<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Port Forwarding In Zone Based Firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/port-forwarding-in-zone-based-firewall/m-p/2417745#M309661</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Marcus,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So some mistakes here, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After briefly checking the configuration I determined traffic will flow from the Out-zone to the Private zone.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Policy from Private to Out&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect ccp-inspect&lt;/P&gt;&lt;P&gt;class type inspect TCP-UDP&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp; drop&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Policy from Out to Private &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect FIREWALL_EXCEPTIONS_POLICY&lt;/P&gt;&lt;P&gt;class type inspect FIREWALL_EXCEPTIONS_CLASS&lt;/P&gt;&lt;P&gt;&amp;nbsp; pass&lt;/P&gt;&lt;P&gt;class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp; drop&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With that confiuration this will never work as you are inspecting traffic on one way and on the other just let it go through with no stateful checks at all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To resolve it&amp;nbsp; &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list Extended Julio_Rocks&lt;/P&gt;&lt;P&gt;permit udp any host 192.168.10.210 eq 88&lt;/P&gt;&lt;P&gt;permit udp any host 192.168.10.210 eq 3074&lt;/P&gt;&lt;P&gt;permit tcp any host 192.168.10.210 eq 3074&lt;/P&gt;&lt;P&gt;permit tcp any host 192.168.10.6 eq 32400&lt;/P&gt;&lt;P&gt;permit udp any host 192.168.10.6 eq 32400&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map&amp;nbsp; type inspect Julio_Rocks&lt;/P&gt;&lt;P&gt;match access-group name Julio_Rocks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect &lt;SPAN style="font-size: 10pt;"&gt;FIREWALL_EXCEPTIONS_POLICY&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;no&amp;nbsp; &lt;SPAN style="font-size: 10pt;"&gt;class FIREWALL_EXCEPTIONS_CLASS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;class Julio_Rocks&lt;/P&gt;&lt;P&gt;inspect&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; Looking for a Network engineer, contact me directly at&amp;nbsp; &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:julio17carvajal@hotmail.com"&gt;julio17carvajal@hotmail.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I will fix your problem ASAP. &lt;BR /&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segura &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 23 Dec 2013 19:00:49 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2013-12-23T19:00:49Z</dc:date>
    <item>
      <title>Port Forwarding In Zone Based Firewall</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-in-zone-based-firewall/m-p/2417742#M309658</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a problem with getting port forward to work. Does this config look right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically I want to forward all traffic from ports UDP 88 to internal 192.168.10.210, TCP &amp;amp; UDP 3074 also to internal 192.168.10.210&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also port TCP &amp;amp; UDP 32400 to internal 192.168.10.6&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also another question is that from a port scan from a web service somewhere checking a port is forwarding correctly on the router; will the scan fail as the traffic has first goto originate and punch a hole in the firewall from my internal network or can a port scan for a particular port (32400) be allowed through straight to my internal server with the traffic not originating from the internal network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;----------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any TCP-UDP&lt;BR /&gt;match protocol tcp&lt;BR /&gt;match protocol udp&lt;BR /&gt;class-map type inspect match-any ccp-cls-icmp-access&lt;BR /&gt;match protocol icmp&lt;BR /&gt;match protocol tcp&lt;BR /&gt;match protocol udp&lt;BR /&gt;class-map type inspect match-any FIREWALL_EXCEPTIONS_CLASS&lt;BR /&gt;match access-group name FIREWALL_EXCEPTIONS_ACL&lt;BR /&gt;class-map type inspect match-all ccp-icmp-access&lt;BR /&gt;match class-map