<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Zone Firewall and ACLs in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/zone-firewall-and-acls/m-p/3907069#M24889</link>
    <description>&lt;P&gt;Hi Everybody&lt;/P&gt;&lt;P&gt;I have some problems with new ISR devices (like 4221, 4451 etc), bunch of old routers use same configuration with simple CBAC (ip inspect xxx) and incoming ACL on external interface (permit SSH from specific network, anti-spoofing, VPN and deny any), very simple.&lt;/P&gt;&lt;P&gt;But this configuration doesnt work with ISRs, i created Zone FW, assigned zones, but my old ACL blocks all HTTP traffic (maybe something else, but very easy to see it in HTTP). When i removed it, everything works fine, but i cannot open SSH only for specific addresses, dont know why but it doesnt work with ZBF.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not sure, ZBF sitting before or after NAT.. maybe this is a issue&lt;/P&gt;&lt;P&gt;thanks&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 12 Aug 2019 20:16:35 GMT</pubDate>
    <dc:creator>sergo777</dc:creator>
    <dc:date>2019-08-12T20:16:35Z</dc:date>
    <item>
      <title>Zone Firewall and ACLs</title>
      <link>https://community.cisco.com/t5/network-security/zone-firewall-and-acls/m-p/3907069#M24889</link>
      <description>&lt;P&gt;Hi Everybody&lt;/P&gt;&lt;P&gt;I have some problems with new ISR devices (like 4221, 4451 etc), bunch of old routers use same configuration with simple CBAC (ip inspect xxx) and incoming ACL on external interface (permit SSH from specific network, anti-spoofing, VPN and deny any), very simple.&lt;/P&gt;&lt;P&gt;But this configuration doesnt work with ISRs, i created Zone FW, assigned zones, but my old ACL blocks all HTTP traffic (maybe something else, but very easy to see it in HTTP). When i removed it, everything works fine, but i cannot open SSH only for specific addresses, dont know why but it doesnt work with ZBF.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not sure, ZBF sitting before or after NAT.. maybe this is a issue&lt;/P&gt;&lt;P&gt;thanks&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Aug 2019 20:16:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-firewall-and-acls/m-p/3907069#M24889</guid>
      <dc:creator>sergo777</dc:creator>
      <dc:date>2019-08-12T20:16:35Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Firewall and ACLs</title>
      <link>https://community.cisco.com/t5/network-security/zone-firewall-and-acls/m-p/3907077#M24891</link>
      <description>Hi,&lt;BR /&gt;Without seeing your configuration I wouldn't be able to identify the exact issue...but you would reference the real (private) IP address in the ZBFW ACLs. Also, if you were referring to connecting the local router itself via SSH then the zone would be "self" rather than outside.&lt;BR /&gt;&lt;BR /&gt;Upload your configuration and some debugs if you'd like some further pointers.&lt;BR /&gt;HTH</description>
      <pubDate>Mon, 12 Aug 2019 20:26:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-firewall-and-acls/m-p/3907077#M24891</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-08-12T20:26:05Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Firewall and ACLs</title>
      <link>https://community.cisco.com/t5/network-security/zone-firewall-and-acls/m-p/3907089#M24894</link>
      <description>&lt;P&gt;Yes sure! this is my config... i think part of it is wrong, just tried to play with zones...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and last part is my access list, when i add it to interface Cell 0/1/0, http traffic blocks... i tried to use it in the Class-map, but in this case it doesnt work at all&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any All_Protocols&lt;BR /&gt;match protocol tcp&lt;BR /&gt;match protocol udp&lt;BR /&gt;match protocol icmp&lt;BR /&gt;match protocol router&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect Trusted_to_Internet&lt;BR /&gt;class type inspect All_Protocols&lt;BR /&gt;inspect&lt;BR /&gt;class class-default&lt;BR /&gt;drop&lt;/P&gt;&lt;P&gt;policy-map type inspect OUTSIDE_IN_POLICY&lt;BR /&gt;class type inspect OUTSIDE_IN_CLASS&lt;BR /&gt;drop&lt;BR /&gt;class class-default&lt;BR /&gt;!