<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I have no idea what is going in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/zone-based-firewall-on-881w/m-p/2444657#M267737</link>
    <description>&lt;P&gt;I have no idea what is going on but I have done some more testing with WireShark running. The system on the internal network sends out pings to the system in the DMZ. The system in the DMZ seems to see the ping since WireShark on that system show the echo request. However, neither system gets an echo reply. Now I am not sure if my problem is the ZBF or something else. I have attached my complete configuration. Can anyone help me understand what I am missing?&lt;/P&gt;&lt;P&gt;Thank You,&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;</description>
    <pubDate>Thu, 24 Apr 2014 21:06:24 GMT</pubDate>
    <dc:creator>DavidDemland</dc:creator>
    <dc:date>2014-04-24T21:06:24Z</dc:date>
    <item>
      <title>zone Based Firewall on 881W</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-on-881w/m-p/2444654#M267734</link>
      <description>&lt;P&gt;I have an 881W that I am trying to setup a zoned based firewall. Here is what an excerpt of it looks like:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;----------------------------------------------------------------&lt;BR /&gt;Current Config:&lt;BR /&gt;----------------------------------------------------------------&lt;/P&gt;&lt;P&gt;ip dhcp excluded-address 192.168.42.1 192.168.42.149&lt;BR /&gt;ip dhcp excluded-address 192.168.42.171 192.168.42.254&lt;BR /&gt;ip dhcp excluded-address 10.0.42.1 10.0.42.149&lt;BR /&gt;ip dhcp excluded-address 10.0.42.171 10.0.42.254&lt;BR /&gt;ip dhcp excluded-address 172.16.42.1 172.16.42.149&lt;BR /&gt;ip dhcp excluded-address 172.16.42.171 172.16.42.254&lt;BR /&gt;ip dhcp excluded-address 10.42.0.1&lt;BR /&gt;ip dhcp excluded-address 10.42.0.253&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool ccp-pool&lt;BR /&gt;&amp;nbsp;import all&lt;BR /&gt;&amp;nbsp;network 10.42.0.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;default-router 10.42.0.1&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool GuessData&lt;BR /&gt;&amp;nbsp;import all&lt;BR /&gt;&amp;nbsp;network 172.16.42.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;dns-server 68.105.28.12 68.105.29.12 68.105.28.11&lt;BR /&gt;&amp;nbsp;default-router 172.16.42.254&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool DMZData&lt;BR /&gt;&amp;nbsp;import all&lt;BR /&gt;&amp;nbsp;network 10.0.42.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;default-router 10.0.42.254&lt;BR /&gt;&amp;nbsp;dns-server 68.105.28.12 68.105.29.12 68.105.28.11&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool InternalData&lt;BR /&gt;&amp;nbsp;import all&lt;BR /&gt;&amp;nbsp;network 192.168.42.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;dns-server 192.168.42.1 68.105.28.12 68.105.29.12 68.105.28.11&lt;BR /&gt;&amp;nbsp;default-router 192.168.42.254&lt;BR /&gt;&amp;nbsp;lease 2&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip cef&lt;BR /&gt;no ip domain lookup&lt;BR /&gt;ip domain name yourdomain.com&lt;BR /&gt;no ipv6 cef&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;license udi pid CISCO881W-GN-A-K9 sn FTX1702852X&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;username daved privilege 15 secret 4 qe8J3v.JBWtcOXpekg566rrPI0ITGNFB/9NQecxoOLU&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;class-map match-any CLASS_COX_OUT&lt;BR /&gt;&amp;nbsp;match any&lt;BR /&gt;class-map type inspect match-any INTERNET-CLASS&lt;BR /&gt;&amp;nbsp;match protocol icmp&lt;BR /&gt;&amp;nbsp;match protocol udp&lt;BR /&gt;&amp;nbsp;match protocol tcp&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map POLICY_COX_OUT&lt;BR /&gt;&amp;nbsp;class CLASS_COX_OUT&lt;BR /&gt;policy-map type inspect INTERNET-POLICY&lt;BR /&gt;&amp;nbsp;class type inspect INTERNET-CLASS&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;!