<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/issue-with-zbf-when-using-pptp/m-p/2900074#M154986</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Please see below&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ip access-list extended ACL-GUEST-LAN&lt;BR /&gt;&amp;nbsp;permit ip 192.168.0.0 0.0.7.255 any&lt;BR /&gt;&amp;nbsp;permit ip 172.30.0.0 0.0.0.255 any&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;This represents the interface IP and a secondary IP I was also testing with. We are currently testing with the 172.30.x.x subnet as a secondary to rule out an issue with the 192.168.x.x.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Sun, 10 Apr 2016 19:12:42 GMT</pubDate>
    <dc:creator>darren-carr</dc:creator>
    <dc:date>2016-04-10T19:12:42Z</dc:date>
    <item>
      <title>Issue with ZBF when using PPTP</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-zbf-when-using-pptp/m-p/2900072#M154984</link>
      <description>&lt;P&gt;Hi community,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;We have a 3945 router configured with a ZBF that serves as a Guest router. We have an issue when a client attempts to initiate a PPTP VPN. I've performed a Wireshark capture and can see the tunnel established (tcp-1723), and the PPP LCP packets from the client (GRE), but I see nothing coming back from the server. As soon as I disable the ZBF the VPN establishes and the traffic is two way, so the issue lies with the ZBF configuration. I've managed to get an extract of the configuration, but am struggling to see where the issue lies. I think it is GRE being blocked, but as far as I can see it is permitted to/from the correct zones.&lt;/P&gt;
&lt;P&gt;Any advice on what I may have missed or what configuration needs to be adjusted?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:36:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-zbf-when-using-pptp/m-p/2900072#M154984</guid>
      <dc:creator>darren-carr</dc:creator>
      <dc:date>2019-03-12T07:36:03Z</dc:date>
    </item>
    <item>
      <title>Please post contents of</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-zbf-when-using-pptp/m-p/2900073#M154985</link>
      <description>&lt;P&gt;Please post contents of Access-List "ACL-GUEST-LAN".&lt;/P&gt;</description>
      <pubDate>Sun, 10 Apr 2016 18:36:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-zbf-when-using-pptp/m-p/2900073#M154985</guid>
      <dc:creator>Paul Chapman</dc:creator>
      <dc:date>2016-04-10T18:36:21Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-zbf-when-using-pptp/m-p/2900074#M154986</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Please see below&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ip access-list extended ACL-GUEST-LAN&lt;BR /&gt;&amp;nbsp;permit ip 192.168.0.0 0.0.7.255 any&lt;BR /&gt;&amp;nbsp;permit ip 172.30.0.0 0.0.0.255 any&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;This represents the interface IP and a secondary IP I was also testing with. We are currently testing with the 172.30.x.x subnet as a secondary to rule out an issue with the 192.168.x.x.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Apr 2016 19:12:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-zbf-when-using-pptp/m-p/2900074#M154986</guid>
      <dc:creator>darren-carr</dc:creator>
      <dc:date>2016-04-10T19:12:42Z</dc:date>
    </item>
    <item>
      <title>Hi -</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-zbf-when-using-pptp/m-p/2900075#M154987</link>
      <description>&lt;P&gt;Hi -&lt;/P&gt;
&lt;P&gt;I think that you were on the right track.&amp;nbsp; The key is to enable GRE bidirectionally, and you may need to add protocol inspection for PPTP going outbound.&amp;nbsp; I've extracted the relevant portions and added some suggested configuration:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;ip access-list extended ACL-GUEST-LAN&lt;BR /&gt;&amp;nbsp;permit ip 192.168.0.0 0.0.7.255 any&lt;BR /&gt;&amp;nbsp;permit ip 172.30.0.0 0.0.0.255 any&lt;BR /&gt;class-map type inspect match-all CLASS-GUEST-2-INTERNET&lt;BR /&gt;&amp;nbsp;match access-group name ACL-GUEST-LAN&lt;BR /&gt;!!&lt;BR /&gt;class-map type inspect match-any GUEST-PROTOCOLS&lt;BR /&gt;&amp;nbsp;match protocol pptp&lt;BR /&gt;ip access-list extended ACL-GRE&lt;BR /&gt;&amp;nbsp;permit gre any any&lt;BR /&gt;class-map type inspect match-all CLASS-GRE&lt;BR /&gt;&amp;nbsp;match access-group name ACL-GRE&lt;BR /&gt;!!&lt;BR /&gt;policy-map type inspect POLICY-GUEST-2-INTERNET&lt;BR /&gt;&amp;nbsp;class type inspect CLASS-GUEST-2-INTERNET&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;class type inspect GUEST-PROTOCOLS&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;class type inpsect CLASS-GRE&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;zone-pair security ZP-GUEST-2-INTERNET source guest destination internet&lt;BR /&gt;&amp;nbsp;service-policy type inspect POLICY-GUEST-2-INTERNET&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect POLICY-INTERNET-2-GUEST&lt;BR /&gt;&amp;nbsp;class type inspect CLASS-ICMP-PMTU&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt;&amp;nbsp;class type inpsect CLASS-GRE&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;zone-pair security ZP-INTERNET-2-GUEST source internet destination guest&lt;BR /&gt;&amp;nbsp;service-policy type inspect POLICY-INTERNET-2-GUEST&lt;/PRE&gt;
&lt;P&gt;Eric Phillips posted an excellent example on his blog:&lt;/P&gt;
&lt;P&gt;&lt;A title="PPTP Passthrough ZBF" href="http://blog.ephillips.us/2011/02/zone-based-firewall-pptp-pass-through.html"&gt;http://blog.ephillips.us/2011/02/zone-based-firewall-pptp-pass-through.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Hope that helps.&lt;/P&gt;
&lt;P&gt;PSC&lt;/P&gt;</description>
      <pubDate>Sun, 10 Apr 2016 19:41:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-zbf-when-using-pptp/m-p/2900075#M154987</guid>
      <dc:creator>Paul Chapman</dc:creator>
      <dc:date>2016-04-10T19:41:20Z</dc:date>
    </item>
    <item>
      <title>Thanks, unfortunately it did</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-zbf-when-using-pptp/m-p/2900076#M154988</link>
      <description>&lt;P&gt;Thanks, unfortunately it did not have the desired effect &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;It definitely appears related to an element of the GRE configuration as I am receiving error code 806 on the Windows client.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Apr 2016 19:35:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-zbf-when-using-pptp/m-p/2900076#M154988</guid>
      <dc:creator>darren-carr</dc:creator>
      <dc:date>2016-04-11T19:35:49Z</dc:date>
    </item>
  </channel>
</rss>

