<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic that not seem to work i added in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/zone-based-fw-blocking-some-eigrp-routes/m-p/2681759#M190432</link>
    <description>&lt;P&gt;that not seem to work i added the permit to the acl&lt;/P&gt;&lt;P&gt;ip access-list extended ACCESS&lt;BR /&gt;&amp;nbsp;permit eigrp any any&lt;BR /&gt;&amp;nbsp;permit udp any eq bootps any&lt;BR /&gt;&amp;nbsp;permit icmp any any echo&lt;BR /&gt;&amp;nbsp;permit icmp any any echo-reply&lt;BR /&gt;&amp;nbsp;permit icmp any any traceroute&lt;BR /&gt;&amp;nbsp;permit icmp any any unreachable&lt;BR /&gt;&amp;nbsp;permit icmp any any time-exceeded&lt;BR /&gt;&amp;nbsp;permit tcp xxx.xxx.xxx.xxx 0.0.0.xxx any eq 22&lt;BR /&gt;&amp;nbsp;permit tcp yyy.yyy.yyy 0.0.0.yyy any eq 22&lt;/P&gt;&lt;P&gt;but had no change in behavior even after i clear eigrp and it rebuilt. i then set the policy map to pass&lt;/P&gt;&lt;P&gt;policy-map type inspect to-self-pmap&lt;BR /&gt;&amp;nbsp;class type inspect to-self&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;that did not affect eigrp routing table but did block me from accessing the router from the external IP good thing i could still get to it via the inside IP and the VPN did not drop.&lt;/P&gt;&lt;P&gt;EDIT:&lt;/P&gt;&lt;P&gt;Ignore everything below this i tried copying parts and its did not work, and when i try to edit i see nothing below this line.&lt;/P&gt;&lt;DIV id="stcpDiv" style="position: absolute; top: -1999px; left: -1988px;"&gt;policy-map type inspect to-self-pmap&lt;BR /&gt;&amp;nbsp;class type inspect to-self&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop - See more at: https://supportforums.cisco.com/discussion/12537016/zone-based-fw-blocking-some-eigrp-routes#sthash.qD6nVnxe.dpuf&lt;/DIV&gt;&lt;DIV id="stcpDiv" style="position: absolute; top: -1999px; left: -1988px;"&gt;policy-map type inspect to-self-pmap&lt;BR /&gt;&amp;nbsp;class type inspect to-self&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop - See more at: https://supportforums.cisco.com/discussion/12537016/zone-based-fw-blocking-some-eigrp-routes#sthash.qD6nVnxe.dpuf&lt;/DIV&gt;&lt;DIV id="stcpDiv" style="position: absolute; top: -1999px; left: -1988px;"&gt;policy-map type inspect to-self-pmap&lt;BR /&gt;&amp;nbsp;class type inspect to-self&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop - See more at: https://supportforums.cisco.com/discussion/12537016/zone-based-fw-blocking-some-eigrp-routes#sthash.qD6nVnxe.dpuf&lt;/DIV&gt;</description>
    <pubDate>Thu, 18 Jun 2015 16:46:55 GMT</pubDate>
    <dc:creator>Mike Buyarski</dc:creator>
    <dc:date>2015-06-18T16:46:55Z</dc:date>
    <item>
      <title>Zone based FW blocking some eigrp routes</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-fw-blocking-some-eigrp-routes/m-p/2681757#M190430</link>
      <description>&lt;P&gt;with the new ZBFW now getting setup on a couple of our new routers i am finding a new issue. It appears with the ZBFW setup i have, the FW is only allowing EIGRP to build the routing table to a certain point and is missing a large number of routes this is what i have for the FW&lt;/P&gt;&lt;P&gt;class-map type inspect match-any SECURITY&lt;BR /&gt;&amp;nbsp;match access-group name SECURITY&lt;BR /&gt;class-map type inspect match-any self-map&lt;BR /&gt;&amp;nbsp;match protocol tcp&lt;BR /&gt;&amp;nbsp;match protocol udp&lt;BR /&gt;&amp;nbsp;match protocol icmp&lt;BR /&gt;class-map type inspect match-any FIREOUT&lt;BR /&gt;&amp;nbsp;match protocol http&lt;BR /&gt;&amp;nbsp;match protocol https&lt;BR /&gt;&amp;nbsp;match protocol ftp&lt;BR /&gt;&amp;nbsp;match protocol tftp&lt;BR /&gt;&amp;nbsp;match protocol tcp&lt;BR /&gt;&amp;nbsp;match protocol