<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic C887 router zone based firewall - Windows Server 2012 PPTP VPN Pass Through in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/c887-router-zone-based-firewall-windows-server-2012-pptp-vpn/m-p/2893898#M156502</link>
    <description>&lt;P&gt;I ham having no end of bother trying to get my mobile devices connected to the VPN server since I implemented a simple zone based firewall!&lt;/P&gt;
&lt;P&gt;It all worked before so NAT is in place and traffic was passing and the VPN worked a treat.&amp;nbsp; I have configured the following as a first attempt and I can't see why its not working.&amp;nbsp; Any pointers would be much appreciated.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;hostname R1&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;security authentication failure rate 3 log&lt;BR /&gt;security passwords min-length 6&lt;BR /&gt;logging buffered 4096 informational&lt;BR /&gt;logging monitor errors&lt;BR /&gt;!&lt;BR /&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login default local&lt;BR /&gt;aaa authorization exec default local &lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa session-id common&lt;BR /&gt;memory-size iomem 10&lt;BR /&gt;clock timezone gmt 0 0&lt;BR /&gt;clock summer-time BST recurring last Sun Mar 2:00 last Sun Oct 2:00&lt;BR /&gt;!&lt;BR /&gt;crypto pki trustpoint TP-self-signed-16243XX&lt;BR /&gt;&amp;nbsp;enrollment selfsigned&lt;BR /&gt;&amp;nbsp;subject-name cn=IOS-Self-Signed-Certificate-16243XX&lt;BR /&gt;&amp;nbsp;revocation-check none&lt;BR /&gt;&amp;nbsp;rsakeypair TP-self-signed-1624352400&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto pki certificate chain TP-self-signed-16243XX&lt;BR /&gt;&lt;BR /&gt;no ip source-route&lt;BR /&gt;ip cef&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no ip bootp server&lt;BR /&gt;ip name-server 10.10.10.8&lt;BR /&gt;ip multicast-routing &lt;BR /&gt;!&lt;BR /&gt;no ipv6 cef&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;parameter-map type ooo global&lt;BR /&gt;&amp;nbsp;tcp reassembly queue length 64&lt;BR /&gt;&amp;nbsp;tcp reassembly memory limit 4096&lt;BR /&gt;&amp;nbsp;tcp reassembly alarm off&lt;BR /&gt;!&lt;BR /&gt;license udi pid C887VA-W-E-K9 sn FCZ171894JN&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;username XXXX privilege 15 secret XXXXXXXXXXXXXXXXX&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;controller VDSL 0&lt;BR /&gt;&amp;nbsp;firmware filename flash:/vdsl.bin-A2pv6C035d23j&lt;BR /&gt;&amp;nbsp;modem customUKannexM&lt;BR /&gt;&amp;nbsp;modem UKfeature&lt;BR /&gt;!&lt;BR /&gt;ip tcp synwait-time 10&lt;BR /&gt;ip ssh time-out 90&lt;BR /&gt;ip ssh version 2&lt;BR /&gt;!&lt;BR /&gt;class-map type inspect match-any PROTOCOLS-ALLOWED-IN&lt;BR /&gt;&amp;nbsp;match protocol tcp&lt;BR /&gt;&amp;nbsp;match protocol udp&lt;BR /&gt;&amp;nbsp;match protocol icmp&lt;/P&gt;
