /&gt;match access-group name OUTSIDE-TO-SELF-REMOTE-SITES&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;policy-map type inspect OUTSIDE-TO-SELF&lt;BR /&gt;class type inspect OUTSIDE-TO-SELF-ICMP-POLICY&lt;BR /&gt;drop&lt;BR /&gt;class type inspect OUTSIDE-TO-SELF-REMOTE-SITES-POLICY&lt;BR /&gt;inspect&lt;BR /&gt;class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ip access-list extended OUTSIDE-TO-SELF-REMOTE-SITES&lt;BR /&gt;10 remark Allow Inbound Connections&lt;BR /&gt;10 remark VPN Connection&lt;BR /&gt;10 permit gre any any&lt;BR /&gt;20 permit udp any any eq non500-isakmp&lt;BR /&gt;30 permit udp any any eq isakmp&lt;BR /&gt;40 permit esp any any&lt;BR /&gt;50 permit ahp any any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;**bleep** what a head ache... i used to have 10 lines for ip inspect now i have over 40&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;looks like i'm up and running, thanks for the assist&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Sep 2021 12:54:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-policy-not-blocking-icmp/m-p/4458199#M1083261</guid>
      <dc:creator>ddolbel</dc:creator>
      <dc:date>2021-09-01T12:54:56Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-Based Firewall policy - not blocking icmp</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-policy-not-blocking-icmp/m-p/4458589#M1083279</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;not sure why but my asterisk server keep losing registration to external sip providers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i'm currently running ios 17.3.4a(MD) i checked the release notes and couldn't see any caveats relating to sip&lt;/P&gt;</description>
      <pubDate>Thu, 02 Sep 2021 06:52:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-policy-not-blocking-icmp/m-p/4458589#M1083279</guid>
      <dc:creator>ddolbel</dc:creator>
      <dc:date>2021-09-02T06:52:39Z</dc:date>
    </item>
  </channel>
</rss>