&lt;BR /&gt;zone security INSIDE&lt;BR /&gt;zone security OUTSIDE&lt;/P&gt;&lt;P&gt;zone-pair security IN-TO-OUT source INSIDE destination OUTSIDE&lt;BR /&gt;service-policy type inspect Trusted_to_Internet&lt;BR /&gt;zone-pair security OUT-TO-IN source OUTSIDE destination INSIDE&lt;BR /&gt;service-policy type inspect OUTSIDE_IN_POLICY&lt;BR /&gt;--------------------------------&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;interface Cellular0/1/0&lt;BR /&gt;description TELUS-LTE&lt;BR /&gt;ip address negotiated&lt;BR /&gt;ip nat outside&lt;BR /&gt;ip access-group OUTSIDE_IN in&lt;BR /&gt;zone-member security OUTSIDE&lt;BR /&gt;dialer in-band&lt;BR /&gt;dialer-group 1&lt;BR /&gt;pulse-time 1&lt;/P&gt;&lt;P&gt;------------------------------&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0/1&lt;BR /&gt;description INTERNAL&lt;BR /&gt;ip address 10.1.1.1 255.255.255.0&lt;BR /&gt;ip nat inside&lt;BR /&gt;zone-member security INSIDE&lt;BR /&gt;negotiation auto&lt;BR /&gt;--------------------------------&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ip access-list extended INTERNET_IN&lt;BR /&gt;permit icmp any any echo&lt;BR /&gt;permit udp host 8.8.8.8 eq domain any&lt;BR /&gt;permit udp any any eq ntp&lt;BR /&gt;permit esp any any&lt;BR /&gt;permit udp any any eq isakmp&lt;BR /&gt;permit udp any any eq non500-isakmp&lt;BR /&gt;permit tcp (my network) 0.0.0.7 any eq 22 443&lt;BR /&gt;deny ip any any&lt;/P&gt;</description>
      <pubDate>Mon, 12 Aug 2019 20:45:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-firewall-and-acls/m-p/3907089#M24894</guid>
      <dc:creator>sergo777</dc:creator>
      <dc:date>2019-08-12T20:45:28Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Firewall and ACLs</title>
      <link>https://community.cisco.com/t5/network-security/zone-firewall-and-acls/m-p/3907098#M24895</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;You shouldn't really mix and match using ZBFW for some zones and then an ACL on the Cell0/1/0 interface. You should make a zone pair from self to outside and another for outside to self. When using zones with the self interface they can only be "pass" not inspect".&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Example (outside to self):-&lt;/P&gt;
&lt;PRE&gt;ip access-list extended ACL_EXTERNAL-TO-SELF-IPSEC&lt;BR /&gt;permit udp any any eq non500-isakmp&lt;BR /&gt;permit udp any any eq isakmp&lt;BR /&gt;permit esp any any&lt;BR /&gt;&lt;BR /&gt;ip access-list extended ACL_EXTERNAL-TO-SELF-MGMT&lt;BR /&gt;permit icmp any any echo&lt;BR /&gt;permit icmp any any echo-reply&lt;BR /&gt;permit tcp any any eq telnet&lt;BR /&gt;permit tcp any any eq 22&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;class-map type inspect match-any CMAP_EXTERNAL-TO-SELF-IPSEC&lt;BR /&gt;match access-group name ACL_EXTERNAL-TO-SELF-IPSEC&lt;BR /&gt;&lt;BR /&gt;class-map type inspect match-any CMAP_EXTERNAL-TO-SELF-MGMT&lt;BR /&gt;match access-group name ACL_EXTERNAL-TO-SELF-MGMT&lt;BR /&gt;&lt;BR /&gt;policy-map type inspect PMAP_EXTERNAL-TO-SELF&lt;BR /&gt;class type inspect CMAP_EXTERNAL-TO-SELF-IPSEC&lt;BR /&gt;pass &lt;BR /&gt;class type inspect CMAP_EXTERNAL-TO-SELF-MGMT&lt;BR /&gt;pass&lt;BR /&gt;class class-default&lt;BR /&gt;drop log&lt;BR /&gt;&lt;BR /&gt;zone-pair security EXTERNAL-TO-SELF source OUTSIDE destination self&lt;BR /&gt;service-policy type inspect PMAP_EXTERNAL-TO-SELF&lt;/PRE&gt;
&lt;P&gt;Example (self to outside):-&lt;/P&gt;
