<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic i had forgotten about this in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/zone-based-firewall-one-way-access-to-a-zone/m-p/2459238#M238211</link>
    <description>&lt;P&gt;i had forgotten about this post!&lt;/P&gt;&lt;P&gt;PCI to LAN is allowed, LAN to PCI is not.&lt;/P&gt;&lt;P&gt;I played with the ACL's and have had it working. I'm marking your answer correct, as it does correct the one ACL issue I was having with assignment of the directions. Thanks for taking the time to respond!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 09 Sep 2014 12:17:57 GMT</pubDate>
    <dc:creator>jeffreymertz</dc:creator>
    <dc:date>2014-09-09T12:17:57Z</dc:date>
    <item>
      <title>zone based firewall one way access to a zone</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-one-way-access-to-a-zone/m-p/2459236#M238209</link>
      <description>&lt;P&gt;I am trying to create a PCI zone inside a network. I am using a 1941 with security and ZFW to restrict traffic. PCI can go out to&amp;nbsp;ASA and across to LAN. LAN can go to&amp;nbsp;ASA but not to PCI, finally ASA can go back to both PCI and LAN to send natted traffic inside to servers respectively. Important config info below. In testing I can't ping from PCI to a LAN machine, but I can ping the LAN interface IP on the router. From LAN I can ping LAN interface IP of router, but can't ping PCI interface of router (this is desired). But I need to be able to ping LAN from PCI, think a nofoward dmz in an ASA. Initiated traffic from PCI is god traffic and can go anywhere. LAN zone can only go to other LAN zone or ASA zone.&lt;/P&gt;&lt;P&gt;interface Embedded-Service-Engine0/0&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;description PCI Interface&lt;BR /&gt;&amp;nbsp;ip address 192.168.201.1 255.255.255.0&lt;BR /&gt;&amp;nbsp;zone-member security PCI&lt;BR /&gt;&amp;nbsp;duplex auto&lt;BR /&gt;&amp;nbsp;speed auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;description LAN Interface&lt;BR /&gt;&amp;nbsp;ip address 192.168.200.1 255.255.255.0&lt;BR /&gt;&amp;nbsp;ip access-group PCItest in&lt;BR /&gt;&amp;nbsp;zone-member security LAN&lt;BR /&gt;&amp;nbsp;duplex auto&lt;BR /&gt;&amp;nbsp;speed auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0/0&lt;BR /&gt;&amp;nbsp;switchport access vlan 3&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0/1&lt;BR /&gt;&amp;nbsp;switchport access vlan 2&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0/2&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0/3&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;&amp;nbsp;ip address 10.0.0.1 255.255.255.0&lt;BR /&gt;&amp;nbsp;zone-member security LAN&lt;BR /&gt;&amp;nbsp;ip tcp adjust-mss 1452&lt;BR /&gt;!&lt;BR /&gt;interface Vlan3&lt;BR /&gt;&amp;nbsp;description ASA INTERFACE&lt;BR /&gt;&amp;nbsp;ip address 172.16.20.1 255.255.255.0&lt;BR /&gt;&amp;nbsp;zone-member security ASA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ip access-list extended ASA-INBOUND-ACL&lt;BR /&gt;&amp;nbsp;permit ip 172.16.20.0 0.0.0.255 any&lt;BR /&gt;ip access-list extended LAN2any-ACL&lt;BR /&gt;&amp;nbsp;permit ip 192.168.200.0 0.0.0.255 any&lt;BR /&gt;&amp;nbsp;permit ip 10.0.0.0 0.0.0.255 any&lt;BR /&gt;&amp;nbsp;permit ip 192.168.5.0 0.0.0.255 any&lt;BR /&gt;&amp;nbsp;permit ip 192.168.50.0 0.0.0.255 any&lt;BR /&gt;ip access-list extended PCI2any-ACL&lt;BR /&gt;&amp;nbsp;permit ip 192.168.201.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;class-map type inspect match-all PCI-ASA-CLASS&lt;BR /&gt;&amp;nbsp;match access-group name PCI2any-ACL&lt;BR /&gt;class-map type inspect match-all ASA-PCI-CLASS&lt;BR /&gt;&amp;nbsp;match access-group name ASA-INBOUND-ACL&lt;BR /&gt;class-map type inspect match-all PCI-LAN-CLASS&lt;BR /&gt;&amp;nbsp;match access-group name PCI2any-ACL&lt;BR /&gt;class-map type inspect match-all LAN-ASA-CLASS&lt;BR /&gt;&amp;nbsp;match access-group name LAN2any-ACL&lt;BR /&gt;class-map type inspect match-all ASA-LAN-CLASS&lt;BR /&gt;&amp;nbsp;match access-group name ASA-INBOUND-ACL&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect LAN-ASA-POLICY&lt;BR /&gt;&amp;nbsp;class type inspect LAN-ASA-CLASS&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;policy-map type inspect ASA-LAN-POLICY&lt;BR /&gt;&amp;nbsp;class type inspect ASA-LAN-CLASS&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;policy-map type inspect ASA-PCI-POLICY&lt;BR /&gt;&amp;nbsp;class type inspect ASA-PCI-CLASS&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;policy-map type inspect PCI-LAN-POLICY&lt;BR /&gt;&amp;nbsp;class type inspect PCI-LAN-CLASS&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;policy-map type inspect PCI-ASA-POLICY&lt;BR /&gt;&amp;nbsp;class type inspect PCI-ASA-CLASS&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;!