<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ZBF Issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/zbf-issue/m-p/4853711#M1101529</link>
    <description>&lt;P&gt;ICMP is actually working (if i source from gi0/0/1.40 in the guest zone)&lt;BR /&gt;It's telnet on tcp 8443 that is failing.&amp;nbsp; All dhcp services are working correctly....&lt;/P&gt;</description>
    <pubDate>Tue, 13 Jun 2023 10:34:57 GMT</pubDate>
    <dc:creator>andypowernet</dc:creator>
    <dc:date>2023-06-13T10:34:57Z</dc:date>
    <item>
      <title>ZBF Issue</title>
      <link>https://community.cisco.com/t5/network-security/zbf-issue/m-p/4853489#M1101523</link>
      <description>&lt;P&gt;Morning,&lt;BR /&gt;&lt;BR /&gt;Im having an issue with ZBF. It needs to allow the guest zone to the inside zone to allow the guest zone to redirect to Cisco ISE webauthentication, which doesn't seem to work.&amp;nbsp; Anyone any ideas? Config below:&lt;/P&gt;&lt;P&gt;Guest Interface:&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0/1.40&lt;BR /&gt;description LAN Guest&lt;BR /&gt;encapsulation dot1Q 40&lt;BR /&gt;vrf forwarding internet&lt;BR /&gt;ip address 10.192.203.254 255.255.255.0&lt;BR /&gt;ip nat inside&lt;BR /&gt;zone-member security GUEST&lt;/P&gt;&lt;P&gt;Inside Interface:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface Tunnel196&lt;BR /&gt;vrf forwarding customer&lt;BR /&gt;ip address 10.248.196.242 255.255.255.224&lt;BR /&gt;no ip redirects&lt;BR /&gt;ip mtu 1400&lt;BR /&gt;ip nhrp authentication customer&lt;BR /&gt;ip nhrp map 10.248.196.254 185.34.234.250&lt;BR /&gt;ip nhrp map multicast 185.34.234.250&lt;BR /&gt;ip nhrp map 10.248.196.253 195.88.236.250&lt;BR /&gt;ip nhrp map multicast 195.88.236.250&lt;BR /&gt;ip nhrp network-id 196&lt;BR /&gt;ip nhrp holdtime 60&lt;BR /&gt;ip nhrp nhs 10.248.196.253&lt;BR /&gt;ip nhrp nhs 10.248.196.254&lt;BR /&gt;zone-member security INSIDE&lt;BR /&gt;ip tcp adjust-mss 1360&lt;BR /&gt;qos pre-classify&lt;BR /&gt;tunnel source GigabitEthernet0/0/0&lt;BR /&gt;tunnel mode gre multipoint&lt;BR /&gt;tunnel key 196&lt;BR /&gt;tunnel vrf internet&lt;BR /&gt;tunnel protection ipsec profile dmvpn-ipsec-profile&lt;BR /&gt;endinterface Tunnel196&lt;BR /&gt;vrf forwarding customer&lt;BR /&gt;ip address 10.248.196.242 255.255.255.224&lt;BR /&gt;no ip redirects&lt;BR /&gt;ip mtu 1400&lt;BR /&gt;ip nhrp authentication customer&lt;BR /&gt;ip nhrp map 10.248.196.254 185.34.234.250&lt;BR /&gt;ip nhrp map multicast 185.34.234.250&lt;BR /&gt;ip nhrp map 10.248.196.253 195.88.236.250&lt;BR /&gt;ip nhrp map multicast 195.88.236.250&lt;BR /&gt;ip nhrp network-id 196&lt;BR /&gt;ip nhrp holdtime 60&lt;BR /&gt;ip nhrp nhs 10.248.196.253&lt;BR /&gt;ip nhrp nhs 10.248.196.254&lt;BR /&gt;zone-member security INSIDE&lt;BR /&gt;ip tcp adjust-mss 1360&lt;BR /&gt;qos pre-classify&lt;BR /&gt;tunnel source GigabitEthernet0/0/0&lt;BR /&gt;tunnel mode gre multipoint&lt;BR /&gt;tunnel key 196&lt;BR /&gt;tunnel vrf internet&lt;BR /&gt;tunnel protection ipsec profile dmvpn-ipsec-profile&lt;BR /&gt;end&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Zone Pairs:&lt;/P&gt;&lt;P&gt;zone-pair security GUEST-TO-INSIDE source GUEST destination INSIDE&lt;BR /&gt;service-policy type inspect GUEST-TO-INSIDE&lt;BR /&gt;&lt;BR /&gt;zone-pair security INSIDE-TO-GUEST source INSIDE destination GUEST&lt;BR /&gt;service-policy type inspect INSIDE-TO-GUEST&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Policy Maps:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;policy-map type inspect GUEST-TO-INSIDE&lt;BR /&gt;class type inspect GUEST-TO-INSIDE&lt;BR /&gt;inspect&lt;BR /&gt;class class-default&lt;BR /&gt;drop log&lt;/P&gt;&lt;P&gt;policy-map type inspect INSIDE-TO-GUEST&lt;BR /&gt;class type inspect INSIDE-TO-GUEST&lt;BR /&gt;inspect&lt;BR /&gt;class class-default&lt;BR /&gt;drop&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Class Maps:&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any GUEST-TO-INSIDE&lt;BR /&gt;match access-group name ZBF-GUEST-TO-INSIDE&lt;/P&gt;&lt;P&gt;class-map type inspect match-any INSIDE-TO-GUEST&lt;BR /&gt;match access-group name ZBF-INSIDE-TO-GUEST&lt;/P&gt;&lt;P&gt;ACL:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Extended IP access list ZBF-INSIDE-TO-GUEST&lt;BR /&gt;10 permit tcp host 10.248.196.39 eq 8443 any&lt;BR /&gt;20 permit icmp host 10.248.196.39 any echo&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Extended IP access list ZBF-GUEST-TO-INSIDE&lt;BR /&gt;10 permit tcp any host 10.248.196.39 eq 8443&lt;BR /&gt;20 permit icmp host 10.248.196.39 any echo&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jun 2023 08:06:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-issue/m-p/4853489#M1101523</guid>
      <dc:creator>andypowernet</dc:creator>
      <dc:date>2023-06-13T08:06:32Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF Issue</title>
      <link>https://community.cisco.com/t5/network-security/zbf-issue/m-p/4853672#M1101525</link>
      <description>&lt;P&gt;only TCP, what about DNS ? I think you need to include the DNS in ACL of policy map&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jun 2023 09:41:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-issue/m-p/4853672#M1101525</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-06-13T09:41:12Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF Issue</title>
      <link>https://community.cisco.com/t5/network-security/zbf-issue/m-p/4853699#M1101527</link>
      <description>&lt;P&gt;Adding to what MHM has mentioned, you would probably need to add entries for DNS and DHCP depending on where your DNS and DHCP servers are located and how the guest network accesses them.&lt;/P&gt;
&lt;P&gt;Extended IP access list ZBF-INSIDE-TO-GUEST&lt;BR /&gt;10 permit tcp host 10.248.196.39 eq 8443 any&lt;BR /&gt;20 permit icmp host 10.248.196.39 any echo&lt;/P&gt;
&lt;P&gt;Extended IP access list ZBF-GUEST-TO-INSIDE&lt;BR /&gt;10 permit tcp any host 10.248.196.39 eq 8443&lt;BR /&gt;20 permit icmp host 10.248.196.39 any echo. &lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;&amp;lt;-- need to swap the source and destination networks for ICMP to work&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jun 2023 10:19:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-issue/m-p/4853699#M1101527</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2023-06-13T10:19:42Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF Issue</title>
      <link>https://community.cisco.com/t5/network-security/zbf-issue/m-p/4853711#M1101529</link>
      <description>&lt;P&gt;ICMP is actually working (if i source from gi0/0/1.40 in the guest zone)&lt;BR /&gt;It's telnet on tcp 8443 that is failing.&amp;nbsp; All dhcp services are working correctly....&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jun 2023 10:34:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-issue/m-p/4853711#M1101529</guid>
      <dc:creator>andypowernet</dc:creator>
      <dc:date>2023-06-13T10:34:57Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF Issue</title>
      <link>https://community.cisco.com/t5/network-security/zbf-issue/m-p/4853715#M1101531</link>
      <description>&lt;P&gt;only one thing then, the using of real or mapped IP,&amp;nbsp;&lt;BR /&gt;if you use real change it to mapped IP.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jun 2023 10:38:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-issue/m-p/4853715#M1101531</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-06-13T10:38:11Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF Issue</title>
      <link>https://community.cisco.com/t5/network-security/zbf-issue/m-p/4853722#M1101533</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Thanks for your replies.&lt;BR /&gt;&lt;BR /&gt;Where are you referring to a mapped IP?&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Andy.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jun 2023 10:45:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-issue/m-p/4853722#M1101533</guid>
      <dc:creator>andypowernet</dc:creator>
      <dc:date>2023-06-13T10:45:28Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF Issue</title>
