<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Self Zone Blocking Internet Traffic in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/self-zone-blocking-internet-traffic/m-p/2387555#M308100</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;well the out to self and self to out&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Value our effort and rate the assistance!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 30 Nov 2013 05:40:34 GMT</pubDate>
    <dc:creator>jumora</dc:creator>
    <dc:date>2013-11-30T05:40:34Z</dc:date>
    <item>
      <title>Self Zone Blocking Internet Traffic</title>
      <link>https://community.cisco.com/t5/network-security/self-zone-blocking-internet-traffic/m-p/2387553#M308098</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a C887 router with IOS c880data-universalk9-mz.151-4.M4.bin.&amp;nbsp; I have configured inside and outside ZBFW config, however on attempting to secure the router self zone it is blocking internet traffic from wifi users on the site.&amp;nbsp; The plan is to block all incoming access to the infrastructure addresses from the Outside zone except ICMP replies and TTL expiries, to allow us to do pings and traceroutes from the router. For GRE, I’m not 100% sure, but it’s likely the ZFW is able to inspect it and allow the incoming GRE in response to the outgoing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the Inside &amp;amp; Outside zone config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any Inside-2-Outside&lt;/P&gt;&lt;P&gt; match access-group name Inside-2-Outside&lt;/P&gt;&lt;P&gt;class-map type inspect match-any Outside-2-Inside&lt;/P&gt;&lt;P&gt; match access-group name Outside-2-Inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect Outside-2-Inside&lt;/P&gt;&lt;P&gt; class type inspect Outside-2-Inside&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp; drop&lt;/P&gt;&lt;P&gt;policy-map type inspect Inside-2-Outside&lt;/P&gt;&lt;P&gt; class type inspect Inside-2-Outside&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp; drop&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;zone security Inside&lt;/P&gt;&lt;P&gt; description WIFI-Network&lt;/P&gt;&lt;P&gt;zone security Outside&lt;/P&gt;&lt;P&gt; description ADSL-Internet&lt;/P&gt;&lt;P&gt;zone-pair security Inside-2-Outside source Inside destination Outside&lt;/P&gt;&lt;P&gt; service-policy type inspect Inside-2-Outside&lt;/P&gt;&lt;P&gt;zone-pair security Outside-2-Inside source Outside destination Inside&lt;/P&gt;&lt;P&gt; service-policy type inspect Outside-2-Inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip access-list extended Inside-2-Outside&lt;/P&gt;&lt;P&gt; permit tcp any any&lt;/P&gt;&lt;P&gt; permit icmp any any&lt;/P&gt;&lt;P&gt; permit udp any any&lt;/P&gt;&lt;P&gt; permit gre any any&lt;/P&gt;&lt;P&gt;ip access-list extended Outside-2-Inside&lt;/P&gt;&lt;P&gt; permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt; permit icmp any any source-quench&lt;/P&gt;&lt;P&gt; permit icmp any any unreachable&lt;/P&gt;&lt;P&gt; permit icmp any any time-exceeded&lt;/P&gt;&lt;P&gt; permit gre any any&lt;/P&gt;&lt;P&gt; permit tcp any any eq pop3&lt;/P&gt;&lt;P&gt; permit tcp any any eq 995&lt;/P&gt;&lt;P&gt; permit tcp any any eq 143&lt;/P&gt;&lt;P&gt; permit tcp any any eq 993&lt;/P&gt;&lt;P&gt; permit tcp any any eq smtp&lt;/P&gt;&lt;P&gt; permit tcp any any eq 2525&lt;/P&gt;&lt;P&gt; permit tcp any any eq 465&lt;/P&gt;&lt;P&gt; permit tcp any any eq 587&lt;/P&gt;&lt;P&gt; deny&amp;nbsp;&amp;nbsp; ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname#sh zone security inside&lt;/P&gt;&lt;P&gt;zone Inside&lt;/P&gt;&lt;P&gt;&amp;nbsp; Description: WIFI-Network&lt;/P&gt;&lt;P&gt;&amp;nbsp; Member Interfaces:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Vlan25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname#sh zone security outside&lt;/P&gt;&lt;P&gt;zone Outside&lt;/P&gt;&lt;P&gt;&amp;nbsp; Description: ADSL-Internet&lt;/P&gt;&lt;P&gt;&amp;nbsp; Member Interfaces:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ATM0.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Dialer1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Tunnel0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Tunnel1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When the above is applied the Wifi users can connect to the internet.