<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic okay...but do change your IP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/zbf-and-loopback-interfaces/m-p/2653921#M194999</link>
    <description>&lt;P&gt;okay...but do change your IP scheme&lt;/P&gt;</description>
    <pubDate>Wed, 15 Apr 2015 18:40:56 GMT</pubDate>
    <dc:creator>Pranay Prasoon</dc:creator>
    <dc:date>2015-04-15T18:40:56Z</dc:date>
    <item>
      <title>ZBF and loopback interfaces</title>
      <link>https://community.cisco.com/t5/network-security/zbf-and-loopback-interfaces/m-p/2653918#M194996</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In my ZBF setup, I assign the physical and logical interface (tunnel)&amp;nbsp;to different zones.&lt;/P&gt;&lt;P&gt;I.E. G0/0 is Trusted zone and Tunnel1 is assigned to a Tunnel zone.&lt;/P&gt;&lt;P&gt;Dynamic NAT is tied to the Loopback1 interface but this interface is not assigned to a zone.&lt;/P&gt;&lt;P&gt;My setup is fully function but am now wondering if I missed something BIG.&amp;nbsp; My understanding is ALL interfaces MUST be assigned to a zone to enable INTER-zone and INTRA-zone communications. Perhaps this rule does not apply to traffic originating from the router itself.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My questions is, do loopback interfaces need to be assigned to a zone to communicate with other zones on&amp;nbsp;the same router?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Frank&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:46:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-and-loopback-interfaces/m-p/2653918#M194996</guid>
      <dc:creator>fsebera</dc:creator>
      <dc:date>2019-03-12T05:46:49Z</dc:date>
    </item>
    <item>
      <title>Nope..if self zone is not</title>
      <link>https://community.cisco.com/t5/network-security/zbf-and-loopback-interfaces/m-p/2653919#M194997</link>
      <description>&lt;P&gt;Nope..if self zone is not configured on router, then loopback belongs to router and you don't need it in a zone to communicate to other zone.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2015 18:28:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-and-loopback-interfaces/m-p/2653919#M194997</guid>
      <dc:creator>Pranay Prasoon</dc:creator>
      <dc:date>2015-04-15T18:28:55Z</dc:date>
    </item>
    <item>
      <title> Sorry, I should have</title>
      <link>https://community.cisco.com/t5/network-security/zbf-and-loopback-interfaces/m-p/2653920#M194998</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sorry, I should have indicated I have a self zone configured (albeit perhaps incorrectly :()&lt;/P&gt;&lt;P&gt;I don't want to impose but I could provide my config for review!!!&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Frank&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2015 18:38:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-and-loopback-interfaces/m-p/2653920#M194998</guid>
      <dc:creator>fsebera</dc:creator>
      <dc:date>2015-04-15T18:38:29Z</dc:date>
    </item>
    <item>
      <title>okay...but do change your IP</title>
      <link>https://community.cisco.com/t5/network-security/zbf-and-loopback-interfaces/m-p/2653921#M194999</link>
      <description>&lt;P&gt;okay...but do change your IP scheme&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2015 18:40:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-and-loopback-interfaces/m-p/2653921#M194999</guid>
      <dc:creator>Pranay Prasoon</dc:creator>
      <dc:date>2015-04-15T18:40:56Z</dc:date>
    </item>
    <item>
      <title>Already SANITIZED due to</title>