&lt;P&gt;match protocol pptp&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;class-map type inspect match-any ALLOWED-PROTOCOLS&lt;BR /&gt;&amp;nbsp;match protocol dns&lt;BR /&gt;&amp;nbsp;match protocol http&lt;BR /&gt;&amp;nbsp;match protocol https&lt;BR /&gt;&amp;nbsp;match protocol ftp&lt;BR /&gt;&amp;nbsp;match protocol imap&lt;BR /&gt;&amp;nbsp;match protocol imap3&lt;BR /&gt;&amp;nbsp;match protocol smtp&lt;BR /&gt;&amp;nbsp;match protocol pop3&lt;BR /&gt;&amp;nbsp;match protocol pop3s&lt;BR /&gt;&amp;nbsp;match protocol imaps&lt;BR /&gt;&amp;nbsp;match protocol pptp&lt;BR /&gt;&amp;nbsp;match protocol icmp&lt;BR /&gt;&amp;nbsp;match protocol ntp&lt;BR /&gt;&amp;nbsp;match protocol tcp&lt;BR /&gt;&amp;nbsp;match protocol udp&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect OUTSIDE-TO-INSIDE-POLICY&lt;BR /&gt;&amp;nbsp;class type inspect PROTOCOLS-ALLOWED-IN&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;policy-map type inspect INSIDE-TO-OUTSIDE-POLICY&lt;BR /&gt;&amp;nbsp;class type inspect ALLOWED-PROTOCOLS&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;!&lt;BR /&gt;zone security LAN&lt;BR /&gt;&amp;nbsp;description Inside Private Network&lt;BR /&gt;zone security INTERNET&lt;BR /&gt;&amp;nbsp;description Outside Public Internet&lt;BR /&gt;zone-pair security LAN-TO-INTERNET source LAN destination INTERNET&lt;BR /&gt;&amp;nbsp;description LAN-TO-INTERNET TRAFFIC&lt;BR /&gt;&amp;nbsp;service-policy type inspect INSIDE-TO-OUTSIDE-POLICY&lt;BR /&gt;zone-pair security INTERNET-TO-LAN source INTERNET destination LAN&lt;BR /&gt;&amp;nbsp;description INTERNET-TO-LAN TRAFFIC&lt;BR /&gt;&amp;nbsp;service-policy type inspect OUTSIDE-TO-INSIDE-POLICY&lt;BR /&gt;! &lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface Null0&lt;BR /&gt;&amp;nbsp;no ip unreachables&lt;BR /&gt;!&lt;BR /&gt;interface ATM0&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;no ip redirects&lt;BR /&gt;&amp;nbsp;no ip unreachables&lt;BR /&gt;&amp;nbsp;no ip proxy-arp&lt;BR /&gt;&amp;nbsp;ip flow ingress&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no atm ilmi-keepalive&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;no ip redirects&lt;BR /&gt;&amp;nbsp;no ip unreachables&lt;BR /&gt;&amp;nbsp;no ip proxy-arp&lt;BR /&gt;&amp;nbsp;ip flow ingress&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0.101&lt;BR /&gt;&amp;nbsp;encapsulation dot1Q 101&lt;BR /&gt;&amp;nbsp;no ip redirects&lt;BR /&gt;&amp;nbsp;no ip unreachables&lt;BR /&gt;&amp;nbsp;no ip proxy-arp&lt;BR /&gt;&amp;nbsp;ip flow ingress&lt;BR /&gt;&amp;nbsp;pppoe enable group global&lt;BR /&gt;&amp;nbsp;pppoe-client dial-pool-number 1&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet2&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet3&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Wlan-GigabitEthernet0&lt;BR /&gt;&amp;nbsp;description Internal switch interface connecting to the embedded AP&lt;BR /&gt;&amp;nbsp;switchport mode trunk&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface wlan-ap0&lt;BR /&gt;&amp;nbsp;description Embedded Service module interface to manage the embedded AP&lt;BR /&gt;&amp;nbsp;ip unnumbered Vlan1&lt;BR /&gt;&amp;nbsp;no ip redirects&lt;BR /&gt;&amp;nbsp;no ip unreachables&lt;BR /&gt;&amp;nbsp;no ip proxy-arp&lt;BR /&gt;&amp;nbsp;ip flow