<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Create an ACL that denies in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/traffic-redirection-to-sfr/m-p/2968443#M156759</link>
    <description>&lt;P&gt;Create an ACL that denies traffic from the inside to the server located in the DMZ zone, and secondly permits traffic from the inside to the internet. &amp;nbsp;Then call this ACL from your class/policy map. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I would certainly enable the SFR for inbound traffic via VPN.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;access-list sfr_redirect extended deny ip &amp;lt;inside_net&amp;gt; host &amp;lt;server ip&amp;gt;&lt;BR /&gt;access-list sfr_redirect extended permit ip &amp;lt;inside_net&amp;gt; any&lt;BR /&gt;&lt;BR /&gt;class-map sfr&lt;BR /&gt;match access-list sfr_redirect&lt;BR /&gt;&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class sfr&lt;BR /&gt;sfr fail-open&lt;/PRE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;-Greg&lt;/P&gt;</description>
    <pubDate>Mon, 25 Jul 2016 20:25:19 GMT</pubDate>
    <dc:creator>Greg Smalley</dc:creator>
    <dc:date>2016-07-25T20:25:19Z</dc:date>
    <item>
      <title>Traffic Redirection to SFR</title>
      <link>https://community.cisco.com/t5/network-security/traffic-redirection-to-sfr/m-p/2968442#M156747</link>
      <description>&lt;P&gt;Hi Experts,&lt;/P&gt;
&lt;P&gt;Good Day!&lt;/P&gt;
&lt;P&gt;Please see my diagram which I attached here.&lt;/P&gt;
&lt;P&gt;I wanted to know if it is possible this scenario, my inside subnet&amp;nbsp;WILL BE&amp;nbsp;redirected to the SFR module for application inspection before going to the internet but it WILL NOT&amp;nbsp;redirect to SFR if the inside subnet will access the server located in the DMZ zone? Is this possible?&lt;/P&gt;
&lt;P&gt;In addition, is it a good design to enable the SFR module while the firewall will also provide site-to-site and remote-access VPN capabilities?&lt;/P&gt;
&lt;P&gt;Thank you and have a nice day!&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:03:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-redirection-to-sfr/m-p/2968442#M156747</guid>
      <dc:creator>fatalXerror</dc:creator>
      <dc:date>2019-03-12T08:03:34Z</dc:date>
    </item>
    <item>
      <title>Create an ACL that denies</title>
      <link>https://community.cisco.com/t5/network-security/traffic-redirection-to-sfr/m-p/2968443#M156759</link>
      <description>&lt;P&gt;Create an ACL that denies traffic from the inside to the server located in the DMZ zone, and secondly permits traffic from the inside to the internet. &amp;nbsp;Then call this ACL from your class/policy map. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I would certainly enable the SFR for inbound traffic via VPN.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;access-list sfr_redirect extended deny ip &amp;lt;inside_net&amp;gt; host &amp;lt;server ip&amp;gt;&lt;BR /&gt;access-list sfr_redirect extended permit ip &amp;lt;inside_net&amp;gt; any&lt;BR /&gt;&lt;BR /&gt;class-map sfr&lt;BR /&gt;match access-list sfr_redirect&lt;BR /&gt;&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class sfr&lt;BR /&gt;sfr fail-open&lt;/PRE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;-Greg&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jul 2016 20:25:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-redirection-to-sfr/m-p/2968443#M156759</guid>
      <dc:creator>Greg Smalley</dc:creator>
      <dc:date>2016-07-25T20:25:19Z</dc:date>
    </item>
  </channel>
</rss>