      <link>https://community.cisco.com/t5/network-security/zbf-and-loopback-interfaces/m-p/2653922#M195000</link>
      <description>&lt;P&gt;Already SANITIZED due to backend private connections!!!!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11px;"&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;R10# sh run&lt;BR /&gt;! Last configuration change at 16:48:12 EST Tue Apr 14 2015 by ?&lt;BR /&gt;! NVRAM config last updated at 16:48:15 EST Tue Apr 14 2015 by ?&lt;BR /&gt;! NVRAM config last updated at 16:48:15 EST Tue Apr 14 2015 by ?&lt;BR /&gt;version 15.1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;no service pad&lt;BR /&gt;service tcp-keepalives-in&lt;BR /&gt;service tcp-keepalives-out&lt;BR /&gt;service timestamps debug datetime localtime&lt;BR /&gt;service timestamps log datetime localtime&lt;BR /&gt;service password-encryption&lt;BR /&gt;no service dhcp&lt;BR /&gt;!&lt;BR /&gt;hostname R10&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot system flash:c1841-advsecurityk9-mz.151-4.M10.bin&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;logging userinfo&lt;BR /&gt;logging buffered 32768&lt;BR /&gt;!&lt;BR /&gt;clock timezone EST -5 0&lt;BR /&gt;crypto pki token default removal timeout 0&lt;BR /&gt;!&lt;BR /&gt;crypto pki trustpoint TP-self-signed-1637678459&lt;BR /&gt;&amp;nbsp;enrollment selfsigned&lt;BR /&gt;&amp;nbsp;subject-name cn=IOS-Self-Signed-Certificate-1637678459&lt;BR /&gt;&amp;nbsp;revocation-check none&lt;BR /&gt;&amp;nbsp;rsakeypair TP-self-signed-1637678459&lt;BR /&gt;!&lt;BR /&gt;crypto pki certificate chain TP-self-signed-1637678459&lt;BR /&gt;&amp;nbsp;certificate self-signed 01&lt;BR /&gt;&amp;nbsp; 3082022B 30820194 A0030201 02020101 300D0609 2A864886 F70D0101 05050030&lt;BR /&gt;&amp;nbsp; 31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274&lt;BR /&gt;&amp;nbsp; --snip--&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; quit&lt;BR /&gt;dot11 syslog&lt;BR /&gt;no ip source-route&lt;BR /&gt;no ip gratuitous-arps&lt;BR /&gt;ip dhcp bootp ignore&lt;BR /&gt;!&lt;BR /&gt;ip cef&lt;BR /&gt;no ip bootp server&lt;BR /&gt;no ip domain lookup&lt;BR /&gt;!&lt;BR /&gt;multilink bundle-name authenticated&lt;BR /&gt;!&lt;BR /&gt;vtp version 2&lt;BR /&gt;username ? privilege 15 password --gone--&lt;BR /&gt;!&lt;BR /&gt;redundancy&lt;BR /&gt;!&lt;BR /&gt;ip tcp selective-ack&lt;BR /&gt;ip tcp synwait-time 10&lt;BR /&gt;ip ssh time-out 20&lt;BR /&gt;ip ssh version 2&lt;BR /&gt;!&lt;BR /&gt;&lt;SPAN style="color: rgb(0, 0, 255);"&gt;&lt;STRONG&gt;class-map type inspect match-all TELNET&lt;BR /&gt;&amp;nbsp;match access-group name TELNET&lt;BR /&gt;&amp;nbsp;match protocol telnet&lt;BR /&gt;class-map type inspect match-all OSPF&lt;BR /&gt;&amp;nbsp;match access-group name OSPF&lt;BR /&gt;class-map type inspect match-all ISAKMP&lt;BR /&gt;&amp;nbsp;match access-group name ISAKMP&lt;BR /&gt;class-map type inspect match-all OUTBOUND&lt;BR /&gt;&amp;nbsp;match protocol icmp&lt;BR /&gt;class-map type inspect match-all SSH&lt;BR /&gt;&amp;nbsp;match access-group name SSH&lt;BR /&gt;&amp;nbsp;match protocol ssh&lt;BR /&gt;class-map type inspect match-all IPSEC&lt;BR /&gt;&amp;nbsp;match access-group name IPSEC&lt;BR /&gt;class-map type inspect match-any WEB&lt;BR /&gt;&amp;nbsp;match protocol http&lt;BR /&gt;&amp;nbsp;match protocol https&lt;BR /&gt;class-map type inspect match-all BGP&lt;BR /&gt;&amp;nbsp;match access-group name BGP&lt;BR /&gt;class-map type inspect match-any ALLOWED&lt;BR /&gt;&amp;nbsp;match protocol ssh&lt;BR /&gt;&amp;nbsp;match protocol https&lt;BR /&gt;&amp;nbsp;match protocol telnet&lt;BR /&gt;&amp;nbsp;match protocol icmp&lt;BR /&gt;&amp;nbsp;match access-group