ingress&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;ip address 10.10.10.1 255.255.255.0&lt;BR /&gt;&amp;nbsp;ip helper-address 10.10.10.8&lt;BR /&gt;&amp;nbsp;no ip redirects&lt;BR /&gt;&amp;nbsp;no ip unreachables&lt;BR /&gt;&amp;nbsp;no ip proxy-arp&lt;BR /&gt;&amp;nbsp;ip flow ingress&lt;BR /&gt;&amp;nbsp;ip pim dense-mode&lt;BR /&gt;&amp;nbsp;ip nat inside&lt;BR /&gt;&amp;nbsp;ip virtual-reassembly in&lt;BR /&gt;&amp;nbsp;zone-member security LAN&lt;BR /&gt;!&lt;BR /&gt;interface Dialer0&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;no ip redirects&lt;BR /&gt;&amp;nbsp;no ip unreachables&lt;BR /&gt;&amp;nbsp;no ip proxy-arp&lt;BR /&gt;&amp;nbsp;ip flow ingress&lt;BR /&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;interface Dialer1&lt;BR /&gt;&amp;nbsp;description **BT INFINITY**$FW_OUTSIDE$&lt;BR /&gt;&amp;nbsp;mtu 1492&lt;BR /&gt;&amp;nbsp;ip address negotiated&lt;BR /&gt;&amp;nbsp;no ip redirects&lt;BR /&gt;&amp;nbsp;no ip unreachables&lt;BR /&gt;&amp;nbsp;no ip proxy-arp&lt;BR /&gt;&amp;nbsp;ip nbar protocol-discovery&lt;BR /&gt;&amp;nbsp;ip flow ingress&lt;BR /&gt;&amp;nbsp;ip nat outside&lt;BR /&gt;&amp;nbsp;ip virtual-reassembly in&lt;BR /&gt;&amp;nbsp;zone-member security INTERNET&lt;BR /&gt;&amp;nbsp;encapsulation ppp&lt;BR /&gt;&amp;nbsp;dialer pool 1&lt;BR /&gt;&amp;nbsp;ppp authentication pap chap ms-chap callin&lt;BR /&gt;&amp;nbsp;ppp chap hostname XXXXX@XXX.btclick.com&lt;BR /&gt;&amp;nbsp;ppp chap password XXXXXXXXXXXXXXXXXX&lt;BR /&gt;&amp;nbsp;ppp ipcp address accept&lt;BR /&gt;&amp;nbsp;no cdp enable&lt;BR /&gt;!&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;ip http server&lt;BR /&gt;ip http access-class 1&lt;BR /&gt;ip http authentication local&lt;BR /&gt;ip http secure-server&lt;BR /&gt;!&lt;BR /&gt;ip nat inside source list 1 interface Dialer1 overload&lt;BR /&gt;ip nat inside source static tcp 10.10.10.4 21 X.X.X.X 21 extendable&lt;BR /&gt;ip nat inside source static tcp 10.10.10.8 1723 X.X.X.X 1723 extendable&lt;BR /&gt;ip nat inside source static tcp 10.10.10.4 5500 X.X.X.X 5500 extendable&lt;BR /&gt;ip nat inside source static tcp 10.10.10.4 5501 X.X.X.X 5501 extendable&lt;BR /&gt;ip nat inside source static tcp 10.10.10.4 5502 X.X.X.X 5502 extendable&lt;BR /&gt;ip nat inside source static tcp 10.10.10.4 5503 X.X.X.X 5503 extendable&lt;BR /&gt;ip nat inside source static tcp 10.10.10.4 5504 X.X.X.X 5504 extendable&lt;BR /&gt;ip nat inside source static tcp 10.10.10.4 5505 X.X.X.X 5505 extendable&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 Dialer1&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended filezilla-in&lt;BR /&gt;&amp;nbsp;permit tcp any any eq ftp&lt;BR /&gt;&amp;nbsp;permit tcp any any range 5500 5505&lt;BR /&gt;!&lt;BR /&gt;logging host 10.10.10.148&lt;BR /&gt;dialer-list 1 protocol ip permit&lt;BR /&gt;no cdp run&lt;BR /&gt;!