&lt;PRE&gt;class-map type inspect match-any CMAP_SELF-OUT-ICMP&lt;BR /&gt;match protocol icmp&lt;BR /&gt;&lt;BR /&gt;class-map type inspect match-any CMAP_SELF-OUT-ISAKMP &lt;BR /&gt;match protocol isakmp&lt;BR /&gt;&lt;BR /&gt;policy-map type inspect PMAP_SELF-OUT&lt;BR /&gt;class type inspect CMAP_SELF-OUT-ISAKMP &lt;BR /&gt;pass&lt;BR /&gt;class type inspect CMAP_SELF-OUT-ICMP&lt;BR /&gt;pass&lt;BR /&gt;class class-default&lt;BR /&gt;drop&lt;BR /&gt;&lt;BR /&gt;zone-pair security self-ext source self destination OUTSIDE&lt;BR /&gt;service-policy type inspect PMAP_SELF-OUT&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also you've not included the class-map for OUTSIDE_IN_CLASS, so I can't tell what thats doing.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For testing purposes define a class-default that is last in the policy, that drops and logs traffic, so you can get some hits and determine what is not matching.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Mon, 12 Aug 2019 21:04:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-firewall-and-acls/m-p/3907098#M24895</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-08-12T21:04:39Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Firewall and ACLs</title>
      <link>https://community.cisco.com/t5/network-security/zone-firewall-and-acls/m-p/3907102#M24897</link>
      <description>&lt;P&gt;Thanks! trying now.&amp;nbsp;&lt;/P&gt;&lt;P&gt;and here i can change ANY to network, correct? and allow SSH only from specific address?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ip access-list extended ACL_EXTERNAL-TO-SELF-MGMT&lt;BR /&gt;permit icmp any any echo&lt;BR /&gt;permit icmp any any echo-reply&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;permit tcp any any eq telnet&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;permit tcp any any eq 22&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Aug 2019 21:25:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-firewall-and-acls/m-p/3907102#M24897</guid>
      <dc:creator>sergo777</dc:creator>
      <dc:date>2019-08-12T21:25:57Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Firewall and ACLs</title>
      <link>https://community.cisco.com/t5/network-security/zone-firewall-and-acls/m-p/3907103#M24899</link>
      <description>Of course. You could leave it open to begin with for testing and then restrict it further once you know it's working.</description>
      <pubDate>Mon, 12 Aug 2019 21:34:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-firewall-and-acls/m-p/3907103#M24899</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-08-12T21:34:27Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Firewall and ACLs</title>
      <link>https://community.cisco.com/t5/network-security/zone-firewall-and-acls/m-p/3907127#M24901</link>
      <description>&lt;P&gt;Thanks RJI. looks like problem was in SELF zone. but right now opposite problem, SSH locked from outside &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;in your example, when i change PASS to INSPECT, SSH is available&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;policy-map type inspect PMAP_EXTERNAL-TO-SELF&lt;BR /&gt;class type inspect CMAP_EXTERNAL-TO-SELF-IPSEC&lt;BR /&gt;pass&lt;BR /&gt;class type inspect CMAP_EXTERNAL-TO-SELF-MGMT&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;pass - (i changed to INSPECT)&lt;/FONT&gt;&lt;BR /&gt;class class-default&lt;/P&gt;&lt;P&gt;drop log&lt;/P&gt;&lt;P&gt;--------------------------------------------------&lt;/P&gt;&lt;P&gt;PASS really confused me it doesnt work in any Policy-map... everywhere change to INSPECT...&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Aug 2019 22:46:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-firewall-and-acls/m-p/3907127#M24901</guid>
      <dc:creator>sergo777</dc:creator>
      <dc:date>2019-08-12T22:46:14Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Firewall and ACLs</title>
      <link>https://community.cisco.com/t5/network-security/zone-firewall-and-acls/m-p/3907565#M24903</link>
      <description>&lt;P&gt;Understood!&lt;/P&gt;&lt;P&gt;we need pairs for router itself and for internal zone!!!!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks guys!!!&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2019 16:31:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-firewall-and-acls/m-p/3907565#M24903</guid>
      <dc:creator>sergo777</dc:creator>
      <dc:date>2019-08-13T16:31:50Z</dc:date>
    </item>
  </channel>
</rss>

