<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic i was able to configure the in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/zbfw-and-secure-access/m-p/2715463#M190614</link>
    <description>&lt;P&gt;i was able to configure the vpn on our router with the setting i have for zone based and it is connecting just fine with out having to change anything on the acl. just as a note i did put the tunnel in the same zone as the inside interface. i dont know if that means anything for your setup but i figured i mention it.&lt;/P&gt;</description>
    <pubDate>Wed, 17 Jun 2015 19:46:35 GMT</pubDate>
    <dc:creator>Mike Buyarski</dc:creator>
    <dc:date>2015-06-17T19:46:35Z</dc:date>
    <item>
      <title>ZBFW and secure access</title>
      <link>https://community.cisco.com/t5/network-security/zbfw-and-secure-access/m-p/2715458#M190586</link>
      <description>&lt;P&gt;I just started setting up my first Zone based firewall and would like some info on how i would secure access into the router. Specifically how i would set the router to only allow access from specific IP's (i.e. the static IP's that we have at our Corp office)? My first thought was to maybe adding the permits to the ACL Like i did for the older CBAC FW's but that seemed to do nothing.&amp;nbsp; I attached the ZBFW config i have on the router.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:07:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbfw-and-secure-access/m-p/2715458#M190586</guid>
      <dc:creator>Mike Buyarski</dc:creator>
      <dc:date>2019-03-12T06:07:10Z</dc:date>
    </item>
    <item>
      <title>Hi,Traffic to the router</title>
      <link>https://community.cisco.com/t5/network-security/zbfw-and-secure-access/m-p/2715459#M190591</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Traffic to the router itself &amp;nbsp;is controlled self zone. You need to configure policies between other zones and the self zone.&lt;/P&gt;&lt;P&gt;Have a look at the following doc:&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/support/docs/security/ios-firewall/98628-zone-design-guide.html"&gt;http://www.cisco.com/c/en/us/support/docs/security/ios-firewall/98628-zone-design-guide.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jun 2015 23:22:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbfw-and-secure-access/m-p/2715459#M190591</guid>
      <dc:creator>johnd2310</dc:creator>
      <dc:date>2015-06-15T23:22:23Z</dc:date>
    </item>
    <item>
      <title>Yea that seemed to work well</title>
      <link>https://community.cisco.com/t5/network-security/zbfw-and-secure-access/m-p/2715460#M190596</link>
      <description>&lt;P&gt;Yea that seemed to work well when i tested it on a router.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jun 2015 21:35:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbfw-and-secure-access/m-p/2715460#M190596</guid>
      <dc:creator>Mike Buyarski</dc:creator>
      <dc:date>2015-06-16T21:35:20Z</dc:date>
    </item>
    <item>
      <title>I have followed all the</title>
      <link>https://community.cisco.com/t5/network-security/zbfw-and-secure-access/m-p/2715461#M190603</link>
      <description>&lt;P&gt;I have followed all the guidelines in this document and tested but the connection to the self zone using SSH (or anything really) doesn't seem to work. The identification of the self zone traffic takes place fine on the way in but doesn't work on the return path. I get a drop log for the return traffic (seen on console session)&lt;/P&gt;&lt;P&gt;Im not sure how else to identify the traffic outside of the ACL since it covers everything anyway&lt;/P&gt;&lt;P&gt;eg&lt;/P&gt;&lt;P&gt;access-list 123 permit esp any any&lt;BR /&gt;access-list 123 permit udp any any eq 4500&lt;BR /&gt;access-list 123 permit ah any any&lt;BR /&gt;access-list 123 permit udp any any eq 500&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jun 2015 17:18:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbfw-and-secure-access/m-p/2715461#M190603</guid>
      <dc:creator>Paul M1</dc:creator>
      <dc:date>2015-06-17T17:18:39Z</dc:date>
    </item>
    <item>
      <title>I attached what i added to</title>
      <link>https://community.cisco.com/t5/network-security/zbfw-and-secure-access/m-p/2715462#M190610</link>
      <description>&lt;P&gt;I attached what i added to the ZBFW. i few points you have to setup zone pairs going from internet to self and reverse so self to internet. The setup i have does not have the VPN part but i will be adding later on when i get a chance to test it.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jun 2015 18:06:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbfw-and-secure-access/m-p/2715462#M190610</guid>
      <dc:creator>Mike Buyarski</dc:creator>
      <dc:date>2015-06-17T18:06:17Z</dc:date>
    </item>
    <item>
      <title>i was able to configure the</title>
      <link>https://community.cisco.com/t5/network-security/zbfw-and-secure-access/m-p/2715463#M190614</link>