      <link>https://community.cisco.com/t5/network-security/zbf-issue/m-p/4853730#M1101534</link>
      <description>&lt;P&gt;&lt;SPAN&gt;10.248.196.39 &amp;lt;&amp;lt;- this IP the and GUEST is config with IP NAT INSIDE&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jun 2023 10:56:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-issue/m-p/4853730#M1101534</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-06-13T10:56:11Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF Issue</title>
      <link>https://community.cisco.com/t5/network-security/zbf-issue/m-p/4853739#M1101536</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;The nat is only applicable to traffic leaving the ouside interface,&amp;nbsp; not Guest to Inside as in this case:&lt;/P&gt;&lt;P&gt;ip nat inside source route-map NAT interface GigabitEthernet0/0/0 vrf internet overload&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jun 2023 11:01:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-issue/m-p/4853739#M1101536</guid>
      <dc:creator>andypowernet</dc:creator>
      <dc:date>2023-06-13T11:01:07Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF Issue</title>
      <link>https://community.cisco.com/t5/network-security/zbf-issue/m-p/4854133#M1101560</link>
      <description>&lt;P&gt;show policy-map type inspect zone-pair sessions &amp;lt;&amp;lt;- for both Zone-pair&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;NOTE:- please confirm that the packet initiate from interface&amp;nbsp; 0.0.1.40 to tunnel to Server&amp;nbsp;&lt;BR /&gt;NOTE:- why the VRF in interface 0.0.1.40 is INTERENT and the tunnel is costumer ?&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jun 2023 20:10:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-issue/m-p/4854133#M1101560</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-06-13T20:10:14Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF Issue</title>
      <link>https://community.cisco.com/t5/network-security/zbf-issue/m-p/4854363#M1101570</link>
      <description>&lt;P&gt;Hey.&lt;/P&gt;&lt;P&gt;Yes, the customers packet who is trying to access the ISE guest portal arrives on the 0/0/1.40 interface.&amp;nbsp; That is also where i'm testing telnet from (sourcing it from that interface)&lt;BR /&gt;&lt;BR /&gt;The reason it sits on a different VRF is that 0/0/1.40 is in the guest vrf so just local internet breakout, however the route to ISE is leaked from the corporate vrf in to the internet vrf.&amp;nbsp; And that route's next hop is via a tunnel.&amp;nbsp; ICMP sourced from 0/0/1.40 is working so to the ISE server so quite a strange scenario,&amp;nbsp; (especially given that the maps don't seem be getting matched - info requested by yourself below)&lt;/P&gt;&lt;P&gt;Zone-pair: GUEST-TO-INSIDE&lt;BR /&gt;Service-policy inspect : GUEST-TO-INSIDE&lt;/P&gt;&lt;P&gt;Class-map: GUEST-TO-INSIDE (match-any)&lt;BR /&gt;Match: access-group name ZBF-GUEST-TO-INSIDE&lt;BR /&gt;Inspect&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Class-map: class-default (match-any)&lt;BR /&gt;Match: any&lt;BR /&gt;Drop&lt;BR /&gt;0 packets, 0 bytes&lt;BR /&gt;&lt;BR /&gt;Zone-pair: INSIDE-TO-GUEST&lt;BR /&gt;Service-policy inspect : INSIDE-TO-GUEST&lt;/P&gt;&lt;P&gt;Class-map: INSIDE-TO-GUEST (match-any)&lt;BR /&gt;Match: access-group name ZBF-INSIDE-TO-GUEST&lt;BR /&gt;Inspect&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Class-map: class-default (match-any)&lt;BR /&gt;Match: any&lt;BR /&gt;Drop&lt;BR /&gt;0 packets, 0 bytes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jun 2023 08:19:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-issue/m-p/4854363#M1101570</guid>
      <dc:creator>andypowernet</dc:creator>
      <dc:date>2023-06-14T08:19:34Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF Issue</title>
      <link>https://community.cisco.com/t5/network-security/zbf-issue/m-p/4854511#M1101596</link>