ccp-cls-icmp-access&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;policy-map type inspect ccp-permit-icmpreply&lt;BR /&gt;class type inspect ccp-icmp-access&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;class class-default&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt;policy-map type inspect FIREWALL_EXCEPTIONS_POLICY&lt;BR /&gt;class type inspect FIREWALL_EXCEPTIONS_CLASS&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt;class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;policy-map type inspect ccp-inspect&lt;BR /&gt;class type inspect TCP-UDP&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;policy-map type inspect ccp-permit&lt;BR /&gt;class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;zone security in-zone&lt;BR /&gt;zone security out-zone&lt;BR /&gt;zone security private-in-zone&lt;BR /&gt;zone-pair security ccp-zp-out-self source out-zone destination self&lt;BR /&gt;service-policy type inspect ccp-permit&lt;BR /&gt;zone-pair security ccp-zp-in-out source in-zone destination out-zone&lt;BR /&gt;service-policy type inspect ccp-inspect&lt;BR /&gt;zone-pair security ccp-zp-self-out source self destination out-zone&lt;BR /&gt;service-policy type inspect ccp-permit-icmpreply&lt;BR /&gt;zone-pair security ccp-zp-private-in-out source private-in-zone destination out-zone&lt;BR /&gt;service-policy type inspect ccp-inspect&lt;BR /&gt;zone-pair security ccp-zp-out-private-in source out-zone destination private-in-zone&lt;BR /&gt;service-policy type inspect FIREWALL_EXCEPTIONS_POLICY&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;ip nat inside source list 1 interface Dialer0 overload&lt;BR /&gt;ip nat inside source static udp 192.168.10.210 88 interface Dialer0 88&lt;BR /&gt;ip nat inside source static udp 192.168.10.210 3074 interface Dialer0 3074&lt;BR /&gt;ip nat inside source static tcp 192.168.10.210 3074 interface Dialer0 3074&lt;BR /&gt;ip nat inside source static tcp 192.168.10.6 32400 interface Dialer0 32400&lt;BR /&gt;ip nat inside source static udp 192.168.10.6 32400 interface Dialer0 32400&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended FIREWALL_EXCEPTIONS_ACL&lt;BR /&gt;permit udp any host 192.168.10.210 eq 88&lt;BR /&gt;permit udp any host 192.168.10.210 eq 3074&lt;BR /&gt;permit tcp any host 192.168.10.210 eq 3074&lt;BR /&gt;permit tcp any host 192.168.10.6 eq 32400&lt;BR /&gt;permit tcp any eq 32400 any&lt;BR /&gt;permit udp any host 192.168.10.6 eq 32400&lt;BR /&gt;permit udp any eq 32400 any&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:00:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-in-zone-based-firewall/m-p/2417742#M309658</guid>
      <dc:creator>markieparkie</dc:creator>
      <dc:date>2019-03-12T03:00:08Z</dc:date>
    </item>
    <item>
      <title>Port Forwarding In Zone Based Firewall</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-in-zone-based-firewall/m-p/2417743#M309659</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please post interface configuration, meaning get me a show run&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Nov 2013 03:59:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-in-zone-based-firewall/m-p/2417743#M309659</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-05T03:59:59Z</dc:date>
    </item>
    <item>
      <title>Port Forwarding In Zone Based Firewall</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-in-zone-based-firewall/m-p/2417744#M309660</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Sorry for the delay, but here is a running config.. Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Current configuration : 6877 bytes&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;version 12.4&lt;/P&gt;&lt;P&gt;no service pad&lt;/P&gt;&lt;P&gt;service timestamps debug datetime msec&lt;/P&gt;&lt;P&gt;service timestamps log datetime msec&lt;/P&gt;&lt;P&gt;service password-encryption&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot-start-marker&lt;/P&gt;&lt;P&gt;boot-end-marker&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;logging message-counter syslog&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa authentication login default local&lt;/P&gt;&lt;P&gt;aaa authorization exec default local &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;clock timezone London 0&lt;/P&gt;&lt;P&gt;clock summer-time London date Mar 30 2003 1:00 Oct 26 2003 2:00&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dot11 syslog&lt;/P&gt;&lt;P&gt;ip source-route&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip dhcp pool HOME&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; import all&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; network 192.168.