      <description>&lt;P&gt;i was able to configure the vpn on our router with the setting i have for zone based and it is connecting just fine with out having to change anything on the acl. just as a note i did put the tunnel in the same zone as the inside interface. i dont know if that means anything for your setup but i figured i mention it.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jun 2015 19:46:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbfw-and-secure-access/m-p/2715463#M190614</guid>
      <dc:creator>Mike Buyarski</dc:creator>
      <dc:date>2015-06-17T19:46:35Z</dc:date>
    </item>
    <item>
      <title>Ive included the full self</title>
      <link>https://community.cisco.com/t5/network-security/zbfw-and-secure-access/m-p/2715464#M190617</link>
      <description>&lt;P&gt;Ive included the full self zone config Ive used below. It is total overkill but I couldn't find the error so I over did it on the maps. There are bidirectional rules for both interfaces ie all zones. And Ive included the log I get which shows that the traffic is not hitting a class which picks it up. But this is on the way out (SELFIN=outbound from router) and the &lt;STRONG&gt;sh policy-map&lt;/STRONG&gt; output shows the INSELF policy picking up the SSH inbound connection packets just fine&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ip access-list ext TFTP&lt;BR /&gt;&amp;nbsp;permit tcp any any eq 8099&lt;BR /&gt;&amp;nbsp;permit udp any any eq 69&lt;/P&gt;&lt;P&gt;ip access-list ext SSH&lt;BR /&gt;&amp;nbsp;permit tcp any any eq 22&lt;BR /&gt;&amp;nbsp;permit tcp any any eq 443&lt;/P&gt;&lt;P&gt;ip access-list ext SNMP&lt;BR /&gt;&amp;nbsp;permit udp any any eq 161&lt;BR /&gt;&amp;nbsp;permit udp any any eq 162&lt;/P&gt;&lt;P&gt;ip access-list extended ESP&lt;BR /&gt;&amp;nbsp;permit esp any any&lt;BR /&gt;&amp;nbsp;permit ah any any&lt;BR /&gt;&amp;nbsp;permit udp any any eq 500&lt;BR /&gt;&amp;nbsp;permit udp any any eq non500-isakmp&lt;/P&gt;&lt;P&gt;class-map type inspect match-any SELFCLASS1&lt;BR /&gt;&amp;nbsp;match access-group name ESP&lt;BR /&gt;&amp;nbsp;match access-group name SSH&lt;BR /&gt;&amp;nbsp;match access-group name SNMP&lt;BR /&gt;&amp;nbsp;match access-group name TFTP&lt;BR /&gt;class-map type inspect match-any SELFCLASS2&lt;BR /&gt;&amp;nbsp;match protocol h323&lt;BR /&gt;&amp;nbsp;match protocol icmp&lt;BR /&gt;&amp;nbsp;match protocol tcp&lt;BR /&gt;&amp;nbsp;match protocol udp&lt;/P&gt;&lt;P&gt;policy-map type inspect OUTSELF&lt;BR /&gt;&amp;nbsp;class type inspect SELFCLASS1&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt;&amp;nbsp;class type inspect SELFCLASS2&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop log&lt;/P&gt;&lt;P&gt;policy-map type inspect SELFOUT&lt;BR /&gt;&amp;nbsp;class type inspect SELFCLASS1&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt;&amp;nbsp;class type inspect SELFCLASS2&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop log&lt;/P&gt;&lt;P&gt;policy-map type inspect INSELF&lt;BR /&gt;&amp;nbsp;class type inspect SELFCLASS1&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt;&amp;nbsp;class type inspect SELFCLASS2&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop log&lt;/P&gt;&lt;P&gt;policy-map type inspect SELFIN&lt;BR /&gt;&amp;nbsp;class type inspect SELFCLASS1&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt;&amp;nbsp;class type inspect SELFCLASS2&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop log&lt;/P&gt;&lt;P&gt;zone-pair security OUTSELF source OUTSIDE destination self&lt;BR /&gt;&amp;nbsp;service-policy type inspect OUTSELF&lt;BR /&gt;zone-pair security SELFOUT source self destination OUTSIDE&lt;BR /&gt;&amp;nbsp;service-policy type inspect SELFOUT&lt;BR /&gt;zone-pair security INSELF source INSIDE destination self&lt;BR /&gt;&amp;nbsp;service-policy type inspect INSELF&lt;BR /&gt;zone-pair security SELFIN source self destination INSIDE&lt;BR /&gt;&amp;nbsp;service-policy type inspect SELFIN&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Syslogs&lt;/P&gt;&lt;P&gt;&amp;nbsp;Jun 17 16:28:04.612: %FW-6-DROP_PKT: Dropping Unknown-l4 session 192.168.178.50:0 192.168.178.53:0 on zone-pair SELFIN class class-default due to&amp;nbsp; DROP action found in policy-map with ip ident 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;UPDATE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;I&lt;/STRONG&gt;ve fixed it - the ACLs need the inverse port identification specifying.&lt;/P&gt;&lt;P&gt;ie&lt;/P&gt;&lt;P&gt;ip access-list ext TFTP&lt;BR /&gt;&amp;nbsp;permit tcp any any eq 8099&lt;BR /&gt;&amp;nbsp;permit tcp any eq 8099&amp;nbsp;any&lt;BR /&gt;&amp;nbsp;permit udp any any eq 69&lt;BR /&gt;&amp;nbsp;permit udp any eq 69 any&lt;/P&gt;&lt;P&gt;ip access-list ext SSH&lt;BR /&gt;&amp;nbsp;permit tcp any any eq 22&lt;BR /&gt;&amp;nbsp;permit tcp any eq 22 any&lt;BR /&gt;&amp;nbsp;permit tcp any any eq 443&lt;BR /&gt;&amp;nbsp;permit tcp any eq 443 any&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jun 2015 15:34:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbfw-and-secure-access/m-p/2715464#M190617</guid>
      <dc:creator>Paul M1</dc:creator>
      <dc:date>2015-06-18T15:34:04Z</dc:date>
    </item>
  </channel>
</rss>