      <description>&lt;P&gt;OK,&amp;nbsp;&lt;BR /&gt;&lt;SPAN&gt;interface GigabitEthernet0/0/1.40&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;vrf forwarding &lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;customer&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;zone-member security GUEST&lt;BR /&gt;&lt;/SPAN&gt;!&lt;BR /&gt;&lt;SPAN&gt;interface &lt;STRONG&gt;&lt;FONT color="#3366FF"&gt;GigabitEthernet0/0/0&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;vrf forwarding &lt;FONT color="#00FF00"&gt;&lt;STRONG&gt;internet&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;BR /&gt;!&lt;BR /&gt;&lt;SPAN&gt;interface Tunnel196&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;vrf forwarding &lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;customer&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;zone-member security INSIDE&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;tunnel source &lt;STRONG&gt;&lt;FONT color="#3366FF"&gt;GigabitEthernet0/0/0&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;tunnel vrf &lt;STRONG&gt;&lt;FONT color="#00FF00"&gt;internet&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;tunnel protection ipsec profile dmvpn-ipsec-profile &lt;STRONG&gt;&lt;FONT color="#3366FF"&gt;shared&lt;/FONT&gt; &lt;/STRONG&gt;&amp;lt;&amp;lt;- this need since you use same interface for both tunnel&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;this must be the config of tunnel and interface&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jun 2023 12:24:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-issue/m-p/4854511#M1101596</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-06-14T12:24:36Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF Issue</title>
      <link>https://community.cisco.com/t5/network-security/zbf-issue/m-p/4854576#M1101606</link>
      <description>&lt;P&gt;Hey.&lt;BR /&gt;&lt;BR /&gt;There is only a single tunnel configured on this router, hence no shared keyword when referencing the ipsec protection.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Andy.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jun 2023 13:30:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-issue/m-p/4854576#M1101606</guid>
      <dc:creator>andypowernet</dc:creator>
      <dc:date>2023-06-14T13:30:35Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF Issue</title>
      <link>https://community.cisco.com/t5/network-security/zbf-issue/m-p/4854585#M1101607</link>
      <description>&lt;P&gt;&lt;SPAN&gt;your post show two, then I check the tunnel number is same, so no need &lt;STRONG&gt;&lt;FONT color="#3366FF"&gt;shared&amp;nbsp;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;interface Tunnel196 &amp;lt;&amp;lt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;vrf forwarding customer&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip address 10.248.196.242 255.255.255.224&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;no ip redirects&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip mtu 1400&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip nhrp authentication customer&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip nhrp map 10.248.196.254 185.34.234.250&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip nhrp map multicast 185.34.234.250&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip nhrp map 10.248.196.253 195.88.236.250&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip nhrp map multicast 195.88.236.250&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip nhrp network-id 196&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip nhrp holdtime 60&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip nhrp nhs 10.248.196.253&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip nhrp nhs 10.248.196.254&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;zone-member security INSIDE&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip tcp adjust-mss 1360&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;qos pre-classify&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;tunnel source GigabitEthernet0/0/0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;tunnel mode gre multipoint&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;tunnel key 196&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;tunnel