&lt;BR /&gt;snmp-server community public RO&lt;BR /&gt;snmp-server ifindex persist&lt;BR /&gt;snmp-server location Test LAB&lt;BR /&gt;snmp-server contact admin@XXXXX.com&lt;BR /&gt;snmp-server chassis-id XXXXXXXXX&lt;BR /&gt;snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart&lt;BR /&gt;snmp-server enable traps tty&lt;BR /&gt;snmp-server enable traps aaa_server&lt;BR /&gt;snmp-server enable traps config-copy&lt;BR /&gt;snmp-server enable traps config&lt;BR /&gt;snmp-server enable traps entity&lt;BR /&gt;snmp-server enable traps cpu threshold&lt;BR /&gt;snmp-server enable traps syslog&lt;BR /&gt;tftp-server ;&lt;BR /&gt;access-list 1 remark *** CLIENTS LAN ***&lt;BR /&gt;access-list 1 permit 10.0.0.0 0.255.255.255&lt;BR /&gt;access-list 1 deny&amp;nbsp;&amp;nbsp; any&lt;BR /&gt;access-list 101 permit tcp any eq 1723 host 10.10.10.8&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;&amp;nbsp;logging synchronous&lt;BR /&gt;&amp;nbsp;no modem enable&lt;BR /&gt;&amp;nbsp;transport output telnet&lt;BR /&gt;line aux 0&lt;BR /&gt;&amp;nbsp;transport output telnet&lt;BR /&gt;line 2&lt;BR /&gt;&amp;nbsp;no activation-character&lt;BR /&gt;&amp;nbsp;no exec&lt;BR /&gt;&amp;nbsp;transport preferred none&lt;BR /&gt;&amp;nbsp;transport input all&lt;BR /&gt;&amp;nbsp;stopbits 1&lt;BR /&gt;line vty 0 4&lt;BR /&gt;&amp;nbsp;access-class 1 in&lt;BR /&gt;&amp;nbsp;password XXXXXXXXXXXXXXXX&lt;BR /&gt;&amp;nbsp;transport input telnet ssh&lt;BR /&gt;!&lt;BR /&gt;scheduler allocate 20000 1000&lt;BR /&gt;scheduler interval 500&lt;BR /&gt;ntp server 0.uk.pool.ntp.org prefer&lt;BR /&gt;!&lt;BR /&gt;end&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;----------------------&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 07:59:29 GMT</pubDate>
    <dc:creator>Nik Warren</dc:creator>
    <dc:date>2019-03-12T07:59:29Z</dc:date>
    <item>
      <title>C887 router zone based firewall - Windows Server 2012 PPTP VPN Pass Through</title>
      <link>https://community.cisco.com/t5/network-security/c887-router-zone-based-firewall-windows-server-2012-pptp-vpn/m-p/2893898#M156502</link>
      <description>&lt;P&gt;I ham having no end of bother trying to get my mobile devices connected to the VPN server since I implemented a simple zone based firewall!&lt;/P&gt;
&lt;P&gt;It all worked before so NAT is in place and traffic was passing and the VPN worked a treat.&amp;nbsp; I have configured the following as a first attempt and I can't see why its not working.&amp;nbsp; Any pointers would be much appreciated.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;hostname R1&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;security authentication failure rate 3 log&lt;BR /&gt;security passwords min-length 6&lt;BR /&gt;logging buffered 4096 informational&lt;BR /&gt;logging monitor errors&lt;BR /&gt;!&lt;BR /&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login default local&lt;BR /&gt;aaa authorization exec default local &lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa session-id common&lt;BR /&gt;memory-size iomem 10&lt;BR /&gt;clock timezone gmt 0 0&lt;BR /&gt;clock summer-time BST recurring last Sun Mar 2:00 last Sun Oct 2:00&lt;BR /&gt;!