udp&lt;BR /&gt;&amp;nbsp;match protocol icmp&lt;BR /&gt;class-map type inspect match-all from-self&lt;BR /&gt;&amp;nbsp;match class-map self-map&lt;BR /&gt;class-map type inspect match-all to-self&lt;BR /&gt;&amp;nbsp;match class-map self-map&lt;BR /&gt;&amp;nbsp;match access-group name ACCESS&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect INTERNET-POLICY&lt;BR /&gt;&amp;nbsp;class type inspect FIREOUT&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;policy-map type inspect to-self-pmap&lt;BR /&gt;&amp;nbsp;class type inspect to-self&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;policy-map type inspect SEC-Policy&lt;BR /&gt;&amp;nbsp;class type inspect SECURITY&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;policy-map type inspect from-self-pmap&lt;BR /&gt;&amp;nbsp;class type inspect from-self&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;!&lt;BR /&gt;zone security inside&lt;BR /&gt;&amp;nbsp;description Bay Network&lt;BR /&gt;zone security outside&lt;BR /&gt;&amp;nbsp;description Internet&lt;BR /&gt;zone-pair security BAY source inside destination outside&lt;BR /&gt;&amp;nbsp;service-policy type inspect INTERNET-POLICY&lt;BR /&gt;zone-pair security SEC-Zone source outside destination inside&lt;BR /&gt;&amp;nbsp;service-policy type inspect SEC-Policy&lt;/P&gt;&lt;P&gt;zone-pair security self-out source self destination outside&lt;BR /&gt;&amp;nbsp;service-policy type inspect from-self-pmap&lt;BR /&gt;zone-pair security out-self source outside destination self&lt;BR /&gt;&amp;nbsp;service-policy type inspect to-self-pmap&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;ip access-list extended ACCESS&lt;BR /&gt;&amp;nbsp;permit udp any eq bootps any&lt;BR /&gt;&amp;nbsp;permit icmp any any echo&lt;BR /&gt;&amp;nbsp;permit icmp any any echo-reply&lt;BR /&gt;&amp;nbsp;permit icmp any any traceroute&lt;BR /&gt;&amp;nbsp;permit icmp any any unreachable&lt;BR /&gt;&amp;nbsp;permit icmp any any time-exceeded&lt;BR /&gt;&amp;nbsp;permit tcp "xxx.xxx.xxx.xxx 0.0.0.0.xxx any eq 22&lt;BR /&gt;&amp;nbsp;permit tcp "yyy.yyy.yyy.yyy 0.0.0.yyy any eq 22&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip any any&lt;BR /&gt;ip access-list extended SECURITY&lt;BR /&gt;&amp;nbsp;permit gre any any&lt;BR /&gt;&amp;nbsp;permit tcp any any eq 443&lt;BR /&gt;&amp;nbsp;permit tcp any any eq 1723&lt;BR /&gt;&amp;nbsp;permit tcp any eq 1723 any&lt;BR /&gt;&amp;nbsp;permit esp any any&lt;BR /&gt;&amp;nbsp;permit ahp any any&lt;BR /&gt;&amp;nbsp;permit udp any eq isakmp any eq isakmp&lt;BR /&gt;&amp;nbsp;permit udp any any eq 1701&lt;BR /&gt;&amp;nbsp;permit udp any eq 1701 any eq 1701&lt;BR /&gt;&amp;nbsp;permit udp any any eq isakmp&lt;BR /&gt;&amp;nbsp;permit udp any eq non500-isakmp any&lt;BR /&gt;&amp;nbsp;permit udp any any eq non500-isakmp&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip any any&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If i remove the lines"&lt;/P&gt;&lt;P&gt;zone-pair security self-out source self destination outside&lt;BR /&gt;&amp;nbsp;service-policy type inspect from-self-pmap&lt;BR /&gt;zone-pair security out-self source outside destination self&lt;BR /&gt;&amp;nbsp;service-policy type inspect to-self-pmap&lt;/P&gt;&lt;P&gt;i will get all the eigrp routers but i open the router up to any one in the work being able to try and SSH into it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What am i missing to make sure i get all the eigrp routes?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the routes i get are all the routes from the corp office but no routes from the other remote location subnets&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:09:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-fw-blocking-some-eigrp-routes/m-p/2681757#M190430</guid>