&amp;nbsp; The internet traffic is redirected over GRE tunnels for Content Filtering - all works fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once the Self Zone config below is applied the internet traffic is blocked:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-all CM_from-self-inspect&lt;/P&gt;&lt;P&gt;&amp;nbsp; match access-group name ACL_from-self-inspect&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map type inspect match-all CM_from-self-passthru&lt;/P&gt;&lt;P&gt;&amp;nbsp; match access-group name ACL_from-self-passthru&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map type inspect match-all CM_to-self-passthru&lt;/P&gt;&lt;P&gt;&amp;nbsp; match access-group name ACL_to-self-passthru&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect PM_from-self&lt;/P&gt;&lt;P&gt;&amp;nbsp; class type inspect CM_from-self-inspect&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;&amp;nbsp; class type inspect CM_from-self-passthru&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; pass&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect PM_to-self&lt;/P&gt;&lt;P&gt;&amp;nbsp; class type inspect CM_to-self-passthru&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; pass&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;zone-pair security ZP_inside-to-self source inside destination self&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; service-policy type inspect PM_to-self&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;zone-pair security ZP_outside-to-self source outside destination self&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; service-policy type inspect PM_to-self&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;zone-pair security ZP_self-to-inside source self destination inside &lt;/P&gt;&lt;P&gt;&amp;nbsp; service-policy type inspect PM_from-self&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;zone-pair security ZP_self-to-outside source self destination outside &lt;/P&gt;&lt;P&gt;&amp;nbsp; service-policy type inspect PM_from-self&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; ip access-list extended ACL_from-self-inspect !&amp;nbsp; ZP_self-to-inside &amp;amp; ZP_self-to-outside&lt;/P&gt;&lt;P&gt;&amp;nbsp; permit tcp any any&lt;/P&gt;&lt;P&gt;&amp;nbsp; permit udp any any&lt;/P&gt;&lt;P&gt;&amp;nbsp; permit icmp any any&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; ip access-list extended ACL_from-self-passthru !&amp;nbsp; ZP_self-to-inside &amp;amp; ZP_self-to-outside&lt;/P&gt;&lt;P&gt;&amp;nbsp; permit gre any any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; permit udp any eq bootps any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; permit udp any any eq bootpc&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; permit udp any any eq bootps &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; permit udp any eq bootpc any&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; ip access-list extended ACL_to-self-passthru ! ZP_inside-to-self &amp;amp; outside to self&lt;/P&gt;&lt;P&gt;&amp;nbsp; permit gre host &amp;lt;Content Filtering ISP-public-address1&amp;gt; host &amp;lt;dialer-public-address&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; permit gre host &amp;lt;Content Filtering ISP-public-address1&amp;gt; host &amp;lt;dialer-public-address&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; permit icmp any host &amp;lt;dialer-public-address&amp;gt; echo-reply&lt;/P&gt;&lt;P&gt;&amp;nbsp; permit icmp any host &amp;lt;dialer-public-address&amp;gt; ttl-exceeded&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; permit icmp any host &amp;lt;dialer-public-address&amp;gt; time-exceeded &lt;/P&gt;&lt;P&gt;&amp;nbsp; permit icmp any host &amp;lt;dialer-public-address&amp;gt; port-unreachable&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; permit udp any eq bootps any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; permit udp any any eq bootpc&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; permit udp any any eq bootps &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; permit udp any eq bootpc any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help would be much appreciated!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:10:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/self-zone-blocking-internet-traffic/m-p/2387553#M308098</guid>
      <dc:creator>cisco_architect</dc:creator>
      <dc:date>2019-03-12T03:10:49Z</dc:date>
    </item>
    <item>
      <title>Self Zone Blocking Internet Traffic</title>