&lt;BR /&gt;zone security INTERNAL&lt;BR /&gt;&amp;nbsp;description Firewall Zone for Internal Users&lt;BR /&gt;zone security DMZ&lt;BR /&gt;&amp;nbsp;description Firewall Zone for DMZ Systems&lt;BR /&gt;zone security GUEST&lt;BR /&gt;&amp;nbsp;description Firewall Zone for Guest Wireless Users&lt;BR /&gt;zone security INTERNET&lt;BR /&gt;&amp;nbsp;description Firewall Zone for ISP&lt;BR /&gt;zone-pair security INTERNET-INTERNAL source INTERNAL destination INTERNET&lt;BR /&gt;&amp;nbsp;service-policy type inspect INTERNET-POLICY&lt;BR /&gt;zone-pair security INTERNAL-INTERNET source INTERNET destination INTERNAL&lt;BR /&gt;&amp;nbsp;service-policy type inspect INTERNET-POLICY&lt;BR /&gt;zone-pair security INTERNET-DMZ source DMZ destination INTERNET&lt;BR /&gt;&amp;nbsp;service-policy type inspect INTERNET-POLICY&lt;BR /&gt;zone-pair security DMZ-INTERNET source INTERNET destination DMZ&lt;BR /&gt;&amp;nbsp;service-policy type inspect INTERNET-POLICY&lt;BR /&gt;zone-pair security INTERNET-GUEST source GUEST destination INTERNET&lt;BR /&gt;&amp;nbsp;service-policy type inspect INTERNET-POLICY&lt;BR /&gt;zone-pair security GUEST-INTERNET source INTERNET destination GUEST&lt;BR /&gt;&amp;nbsp;service-policy type inspect INTERNET-POLICY&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0&lt;BR /&gt;&amp;nbsp;switchport access vlan 10&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1&lt;BR /&gt;&amp;nbsp;switchport access vlan 20&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet2&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet3&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet4&lt;BR /&gt;&amp;nbsp;description Cox ISP Interface for all data&lt;BR /&gt;&amp;nbsp;ip address dhcp&lt;BR /&gt;&amp;nbsp;no ip redirects&lt;BR /&gt;&amp;nbsp;no ip unreachables&lt;BR /&gt;&amp;nbsp;no ip proxy-arp&lt;BR /&gt;&amp;nbsp;ip flow ingress&lt;BR /&gt;&amp;nbsp;ip nat outside&lt;BR /&gt;&amp;nbsp;ip virtual-reassembly in&lt;BR /&gt;&amp;nbsp;zone-member security INTERNET&lt;BR /&gt;&amp;nbsp;duplex auto&lt;BR /&gt;&amp;nbsp;speed auto&lt;BR /&gt;&amp;nbsp;no cdp enable&lt;BR /&gt;&amp;nbsp;service-policy output POLICY_COX_OUT&lt;BR /&gt;!&lt;BR /&gt;interface wlan-ap0&lt;BR /&gt;&amp;nbsp;description Service module interface to manage the embedded AP&lt;BR /&gt;&amp;nbsp;ip unnumbered Vlan30&lt;BR /&gt;&amp;nbsp;ip flow ingress&lt;BR /&gt;&amp;nbsp;arp timeout 0&lt;BR /&gt;!&lt;BR /&gt;interface Wlan-GigabitEthernet0&lt;BR /&gt;&amp;nbsp;description Internal switch interface connecting to the embedded AP&lt;BR /&gt;&amp;nbsp;switchport mode trunk&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;description $ETH-SW-LAUNCH$$INTF-INFO-HWIC 4ESW$&lt;BR /&gt;&amp;nbsp;ip address 10.42.0.1 255.255.255.0&lt;BR /&gt;&amp;nbsp;no ip redirects&lt;BR /&gt;&amp;nbsp;no ip unreachables&lt;BR /&gt;&amp;nbsp;no ip proxy-arp&lt;BR /&gt;&amp;nbsp;ip flow ingress&lt;BR /&gt;&amp;nbsp;ip nat inside&lt;BR /&gt;&amp;nbsp;ip virtual-reassembly in&lt;BR /&gt;&amp;nbsp;ip tcp adjust-mss 1452&lt;BR /&gt;!&lt;BR /&gt;interface Vlan10&lt;BR /&gt;&amp;nbsp;description Internal Users Network Vlan&lt;BR /&gt;&amp;nbsp;ip address 192.168.42.254 255.255.255.0&lt;BR /&gt;&amp;nbsp;ip nat inside&lt;BR /&gt;&amp;nbsp;ip virtual-reassembly in&lt;BR /&gt;&amp;nbsp;zone-member security INTERNAL&lt;BR /&gt;!&lt;BR /&gt;interface Vlan20&lt;BR /&gt;&amp;nbsp;description DMZ Network Vlan&lt;BR /&gt;&amp;nbsp;ip address 10.0.42.254 255.255.255.0&lt;BR /&gt;&amp;nbsp;ip nat inside&lt;BR /&gt;&amp;nbsp;ip virtual-reassembly in&lt;BR /&gt;&amp;nbsp;zone-member security DMZ&lt;BR /&gt;!&lt;BR /&gt;interface Vlan30&lt;BR /&gt;&amp;nbsp;description Guest Wireless Network Vlan&lt;BR /&gt;&amp;nbsp;ip address 172.16.42.254 255.255.255.0&lt;BR /&gt;&amp;nbsp;ip nat inside&lt;BR /&gt;&amp;nbsp;ip virtual-reassembly in&lt;BR /&gt;&amp;nbsp;zone-member security GUEST&lt;BR /&gt;!