name HTTP-REDIR&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect OUTBOUND&lt;BR /&gt;&amp;nbsp;class type inspect OUTBOUND&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt;policy-map type inspect TO-AWS2&lt;BR /&gt;&amp;nbsp;class type inspect ALLOWED&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;policy-map type inspect TO-AWS1&lt;BR /&gt;&amp;nbsp;class type inspect ALLOWED&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;policy-map type inspect INBOUND&lt;BR /&gt;&amp;nbsp;class type inspect IPSEC&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt;&amp;nbsp;class type inspect ISAKMP&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt;&amp;nbsp;class type inspect OSPF&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt;&amp;nbsp;class type inspect BGP&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt;&amp;nbsp;class type inspect TELNET&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt;&amp;nbsp;class type inspect SSH&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt;&amp;nbsp;class type inspect WEB&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;!&lt;BR /&gt;zone security TUN1&lt;BR /&gt;zone security TUN2&lt;BR /&gt;zone security TRUSTED&lt;BR /&gt;zone-pair security F0/0-&amp;gt;TUN1 source TRUSTED destination TUN1&lt;BR /&gt;&amp;nbsp;service-policy type inspect TO-AWS1&lt;BR /&gt;zone-pair security F0/0-&amp;gt;TUN2 source TRUSTED destination TUN2&lt;BR /&gt;&amp;nbsp;service-policy type inspect TO-AWS2&lt;BR /&gt;zone-pair security INBOUND source TRUSTED destination self&lt;BR /&gt;&amp;nbsp;service-policy type inspect INBOUND&lt;BR /&gt;zone-pair security OUTBOUND source self destination TRUSTED&lt;BR /&gt;&amp;nbsp;service-policy type inspect OUTBOUND&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;!&lt;BR /&gt;crypto keyring KEYRING-VPN-344BFC4B-0&lt;BR /&gt;&amp;nbsp; local-address 192.168.90.1&lt;BR /&gt;&amp;nbsp; pre-shared-key address 192.168.0.34 key --gone--&lt;BR /&gt;crypto keyring KEYRING-VPN-344BFC4B-1&lt;BR /&gt;&amp;nbsp; local-address 192.168.90.1&lt;BR /&gt;&amp;nbsp; pre-shared-key address 192.168.0.50 key --gone--&lt;BR /&gt;!&lt;BR /&gt;crypto isakmp policy 200&lt;BR /&gt;&amp;nbsp;encr aes&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 28800&lt;BR /&gt;!&lt;BR /&gt;crypto isakmp policy 201&lt;BR /&gt;&amp;nbsp;encr aes&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 28800&lt;BR /&gt;crypto isakmp keepalive 10 10&lt;BR /&gt;crypto isakmp profile ISAKMP-VPN-344BFC4B-0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; keyring KEYRING-VPN-344BFC4B-0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; match identity address 192.168.0.34 255.255.255.255&lt;BR /&gt;&amp;nbsp;&amp;nbsp; local-address 192.168.90.1&lt;BR /&gt;crypto isakmp profile ISAKMP-VPN-344BFC4B-1&lt;BR /&gt;&amp;nbsp;&amp;nbsp; keyring KEYRING-VPN-344BFC4B-1&lt;BR /&gt;&amp;nbsp;&amp;nbsp; match identity address 192.168.0.50 255.255.255.255&lt;BR /&gt;&amp;nbsp;&amp;nbsp; local-address 192.168.90.1&lt;BR /&gt;!&lt;BR /&gt;crypto ipsec security-association replay window-size 128&lt;BR /&gt;!&lt;BR /&gt;crypto ipsec transform-set IPSEC-PROP-VPN-344BFC4B-0 esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set IPSEC-PROP-VPN-344BFC4B-1 esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec df-bit clear&lt;BR /&gt;!&lt;BR /&gt;crypto ipsec profile IPSEC-VPN-344BFC4B-0&lt;BR /&gt;&amp;nbsp;set transform-set IPSEC-PROP-VPN-344BFC4B-0&lt;BR /&gt;&amp;nbsp;set pfs group2&lt;BR /&gt;!&lt;BR /&gt;crypto ipsec profile IPSEC-VPN-344BFC4B-1&lt;BR /&gt;&amp;nbsp;set transform-set IPSEC-PROP-VPN-344BFC4B-1&lt;BR /&gt;&amp;nbsp;set pfs group2&lt;BR /&gt;!