<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Zone Based Firewall Deployement in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/zone-based-firewall-deployement/m-p/4750859#M1096527</link>
    <description>&lt;P&gt;do you config two side or one side zone pair ?&lt;/P&gt;</description>
    <pubDate>Sat, 07 Jan 2023 21:59:20 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2023-01-07T21:59:20Z</dc:date>
    <item>
      <title>Zone Based Firewall Deployement</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-deployement/m-p/4750857#M1096526</link>
      <description>&lt;P&gt;hello all,&lt;/P&gt;&lt;P&gt;acually i'am planing to deploy zone based Firewall policy on some Cisco ISR 4300 series Routers,&lt;/P&gt;&lt;P&gt;i have monitoring all most the traffic flow get in and out of those router,so i&amp;nbsp; have create two ACLS to match the traffic, one the inside and the other for the outside,&lt;/P&gt;&lt;P&gt;the design that i prepare to put in place is as follow:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; * define two zones&amp;nbsp; ( inside and outside )&lt;/P&gt;&lt;P&gt;&amp;nbsp; * create a policy map to match the internal traffic in my case a named ACL ( InsideProtocols )&lt;/P&gt;&lt;P&gt;&amp;nbsp;* create a policy-map type inspect&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;* create the zone-pair and attached the policy-map&lt;/P&gt;&lt;P&gt;&amp;nbsp;* assign interfaces the proper zone ( in my case each router has 5 link to HeadQuarter)&amp;nbsp;&lt;/P&gt;&lt;P&gt;my probleme is when i assign the interface to zone, some traffic flow normally and some no; especially the Voice Over Ip )&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;does anyone has the same case or he has deployed the zone based firewall, ihope he can give me some advice or the tricks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks in advance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 07 Jan 2023 21:46:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-deployement/m-p/4750857#M1096526</guid>
      <dc:creator>mellalBrahim</dc:creator>
      <dc:date>2023-01-07T21:46:43Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall Deployement</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-deployement/m-p/4750859#M1096527</link>
      <description>&lt;P&gt;do you config two side or one side zone pair ?&lt;/P&gt;</description>
      <pubDate>Sat, 07 Jan 2023 21:59:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-deployement/m-p/4750859#M1096527</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-01-07T21:59:20Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall Deployement</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-deployement/m-p/4750862#M1096528</link>
      <description>&lt;P&gt;juste one side, which are the router's branches&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 07 Jan 2023 22:37:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-deployement/m-p/4750862#M1096528</guid>
      <dc:creator>mellalBrahim</dc:creator>
      <dc:date>2023-01-07T22:37:43Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall Deployement</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-deployement/m-p/4750863#M1096529</link>
      <description>&lt;P&gt;if traffic OUT to IN and traffic by default drop.&amp;nbsp;&lt;BR /&gt;I think you need two sides.&lt;/P&gt;</description>
      <pubDate>Sat, 07 Jan 2023 22:40:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-deployement/m-p/4750863#M1096529</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-01-07T22:40:57Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall Deployement</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-deployement/m-p/4750865#M1096530</link>