      <link>https://community.cisco.com/t5/network-security/self-zone-blocking-internet-traffic/m-p/2387554#M308099</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Remove the self to restore services&lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Value our effort and rate the assistance!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Nov 2013 05:40:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/self-zone-blocking-internet-traffic/m-p/2387554#M308099</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-30T05:40:08Z</dc:date>
    </item>
    <item>
      <title>Self Zone Blocking Internet Traffic</title>
      <link>https://community.cisco.com/t5/network-security/self-zone-blocking-internet-traffic/m-p/2387555#M308100</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;well the out to self and self to out&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Value our effort and rate the assistance!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Nov 2013 05:40:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/self-zone-blocking-internet-traffic/m-p/2387555#M308100</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-30T05:40:34Z</dc:date>
    </item>
    <item>
      <title>Self Zone Blocking Internet Traffic</title>
      <link>https://community.cisco.com/t5/network-security/self-zone-blocking-internet-traffic/m-p/2387556#M308101</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The reason your Internet traffic is dropped is because the router's control plane is routing between the security zones since you are sending all traffic to "self".&amp;nbsp; You need to setup 2 more zone-pairs between the outside and inside, inside and outside to permit internet traffic.&amp;nbsp; Or you can do what jumora suggested.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to rate and select a correct answer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Nov 2013 22:07:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/self-zone-blocking-internet-traffic/m-p/2387556#M308101</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2013-11-30T22:07:49Z</dc:date>
    </item>
    <item>
      <title>Self Zone Blocking Internet Traffic</title>
      <link>https://community.cisco.com/t5/network-security/self-zone-blocking-internet-traffic/m-p/2387557#M308102</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Raj,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would not recommend to remove the Self-Zone. I mean this is a FW right?? You want it to be as restrictive as possible &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you have a GRE tunnel use for redirection of traffic for content-filtering! That interface belongs to the outside zone.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can see that we already have the policies from In to Out so the zone-policies are ok&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This my be a copy paste error but check it anyway:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12.222222328186035px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;p access-list extended ACL_to-self-passthru ! ZP_inside-to-self &amp;amp; outside to self&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12.222222328186035px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp; permit gre host &lt;CONTENT filtering="" isp-public-address1=""&gt; host &lt;DIALER-PUBLIC-ADDRESS&gt;&lt;/DIALER-PUBLIC-ADDRESS&gt;&lt;/CONTENT&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12.222222328186035px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp; permit gre host &lt;CONTENT filtering="" isp-public-address1=""&gt; host &lt;DIALER-PUBLIC-ADDRESS&gt;&lt;/DIALER-PUBLIC-ADDRESS&gt;&lt;/CONTENT&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you sure you have the right IP address for the Tunnel source?/&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also I would add the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended GRE_Inspect&lt;/P&gt;&lt;P&gt;permit tcp host host eq 1723&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect&amp;nbsp; GRE_Inspect&lt;/P&gt;&lt;P&gt;match access-group name GRE_Inspect&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12.222222328186035px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;policy-map type inspect PM_to-self&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12.222222328186035px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;class &lt;SPAN style="background-color: transparent; font-family: arial, helvetica, sans-serif; font-size: 10pt;"&gt;GRE_Inspect&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12.222222328186035px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;inspect&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12.222222328186035px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp; class type inspect CM_to-self-passthru&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12.222222328186035px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; pass&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Additional Info:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Is the GRE tunnel even&amp;nbsp; being build??