      <dc:creator>Mike Buyarski</dc:creator>
      <dc:date>2019-03-12T06:09:10Z</dc:date>
    </item>
    <item>
      <title>HiI'm pretty sure you need to</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-fw-blocking-some-eigrp-routes/m-p/2681758#M190431</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;I'm pretty sure you need to "pass" the traffic instead of using "inspect" to and from the self zone. At least you had to do that before.&lt;/P&gt;
&lt;P&gt;Edit:&lt;/P&gt;
&lt;P&gt;You haven't allowed EIGRP to the self zone. EIGRP is neither UDP or TCP.&lt;/P&gt;

&lt;PRE&gt;
acess-list EIGRP extended permit eigrp any any&lt;/PRE&gt;</description>
      <pubDate>Thu, 18 Jun 2015 16:14:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-fw-blocking-some-eigrp-routes/m-p/2681758#M190431</guid>
      <dc:creator>Henrik Grankvist</dc:creator>
      <dc:date>2015-06-18T16:14:59Z</dc:date>
    </item>
    <item>
      <title>that not seem to work i added</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-fw-blocking-some-eigrp-routes/m-p/2681759#M190432</link>
      <description>&lt;P&gt;that not seem to work i added the permit to the acl&lt;/P&gt;&lt;P&gt;ip access-list extended ACCESS&lt;BR /&gt;&amp;nbsp;permit eigrp any any&lt;BR /&gt;&amp;nbsp;permit udp any eq bootps any&lt;BR /&gt;&amp;nbsp;permit icmp any any echo&lt;BR /&gt;&amp;nbsp;permit icmp any any echo-reply&lt;BR /&gt;&amp;nbsp;permit icmp any any traceroute&lt;BR /&gt;&amp;nbsp;permit icmp any any unreachable&lt;BR /&gt;&amp;nbsp;permit icmp any any time-exceeded&lt;BR /&gt;&amp;nbsp;permit tcp xxx.xxx.xxx.xxx 0.0.0.xxx any eq 22&lt;BR /&gt;&amp;nbsp;permit tcp yyy.yyy.yyy 0.0.0.yyy any eq 22&lt;/P&gt;&lt;P&gt;but had no change in behavior even after i clear eigrp and it rebuilt. i then set the policy map to pass&lt;/P&gt;&lt;P&gt;policy-map type inspect to-self-pmap&lt;BR /&gt;&amp;nbsp;class type inspect to-self&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;that did not affect eigrp routing table but did block me from accessing the router from the external IP good thing i could still get to it via the inside IP and the VPN did not drop.&lt;/P&gt;&lt;P&gt;EDIT:&lt;/P&gt;&lt;P&gt;Ignore everything below this i tried copying parts and its did not work, and when i try to edit i see nothing below this line.&lt;/P&gt;&lt;DIV id="stcpDiv" style="position: absolute; top: -1999px; left: -1988px;"&gt;policy-map type inspect to-self-pmap&lt;BR /&gt;&amp;nbsp;class type inspect to-self&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop - See more at: https://supportforums.cisco.com/discussion/12537016/zone-based-fw-blocking-some-eigrp-routes#sthash.qD6nVnxe.dpuf&lt;/DIV&gt;&lt;DIV id="stcpDiv" style="position: absolute; top: -1999px; left: -1988px;"&gt;policy-map type inspect to-self-pmap&lt;BR /&gt;&amp;nbsp;class type inspect to-self&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop - See more at: https://supportforums.cisco.com/discussion/12537016/zone-based-fw-blocking-some-eigrp-routes#sthash.qD6nVnxe.dpuf&lt;/DIV&gt;&lt;DIV id="stcpDiv" style="position: absolute; top: -1999px; left: -1988px;"&gt;policy-map type inspect to-self-pmap&lt;BR /&gt;&amp;nbsp;class type inspect to-self&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop - See more at: https://supportforums.cisco.com/discussion/12537016/zone-based-fw-blocking-some-eigrp-routes#sthash.qD6nVnxe.dpuf&lt;/DIV&gt;</description>
      <pubDate>Thu, 18 Jun 2015 16:46:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-fw-blocking-some-eigrp-routes/m-p/2681759#M190432</guid>
      <dc:creator>Mike Buyarski</dc:creator>
      <dc:date>2015-06-18T16:46:55Z</dc:date>
    </item>
  </channel>
</rss>