      <description>&lt;P&gt;You haven't posted any configuration or described anything about how you VoIP is setup.&amp;nbsp; My first guess is that there is traffic being initiated from the "outside" that is being dropped.&amp;nbsp; This needs to be allowed specifically.&amp;nbsp; Do you see any of these drops in your logging?&lt;/P&gt;</description>
      <pubDate>Sat, 07 Jan 2023 23:03:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-deployement/m-p/4750865#M1096530</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2023-01-07T23:03:49Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall Deployement</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-deployement/m-p/4750899#M1096531</link>
      <description>&lt;P&gt;already define an access-list to match the return traffic, and also the traffic generating from the outside such as the users who try to call the branch's phone . and i have change the default class-map to log the dropped traffic.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 08 Jan 2023 08:14:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-deployement/m-p/4750899#M1096531</guid>
      <dc:creator>mellalBrahim</dc:creator>
      <dc:date>2023-01-08T08:14:50Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall Deployement</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-deployement/m-p/4750900#M1096532</link>
      <description>&lt;P&gt;hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;i have 3 call manager and many servers which the braches uses contact them,&amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;i have define an access-list which match the incomming traffic, from the outiside and create a policy-map to pass this traffic without inspection, and also i have made a change on the default-class map to also log the dropped traffic.&amp;nbsp;&lt;/P&gt;&lt;P&gt;when check if there no dropping traffic within the logs.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 08 Jan 2023 08:18:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-deployement/m-p/4750900#M1096532</guid>
      <dc:creator>mellalBrahim</dc:creator>
      <dc:date>2023-01-08T08:18:26Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall Deployement</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-deployement/m-p/4750903#M1096533</link>
      <description>&lt;P&gt;an example of the ACL to match the incomming traffic.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;ip access-list extended VoIP&lt;BR /&gt;10 permit tcp host 10.10.69.121 eq 5060 any&lt;BR /&gt;20 permit udp host 10.10.69.121 eq 5060 any&lt;BR /&gt;60 permit ip 10.10.111.0 0.0.0.255 any&lt;BR /&gt;70 permit ip 10.196.111.0 0.0.0.255 any&lt;BR /&gt;80 permit ip 10.10.68.0 0.0.0.255 any&lt;BR /&gt;100 permit tcp host 10.10.101.121 eq 5060 any&lt;BR /&gt;110 permit udp host 10.10.101.121 eq 5060 any&lt;BR /&gt;120 permit ip host 10.10.101.111 any&lt;BR /&gt;130 permit ip host 10.10.101.2 any&amp;nbsp;&lt;BR /&gt;140 permit ip host 10.10.101.3 any&amp;nbsp;&amp;nbsp;&lt;BR /&gt;150 permit ip host 10.10.111.41 any&lt;BR /&gt;2000 deny ip any any&amp;nbsp;&lt;/P&gt;&lt;P&gt;---------------------------------------&lt;/P&gt;&lt;P&gt;the class-maps to match the traffic&amp;nbsp;&lt;/P&gt;&lt;P&gt;----------------------------------------&lt;/P&gt;&lt;P&gt;class-map type inspect match-any INSIDE&lt;BR /&gt;match protocol tcp&lt;BR /&gt;match protocol udp&lt;BR /&gt;match protocol icmp&lt;BR /&gt;class-map type inspect match-all VoIP&lt;BR /&gt;match access-group name VoIP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;----------------------------------------------------&lt;/P&gt;&lt;P&gt;the policy-map&amp;nbsp;&lt;/P&gt;&lt;P&gt;-------------------------------&lt;/P&gt;&lt;P&gt;policy-map type inspect OUT-IN&lt;BR /&gt;class type inspect VoIP&lt;BR /&gt;pass&lt;BR /&gt;class class-default&lt;BR /&gt;drop log&lt;BR /&gt;policy-map type inspect IN-OUT&lt;BR /&gt;class type inspect INSIDE&lt;BR /&gt;inspect&lt;BR /&gt;class class-default&lt;BR /&gt;drop&lt;/P&gt;&lt;P&gt;---------------------------------------&lt;/P&gt;&lt;P&gt;the zone-pair&amp;nbsp;&lt;/P&gt;&lt;P&gt;-----------------------------------&lt;/P&gt;&lt;P&gt;Zone-pair name INSIDE_TO_OUTSIDE&lt;BR /&gt;Source-Zone INSIDE Destination-Zone OUTSIDE&lt;BR /&gt;service-policy IN-OUT&lt;BR /&gt;Zone-pair name OUTSIDE_TO_INSIDE&lt;BR /&gt;Source-Zone OUTSIDE Destination-Zone INSIDE&lt;BR /&gt;service-policy OUT-IN&lt;/P&gt;&lt;P&gt;-------------------------------&lt;/P&gt;&lt;P&gt;interfaces&amp;nbsp;&lt;/P&gt;&lt;P&gt;-----------------------&lt;/P&gt;&lt;P&gt;interface g0/0&amp;nbsp;&lt;/P&gt;&lt;P&gt;zone-member security INSIDE&amp;nbsp;&lt;/P&gt;&lt;P&gt;Interface tun 0&amp;nbsp;&lt;/P&gt;&lt;P&gt;zone-member security OUTSIDE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 08 Jan 2023 08:25:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-deployement/m-p/4750903#M1096533</guid>
      <dc:creator>mellalBrahim</dc:creator>
      <dc:date>2023-01-08T08:25:37Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall Deployement</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-deployement/m-p/4750904#M1096534</link>
      <description>&lt;P&gt;in addittion , if apply only the acl for incomming and outoing interfaces every thing works well&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 08 Jan 2023 08:33:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-deployement/m-p/4750904#M1096534</guid>
      <dc:creator>mellalBrahim</dc:creator>
      <dc:date>2023-01-08T08:33:17Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall Deployement</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-deployement/m-p/4750959#M1096541</link>
      <description>&lt;P&gt;I am so interest in this case,&amp;nbsp;&lt;BR /&gt;you mention only ACL work&amp;nbsp;&lt;BR /&gt;can you share both config work and not work&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 08 Jan 2023 14:06:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-deployement/m-p/4750959#M1096541</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-01-08T14:06:22Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall Deployement</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-deployement/m-p/4750981#M1096545</link>
      <description>&lt;P&gt;Which ACLs did you apply to which interfaces when this worked.&amp;nbsp; From what I can see&amp;nbsp; from what you posted you only have the VOIP ACL for incoming traffic.&lt;/P&gt;
&lt;P&gt;Would be helpful to see the full configuration of the router you are applying this to (remember to remove any public IPs, usernames and passwords.)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 08 Jan 2023 15:46:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-deployement/m-p/4750981#M1096545</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2023-01-08T15:46:12Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall Deployement</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-deployement/m-p/4751015#M1096549</link>
      <description>&lt;P&gt;hi all,&lt;/P&gt;&lt;P&gt;there the config that i deployed :&lt;/P&gt;&lt;P&gt;when i just the ACL on the interfaces ( Classic Firewall ) every things Works Fine, Data and Voice&amp;nbsp;&lt;/P&gt;&lt;P&gt;when i tryed to match these acl with class-map ( to use full state firewall ), there many, issue for exemple the IP phones rings but there no voice to here,&amp;nbsp; some application works and other no, for this reason i've this really weired for me, and i wondered if any body here has deploy the ZBF in a production envirement.