&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If it's still not working then provide us the drop log: for that:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip inspect log drop-pkt &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and make sure you have logging enabled so next time something does not work you can provide us a &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show logging | include x.x.x.x (IP address of host not working)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With that we will see what's is getting dropped and why.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rate all of the helpful posts!!! &lt;BR /&gt; &lt;BR /&gt;Regards, &lt;BR /&gt; &lt;BR /&gt;Jcarvaja &lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Follow me on &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 01 Dec 2013 07:59:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/self-zone-blocking-internet-traffic/m-p/2387557#M308102</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-12-01T07:59:32Z</dc:date>
    </item>
    <item>
      <title>Self Zone Blocking Internet Traffic</title>
      <link>https://community.cisco.com/t5/network-security/self-zone-blocking-internet-traffic/m-p/2387558#M308103</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks you for all your responses!&amp;nbsp; The self to out and out to self configuration is probably causing the issue, however I agree that removing it altogether is not recommended since the intention is to protect the router infrastructure from the internet.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio, yes the GRE tunnel interface belongs to the outside zone and the tunnel interfaces are up:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Interface Tunnel0&lt;/P&gt;&lt;P&gt;Ip address x.x.x.x 255.255.255.252&lt;/P&gt;&lt;P&gt;Ip tcp adjust-mss 1436&lt;/P&gt;&lt;P&gt;Ip nat outside&lt;/P&gt;&lt;P&gt;Zone-member security Outside&lt;/P&gt;&lt;P&gt;Ip virtual-reassemble&lt;/P&gt;&lt;P&gt;Keepalive 5 3&lt;/P&gt;&lt;P&gt;Tunnel source Dialer1&lt;/P&gt;&lt;P&gt;Tunnel destination x.x.x.x&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I think I’ve made an error in the ACL below as I’ve specified &lt;CONTENT filtering="" isp-public-address1=""&gt; as the tunnel destination address.&amp;nbsp; &lt;SPAN style="text-decoration: underline;"&gt;The tunnel source address is dialer1, therefore should the &lt;CONTENT filtering="" isp-public-address1=""&gt; be the tunnel interface IP address with the /30 mask above?&lt;/CONTENT&gt;&lt;/SPAN&gt;&lt;/CONTENT&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended ACL_to-self-passthru ! ZP_inside-to-self &amp;amp; outside to self&lt;/P&gt;&lt;P&gt;&amp;nbsp; permit gre host &lt;CONTENT filtering="" isp-public-address1=""&gt; host &lt;DIALER-PUBLIC-ADDRESS&gt;&lt;/DIALER-PUBLIC-ADDRESS&gt;&lt;/CONTENT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; permit gre host &lt;CONTENT filtering="" isp-public-address1=""&gt; host &lt;DIALER-PUBLIC-ADDRESS&gt;&lt;/DIALER-PUBLIC-ADDRESS&gt;&lt;/CONTENT&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 01 Dec 2013 11:50:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/self-zone-blocking-internet-traffic/m-p/2387558#M308103</guid>
      <dc:creator>cisco_architect</dc:creator>
      <dc:date>2013-12-01T11:50:51Z</dc:date>
    </item>
    <item>
      <title>Self Zone Blocking Internet Traffic</title>
      <link>https://community.cisco.com/t5/network-security/self-zone-blocking-internet-traffic/m-p/2387559#M308104</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please add zone-pairs between the inside and outdide security zones that allow the desired traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to rate and select a correct answer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 01 Dec 2013 12:13:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/self-zone-blocking-internet-traffic/m-p/2387559#M308104</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2013-12-01T12:13:52Z</dc:date>
    </item>
    <item>
      <title>Self Zone Blocking Internet Traffic</title>
