<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic class-map type inspect match in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fw-6-drop-pkt-dropping-icmp-session/m-p/2675151#M192115</link>
    <description>&lt;P&gt;class-map type inspect match-any CM_LAN_TRAFFIC&lt;BR /&gt;&amp;nbsp;match protocol tcp&lt;BR /&gt;&amp;nbsp;match protocol udp&lt;BR /&gt;&amp;nbsp;match protocol icmp&lt;BR /&gt;class-map type inspect match-all CM_WAN_TRAFFIC&lt;BR /&gt;&amp;nbsp;match access-group name ACL_WAN&amp;gt;LAN&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect PM_WAN&amp;gt;LAN&lt;BR /&gt;&amp;nbsp;class type inspect CM_WAN_TRAFFIC&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop log&lt;BR /&gt;policy-map type inspect PM_LAN&amp;gt;WAN&lt;BR /&gt;&amp;nbsp;class type inspect CM_LAN_TRAFFIC&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop log&lt;/P&gt;</description>
    <pubDate>Thu, 30 Apr 2015 15:26:17 GMT</pubDate>
    <dc:creator>sdawson14</dc:creator>
    <dc:date>2015-04-30T15:26:17Z</dc:date>
    <item>
      <title>%FW-6-DROP_PKT: Dropping icmp session</title>
      <link>https://community.cisco.com/t5/network-security/fw-6-drop-pkt-dropping-icmp-session/m-p/2675147#M192111</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am getting an error message on a Cisco 887 -&amp;nbsp;*Apr 29 13:47:39.901: %FW-6-DROP_PKT: Dropping icmp session 37.157.53.34:0 192.168.1.58:0 on zone-pair ZP_WAN&amp;gt;LAN class class-default due to &amp;nbsp;DROP action found in policy-map with ip ident 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unfortunately I don't know much about the zone based firewall which seems to be the problem, the firewall configuration is below:&lt;/P&gt;&lt;P&gt;zone security LAN&lt;BR /&gt;zone security WAN&lt;BR /&gt;zone-pair security ZP_LAN&amp;gt;WAN source LAN destination WAN&lt;BR /&gt;&amp;nbsp;service-policy type inspect PM_LAN&amp;gt;WAN&lt;BR /&gt;zone-pair security ZP_WAN&amp;gt;LAN source WAN destination LAN&lt;BR /&gt;&amp;nbsp;service-policy type inspect PM_WAN&amp;gt;LAN&lt;/P&gt;&lt;P&gt;What is going wrong? I am unable to SSH onto the device as well!&lt;/P&gt;&lt;P&gt;Any help would be amazing! Thank you all!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Simon&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:51:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fw-6-drop-pkt-dropping-icmp-session/m-p/2675147#M192111</guid>
      <dc:creator>sdawson14</dc:creator>
      <dc:date>2019-03-12T05:51:51Z</dc:date>
    </item>
    <item>
      <title>Hi,I think as per the ICMP</title>
      <link>https://community.cisco.com/t5/network-security/fw-6-drop-pkt-dropping-icmp-session/m-p/2675148#M192112</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I think as per the ICMP not working through the ZBF policies , you need to either inspect the ICMP traffic or Pass this traffic through both the Inbound policies on both the interfaces.&lt;/P&gt;&lt;P&gt;As per the SSH not working , do you have any self zone ? If not , check the Line configuration and related SSH configuration.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2015 14:38:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fw-6-drop-pkt-dropping-icmp-session/m-p/2675148#M192112</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2015-04-29T14:38:36Z</dc:date>
    </item>
    <item>
      <title>Hiyou have a policy applied</title>
      <link>https://community.cisco.com/t5/network-security/fw-6-drop-pkt-dropping-icmp-session/m-p/2675149#M192113</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;you have a policy applied to the wan and lan , this policy must be blocking those specific services , you need to check exactly what the policy is at and tweak it to allow what you want or disable zone of the interface by removing the service-policy&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2015 14:40:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fw-6-drop-pkt-dropping-icmp-session/m-p/2675149#M192113</guid>
      <dc:creator>Mark Malone</dc:creator>
      <dc:date>2015-04-29T14:40:33Z</dc:date>
    </item>
    <item>
      <title>HI. Can you please post the</title>
      <link>https://community.cisco.com/t5/network-security/fw-6-drop-pkt-dropping-icmp-session/m-p/2675150#M192114</link>
      <description>&lt;P&gt;HI. Can you please post&amp;nbsp;the following output from your config?&lt;/P&gt;&lt;P&gt;These 2 policy maps:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;PM_LAN&amp;gt;WAN&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;PM_WAN&amp;gt;LAN&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;And the Class Maps&amp;nbsp;that are configured under those policy maps&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2015 11:39:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fw-6-drop-pkt-dropping-icmp-session/m-p/2675150#M192114</guid>
      <dc:creator>Andre Neethling</dc:creator>
      <dc:date>2015-04-30T11:39:33Z</dc:date>
    </item>
    <item>
      <title>class-map type inspect match</title>
      <link>https://community.cisco.com/t5/network-security/fw-6-drop-pkt-dropping-icmp-session/m-p/2675151#M192115</link>
      <description>&lt;P&gt;class-map type inspect match-any CM_LAN_TRAFFIC&lt;BR /&gt;&amp;nbsp;match protocol tcp&lt;BR /&gt;&amp;nbsp;match protocol udp&lt;BR /&gt;&amp;nbsp;match protocol icmp&lt;BR /&gt;class-map type inspect match-all CM_WAN_TRAFFIC&lt;BR /&gt;&amp;nbsp;match access-group name ACL_WAN&amp;gt;LAN&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect PM_WAN&amp;gt;LAN&lt;BR /&gt;&amp;nbsp;class type inspect CM_WAN_TRAFFIC&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop log&lt;BR /&gt;policy-map type inspect PM_LAN&amp;gt;WAN&lt;BR /&gt;&amp;nbsp;class type inspect CM_LAN_TRAFFIC&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop log&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2015 15:26:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fw-6-drop-pkt-dropping-icmp-session/m-p/2675151#M192115</guid>
      <dc:creator>sdawson14</dc:creator>
      <dc:date>2015-04-30T15:26:17Z</dc:date>
    </item>
    <item>
      <title>Hi. It's quite possible that</title>
      <link>https://community.cisco.com/t5/network-security/fw-6-drop-pkt-dropping-icmp-session/m-p/2675152#M192116</link>
      <description>&lt;P&gt;Hi. It's quite possible that you are nit allowing ICMP from your WAN to LAN service policy. &amp;nbsp;That is a good thing, unless you need to allow ping from the WAN interface. &amp;nbsp;Are you aware of any icmp traffic coming in from the WAN? If not then someone is trying to ping your router. If you need to allow icmp then all you need to do is add a permit icmp line to the access list&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;ACL_WAN&amp;gt;LAN&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2015 17:32:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fw-6-drop-pkt-dropping-icmp-session/m-p/2675152#M192116</guid>
      <dc:creator>Andre Neethling</dc:creator>
      <dc:date>2015-04-30T17:32:10Z</dc:date>
    </item>
  </channel>
</rss>

