<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic If you want to &amp;quot;inspect&amp;quot; then in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/question-about-zone-based-firewall-on-ios/m-p/2982387#M144089</link>
    <description>&lt;P&gt;If you want to "inspect" then you should configure this &lt;G class="gr_ gr_64 gr-alert gr_spell gr_run_anim ContextualSpelling ins-del multiReplace" id="64" data-gr-id="64"&gt;acl&lt;/G&gt;&amp;nbsp;and allow VPN protocols &amp;nbsp;and port numbers also.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Deepak Kumar&lt;/P&gt;</description>
    <pubDate>Tue, 20 Dec 2016 07:41:13 GMT</pubDate>
    <dc:creator>Deepak Kumar</dc:creator>
    <dc:date>2016-12-20T07:41:13Z</dc:date>
    <item>
      <title>Question About Zone Based Firewall on IOS</title>
      <link>https://community.cisco.com/t5/network-security/question-about-zone-based-firewall-on-ios/m-p/2982386#M144088</link>
      <description>&lt;P&gt;Hello, I've been working on implementing a Zone Based Firewall for our offsite users that utilize an 881 router with DMVPN tunnels to connect. Right now I have an outsize zone (WAN facing), inside zone (LAN) and the self zone. I have zone pairs for Inside to Outside and Outside to Self. The Outside to Self zone-pair has a policy that includes an ACL with the following:&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;remark Permits DHCP from ISP&lt;BR /&gt;&amp;nbsp;permit udp any any eq bootpc&lt;BR /&gt;&amp;nbsp;permit udp any any eq bootps&lt;BR /&gt;&amp;nbsp;remark Permits DMVPN Tunnel Traffic&lt;BR /&gt;&amp;nbsp;permit udp any any eq non500-isakmp&lt;BR /&gt;&amp;nbsp;permit udp any any eq isakmp&lt;BR /&gt;&amp;nbsp;permit esp any any&lt;BR /&gt;&amp;nbsp;permit ahp any any&lt;BR /&gt;&amp;nbsp;permit gre any any&lt;BR /&gt;&amp;nbsp;remark Permits Management Access&lt;BR /&gt;&amp;nbsp;permit tcp X.X.X.X 0.0.3.255 any eq 22&lt;BR /&gt;&amp;nbsp;permit tcp X.X.X.X 0.0.3.255 any eq 443&lt;BR /&gt;&amp;nbsp;permit tcp X.X.X.X 0.0.0.255 any eq 22&lt;BR /&gt;&amp;nbsp;permit tcp X.X.X.X 0.0.0.255 any eq 443&lt;BR /&gt;&amp;nbsp;permit tcp X.X.X.X 0.0.0.255 any eq cmd&lt;BR /&gt;&amp;nbsp;permit tcp X.X.X.X 0.0.3.255 any eq cmd&lt;BR /&gt;&amp;nbsp;permit icmp X.X.X.X 0.0.3.255 any&lt;BR /&gt;&amp;nbsp;remark Permits Selected ICMP Traffic&lt;BR /&gt;&amp;nbsp;permit icmp any any echo-reply&lt;BR /&gt;&amp;nbsp;permit icmp any any time-exceeded&lt;BR /&gt;&amp;nbsp;permit icmp any any unreachable&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.0.0.0 0.255.255.255 any&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 172.16.0.0 0.15.255.255 any&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 192.168.0.0 0.0.255.255 any&lt;BR /&gt;&amp;nbsp;remark Deny Traffic Sourced From Loopback Addresses&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 127.0.0.0 0.255.255.255 any&lt;BR /&gt;&amp;nbsp;remark Deny Traffic Sourced From Broadcast Address&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 255.255.255.255 any&lt;BR /&gt;&amp;nbsp;remark Deny Traffic Sourced From Default&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 0.0.0.0 any&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip any any&lt;BR /&gt;&lt;BR /&gt;And this is my zone policy configuration:&lt;BR /&gt;&lt;BR /&gt;class-map type inspect match-any OUTSIDE-SELF&lt;BR /&gt;&amp;nbsp;match access-group name INET_PROTECT&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect OUTSIDE-SELF&lt;BR /&gt;&amp;nbsp;class type inspect OUTSIDE-SELF&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;!&lt;BR /&gt;zone-pair security OUTSIDE-SELF source OUTSIDE destination self&lt;BR /&gt;&amp;nbsp;service-policy type inspect OUTSIDE-SELF&lt;BR /&gt;&lt;BR /&gt;My question is, when I have the policy map OUTSIDE-SELF set to "pass" traffic from the OUTSIDE-SELF class map, everything works fine and the tunnels come up and form EIGRP adjacencies. If I change this to "inspect", the tunnels are no longer able to form neighborships and I see blocks on the "deny ip 10.0.0.0 0.255.255.255 any" part of the ACL. Can someone help me understand why this happening?&lt;BR /&gt;&lt;BR /&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:40:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-zone-based-firewall-on-ios/m-p/2982386#M144088</guid>
      <dc:creator>jonathanw84</dc:creator>
      <dc:date>2019-03-12T08:40:48Z</dc:date>
    </item>
    <item>
      <title>If you want to "inspect" then</title>
      <link>https://community.cisco.com/t5/network-security/question-about-zone-based-firewall-on-ios/m-p/2982387#M144089</link>
      <description>&lt;P&gt;If you want to "inspect" then you should configure this &lt;G class="gr_ gr_64 gr-alert gr_spell gr_run_anim ContextualSpelling ins-del multiReplace" id="64" data-gr-id="64"&gt;acl&lt;/G&gt;&amp;nbsp;and allow VPN protocols &amp;nbsp;and port numbers also.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Deepak Kumar&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2016 07:41:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-zone-based-firewall-on-ios/m-p/2982387#M144089</guid>
      <dc:creator>Deepak Kumar</dc:creator>
      <dc:date>2016-12-20T07:41:13Z</dc:date>
    </item>
    <item>
      <title>can you try this ....</title>
      <link>https://community.cisco.com/t5/network-security/question-about-zone-based-firewall-on-ios/m-p/2982388#M144092</link>
      <description>&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;can you try this ....&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;1. Define ACL and to allow udp port any any 500&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;2. Define the ACL into the Class-map&amp;nbsp;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;3.Define Class map with inspection of ipsec inside the policy-map&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;4.bring policy-map into the service-policy applied on outside and in .&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;----------------------------------------------------------------------------&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;or try below .&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="color: #ff0000;"&gt;class-map match-any ISAKMP-IPSec-TRAFFIC&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;SPAN style="color: #ff0000;"&gt;&amp;nbsp;match protocol ipsec&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;SPAN style="color: #ff0000;"&gt;&amp;nbsp;match protocol isakmp&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="color: #ff0000;"&gt;!&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="color: #ff0000;"&gt;policy-map type inspect OUTSIDE-SELF&lt;BR /&gt;&amp;nbsp;class type inspect ISAKMP-IPSec-TRAFFIC&lt;BR /&gt;&amp;nbsp;&lt;STRONG&gt;&amp;nbsp;inspect&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="color: #ff0000;"&gt;!&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="color: #ff0000;"&gt;service-policy OUTSIDE-SELF interface outside&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please rate my comments if this helps you .&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;thanks ,&lt;/P&gt;
&lt;P&gt;Mani&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2016 11:27:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-zone-based-firewall-on-ios/m-p/2982388#M144092</guid>
      <dc:creator>MANI .P</dc:creator>
      <dc:date>2016-12-20T11:27:47Z</dc:date>
    </item>
  </channel>
</rss>