      <link>https://community.cisco.com/t5/network-security/self-zone-blocking-internet-traffic/m-p/2387560#M308105</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Raj,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, you should point to the tunnel source.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now can you provide us the drop log?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rate all of the helpful posts!!! &lt;BR /&gt; &lt;BR /&gt;Regards, &lt;BR /&gt; &lt;BR /&gt;Jcarvaja &lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Follow me on &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 01 Dec 2013 18:35:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/self-zone-blocking-internet-traffic/m-p/2387560#M308105</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-12-01T18:35:54Z</dc:date>
    </item>
    <item>
      <title>Self Zone Blocking Internet Traffic</title>
      <link>https://community.cisco.com/t5/network-security/self-zone-blocking-internet-traffic/m-p/2387561#M308106</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Okay I'll re-configure the ACL below to permit the tunnel interface addresses (source) instead of the destination tunnel IP's to the dialer public address and try again.&amp;nbsp; I have another test window on Tuesday so will post up the results.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i&lt;SPAN style="background-color: #ffffff; font-family: Arial, verdana, sans-serif; font-size: 12.222222328186035px;"&gt;p access-list extended ACL_to-self-passthru ! ZP_inside-to-self &amp;amp; outside to self&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12.222222328186035px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp; permit gre host &lt;STRONG&gt;&lt;CONTENT filtering="" isp-public-address1=""&gt;&lt;/CONTENT&gt;&lt;/STRONG&gt; host &lt;DIALER-PUBLIC-ADDRESS&gt;&lt;/DIALER-PUBLIC-ADDRESS&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12.222222328186035px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp; permit gre host &lt;STRONG&gt;&lt;CONTENT filtering="" isp-public-address1=""&gt;&lt;/CONTENT&gt;&lt;/STRONG&gt; host &lt;DIALER-PUBLIC-ADDRESS&gt;&lt;/DIALER-PUBLIC-ADDRESS&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since the tunnels were up I assumed that the ACL was not blocking the internet traffic.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks all for the help!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 01 Dec 2013 19:42:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/self-zone-blocking-internet-traffic/m-p/2387561#M308106</guid>
      <dc:creator>cisco_architect</dc:creator>
      <dc:date>2013-12-01T19:42:01Z</dc:date>
    </item>
    <item>
      <title>Self Zone Blocking Internet Traffic</title>
      <link>https://community.cisco.com/t5/network-security/self-zone-blocking-internet-traffic/m-p/2387562#M308107</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Exactly,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember the logs right, that is what will let us move forward&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rate all of the helpful posts!!! &lt;BR /&gt; &lt;BR /&gt;Regards, &lt;BR /&gt; &lt;BR /&gt;Jcarvaja &lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Follow me on &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 01 Dec 2013 21:30:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/self-zone-blocking-internet-traffic/m-p/2387562#M308107</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-12-01T21:30:52Z</dc:date>
    </item>
    <item>
      <title>Self Zone Blocking Internet Traffic</title>
      <link>https://community.cisco.com/t5/network-security/self-zone-blocking-internet-traffic/m-p/2387563#M308108</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Okay these are the logs when the Self Zone config is applied:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dec&amp;nbsp; 5 13:43:38.855 GMT: %FW-6-DROP_PKT: Dropping tcp session [Dialer IP]:65065 x.x.x.x:80&amp;nbsp; due to&amp;nbsp; RST inside current window with ip ident 0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dec&amp;nbsp; 5 13:44:17.311 GMT: %FW-6-DROP_PKT: Dropping tcp session [Dialer IP]:65111 x.x.x.x:80&amp;nbsp; due to&amp;nbsp; RST inside current window with ip ident 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dec&amp;nbsp; 5 13:47:54.627 GMT: %FW-6-DROP_PKT: Dropping udp session [WIFI DEF GATEWAY IP]:67 255.255.255.255:68 on zone-pair ZP_self-to-inside class CM_from-self-inspect&amp;nbsp;&amp;nbsp; with ip ident 0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dec&amp;nbsp; 5 13:50:59.643 GMT: %FW-6-DROP_PKT: Dropping udp session [WIFI DEF GATEWAY IP]:67 255.255.255.255:68 on zone-pair ZP_self-to-inside class CM_from-self-inspect&amp;nbsp;&amp;nbsp; with ip ident 0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried opening up the ACL's permitting everything but the Wifi internet was still blocked, ie:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; ip access-list extended ACL_from-self-inspect !