vrf internet&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;tunnel protection ipsec profile dmvpn-ipsec-profile&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;endinterface Tunnel196 &amp;lt;&amp;lt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;vrf forwarding customer&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip address 10.248.196.242 255.255.255.224&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;no ip redirects&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip mtu 1400&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip nhrp authentication customer&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip nhrp map 10.248.196.254 185.34.234.250&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip nhrp map multicast 185.34.234.250&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip nhrp map 10.248.196.253 195.88.236.250&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip nhrp map multicast 195.88.236.250&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip nhrp network-id 196&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip nhrp holdtime 60&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip nhrp nhs 10.248.196.253&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip nhrp nhs 10.248.196.254&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;zone-member security INSIDE&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip tcp adjust-mss 1360&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;qos pre-classify&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;tunnel source GigabitEthernet0/0/0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;tunnel mode gre multipoint&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;tunnel key 196&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;tunnel vrf internet&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;tunnel protection ipsec profile dmvpn-ipsec-profile&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jun 2023 13:38:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-issue/m-p/4854585#M1101607</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-06-14T13:38:22Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF Issue</title>
      <link>https://community.cisco.com/t5/network-security/zbf-issue/m-p/4861198#M1101910</link>
      <description>&lt;P&gt;Interestingly, I did some further debugging on this, and it shows packets being dropped arriving on the tunnel interface (inside zone) destined for the guest zone.&amp;nbsp; However it's showing the source as the remote tunnel endpoint rather than the original source.&lt;BR /&gt;&lt;BR /&gt;That would suggest to me that it is processing the ZBF prior to decapsulation of the DMVPN headers, however Cisco documentation states otherwise....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;%IOSXE-6-PLATFORM: SIP0: cpp_cp: QFP:0.0 Thread:000 TS:00031902468136318644 %FW-6-DROP_PKT: Dropping udp pkt from Tunnel196 195.88.236.250:4500 =&amp;gt; 10.192.203.1:33446(target:class)-(INSIDE-TO-GUEST:class-default) due to Policy drop:classify result with ip ident 18807&lt;/P&gt;</description>
      <pubDate>Fri, 23 Jun 2023 08:35:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-issue/m-p/4861198#M1101910</guid>
      <dc:creator>andypowernet</dc:creator>
      <dc:date>2023-06-23T08:35:02Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF Issue</title>
      <link>https://community.cisco.com/t5/network-security/zbf-issue/m-p/4861312#M1101915</link>