&lt;BR /&gt;&lt;SPAN style="color: rgb(178, 34, 34);"&gt;&lt;STRONG&gt;interface Loopback1&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: rgb(0, 0, 0);"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;ip address 172.16.6.1 255.255.255.0&lt;/SPAN&gt;&lt;BR /&gt;!&lt;BR /&gt;&lt;STRONG&gt;interface Tunnel1&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp;description BORDER1&lt;BR /&gt;&amp;nbsp;ip address xxx.yyy.zzz.22 255.255.255.252&lt;BR /&gt;&amp;nbsp;ip flow ingress&lt;BR /&gt;&amp;nbsp;ip flow egress&lt;BR /&gt;&amp;nbsp;ip nat outside&lt;BR /&gt;&amp;nbsp;ip virtual-reassembly in&lt;BR /&gt;&lt;SPAN style="color: rgb(0, 0, 255);"&gt;&lt;STRONG&gt;&amp;nbsp;zone-member security TUN1&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;ip tcp adjust-mss 1387&lt;BR /&gt;&amp;nbsp;tunnel source 192.168.90.1&lt;BR /&gt;&amp;nbsp;tunnel mode ipsec ipv4&lt;BR /&gt;&amp;nbsp;tunnel destination 192.168.0.34&lt;BR /&gt;&amp;nbsp;tunnel protection ipsec profile IPSEC-VPN-344BFC4B-0&lt;BR /&gt;!&lt;BR /&gt;&lt;STRONG&gt;interface Tunnel2&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp;description BORDER2&lt;BR /&gt;&amp;nbsp;ip address xxx.yyy.zzz.18 255.255.255.252&lt;BR /&gt;&amp;nbsp;ip flow ingress&lt;BR /&gt;&amp;nbsp;ip flow egress&lt;BR /&gt;&amp;nbsp;ip nat outside&lt;BR /&gt;&amp;nbsp;ip virtual-reassembly in&lt;BR /&gt;&amp;nbsp;&lt;SPAN style="color: rgb(0, 0, 255);"&gt;&lt;STRONG&gt;zone-member security TUN2&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;ip tcp adjust-mss 1387&lt;BR /&gt;&amp;nbsp;tunnel source 192.168.90.1&lt;BR /&gt;&amp;nbsp;tunnel mode ipsec ipv4&lt;BR /&gt;&amp;nbsp;tunnel destination 192.168.0.50&lt;BR /&gt;&amp;nbsp;tunnel protection ipsec profile IPSEC-VPN-344BFC4B-1&lt;BR /&gt;!&lt;BR /&gt;&lt;STRONG&gt;interface FastEthernet0/0&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp;ip address 192.168.90.1 255.255.255.240&lt;BR /&gt;&amp;nbsp;ip flow ingress&lt;BR /&gt;&amp;nbsp;ip flow egress&lt;BR /&gt;&amp;nbsp;ip nat inside&lt;BR /&gt;&amp;nbsp;ip virtual-reassembly in&lt;BR /&gt;&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="color: rgb(0, 0, 255);"&gt;zone-member security TRUSTED&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp;load-interval 30&lt;BR /&gt;!&lt;BR /&gt;router ospf 110&lt;BR /&gt;&amp;nbsp;router-id 172.16.6.1&lt;BR /&gt;&amp;nbsp;redistribute bgp 6 subnets route-map AWS-NETS&lt;BR /&gt;&amp;nbsp;passive-interface default&lt;BR /&gt;&amp;nbsp;no passive-interface FastEthernet0/0&lt;BR /&gt;&amp;nbsp;network xxx.yyy.zzz.16 0.0.0.3 area 64&lt;BR /&gt;&amp;nbsp;network xxx.yyy.zzz.20 0.0.0.3 area 64&lt;BR /&gt;&amp;nbsp;network 172.16.6.0 0.0.0.255 area 64&lt;BR /&gt;&amp;nbsp;network 192.168.90.0 0.0.0.15 area 64&lt;BR /&gt;!&lt;BR /&gt;router bgp 6&lt;BR /&gt;&amp;nbsp;bgp router-id 172.16.6.1&lt;BR /&gt;&amp;nbsp;bgp log-neighbor-changes&lt;BR /&gt;&amp;nbsp;redistribute ospf 110 route-map OSPF-NETS&lt;BR /&gt;&amp;nbsp;neighbor xxx.yyy.zzz.17 remote-as 10&lt;BR /&gt;&amp;nbsp;neighbor xxx.yyy.zzz.17 description AWS2-Tun2&lt;BR /&gt;&amp;nbsp;neighbor xxx.yyy.zzz.17 soft-reconfiguration inbound&lt;BR /&gt;&amp;nbsp;neighbor xxx.yyy.zzz.17 prefix-list AWS-BORDER2 out&lt;BR /&gt;&amp;nbsp;neighbor xxx.yyy.zzz.21 remote-as 10&lt;BR /&gt;&amp;nbsp;neighbor xxx.yyy.zzz.21 description AWS1-Tun1&lt;BR /&gt;&amp;nbsp;neighbor xxx.yyy.zzz.21 soft-reconfiguration inbound&lt;BR /&gt;&amp;nbsp;neighbor xxx.yyy.zzz.21 prefix-list AWS-BORDER1 out&lt;BR /&gt;&amp;nbsp;maximum-paths 2&lt;BR /&gt;!&lt;BR /&gt;no ip forward-protocol nd&lt;BR /&gt;no ip forward-protocol udp netbios-ns&lt;BR /&gt;no ip forward-protocol udp netbios-dgm&lt;BR /&gt;no ip forward-protocol udp tacacs&lt;BR /&gt;!