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; default-router 192.168.20.254 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip cef&lt;/P&gt;&lt;P&gt;ip domain name home.local&lt;/P&gt;&lt;P&gt;no ipv6 cef&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;multilink bundle-name authenticated&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;vtp mode client&lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;archive&lt;/P&gt;&lt;P&gt; log config&lt;/P&gt;&lt;P&gt;&amp;nbsp; hidekeys&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;no ip ftp passive&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map type inspect match-any TCP-UDP&lt;/P&gt;&lt;P&gt; match protocol tcp&lt;/P&gt;&lt;P&gt; match protocol udp&lt;/P&gt;&lt;P&gt;class-map type inspect match-any ccp-cls-icmp-access&lt;/P&gt;&lt;P&gt; match protocol icmp&lt;/P&gt;&lt;P&gt; match protocol tcp&lt;/P&gt;&lt;P&gt; match protocol udp&lt;/P&gt;&lt;P&gt;class-map type inspect match-any FIREWALL_EXCEPTIONS_CLASS&lt;/P&gt;&lt;P&gt; match access-group name FIREWALL_EXCEPTIONS_ACL&lt;/P&gt;&lt;P&gt;class-map type inspect match-all ccp-icmp-access&lt;/P&gt;&lt;P&gt; match class-map ccp-cls-icmp-access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect ccp-permit-icmpreply&lt;/P&gt;&lt;P&gt; class type inspect ccp-icmp-access&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect &lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp; pass&lt;/P&gt;&lt;P&gt;policy-map type inspect FIREWALL_EXCEPTIONS_POLICY&lt;/P&gt;&lt;P&gt; class type inspect FIREWALL_EXCEPTIONS_CLASS&lt;/P&gt;&lt;P&gt;&amp;nbsp; pass&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp; drop&lt;/P&gt;&lt;P&gt;policy-map type inspect ccp-inspect&lt;/P&gt;&lt;P&gt; class type inspect TCP-UDP&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect &lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp; drop&lt;/P&gt;&lt;P&gt;policy-map type inspect ccp-permit&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp; drop&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;zone security in-zone&lt;/P&gt;&lt;P&gt;zone security out-zone&lt;/P&gt;&lt;P&gt;zone security private-in-zone&lt;/P&gt;&lt;P&gt;zone-pair security ccp-zp-out-self source out-zone destination self&lt;/P&gt;&lt;P&gt; service-policy type inspect ccp-permit&lt;/P&gt;&lt;P&gt;zone-pair security ccp-zp-in-out source in-zone destination out-zone&lt;/P&gt;&lt;P&gt; service-policy type inspect ccp-inspect&lt;/P&gt;&lt;P&gt;zone-pair security ccp-zp-self-out source self destination out-zone&lt;/P&gt;&lt;P&gt; service-policy type inspect ccp-permit-icmpreply&lt;/P&gt;&lt;P&gt;zone-pair security ccp-zp-private-in-out source private-in-zone destination out-zone&lt;/P&gt;&lt;P&gt; service-policy type inspect ccp-inspect&lt;/P&gt;&lt;P&gt;zone-pair security ccp-zp-out-private-in source out-zone destination private-in-zone&lt;/P&gt;&lt;P&gt; service-policy type inspect FIREWALL_EXCEPTIONS_POLICY&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface ATM0&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; no ip redirects&lt;/P&gt;&lt;P&gt; no ip proxy-arp&lt;/P&gt;&lt;P&gt; no atm ilmi-keepalive&lt;/P&gt;&lt;P&gt; pvc 0/38 &lt;/P&gt;&lt;P&gt;&amp;nbsp; encapsulation aal5mux ppp dialer&lt;/P&gt;&lt;P&gt;&amp;nbsp; dialer pool-member 1&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface ATM0.1 point-to-point&lt;/P&gt;&lt;P&gt; description WAN via ADSL&lt;/P&gt;&lt;P&gt; pvc 0/35 &lt;/P&gt;&lt;P&gt;&amp;nbsp; pppoe-client dial-pool-number 1&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0&lt;/P&gt;&lt;P&gt; description LINK TO SWITCH&lt;/P&gt;&lt;P&gt; switchport mode trunk&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet1&lt;/P&gt;&lt;P&gt; switchport mode trunk&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; description MANAGEMENT&lt;/P&gt;&lt;P&gt; ip address 192.168.1.254 255.255.255.0&lt;/P&gt;&lt;P&gt; ip nat inside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt; zone-member security private-in-zone&lt;/P&gt;&lt;P&gt; ip tcp adjust-mss 1412&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan10&lt;/P&gt;&lt;P&gt; description HOME_PRIVATE&lt;/P&gt;&lt;P&gt; ip