&lt;BR /&gt;crypto pki trustpoint TP-self-signed-16243XX&lt;BR /&gt;&amp;nbsp;enrollment selfsigned&lt;BR /&gt;&amp;nbsp;subject-name cn=IOS-Self-Signed-Certificate-16243XX&lt;BR /&gt;&amp;nbsp;revocation-check none&lt;BR /&gt;&amp;nbsp;rsakeypair TP-self-signed-1624352400&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto pki certificate chain TP-self-signed-16243XX&lt;BR /&gt;&lt;BR /&gt;no ip source-route&lt;BR /&gt;ip cef&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no ip bootp server&lt;BR /&gt;ip name-server 10.10.10.8&lt;BR /&gt;ip multicast-routing &lt;BR /&gt;!&lt;BR /&gt;no ipv6 cef&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;parameter-map type ooo global&lt;BR /&gt;&amp;nbsp;tcp reassembly queue length 64&lt;BR /&gt;&amp;nbsp;tcp reassembly memory limit 4096&lt;BR /&gt;&amp;nbsp;tcp reassembly alarm off&lt;BR /&gt;!&lt;BR /&gt;license udi pid C887VA-W-E-K9 sn FCZ171894JN&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;username XXXX privilege 15 secret XXXXXXXXXXXXXXXXX&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;controller VDSL 0&lt;BR /&gt;&amp;nbsp;firmware filename flash:/vdsl.bin-A2pv6C035d23j&lt;BR /&gt;&amp;nbsp;modem customUKannexM&lt;BR /&gt;&amp;nbsp;modem UKfeature&lt;BR /&gt;!&lt;BR /&gt;ip tcp synwait-time 10&lt;BR /&gt;ip ssh time-out 90&lt;BR /&gt;ip ssh version 2&lt;BR /&gt;!&lt;BR /&gt;class-map type inspect match-any PROTOCOLS-ALLOWED-IN&lt;BR /&gt;&amp;nbsp;match protocol tcp&lt;BR /&gt;&amp;nbsp;match protocol udp&lt;BR /&gt;&amp;nbsp;match protocol icmp&lt;/P&gt;
&lt;P&gt;match protocol pptp&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;class-map type inspect match-any ALLOWED-PROTOCOLS&lt;BR /&gt;&amp;nbsp;match protocol dns&lt;BR /&gt;&amp;nbsp;match protocol http&lt;BR /&gt;&amp;nbsp;match protocol https&lt;BR /&gt;&amp;nbsp;match protocol ftp&lt;BR /&gt;&amp;nbsp;match protocol imap&lt;BR /&gt;&amp;nbsp;match protocol imap3&lt;BR /&gt;&amp;nbsp;match protocol smtp&lt;BR /&gt;&amp;nbsp;match protocol pop3&lt;BR /&gt;&amp;nbsp;match protocol pop3s&lt;BR /&gt;&amp;nbsp;match protocol imaps&lt;BR /&gt;&amp;nbsp;match protocol pptp&lt;BR /&gt;&amp;nbsp;match protocol icmp&lt;BR /&gt;&amp;nbsp;match protocol ntp&lt;BR /&gt;&amp;nbsp;match protocol tcp&lt;BR /&gt;&amp;nbsp;match protocol udp&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect OUTSIDE-TO-INSIDE-POLICY&lt;BR /&gt;&amp;nbsp;class type inspect PROTOCOLS-ALLOWED-IN&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;policy-map type inspect INSIDE-TO-OUTSIDE-POLICY&lt;BR /&gt;&amp;nbsp;class type inspect ALLOWED-PROTOCOLS&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;!&lt;BR /&gt;zone security LAN&lt;BR /&gt;&amp;nbsp;description Inside Private Network&lt;BR /&gt;zone security INTERNET&lt;BR /&gt;&amp;nbsp;description Outside Public Internet&lt;BR /&gt;zone-pair security LAN-TO-INTERNET source LAN destination INTERNET&lt;BR /&gt;&amp;nbsp;description LAN-TO-INTERNET TRAFFIC&lt;BR /&gt;&amp;nbsp;service-policy type inspect INSIDE-TO-OUTSIDE-POLICY&lt;BR /&gt;zone-pair security INTERNET-TO-LAN source INTERNET destination LAN&lt;BR /&gt;&amp;nbsp;description INTERNET-TO-LAN TRAFFIC&lt;BR /&gt;&amp;nbsp;service-policy type inspect OUTSIDE-TO-INSIDE-POLICY&lt;BR /&gt;! &lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface Null0&lt;BR /&gt;&amp;nbsp;no ip unreachables&lt;BR /&gt;!