&amp;nbsp; ZP_self-to-inside &amp;amp; ZP_self-to-outside&lt;/P&gt;&lt;P&gt;&amp;nbsp; permit tcp any any&lt;/P&gt;&lt;P&gt;&amp;nbsp; permit udp any any&lt;/P&gt;&lt;P&gt;&amp;nbsp; permit icmp any any&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip access-list extended ACL_from-self-passthru !&amp;nbsp; ZP_self-to-inside &amp;amp; ZP_self-to-outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; permit gre any any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; permit tcp any any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; permit udp any any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; permit icmp any any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip access-list extended ACL_to-self-passthru ! ZP_inside-to-self &amp;amp; outside to self&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; permit gre any any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; permit tcp any any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; permit udp any any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; permit icmp any any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Opening up the ACL's did not resolve the issue, any thoughts please?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Dec 2013 14:32:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/self-zone-blocking-internet-traffic/m-p/2387563#M308108</guid>
      <dc:creator>cisco_architect</dc:creator>
      <dc:date>2013-12-05T14:32:55Z</dc:date>
    </item>
    <item>
      <title>Self Zone Blocking Internet Traffic</title>
      <link>https://community.cisco.com/t5/network-security/self-zone-blocking-internet-traffic/m-p/2387564#M308109</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Based from the logs it looks like the traffic getting denied (most important) is the DHCP offers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the device working as a DHCP client even getting an IP address?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do not think so but here is what you need to do:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Create a class-map matching UDP 68, 67&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configure the policy&amp;nbsp; Self-Inside with that class-map previously defined on top of it using the PASS action.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Traffic is being inspected at the moment and for DHCP this cannot happen.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rate all of the helpful posts!!! &lt;BR /&gt; &lt;BR /&gt;Regards, &lt;BR /&gt; &lt;BR /&gt;Jcarvaja &lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Follow me on &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Dec 2013 15:17:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/self-zone-blocking-internet-traffic/m-p/2387564#M308109</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-12-05T15:17:10Z</dc:date>
    </item>
    <item>
      <title>Re: Self Zone Blocking Internet Traffic</title>
      <link>https://community.cisco.com/t5/network-security/self-zone-blocking-internet-traffic/m-p/2387565#M308110</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Like this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended DHCP_Passthru&lt;/P&gt;&lt;P&gt;&amp;nbsp; permit udp any eq bootps any&lt;/P&gt;&lt;P&gt;&amp;nbsp; permit udp any any eq bootpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; permit udp any any eq bootps &lt;/P&gt;&lt;P&gt;&amp;nbsp; permit udp any eq bootpc any&lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;class-map type inspect DHCP_Passthru&lt;/P&gt;&lt;P&gt; match access-group name DHCP_Passthru&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect PM_from-self&lt;/P&gt;&lt;P&gt;&amp;nbsp; class type inspect DHCP_Passthru&lt;/P&gt;&lt;P&gt;&amp;nbsp; pass&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Dec 2013 15:42:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/self-zone-blocking-internet-traffic/m-p/2387565#M308110</guid>
      <dc:creator>cisco_architect</dc:creator>
      <dc:date>2013-12-05T15:42:54Z</dc:date>
    </item>
    <item>
      <title>Self Zone Blocking Internet Traffic</title>