      <description>&lt;P&gt;Did you try config I suggest before ?&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;interface GigabitEthernet0/0/1.40&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;vrf forwarding&amp;nbsp;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;customer&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;zone-member security GUEST&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;interface&amp;nbsp;&lt;STRONG&gt;&lt;FONT color="#3366FF"&gt;GigabitEthernet0/0/0&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;vrf forwarding&amp;nbsp;&lt;FONT color="#00FF00"&gt;&lt;STRONG&gt;internet&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;interface Tunnel196&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;vrf forwarding&amp;nbsp;&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;customer&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;zone-member security INSIDE&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;tunnel source&amp;nbsp;&lt;STRONG&gt;&lt;FONT color="#3366FF"&gt;GigabitEthernet0/0/0&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;tunnel vrf&amp;nbsp;&lt;STRONG&gt;&lt;FONT color="#00FF00"&gt;internet&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;tunnel protection ipsec profile&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Jun 2023 10:45:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-issue/m-p/4861312#M1101915</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-06-23T10:45:17Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF Issue</title>
      <link>https://community.cisco.com/t5/network-security/zbf-issue/m-p/4861341#M1101917</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;This isn't really practice as the whole idea is that customer and guest are&lt;BR /&gt;on separate vrf. And guest traffic locally breaks out for internet on the&lt;BR /&gt;router. Where as the customer vrf internet goes via the data center.&lt;BR /&gt;</description>
      <pubDate>Fri, 23 Jun 2023 10:54:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-issue/m-p/4861341#M1101917</guid>
      <dc:creator>andypowernet</dc:creator>
      <dc:date>2023-06-23T10:54:21Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF Issue</title>
      <link>https://community.cisco.com/t5/network-security/zbf-issue/m-p/4861372#M1101918</link>
      <description>&lt;P&gt;I dont get your last comment&amp;nbsp;&lt;BR /&gt;there are two VRF&amp;nbsp;&lt;BR /&gt;there are four Zone&amp;nbsp;&lt;BR /&gt;self&amp;nbsp;&lt;BR /&gt;OUT&amp;nbsp;&lt;BR /&gt;LOCAL&amp;nbsp;&lt;BR /&gt;REMOTE&lt;BR /&gt;&lt;BR /&gt;self+OUT in one VRF&amp;nbsp;&lt;BR /&gt;LOCAL REMOTE in ONE VRF&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;where is issue here, I dont see any security issue with above&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Jun 2023 12:17:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-issue/m-p/4861372#M1101918</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-06-23T12:17:16Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF Issue</title>
      <link>https://community.cisco.com/t5/network-security/zbf-issue/m-p/4862207#M1101991</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;&lt;BR /&gt;The issue is that the customer and guest vrf have to be kept seperate.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jun 2023 08:28:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-issue/m-p/4862207#M1101991</guid>
      <dc:creator>andypowernet</dc:creator>
      <dc:date>2023-06-26T08:28:21Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF Issue</title>
      <link>https://community.cisco.com/t5/network-security/zbf-issue/m-p/4862244#M1101992</link>
      <description>&lt;P&gt;Could you please try to swap ISE IP address with any on the ZBF ACLs and see if that makes any difference? this would help us ruling out any NAT'ing issue, if that doesn't make a difference, could you please remove temporarily the guest and customer interfaces from the ZBF? this would help confirming if routing is working as expected in the first place. You mentioned ping is working from the guest interface, however, ping is stateless so if the echo packets go one way and the replies come on another ping doesn't bother. In other words if you have asymmetric routing ping would still work, but the traffic destined to ISE portal won't as it uses TCP.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jun 2023 09:35:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-issue/m-p/4862244#M1101992</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2023-06-26T09:35:22Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF Issue</title>