&amp;nbsp;&lt;/P&gt;&lt;P&gt;thank you all&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;class-map type inspect match-any INSIDE&lt;BR /&gt;match protocol tcp&lt;BR /&gt;match protocol udp&lt;BR /&gt;match protocol icmp&lt;BR /&gt;class-map type inspect match-all VoIP&lt;BR /&gt;match access-group name VoIP&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;class-map type inspect match-all INSIDE&lt;BR /&gt;match access-group name 100&lt;BR /&gt;&lt;BR /&gt;class-map type inspect match-all OUTSIDE&lt;BR /&gt;match access-group name 101&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;policy-map type inspect OUT-IN&lt;BR /&gt;class type inspect OUTSIDE&lt;BR /&gt;pass&lt;BR /&gt;class class-default&lt;BR /&gt;drop log&lt;BR /&gt;&lt;BR /&gt;policy-map type inspect IN-OUT&lt;BR /&gt;class type inspect INSIDE&lt;BR /&gt;inspect&lt;BR /&gt;class class-default&lt;BR /&gt;drop&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;zone security INSIDE&lt;BR /&gt;zone security OUTSIDE&lt;BR /&gt;zone-pair security INSIDE_TO_OUTSIDE source INSIDE destination OUTSIDE&lt;BR /&gt;service-policy type inspect IN-OUT&lt;BR /&gt;zone-pair security OUTSIDE_TO_INSIDE source OUTSIDE destination INSIDE&lt;BR /&gt;service-policy type inspect OUT-IN&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list 100 remark this ACL to identify the intressting Traffic&lt;BR /&gt;access-list 100 permit tcp any host 10.X.101.121 eq 5060&lt;BR /&gt;access-list 100 permit udp any host 10.X.101.121 eq 5060&lt;BR /&gt;access-list 100 permit tcp any host 10.X.69.121 eq 5060&lt;BR /&gt;access-list 100 permit udp any host 10.X.69.121 eq 5060&lt;BR /&gt;access-list 100 permit tcp any host 10.X.101.121 eq 5060&lt;BR /&gt;access-list 100 permit udp any host 10.X.101.121 eq 5060&lt;BR /&gt;access-list 100 permit ip any 10.X.128.0 0.0.31.255&lt;BR /&gt;access-list 100 permit ip any 10.X.111.0 0.0.0.255&lt;BR /&gt;access-list 100 permit ip any 10.X.111.0 0.0.0.255&lt;BR /&gt;access-list 100 permit ip any 10.X.68.0 0.0.0.255&lt;BR /&gt;access-list 100 permit tcp 10.X.116.0 0.0.0.255 host 10.X.101.53 eq 443&lt;BR /&gt;access-list 100 permit ip any host 10.X.101.5&lt;BR /&gt;access-list 100 permit ip any host 10.X.101.6&lt;BR /&gt;access-list 100 permit ip any host 10.X.101.93&lt;BR /&gt;access-list 100 permit ip any host 10.X.101.104&lt;BR /&gt;access-list 100 permit ip any host 10.X.143.240&lt;BR /&gt;access-list 100 permit ip any host 10.X.101.135&lt;BR /&gt;access-list 100 permit ip any host 10.X.101.92&lt;BR /&gt;access-list 100 permit ip any host 10.X.101.105&lt;BR /&gt;access-list 100 permit ip any host 10.X.101.101&lt;BR /&gt;access-list 100 permit ip any host 10.X.101.2&lt;BR /&gt;access-list 100 permit ip any host 10.X.76.100&lt;BR /&gt;access-list 100 permit ip any host 10.X.101.81&lt;BR /&gt;access-list 100 permit ip any host 10.X.101.4&lt;BR /&gt;access-list 100 permit ip any host 10.X.101.3&lt;BR /&gt;access-list 100 permit ip any host 10.X.109.101&lt;BR /&gt;access-list 100 permit ip any host 10.X.52.46&lt;BR /&gt;access-list 100 permit ip any host 10.X.101.240&lt;BR /&gt;access-list 100 permit ip any host 10.X.203.143&lt;BR /&gt;access-list 100 permit ip any host 10.X.101.100&lt;BR /&gt;access-list 100 permit ip any host 10.X.101.102&lt;BR /&gt;access-list 100 permit ip any host 10.X.202.218&lt;BR /&gt;access-list 100 permit ip any host 10.X.101.18&lt;BR /&gt;access-list 100 permit ip any host 10.X.101.112&lt;BR /&gt;access-list 100 permit ip any host 10.X.116.255&lt;BR /&gt;access-list 100 permit ip any host 10.X.163.135&lt;BR /&gt;access-list 100 permit ip any host 10.X.102.23&lt;BR /&gt;access-list 100 permit ip any host 10.X.163.240&lt;BR /&gt;access-list 100 permit ip any host 10.X.101.103&lt;BR /&gt;access-list 100 permit ip any host 10.X.162.221&lt;BR /&gt;access-list 100 permit ip any host 10.X.121.253&lt;BR /&gt;access-list 100 permit ip any host 10.X.101.90&lt;BR /&gt;access-list 100 permit ip any host 10.X.100.1&lt;BR /&gt;access-list 100 permit ip any host 10.X.101.21&lt;BR /&gt;access-list 100 permit ip any host 10.X.144.167&lt;BR /&gt;access-list 