&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;ip http server&lt;BR /&gt;ip http access-class 23&lt;BR /&gt;ip http authentication local&lt;BR /&gt;ip http secure-server&lt;BR /&gt;ip http timeout-policy idle 60 life 86400 requests 10000&lt;BR /&gt;!&lt;BR /&gt;ip nat inside source route-map COX_NAT interface FastEthernet4 overload&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 dhcp&lt;BR /&gt;!&lt;BR /&gt;access-list 23 permit 10.42.0.0&lt;BR /&gt;access-list 110 permit ip 192.168.42.0 0.0.0.255 any&lt;BR /&gt;access-list 110 permit ip 172.16.42.0 0.0.0.255 any&lt;BR /&gt;access-list 110 permit ip 10.0.42.0 0.0.0.255 any&lt;BR /&gt;access-list 110 permit ip 10.42.0.0 0.0.0.255 any&lt;BR /&gt;access-list 110 deny&amp;nbsp;&amp;nbsp; ip any any&lt;BR /&gt;no cdp run&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;route-map COX_NAT permit 10&lt;BR /&gt;&amp;nbsp;match ip address 110&lt;BR /&gt;&amp;nbsp;match interface FastEthernet4&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My problem is that traffic is not being passed from the INTERNAL Zone to the DMZ zone. I have tried everything I can think of. What do I have to do to allow this traffic to pass through?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank You,&lt;/P&gt;&lt;P&gt;David Demland&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:02:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-on-881w/m-p/2444654#M267734</guid>
      <dc:creator>DavidDemland</dc:creator>
      <dc:date>2019-03-12T04:02:46Z</dc:date>
    </item>
    <item>
      <title>Hello David,I cannot see any</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-on-881w/m-p/2444655#M267735</link>
      <description>&lt;P&gt;Hello David,&lt;/P&gt;&lt;P&gt;I cannot see any zone-pair configuration from internal to DMZ. If you create this with the correct policy then this should work.&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;</description>
      <pubDate>Mon, 21 Apr 2014 12:39:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-on-881w/m-p/2444655#M267735</guid>
      <dc:creator>Bilal Nawaz</dc:creator>
      <dc:date>2014-04-21T12:39:05Z</dc:date>
    </item>
    <item>
      <title>After re-looking at the</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-on-881w/m-p/2444656#M267736</link>
      <description>&lt;P&gt;After re-looking at the configuration, I have corrected everything I think was wrong and here is the configuration of the ZBW I have:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;lass-map type inspect match-any CLASS-INTERNET-DMZ&lt;BR /&gt;&amp;nbsp;match protocol icmp&lt;BR /&gt;&amp;nbsp;match protocol udp&lt;BR /&gt;&amp;nbsp;match protocol tcp&lt;BR /&gt;class-map type inspect match-any CLASS-INTERNAL-DMZ&lt;BR /&gt;&amp;nbsp;match protocol icmp&lt;BR /&gt;&amp;nbsp;match protocol udp&lt;BR /&gt;&amp;nbsp;match protocol tcp&lt;BR /&gt;class-map match-any CLASS_COX_OUT&lt;BR /&gt;&amp;nbsp;match any&lt;BR /&gt;class-map type inspect match-any INTERNET-CLASS&lt;BR /&gt;&amp;nbsp;match protocol icmp&lt;BR /&gt;&amp;nbsp;match protocol udp&lt;BR /&gt;&amp;nbsp;match protocol tcp&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map POLICY_COX_OUT&lt;BR /&gt;&amp;nbsp;class CLASS_COX_OUT&lt;BR /&gt;policy-map type inspect INTERNET-POLICY&lt;BR /&gt;&amp;nbsp;class type inspect INTERNET-CLASS&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;policy-map type inspect POLICY-INTERNET-DMZ&lt;BR /&gt;&amp;nbsp;class type inspect CLASS-INTERNET-DMZ&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;policy-map type inspect POLICY-INTERNAL-DMZ&lt;BR /&gt;&amp;nbsp;class type inspect CLASS-INTERNAL-DMZ&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;!