&lt;BR /&gt;interface ATM0&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;no ip redirects&lt;BR /&gt;&amp;nbsp;no ip unreachables&lt;BR /&gt;&amp;nbsp;no ip proxy-arp&lt;BR /&gt;&amp;nbsp;ip flow ingress&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no atm ilmi-keepalive&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;no ip redirects&lt;BR /&gt;&amp;nbsp;no ip unreachables&lt;BR /&gt;&amp;nbsp;no ip proxy-arp&lt;BR /&gt;&amp;nbsp;ip flow ingress&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0.101&lt;BR /&gt;&amp;nbsp;encapsulation dot1Q 101&lt;BR /&gt;&amp;nbsp;no ip redirects&lt;BR /&gt;&amp;nbsp;no ip unreachables&lt;BR /&gt;&amp;nbsp;no ip proxy-arp&lt;BR /&gt;&amp;nbsp;ip flow ingress&lt;BR /&gt;&amp;nbsp;pppoe enable group global&lt;BR /&gt;&amp;nbsp;pppoe-client dial-pool-number 1&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet2&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet3&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Wlan-GigabitEthernet0&lt;BR /&gt;&amp;nbsp;description Internal switch interface connecting to the embedded AP&lt;BR /&gt;&amp;nbsp;switchport mode trunk&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface wlan-ap0&lt;BR /&gt;&amp;nbsp;description Embedded Service module interface to manage the embedded AP&lt;BR /&gt;&amp;nbsp;ip unnumbered Vlan1&lt;BR /&gt;&amp;nbsp;no ip redirects&lt;BR /&gt;&amp;nbsp;no ip unreachables&lt;BR /&gt;&amp;nbsp;no ip proxy-arp&lt;BR /&gt;&amp;nbsp;ip flow ingress&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;ip address 10.10.10.1 255.255.255.0&lt;BR /&gt;&amp;nbsp;ip helper-address 10.10.10.8&lt;BR /&gt;&amp;nbsp;no ip redirects&lt;BR /&gt;&amp;nbsp;no ip unreachables&lt;BR /&gt;&amp;nbsp;no ip proxy-arp&lt;BR /&gt;&amp;nbsp;ip flow ingress&lt;BR /&gt;&amp;nbsp;ip pim dense-mode&lt;BR /&gt;&amp;nbsp;ip nat inside&lt;BR /&gt;&amp;nbsp;ip virtual-reassembly in&lt;BR /&gt;&amp;nbsp;zone-member security LAN&lt;BR /&gt;!&lt;BR /&gt;interface Dialer0&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;no ip redirects&lt;BR /&gt;&amp;nbsp;no ip unreachables&lt;BR /&gt;&amp;nbsp;no ip proxy-arp&lt;BR /&gt;&amp;nbsp;ip flow ingress&lt;BR /&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;interface Dialer1&lt;BR /&gt;&amp;nbsp;description **BT INFINITY**$FW_OUTSIDE$&lt;BR /&gt;&amp;nbsp;mtu 1492&lt;BR /&gt;&amp;nbsp;ip address negotiated&lt;BR /&gt;&amp;nbsp;no ip redirects&lt;BR /&gt;&amp;nbsp;no ip unreachables&lt;BR /&gt;&amp;nbsp;no ip proxy-arp&lt;BR /&gt;&amp;nbsp;ip nbar protocol-discovery&lt;BR /&gt;&amp;nbsp;ip flow ingress&lt;BR /&gt;&amp;nbsp;ip nat outside&lt;BR /&gt;&amp;nbsp;ip virtual-reassembly in&lt;BR /&gt;&amp;nbsp;zone-member security INTERNET&lt;BR /&gt;&amp;nbsp;encapsulation ppp&lt;BR /&gt;&amp;nbsp;dialer pool 1&lt;BR /&gt;&amp;nbsp;ppp authentication pap chap ms-chap callin&lt;BR /&gt;&amp;nbsp;ppp chap hostname XXXXX@XXX.btclick.com&lt;BR /&gt;&amp;nbsp;ppp chap password XXXXXXXXXXXXXXXXXX&lt;BR /&gt;&amp;nbsp;ppp ipcp address accept&lt;BR /&gt;&amp;nbsp;no cdp enable&lt;BR /&gt;!