100 permit ip any host 10.X.101.136&lt;BR /&gt;access-list 100 permit ip any host 10.X.163.134&lt;BR /&gt;access-list 100 permit ip any host 10.X.101.137&lt;BR /&gt;access-list 100 permit ip any host 10.X.203.232&lt;BR /&gt;access-list 100 permit ip any host 10.X.203.40&lt;BR /&gt;access-list 100 permit ip any host 10.X.195.184&lt;BR /&gt;access-list 100 permit ip any host 10.X.202.88&lt;BR /&gt;access-list 100 permit ip any host 10.X.96.4&lt;BR /&gt;access-list 100 permit udp any host 10.X.101.25&lt;BR /&gt;access-list 100 permit ip any host 10.X.101.48&lt;BR /&gt;access-list 100 permit ip any host 10.X.116.254&lt;BR /&gt;access-list 100 permit ip any host 10.X.202.165&lt;BR /&gt;access-list 100 permit ip any host 10.X.163.73&lt;BR /&gt;access-list 100 permit ip any host 10.X.194.240&lt;BR /&gt;access-list 100 permit ip any host 10.X.163.248&lt;BR /&gt;access-list 100 permit ip any host 10.X.162.14&lt;BR /&gt;access-list 100 permit ip any host 10.X.101.46&lt;BR /&gt;access-list 100 permit ip any host 224.0.0.5&lt;BR /&gt;access-list 100 permit ip any host 10.X.101.82&lt;BR /&gt;access-list 100 permit ip any host 10.X.101.81&lt;BR /&gt;access-list 100 permit ip any host 10.X.101.165&lt;BR /&gt;access-list 100 permit ip 10.X.143.96 0.0.0.31 any&lt;BR /&gt;access-list 100 permit ip any host 10.X.201.45&lt;BR /&gt;access-list 100 permit ip any host 10.X.249.97&lt;BR /&gt;access-list 100 permit ip any host 10.X.249.106&lt;BR /&gt;access-list 100 permit ip any host 10.X.195.239&lt;BR /&gt;access-list 100 permit ip any host 10.X.249.9&lt;BR /&gt;access-list 100 permit ip any host 10.X.203.254&lt;BR /&gt;access-list 100 permit ip any host 10.X.201.46&lt;BR /&gt;access-list 100 permit ip any host 10.X.201.94&lt;BR /&gt;access-list 100 permit icmp any host 10.X.248.252&lt;BR /&gt;access-list 100 permit icmp any host 10.X.43.254&lt;BR /&gt;access-list 100 permit ip any host 10.X.195.185&lt;BR /&gt;access-list 100 deny ip any any&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;access-list 101 permit tcp host 10.X.195.185 eq 443 any&lt;BR /&gt;access-list 101 permit icmp host 10.X.51.250 any echo-reply&lt;BR /&gt;access-list 101 permit tcp host 10.X.201.94 eq www any&lt;BR /&gt;access-list 101 permit tcp host 10.X.162.210 eq www any&lt;BR /&gt;access-list 101 permit tcp host 10.X.163.51 eq www any&lt;BR /&gt;access-list 101 permit tcp host 10.X.52.10 eq 443 any&lt;BR /&gt;access-list 101 permit ip host 10.X.101.240 host 10.X.116.189&lt;BR /&gt;access-list 101 permit ip host 10.X.51.250 10.X.116.0 0.0.0.255&lt;BR /&gt;access-list 101 permit tcp host 10.X.69.114 eq 445 10.X.116.0 0.0.0.255&lt;BR /&gt;access-list 101 permit icmp host 10.X.69.114 10.X.116.0 0.0.0.255 echo-reply&lt;BR /&gt;access-list 101 permit tcp host 10.X.101.53 10.X.116.0 0.0.0.255 eq 443&lt;BR /&gt;access-list 101 permit tcp host 10.X.69.115 eq 445 10.X.116.0 0.0.0.255&lt;BR /&gt;access-list 101 permit ip host 10.X.101.5 any&lt;BR /&gt;access-list 101 permit tcp host 10.X.69.114 eq 7070 10.X.116.0 0.0.0.255&lt;BR /&gt;access-list 101 permit ip host 10.X.101.6 any&lt;BR /&gt;access-list 101 permit ip host 10.X.101.129 10.X.116.0 0.0.0.255&lt;BR /&gt;access-list 101 permit ip host 10.X.101.93 any&lt;BR /&gt;access-list 101 permit ip host 10.X.101.104 any&lt;BR /&gt;access-list 101 permit ip host 10.X.143.240 any&lt;BR /&gt;access-list 101 permit ip host 10.X.101.135 any&lt;BR /&gt;access-list 101 permit ip host 10.X.101.92 any&lt;BR /&gt;access-list 101 permit ip host 10.X.101.105 any&lt;BR /&gt;access-list 101 permit ip host 10.X.101.101 any&lt;BR /&gt;access-list 101 permit ip host 10.X.101.2 any&lt;BR /&gt;access-list 101 permit ip host 10.X.76.100 any&lt;BR /&gt;access-list 101 permit ip host 10.X.101.81 any&lt;BR /&gt;access-list 101 permit ip host 10.X.101.4 any&lt;BR /&gt;access-list 101 permit ip host 10.X.101.3 any&lt;BR /&gt;access-list 