&lt;BR /&gt;zone security INTERNAL&lt;BR /&gt;&amp;nbsp;description Firewall Zone for Internal Users&lt;BR /&gt;zone security DMZ&lt;BR /&gt;&amp;nbsp;description Firewall Zone for DMZ Systems&lt;BR /&gt;zone security GUEST&lt;BR /&gt;&amp;nbsp;description Firewall Zone for Guest Wireless Users&lt;BR /&gt;zone security INTERNET&lt;BR /&gt;&amp;nbsp;description Firewall Zone for ISP&lt;BR /&gt;zone-pair security INTERNAL-INTERNET source INTERNAL destination INTERNET&lt;BR /&gt;&amp;nbsp;service-policy type inspect INTERNET-POLICY&lt;BR /&gt;zone-pair security DMZ-INTERNET source DMZ destination INTERNET&lt;BR /&gt;&amp;nbsp;service-policy type inspect INTERNET-POLICY&lt;BR /&gt;zone-pair security GUEST-INTERNET source GUEST destination INTERNET&lt;BR /&gt;&amp;nbsp;service-policy type inspect INTERNET-POLICY&lt;BR /&gt;zone-pair security INTERNAL-DMZ source INTERNAL destination DMZ&lt;BR /&gt;&amp;nbsp;service-policy type inspect POLICY-INTERNAL-DMZ&lt;BR /&gt;zone-pair security INTERNET-DMZ source INTERNET destination DMZ&lt;BR /&gt;&amp;nbsp;service-policy type inspect POLICY-INTERNET-DMZ&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The problem still exists, the internet host cannot ping the DMZ host. What am I missing?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank You,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;</description>
      <pubDate>Thu, 24 Apr 2014 03:08:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-on-881w/m-p/2444656#M267736</guid>
      <dc:creator>DavidDemland</dc:creator>
      <dc:date>2014-04-24T03:08:33Z</dc:date>
    </item>
    <item>
      <title>I have no idea what is going</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-on-881w/m-p/2444657#M267737</link>
      <description>&lt;P&gt;I have no idea what is going on but I have done some more testing with WireShark running. The system on the internal network sends out pings to the system in the DMZ. The system in the DMZ seems to see the ping since WireShark on that system show the echo request. However, neither system gets an echo reply. Now I am not sure if my problem is the ZBF or something else. I have attached my complete configuration. Can anyone help me understand what I am missing?&lt;/P&gt;&lt;P&gt;Thank You,&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;</description>
      <pubDate>Thu, 24 Apr 2014 21:06:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-on-881w/m-p/2444657#M267737</guid>
      <dc:creator>DavidDemland</dc:creator>
      <dc:date>2014-04-24T21:06:24Z</dc:date>
    </item>
    <item>
      <title>Hello David,Please try</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-on-881w/m-p/2444658#M267738</link>
      <description>&lt;P&gt;Hello David,&lt;/P&gt;&lt;P&gt;Please try this&lt;/P&gt;&lt;P&gt;Conf t&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip access-list extended INTERNET-TO-DMZ&lt;/P&gt;&lt;P&gt;permit icmp any any&lt;/P&gt;&lt;P&gt;permit tcp any any&lt;/P&gt;&lt;P&gt;permit udp any any&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map type inspect match-any CLASS-INTERNET-DMZ&lt;BR /&gt;no match protocol icmp&lt;BR /&gt;no match protocol udp&lt;BR /&gt;no match protocol tcp&lt;/P&gt;&lt;P&gt;match access-group name INTERNET-TO-DMZ&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please try this and also the same with the class-map "INTERNET-CLASS"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Apr 2014 06:44:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-on-881w/m-p/2444658#M267738</guid>
      <dc:creator>Bilal Nawaz</dc:creator>
      <dc:date>2014-04-25T06:44:13Z</dc:date>
    </item>
    <item>
      <title>Bilal,Just to clarify, how</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-on-881w/m-p/2444659#M267739</link>
      <description>&lt;P&gt;Bilal,&lt;/P&gt;&lt;P&gt;&lt;SPAN class="fullname"&gt;&lt;SPAN rel="sioc:has_creator"&gt;Just to clarify, how would the changes to the Internet to DMZ affect the Internal to DMZ communications?&lt;/SPAN&gt;&lt;/SPAN&gt; Or do you mean to make these changes to the Internal to DMZ configurations?&lt;/P&gt;&lt;P&gt;Thank You,&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;</description>