&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;ip http server&lt;BR /&gt;ip http access-class 1&lt;BR /&gt;ip http authentication local&lt;BR /&gt;ip http secure-server&lt;BR /&gt;!&lt;BR /&gt;ip nat inside source list 1 interface Dialer1 overload&lt;BR /&gt;ip nat inside source static tcp 10.10.10.4 21 X.X.X.X 21 extendable&lt;BR /&gt;ip nat inside source static tcp 10.10.10.8 1723 X.X.X.X 1723 extendable&lt;BR /&gt;ip nat inside source static tcp 10.10.10.4 5500 X.X.X.X 5500 extendable&lt;BR /&gt;ip nat inside source static tcp 10.10.10.4 5501 X.X.X.X 5501 extendable&lt;BR /&gt;ip nat inside source static tcp 10.10.10.4 5502 X.X.X.X 5502 extendable&lt;BR /&gt;ip nat inside source static tcp 10.10.10.4 5503 X.X.X.X 5503 extendable&lt;BR /&gt;ip nat inside source static tcp 10.10.10.4 5504 X.X.X.X 5504 extendable&lt;BR /&gt;ip nat inside source static tcp 10.10.10.4 5505 X.X.X.X 5505 extendable&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 Dialer1&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended filezilla-in&lt;BR /&gt;&amp;nbsp;permit tcp any any eq ftp&lt;BR /&gt;&amp;nbsp;permit tcp any any range 5500 5505&lt;BR /&gt;!&lt;BR /&gt;logging host 10.10.10.148&lt;BR /&gt;dialer-list 1 protocol ip permit&lt;BR /&gt;no cdp run&lt;BR /&gt;!&lt;BR /&gt;snmp-server community public RO&lt;BR /&gt;snmp-server ifindex persist&lt;BR /&gt;snmp-server location Test LAB&lt;BR /&gt;snmp-server contact admin@XXXXX.com&lt;BR /&gt;snmp-server chassis-id XXXXXXXXX&lt;BR /&gt;snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart&lt;BR /&gt;snmp-server enable traps tty&lt;BR /&gt;snmp-server enable traps aaa_server&lt;BR /&gt;snmp-server enable traps config-copy&lt;BR /&gt;snmp-server enable traps config&lt;BR /&gt;snmp-server enable traps entity&lt;BR /&gt;snmp-server enable traps cpu threshold&lt;BR /&gt;snmp-server enable traps syslog&lt;BR /&gt;tftp-server ;&lt;BR /&gt;access-list 1 remark *** CLIENTS LAN ***&lt;BR /&gt;access-list 1 permit 10.0.0.0 0.255.255.255&lt;BR /&gt;access-list 1 deny&amp;nbsp;&amp;nbsp; any&lt;BR /&gt;access-list 101 permit tcp any eq 1723 host 10.10.10.8&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;&amp;nbsp;logging synchronous&lt;BR /&gt;&amp;nbsp;no modem enable&lt;BR /&gt;&amp;nbsp;transport output telnet&lt;BR /&gt;line aux 0&lt;BR /&gt;&amp;nbsp;transport output telnet&lt;BR /&gt;line 2&lt;BR /&gt;&amp;nbsp;no activation-character&lt;BR /&gt;&amp;nbsp;no exec&lt;BR /&gt;&amp;nbsp;transport preferred none&lt;BR /&gt;&amp;nbsp;transport input all&lt;BR /&gt;&amp;nbsp;stopbits 1&lt;BR /&gt;line vty 0 4&lt;BR /&gt;&amp;nbsp;access-class 1 in&lt;BR /&gt;&amp;nbsp;password XXXXXXXXXXXXXXXX&lt;BR /&gt;&amp;nbsp;transport input telnet ssh&lt;BR /&gt;!&lt;BR /&gt;scheduler allocate 20000 1000&lt;BR /&gt;scheduler interval 500&lt;BR /&gt;ntp server 0.uk.pool.ntp.org prefer&lt;BR /&gt;!&lt;BR /&gt;end&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;----------------------&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:59:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/c887-router-zone-based-firewall-windows-server-2012-pptp-vpn/m-p/2893898#M156502</guid>