      <link>https://community.cisco.com/t5/network-security/self-zone-blocking-internet-traffic/m-p/2387566#M308111</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Raj,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, then add the other lines you had there (inspection and other pass ones)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rate all of the helpful posts!!! &lt;BR /&gt; &lt;BR /&gt;Regards, &lt;BR /&gt; &lt;BR /&gt;Jcarvaja &lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Follow me on &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Dec 2013 15:44:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/self-zone-blocking-internet-traffic/m-p/2387566#M308111</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-12-05T15:44:52Z</dc:date>
    </item>
    <item>
      <title>Re: Self Zone Blocking Internet Traffic</title>
      <link>https://community.cisco.com/t5/network-security/self-zone-blocking-internet-traffic/m-p/2387567#M308112</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Okay will apply the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="border-collapse: collapse; list-style-type: none;"&gt;ip access-list extended DHCP_Passthru&lt;/P&gt;&lt;P style="border-collapse: collapse; list-style-type: none;"&gt;&amp;nbsp; permit udp any eq bootps any&lt;/P&gt;&lt;P style="border-collapse: collapse; list-style-type: none;"&gt;&amp;nbsp; permit udp any any eq bootpc&lt;/P&gt;&lt;P style="border-collapse: collapse; list-style-type: none;"&gt;&amp;nbsp; permit udp any any eq bootps&lt;/P&gt;&lt;P style="border-collapse: collapse; list-style-type: none;"&gt;&amp;nbsp; permit udp any eq bootpc any&lt;/P&gt;&lt;P style="border-collapse: collapse; list-style-type: none;"&gt;!&lt;/P&gt;&lt;P style="border-collapse: collapse; list-style-type: none;"&gt;class-map type inspect DHCP_Passthru&lt;/P&gt;&lt;P style="border-collapse: collapse; list-style-type: none;"&gt;match access-group name DHCP_Passthru&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect PM_from-self&lt;/P&gt;&lt;P&gt;&amp;nbsp; class type inspect CM_from-self-inspect&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;&amp;nbsp; class type inspect CM_from-self-passthru&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; pass&lt;/P&gt;&lt;P&gt;&amp;nbsp; class type inspect DHCP_Passthru&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; pass&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunately have to wait until next week now till I can test again but thanks for all your help, much appreciated.&amp;nbsp; Will report back following the next test.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Raj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Dec 2013 16:10:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/self-zone-blocking-internet-traffic/m-p/2387567#M308112</guid>
      <dc:creator>cisco_architect</dc:creator>
      <dc:date>2013-12-05T16:10:06Z</dc:date>
    </item>
    <item>
      <title>Self Zone Blocking Internet Traffic</title>
      <link>https://community.cisco.com/t5/network-security/self-zone-blocking-internet-traffic/m-p/2387568#M308113</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Finally an update on this.&amp;nbsp; Opened a TAC case with Cisco in the end.&amp;nbsp; The issue with the Zone Based Firewall blocking internet traffic was due to an&amp;nbsp; IOS bug in version 151(4) M2 which blocks GRE traffic with ‘Self’ zones&amp;nbsp; configured. This was resolved by upgrading the IOS to 152(4) M4.&amp;nbsp; Details of the&amp;nbsp; bug can be found here&lt;/P&gt;&lt;P&gt;&lt;A href="https://tools.cisco.com/bugsearch/bug/%3Ca%20href='https://www.cisco.com/cisco/psn/bssprt/bss?searchType=bstbugidsearch&amp;amp;page=bstBugDetail&amp;amp;BugID=CSCtw45480'%20target='_blank'%3ECSCtw45480%3C/a%3E." target="_blank" title="https://tools.cisco.com/bugsearch/bug/&amp;lt;a href='https://www.cisco.com/cisco/psn/bssprt/bss?searchType=bstbugidsearch&amp;amp;page=bstBugDetail&amp;amp;BugID=CSCtw45480' target='_blank'&amp;gt;CSCtw45480&amp;lt;/a&amp;gt;."&gt;https://tools.cisco.com/bugsearch/bug/&lt;/A&gt;&lt;A href="https://www.cisco.com/cisco/psn/bssprt/bss?searchType=bstbugidsearch&amp;amp;page=bstBugDetail&amp;amp;BugID=CSCtw45480" target="_blank"&gt;CSCtw45480&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks all for your help on this case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Raj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Feb 2014 15:12:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/self-zone-blocking-internet-traffic/m-p/2387568#M308113</guid>
      <dc:creator>cisco_architect</dc:creator>
      <dc:date>2014-02-27T15:12:34Z</dc:date>
    </item>
  </channel>
</rss>