&lt;BR /&gt;zone security PCI&lt;BR /&gt;zone security LAN&lt;BR /&gt;zone security ASA&lt;BR /&gt;zone-pair security PCI-to-LAN source PCI destination LAN&lt;BR /&gt;&amp;nbsp;service-policy type inspect PCI-LAN-POLICY&lt;BR /&gt;zone-pair security PCI-to-ASA source PCI destination ASA&lt;BR /&gt;&amp;nbsp;service-policy type inspect PCI-ASA-POLICY&lt;BR /&gt;zone-pair security LAN-to-ASA source LAN destination ASA&lt;BR /&gt;&amp;nbsp;service-policy type inspect LAN-ASA-POLICY&lt;BR /&gt;zone-pair security ASA-to-PCI source ASA destination PCI&lt;BR /&gt;&amp;nbsp;service-policy type inspect ASA-PCI-POLICY&lt;BR /&gt;zone-pair security ASA-to-LAN source ASA destination LAN&lt;BR /&gt;&amp;nbsp;service-policy type inspect ASA-LAN-POLICY&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:14:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-one-way-access-to-a-zone/m-p/2459236#M238209</guid>
      <dc:creator>jeffreymertz</dc:creator>
      <dc:date>2019-03-12T04:14:21Z</dc:date>
    </item>
    <item>
      <title>First of all, this ACL is</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-one-way-access-to-a-zone/m-p/2459237#M238210</link>
      <description>&lt;P&gt;First of all, this ACL is wrongly configured or you have just placed it on the wrong interface:&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;description LAN Interface&lt;BR /&gt;&amp;nbsp;ip address 192.168.200.1 255.255.255.0&lt;BR /&gt;&amp;nbsp;&lt;STRONG&gt;ip access-group PCItest in&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip access-list extended PCI2any-ACL&lt;BR /&gt;&amp;nbsp;permit ip 192.168.201.0 0.0.0.255 any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;This is saying that a source IP of 192.168.201.0/24 will be entering the LAN interface and this is not the case. in any case I suggest removing this ACL from the interface.&lt;/P&gt;&lt;P&gt;As you are have not included a zone pair for LAN to the PCI interface IP you will not be able to ping from LAN to the PCI interface (from my understanding of your post this is what you are trying to achieve?)&lt;/P&gt;&lt;P&gt;You would need to explicitly permit this traffic since you have the interfaces placed in security zones.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip access-list extended LAN-to-PCI-ACL&lt;BR /&gt;&amp;nbsp;permit ip any host 192.168.201.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;class-map type inspect match-all LAN-PCI-CLASS&lt;BR /&gt;&amp;nbsp;match access-group name LAN-to-PCI-ACL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;policy-map type inspect LAN-PCI-POLICY&lt;BR /&gt;&amp;nbsp;class type inspect LAN-PCI-CLASS&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;zone-pair security LAN-to.PCI source LAN destination PCI&lt;BR /&gt;&amp;nbsp;service-policy type inspect LAN-PCI-POLICY&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Tue, 09 Sep 2014 12:00:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-one-way-access-to-a-zone/m-p/2459237#M238210</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-09-09T12:00:47Z</dc:date>
    </item>
    <item>
      <title>i had forgotten about this</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-one-way-access-to-a-zone/m-p/2459238#M238211</link>
      <description>&lt;P&gt;i had forgotten about this post!&lt;/P&gt;&lt;P&gt;PCI to LAN is allowed, LAN to PCI is not.&lt;/P&gt;&lt;P&gt;I played with the ACL's and have had it working. I'm marking your answer correct, as it does correct the one ACL issue I was having with assignment of the directions. Thanks for taking the time to respond!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Sep 2014 12:17:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-one-way-access-to-a-zone/m-p/2459238#M238211</guid>
      <dc:creator>jeffreymertz</dc:creator>
      <dc:date>2014-09-09T12:17:57Z</dc:date>
    </item>
  </channel>
</rss>