      <dc:creator>Nik Warren</dc:creator>
      <dc:date>2019-03-12T07:59:29Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/c887-router-zone-based-firewall-windows-server-2012-pptp-vpn/m-p/2893899#M156503</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;In you zone-based firewall configuration, can you start by not inspecting the traffic to the vpn server. Use the pass and not the inspect command for traffic to the vpn server only. See if this works. You also need to allow gre to the vpn server.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;John&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jul 2016 00:26:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/c887-router-zone-based-firewall-windows-server-2012-pptp-vpn/m-p/2893899#M156503</guid>
      <dc:creator>johnd2310</dc:creator>
      <dc:date>2016-07-06T00:26:09Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/c887-router-zone-based-firewall-windows-server-2012-pptp-vpn/m-p/2893900#M156504</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for that.&amp;nbsp; It worked perfectly.&amp;nbsp; I created the following access lists but substituted any any for the ip's of the relevant hosts.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ip access-list extended GRE-IN&lt;BR /&gt; permit gre any any&lt;BR /&gt;ip access-list extended GRE-OUT&lt;BR /&gt; permit gre any any&lt;/P&gt;
&lt;P&gt;Then Ammended the Policy Maps as follows:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;policy-map type inspect OUTSIDE-TO-INSIDE-POLICY&lt;BR /&gt;&amp;nbsp;class type inspect CLASS-GRE-IN&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt;&amp;nbsp;class type inspect PROTOCOLS-ALLOWED-IN&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;policy-map type inspect INSIDE-TO-OUTSIDE-POLICY&lt;BR /&gt;&amp;nbsp;class type inspect CLASS-GRE-OUT&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt;&amp;nbsp;class type inspect ALLOWED-PROTOCOLS&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;And then created the following Class Maps:&lt;/P&gt;
&lt;P&gt;class-map type inspect match-any CLASS-GRE-IN&lt;BR /&gt;&amp;nbsp;match access-group name GRE-IN&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;class-map type inspect match-any CLASS-GRE-OUT&lt;BR /&gt;&amp;nbsp;match access-group name GRE-OUT&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;And that was that.&amp;nbsp; I have also removed some protocols inbound that I didn't need and just left PPTP.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you so much for you help.&amp;nbsp; I was staring at the screen for hours not seeing the wood for the forrest.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Rgds,&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jul 2016 18:29:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/c887-router-zone-based-firewall-windows-server-2012-pptp-vpn/m-p/2893900#M156504</guid>
      <dc:creator>Nik Warren</dc:creator>
      <dc:date>2016-07-06T18:29:54Z</dc:date>
    </item>
  </channel>
</rss>