      <pubDate>Sat, 26 Apr 2014 05:20:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-on-881w/m-p/2444659#M267739</guid>
      <dc:creator>DavidDemland</dc:creator>
      <dc:date>2014-04-26T05:20:48Z</dc:date>
    </item>
    <item>
      <title>Hello David, Your reply 2</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-on-881w/m-p/2444660#M267740</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;Hello &lt;/SPAN&gt;David, Your reply 2 days ago suggested you were having problems with internet to DMZ "&lt;SPAN style="background-color: rgb(247, 247, 247);"&gt;&amp;nbsp;internet host cannot ping the DMZ host."&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;&lt;SPAN style="background-color: rgb(247, 247, 247);"&gt;Anyway, lets do this then (if the problem is internal to DMZ)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;

&lt;PRE style="color: rgb(0, 0, 0); line-height: normal;"&gt;
&lt;SPAN style="font-family:trebuchet ms,helvetica,sans-serif;"&gt;&lt;SPAN style="font-size:14px;"&gt;ip access-list extended 100
 permit ip 192.168.42.0 0.0.0.255 10.0.42.0 0.0.0.255&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/PRE&gt;

&lt;PRE style="color: rgb(0, 0, 0); line-height: normal;"&gt;
&lt;SPAN style="font-family:trebuchet ms,helvetica,sans-serif;"&gt;&lt;SPAN style="font-size:14px;"&gt;class-map type inspect match-any CLASS-INTERNAL-DMZ
 no match access-group name INSIDE-TO-DMZ &amp;lt;------------ make it a numbered ACL&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/PRE&gt;

&lt;P&gt;&lt;SPAN style="font-family:trebuchet ms,helvetica,sans-serif;"&gt;&lt;SPAN style="font-size:14px;"&gt;match access-group 100&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 26 Apr 2014 05:46:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-on-881w/m-p/2444660#M267740</guid>
      <dc:creator>Bilal Nawaz</dc:creator>
      <dc:date>2014-04-26T05:46:15Z</dc:date>
    </item>
    <item>
      <title>Bilal,I cannot believe what</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-on-881w/m-p/2444661#M267741</link>
      <description>&lt;P&gt;Bilal,&lt;/P&gt;&lt;P&gt;I cannot believe what the problem is. It seems to be in the Windows 7 host I was testing with. I have replaced that host with two different Linux hosts and both work with my original configuration. Which means I have a better understanding of ZBF what I felt I did. Even though I still cannot ping the original Windows 7 hosts, I can ping both the Linux hosts as well as FTP and SSH to both of them. Thank you for your help and I am sorry I was not able to discover this issue sooner.&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;</description>
      <pubDate>Mon, 28 Apr 2014 16:41:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-on-881w/m-p/2444661#M267741</guid>
      <dc:creator>DavidDemland</dc:creator>
      <dc:date>2014-04-28T16:41:24Z</dc:date>
    </item>
    <item>
      <title>Hello David, that is good</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-on-881w/m-p/2444662#M267742</link>
      <description>&lt;P&gt;Hello David, that is good news! glad you worked it out in the end. The reason I asked to change to a numbered ACL, just in case we ever come across a problem with ZBFW, in some code the IOS does not behave with named ACLs.&lt;/P&gt;&lt;P&gt;That's okay, as long as you got there in the end, and your post will no doubt help someone else in the future with a similar scenario.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Apr 2014 17:01:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-on-881w/m-p/2444662#M267742</guid>
      <dc:creator>Bilal Nawaz</dc:creator>
      <dc:date>2014-04-28T17:01:21Z</dc:date>
    </item>
  </channel>
</rss>