      <link>https://community.cisco.com/t5/network-security/zbf-issue/m-p/4865559#M1102206</link>
      <description>&lt;P&gt;&lt;BR /&gt;R1#wr&lt;BR /&gt;&lt;BR /&gt;hostname R1&lt;BR /&gt;!&lt;BR /&gt;ip vrf Cos&lt;BR /&gt;rd 1:200&lt;BR /&gt;!&lt;BR /&gt;ip vrf ISP&lt;BR /&gt;rd 1:100&lt;BR /&gt;!&lt;BR /&gt;class-map type inspect match-all L-R-Licmp&lt;BR /&gt;match protocol icmp&lt;BR /&gt;match access-group 100&lt;BR /&gt;class-map type inspect match-all R-L-Rtelnet&lt;BR /&gt;match access-group 110&lt;BR /&gt;match protocol telnet&lt;BR /&gt;class-map type inspect match-all L-R-Ltelnet&lt;BR /&gt;match protocol telnet&lt;BR /&gt;match access-group 100&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;&lt;STRIKE&gt;class-map type inspect match-all L-R-L&lt;/STRIKE&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;&lt;STRIKE&gt;match protocol icmp&lt;/STRIKE&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;&lt;STRIKE&gt;match protocol telnet&lt;/STRIKE&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;&lt;STRIKE&gt;match protocol ssh&lt;/STRIKE&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;&lt;STRIKE&gt;match access-group 100&lt;/STRIKE&gt;&lt;/FONT&gt;&lt;BR /&gt;class-map type inspect match-all R-L-Ricmp&lt;BR /&gt;match access-group 110&lt;BR /&gt;match protocol icmp&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;&lt;STRIKE&gt;class-map type inspect match-all L-R-L2&lt;/STRIKE&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;&lt;STRIKE&gt;match access-group 100&lt;/STRIKE&gt;&lt;/FONT&gt;&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect R-L-R&lt;BR /&gt;class type inspect R-L-Ricmp&lt;BR /&gt;inspect&lt;BR /&gt;class type inspect R-L-Rtelnet&lt;BR /&gt;inspect&lt;BR /&gt;class class-default&lt;BR /&gt;policy-map type inspect L-R-L&lt;BR /&gt;class type inspect L-R-Licmp&lt;BR /&gt;inspect&lt;BR /&gt;class type inspect L-R-Ltelnet&lt;BR /&gt;inspect&lt;BR /&gt;class class-default&lt;BR /&gt;!&lt;BR /&gt;zone security OUT&lt;BR /&gt;zone security LOCAL&lt;BR /&gt;zone security REMOTE&lt;BR /&gt;zone-pair security L-R-L source LOCAL destination REMOTE&lt;BR /&gt;service-policy type inspect L-R-L&lt;BR /&gt;zone-pair security R-L-R source REMOTE destination LOCAL&lt;BR /&gt;service-policy type inspect R-L-R&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface Tunnel0&lt;BR /&gt;ip vrf forwarding Cos&lt;BR /&gt;ip address 5.0.0.1 255.255.255.0&lt;BR /&gt;zone-member security REMOTE&lt;BR /&gt;tunnel source FastEthernet0/1&lt;BR /&gt;tunnel destination 200.0.0.2&lt;BR /&gt;tunnel vrf ISP&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/0&lt;BR /&gt;ip vrf forwarding Cos&lt;BR /&gt;ip address 10.0.0.1 255.255.255.0&lt;BR /&gt;zone-member security LOCAL&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/1&lt;BR /&gt;ip vrf forwarding ISP&lt;BR /&gt;ip address 100.0.0.1 255.255.255.0&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;!&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;ip route vrf ISP 0.0.0.0 0.0.0.0 100.0.0.5&lt;BR /&gt;ip route vrf Cos 20.0.0.0 255.255.255.0 Tunnel0&lt;BR /&gt;!&lt;BR /&gt;access-list 100 permit ip 10.0.0.0 0.0.0.255 20.0.0.0 0.0.0.255&lt;BR /&gt;access-list 110 permit ip 20.0.0.0 0.0.0.255 10.0.0.0 0.0.0.255&lt;BR /&gt;&lt;BR /&gt;this LAB for you GRE with VRF and multi security Zone&amp;nbsp;&lt;/P&gt;
&lt;P&gt;NO issue I can ping from both side of tunnel&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (882).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/189127i0125A8F0199E1614/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (882).png" alt="Screenshot (882).png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (883).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/189128i40191B870EE58794/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (883).png" alt="Screenshot (883).png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 01 Jul 2023 10:48:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-issue/m-p/4865559#M1102206</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-07-01T10:48:07Z</dc:date>
    </item>
  </channel>
</rss>