101 permit ip host 10.X.109.101 any&lt;BR /&gt;access-list 101 permit ip host 10.X.52.46 any&lt;BR /&gt;access-list 101 permit ip host 10.X.101.240 any&lt;BR /&gt;access-list 101 permit ip host 10.X.203.143 any&lt;BR /&gt;access-list 101 permit ip host 10.X.101.100 any&lt;BR /&gt;access-list 101 permit ip host 10.X.101.102 any&lt;BR /&gt;access-list 101 permit ip host 10.X.202.218 any&lt;BR /&gt;access-list 101 permit ip host 10.X.101.18 any&lt;BR /&gt;access-list 101 permit ip host 10.X.101.112 any&lt;BR /&gt;access-list 101 permit ip host 10.X.116.255 any&lt;BR /&gt;access-list 101 permit ip host 10.X.163.135 any&lt;BR /&gt;access-list 101 permit ip host 10.X.102.23 any&lt;BR /&gt;access-list 101 permit ip host 10.X.163.240 any&lt;BR /&gt;access-list 101 permit ip host 10.X.101.103 any&lt;BR /&gt;access-list 101 permit ip host 10.X.162.221 any&lt;BR /&gt;access-list 101 permit ip host 10.X.121.253 any&lt;BR /&gt;access-list 101 permit ip host 10.X.101.90 any&lt;BR /&gt;access-list 101 permit ip host 10.X.100.1 any&lt;BR /&gt;access-list 101 permit ip host 10.X.101.21 any&lt;BR /&gt;access-list 101 permit ip host 10.X.144.167 any&lt;BR /&gt;access-list 101 permit ip host 10.X.101.136 any&lt;BR /&gt;access-list 101 permit ip host 10.X.163.134 any&lt;BR /&gt;access-list 101 permit ip host 10.X.101.137 any&lt;BR /&gt;access-list 101 permit ip host 10.X.203.232 any&lt;BR /&gt;access-list 101 permit ip host 10.X.203.40 any&lt;BR /&gt;access-list 101 permit ip host 10.X.195.184 any&lt;BR /&gt;access-list 101 permit ip host 10.X.202.88 any&lt;BR /&gt;access-list 101 permit ip host 10.X.96.4 any&lt;BR /&gt;access-list 101 permit ip host 10.X.101.25 any&lt;BR /&gt;access-list 101 permit ip host 10.X.101.48 any&lt;BR /&gt;access-list 101 permit ip host 10.X.116.254 any&lt;BR /&gt;access-list 101 permit ip host 10.X.202.165 any&lt;BR /&gt;access-list 101 permit ip host 10.X.163.73 any&lt;BR /&gt;access-list 101 permit ip host 10.X.194.240 any&lt;BR /&gt;access-list 101 permit ip host 10.X.163.248 any&lt;BR /&gt;access-list 101 permit ip host 10.X.162.14 any&lt;BR /&gt;access-list 101 permit ip host 10.X.101.46 any&lt;BR /&gt;access-list 101 permit ip host 224.0.0.5 any&lt;BR /&gt;access-list 101 permit ip host 10.X.101.82 any&lt;BR /&gt;access-list 101 permit ip host 10.X.101.81 any&lt;BR /&gt;access-list 101 permit ip host 10.X.101.165 any&lt;BR /&gt;access-list 101 permit tcp host 10.X.194.239 eq 123 any&lt;BR /&gt;access-list 101 permit tcp host 10.X.101.53 eq 443 any&lt;BR /&gt;access-list 101 permit tcp host 10.X.194.239 any eq 123&lt;BR /&gt;access-list 101 permit udp host 10.X.70.5 any&lt;BR /&gt;access-list 101 permit icmp host 10.X.101.111 any echo-reply&lt;BR /&gt;access-list 101 permit ospf any any&lt;BR /&gt;access-list 101 permit tcp host 10.X.101.111 any&lt;BR /&gt;access-list 101 permit udp host 10.X.194.239 eq ntp object-group KBAIPs&lt;BR /&gt;access-list 101 permit ip host 10.X.145.34 any&lt;BR /&gt;access-list 101 permit ip host 10.X.201.45 any&lt;BR /&gt;access-list 101 permit ip host 10.X.249.97 any&lt;BR /&gt;access-list 101 permit ip host 10.X.249.106 any&lt;BR /&gt;access-list 101 permit ip host 10.X.195.239 any&lt;BR /&gt;access-list 101 permit ip host 10.X.249.9 any&lt;BR /&gt;access-list 101 permit ip host 10.X.203.254 any&lt;BR /&gt;access-list 101 permit ip host 10.X.201.46 any&lt;BR /&gt;access-list 101 permit icmp host 10.X.201.94 any&lt;BR /&gt;access-list 101 permit icmp host 10.X.248.252 any&lt;BR /&gt;access-list 101 permit icmp host 10.X.43.254 any&lt;BR /&gt;access-list 101 deny ip any any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 08 Jan 2023 17:34:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-deployement/m-p/4751015#M1096549</guid>
      <dc:creator>mellalBrahim</dc:creator>
      <dc:date>2023-01-08T17:34:33Z</dc:date>
    </item>
  </channel>
</rss>