&lt;BR /&gt;ip http server&lt;BR /&gt;ip http authentication local&lt;BR /&gt;ip http secure-server&lt;BR /&gt;!&lt;BR /&gt;&lt;SPAN style="color: rgb(0, 0, 255);"&gt;&lt;STRONG&gt;ip nat pool LOOP1 172.16.6.1 172.16.6.1 netmask 255.255.255.0&lt;BR /&gt;ip nat inside source list HQ-AWS1-AWS2 pool LOOP1 overload&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;!&lt;BR /&gt;ip access-list standard AWS-NETS&lt;BR /&gt;&amp;nbsp;permit 172.16.3.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;permit 172.16.4.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;permit 172.16.5.0 0.0.0.255&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended HQ-AWS1-AWS2&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; tcp host xxx.yyy.zzz.18 eq bgp host xxx.yyy.zzz.17&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; tcp host xxx.yyy.zzz.18 host xxx.yyy.zzz.17 eq bgp&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; tcp host xxx.yyy.zzz.22 eq bgp host xxx.yyy.zzz.21&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; tcp host xxx.yyy.zzz.22 host xxx.yyy.zzz.21 eq bgp&lt;BR /&gt;&amp;nbsp;permit ip any any&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended HTTP-REDIR&lt;BR /&gt;&amp;nbsp;permit tcp 192.168.2.0 0.0.0.255 host 172.16.5.2 eq 9999&lt;BR /&gt;&amp;nbsp;permit tcp 192.168.2.0 0.0.0.255 host 172.16.5.1 eq 8888&lt;BR /&gt;&amp;nbsp;permit tcp 192.168.1.0 0.0.0.255 host 172.16.5.2 eq 9999&lt;BR /&gt;&amp;nbsp;permit tcp 192.168.1.0 0.0.0.255 host 172.16.5.1 eq 8888&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended IPSEC&lt;BR /&gt;&amp;nbsp;permit esp any any&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended ISAKMP&lt;BR /&gt;&amp;nbsp;permit udp any any eq isakmp&lt;BR /&gt;&amp;nbsp;permit udp any any eq non500-isakmp&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended OSPF&lt;BR /&gt;&amp;nbsp;permit ospf any any&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended SSH&lt;BR /&gt;&amp;nbsp;permit tcp 192.168.1.0 0.0.0.255 any eq 22&lt;BR /&gt;&amp;nbsp;permit tcp 192.168.2.0 0.0.0.255 any eq 22&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended TELNET&lt;BR /&gt;&amp;nbsp;permit tcp 192.168.1.0 0.0.0.255 any eq telnet&lt;BR /&gt;&amp;nbsp;permit tcp 192.168.2.0 0.0.0.255 any eq telnet&lt;BR /&gt;!&lt;BR /&gt;ip prefix-list AWS-BORDER1 seq 10 permit 172.16.4.0/24&lt;BR /&gt;ip prefix-list AWS-BORDER1 seq 30 permit 172.16.6.0/24&lt;BR /&gt;!&lt;BR /&gt;ip prefix-list AWS-BORDER2 seq 10 permit 172.16.3.0/24&lt;BR /&gt;ip prefix-list AWS-BORDER2 seq 30 permit 172.16.6.0/24&lt;BR /&gt;!&lt;BR /&gt;logging history size 100&lt;BR /&gt;logging history debugging&lt;BR /&gt;!&lt;BR /&gt;access-list 1 permit 2.0.0.0 0.0.0.15&lt;BR /&gt;access-list 1 permit 192.168.90.0 0.0.0.255&lt;BR /&gt;access-list 1 permit 172.16.6.0 0.0.0.255&lt;BR /&gt;access-list 1 permit 192.168.2.0 0.0.0.255&lt;BR /&gt;!&lt;BR /&gt;route-map OSPF-NETS permit 10&lt;BR /&gt;&amp;nbsp;match ip address 1&lt;BR /&gt;!&lt;BR /&gt;route-map AWS-NETS permit 10&lt;BR /&gt;&amp;nbsp;match ip address AWS-NETS&lt;BR /&gt;&amp;nbsp;set tag 10&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;&amp;nbsp;exec-timeout 3 0&lt;BR /&gt;&amp;nbsp;privilege level 15&lt;BR /&gt;&amp;nbsp;password&amp;nbsp;--gone--&lt;BR /&gt;&amp;nbsp;session-limit 2&lt;BR /&gt;&amp;nbsp;logging synchronous&lt;BR /&gt;&amp;nbsp;no vacant-message&lt;BR /&gt;&amp;nbsp;login&lt;BR /&gt;&amp;nbsp;transport preferred telnet&lt;BR /&gt;&amp;nbsp;transport output telnet&lt;BR /&gt;&amp;nbsp;speed 4800&lt;BR /&gt;line