<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Paul- in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asr-zone-based-firewall-and-return-traffic/m-p/2948769#M149590</link>
    <description>&lt;P&gt;Paul-&lt;/P&gt;
&lt;P&gt;It sounds like you are permitting traffic, not inspecting it. When it is inspected, the traffic is put into a state table and return traffic is allowed through. If you simply permit traffic, then you would have to permit that traffic and that defeats the purpose of using the firewall. Here's an example-&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;class-map type inspect match-any INSIDE-TO-OUTSIDE-CLASS &lt;BR /&gt;&amp;nbsp;match protocol ftp &lt;BR /&gt;&amp;nbsp;match protocol tcp &lt;BR /&gt;&amp;nbsp;match protocol udp &lt;BR /&gt;&amp;nbsp;match protocol icmp &lt;BR /&gt;&lt;BR /&gt;policy-map type inspect INSIDE-TO-OUTSIDE-POLICY &lt;BR /&gt;&amp;nbsp;class type inspect INSIDE-TO-OUTSIDE-CLASS &lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt;&amp;nbsp;class class-default &lt;BR /&gt;&amp;nbsp; drop &lt;BR /&gt;&lt;BR /&gt;zone-pair security IN_OUT source INSIDE destination OUTSIDE &lt;BR /&gt;&amp;nbsp;service-policy type inspect INSIDE-TO-OUTSIDE-POLICY &lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 29 Sep 2016 21:26:26 GMT</pubDate>
    <dc:creator>Collin Clark</dc:creator>
    <dc:date>2016-09-29T21:26:26Z</dc:date>
    <item>
      <title>ASR Zone based firewall and return traffic</title>
      <link>https://community.cisco.com/t5/network-security/asr-zone-based-firewall-and-return-traffic/m-p/2948768#M149589</link>
      <description>&lt;P&gt;OK Guys, I am new to firewalling but need to get one up and running, I actually have a pair, but am trying to just get it working on one to then copy.&lt;BR /&gt;&lt;BR /&gt;I am using three zones - inside, outside and self. Self seems to be OK.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I need to permit some access in through the firewall, and some out. As a consequence I have two zone pairs.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;When I try to do it I see return traffic being dropped, so obviously I need to somehow permit that.&lt;BR /&gt;&lt;BR /&gt;Is it simply a case of reversing the ACLs (I have a worry about that) and adding them to the opposite zone pair? is there some easy option I have missed in my hurry?&lt;BR /&gt;&lt;BR /&gt;I mentioned the concern. One outbound rule is from a server on any port to the internet on any port. Obviously that reversed is going to open the server up to everything.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Paul.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:20:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asr-zone-based-firewall-and-return-traffic/m-p/2948768#M149589</guid>
      <dc:creator>paul.matthews</dc:creator>
      <dc:date>2019-03-12T08:20:15Z</dc:date>
    </item>
    <item>
      <title>Paul-</title>
      <link>https://community.cisco.com/t5/network-security/asr-zone-based-firewall-and-return-traffic/m-p/2948769#M149590</link>
      <description>&lt;P&gt;Paul-&lt;/P&gt;
&lt;P&gt;It sounds like you are permitting traffic, not inspecting it. When it is inspected, the traffic is put into a state table and return traffic is allowed through. If you simply permit traffic, then you would have to permit that traffic and that defeats the purpose of using the firewall. Here's an example-&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;class-map type inspect match-any INSIDE-TO-OUTSIDE-CLASS &lt;BR /&gt;&amp;nbsp;match protocol ftp &lt;BR /&gt;&amp;nbsp;match protocol tcp &lt;BR /&gt;&amp;nbsp;match protocol udp &lt;BR /&gt;&amp;nbsp;match protocol icmp &lt;BR /&gt;&lt;BR /&gt;policy-map type inspect INSIDE-TO-OUTSIDE-POLICY &lt;BR /&gt;&amp;nbsp;class type inspect INSIDE-TO-OUTSIDE-CLASS &lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt;&amp;nbsp;class class-default &lt;BR /&gt;&amp;nbsp; drop &lt;BR /&gt;&lt;BR /&gt;zone-pair security IN_OUT source INSIDE destination OUTSIDE &lt;BR /&gt;&amp;nbsp;service-policy type inspect INSIDE-TO-OUTSIDE-POLICY &lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Sep 2016 21:26:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asr-zone-based-firewall-and-return-traffic/m-p/2948769#M149590</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2016-09-29T21:26:26Z</dc:date>
    </item>
    <item>
      <title>I have</title>
      <link>https://community.cisco.com/t5/network-security/asr-zone-based-firewall-and-return-traffic/m-p/2948770#M149591</link>
      <description>&lt;P&gt;I have&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;policy-map type inspect PolInsideOut&lt;BR /&gt;&amp;nbsp;class type inspect ClassManagementOutDNS&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;class type inspect ClassManagementOutWebproxies&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;class type inspect ClassReturnTrafficOut&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop log&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;policy-map type inspect PolOutsideIn&lt;BR /&gt;&amp;nbsp;class type inspect ClassMediaAgentBackupCommcell&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;class type inspect ClassWebConsoleManagementCommcell&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;class type inspect ClassWebConsoleManagementReport&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;class type inspect ClassWebConsoleManagementProxy&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;class type inspect ClassReturnTrafficIn&lt;BR /&gt;&amp;nbsp; inspect&lt;/P&gt;
&lt;P&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop log&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;where the classes define traffic, for example:&lt;/P&gt;
&lt;P&gt;ip access-list extended WebConsoleManagementCommcell&lt;BR /&gt;&amp;nbsp;permit tcp any host 172.16.45.4 eq www&lt;BR /&gt;&amp;nbsp;permit tcp any host 172.16.45.4 eq 443&lt;/P&gt;
&lt;P&gt;class-map type inspect match-any ClassWebConsoleManagementCommcell&lt;BR /&gt;&amp;nbsp;match access-group name WebConsoleManagementCommcell&lt;/P&gt;</description>
      <pubDate>Fri, 30 Sep 2016 08:30:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asr-zone-based-firewall-and-return-traffic/m-p/2948770#M149591</guid>
      <dc:creator>paul.matthews</dc:creator>
      <dc:date>2016-09-30T08:30:44Z</dc:date>
    </item>
    <item>
      <title>Add you have that applied to</title>
      <link>https://community.cisco.com/t5/network-security/asr-zone-based-firewall-and-return-traffic/m-p/2948771#M149592</link>
      <description>&lt;P&gt;Add you have that applied to an interface correct?&lt;/P&gt;
&lt;P&gt;Can you post the results of the following commands:&lt;/P&gt;
&lt;P&gt;show zone-pair security&lt;BR /&gt;show policy-map type inspect&lt;/P&gt;</description>
      <pubDate>Fri, 30 Sep 2016 18:19:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asr-zone-based-firewall-and-return-traffic/m-p/2948771#M149592</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2016-09-30T18:19:54Z</dc:date>
    </item>
  </channel>
</rss>