aux 0&lt;BR /&gt;&amp;nbsp;exec-timeout 0 1&lt;BR /&gt;&amp;nbsp;login&lt;BR /&gt;line vty 0 15&lt;BR /&gt;&amp;nbsp;exec-timeout 5 0&lt;BR /&gt;&amp;nbsp;privilege level 15&lt;BR /&gt;&amp;nbsp;password&amp;nbsp;--gone--&lt;BR /&gt;&amp;nbsp;absolute-timeout 15&lt;BR /&gt;&amp;nbsp;session-limit 2&lt;BR /&gt;&amp;nbsp;no vacant-message&lt;BR /&gt;&amp;nbsp;login local&lt;BR /&gt;&amp;nbsp;transport preferred telnet&lt;BR /&gt;&amp;nbsp;transport input telnet ssh&lt;BR /&gt;&amp;nbsp;transport output telnet&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2015 20:14:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-and-loopback-interfaces/m-p/2653922#M195000</guid>
      <dc:creator>fsebera</dc:creator>
      <dc:date>2015-04-15T20:14:32Z</dc:date>
    </item>
    <item>
      <title>okay so just that i</title>
      <link>https://community.cisco.com/t5/network-security/zbf-and-loopback-interfaces/m-p/2653923#M195001</link>
      <description>&lt;P&gt;okay so just that I am&amp;nbsp; understanding your requirement correctly,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is the traffic going to come from trusted zone, get NATed with the loop back IP address and go through tunnel interface?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2015 20:14:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-and-loopback-interfaces/m-p/2653923#M195001</guid>
      <dc:creator>Pranay Prasoon</dc:creator>
      <dc:date>2015-04-15T20:14:33Z</dc:date>
    </item>
    <item>
      <title>YES!!</title>
      <link>https://community.cisco.com/t5/network-security/zbf-and-loopback-interfaces/m-p/2653924#M195002</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;YES!!&lt;/P&gt;&lt;P&gt;...... but also traffic ingresses the TRUSTED interface to the router itself.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Frank&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2015 21:12:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-and-loopback-interfaces/m-p/2653924#M195002</guid>
      <dc:creator>fsebera</dc:creator>
      <dc:date>2015-04-15T21:12:46Z</dc:date>
    </item>
    <item>
      <title>you don't need to have loop</title>
      <link>https://community.cisco.com/t5/network-security/zbf-and-loopback-interfaces/m-p/2653925#M195003</link>
      <description>&lt;P&gt;you don't need to have loop back into any zone.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When traffic will come from trusted to tunnel, it will represent source from trusted and destination tunnel, even if the traffic changes its source IP address to NAT IP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You just need to make sure that your traffic is allowed from trusted to tunnel and tunnel to trusted if traffic is coming back tunneled.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2015 22:11:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-and-loopback-interfaces/m-p/2653925#M195003</guid>
      <dc:creator>Pranay Prasoon</dc:creator>
      <dc:date>2015-04-15T22:11:13Z</dc:date>
    </item>
    <item>
      <title> Thanks Pranay, Thanks for</title>
      <link>https://community.cisco.com/t5/network-security/zbf-and-loopback-interfaces/m-p/2653926#M195004</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks Pranay,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your assistance!&lt;/P&gt;&lt;P&gt;Frank&lt;/P&gt;</description>
      <pubDate>Thu, 16 Apr 2015 12:01:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-and-loopback-interfaces/m-p/2653926#M195004</guid>
      <dc:creator>fsebera</dc:creator>
      <dc:date>2015-04-16T12:01:57Z</dc:date>
    </item>
  </channel>
</rss>