address 192.168.10.254 255.255.255.0&lt;/P&gt;&lt;P&gt; ip helper-address 192.168.10.251&lt;/P&gt;&lt;P&gt; ip nat inside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt; zone-member security private-in-zone&lt;/P&gt;&lt;P&gt; ip tcp adjust-mss 1412&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan20&lt;/P&gt;&lt;P&gt; description HOME_WORK&lt;/P&gt;&lt;P&gt; ip address 192.168.20.254 255.255.255.0&lt;/P&gt;&lt;P&gt; ip nat inside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt; zone-member security in-zone&lt;/P&gt;&lt;P&gt; ip tcp adjust-mss 1412&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan30&lt;/P&gt;&lt;P&gt; description HOME_PUBLIC&lt;/P&gt;&lt;P&gt; ip address 192.168.30.254 255.255.255.0&lt;/P&gt;&lt;P&gt; ip helper-address 192.168.10.251&lt;/P&gt;&lt;P&gt; ip nat inside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt; zone-member security in-zone&lt;/P&gt;&lt;P&gt; ip tcp adjust-mss 1412&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Dialer0&lt;/P&gt;&lt;P&gt; description ADSL Dialup&lt;/P&gt;&lt;P&gt; ip address negotiated&lt;/P&gt;&lt;P&gt; no ip redirects&lt;/P&gt;&lt;P&gt; ip mtu 1452&lt;/P&gt;&lt;P&gt; ip nat outside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt; zone-member security out-zone&lt;/P&gt;&lt;P&gt; encapsulation ppp&lt;/P&gt;&lt;P&gt; dialer pool 1&lt;/P&gt;&lt;P&gt; dialer-group 1&lt;/P&gt;&lt;P&gt; ppp authentication chap callin&lt;/P&gt;&lt;P&gt; ppp chap hostname &lt;/P&gt;&lt;P&gt; ppp chap password&lt;/P&gt;&lt;P&gt; ppp ipcp dns request&lt;/P&gt;&lt;P&gt; ppp ipcp address accept&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip forward-protocol nd&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 Dialer0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;no ip http server&lt;/P&gt;&lt;P&gt;ip http secure-server&lt;/P&gt;&lt;P&gt;ip nat inside source list 1 interface Dialer0 overload&lt;/P&gt;&lt;P&gt;ip nat inside source static udp 192.168.10.210 88 interface Dialer0 88&lt;/P&gt;&lt;P&gt;ip nat inside source static udp 192.168.10.210 3074 interface Dialer0 3074&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.10.210 3074 interface Dialer0 3074&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.10.6 32400 interface Dialer0 32400&lt;/P&gt;&lt;P&gt;ip nat inside source static udp 192.168.10.6 32400 interface Dialer0 32400&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip access-list extended FIREWALL_EXCEPTIONS_ACL&lt;/P&gt;&lt;P&gt; permit udp any host 192.168.10.210 eq 88&lt;/P&gt;&lt;P&gt; permit udp any host 192.168.10.210 eq 3074&lt;/P&gt;&lt;P&gt; permit tcp any host 192.168.10.210 eq 3074&lt;/P&gt;&lt;P&gt; permit tcp any host 192.168.10.6 eq 32400&lt;/P&gt;&lt;P&gt; permit tcp any eq 32400 any&lt;/P&gt;&lt;P&gt; permit udp any host 192.168.10.6 eq 32400&lt;/P&gt;&lt;P&gt; permit udp any eq 32400 any&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list 1 permit 192.168.10.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 1 permit 192.168.20.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 1 permit 192.168.30.0 0.0.0.255&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;snmp-server community&lt;/P&gt;&lt;P&gt;snmp-server community&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;control-plane&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt; no modem enable&lt;/P&gt;&lt;P&gt;line aux 0&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; transport input ssh&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;scheduler max-task-time 5000&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 22 Dec 2013 16:58:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-in-zone-based-firewall/m-p/2417744#M309660</guid>
      <dc:creator>markieparkie</dc:creator>
      <dc:date>2013-12-22T16:58:42Z</dc:date>
    </item>
    <item>
      <title>Port Forwarding In Zone Based Firewall</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-in-zone-based-firewall/m-p/2417745#M309661</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Marcus,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So some mistakes here, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After briefly checking the configuration I determined traffic will flow from the Out-zone to the Private zone.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Policy from Private to Out&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect ccp-inspect&lt;/P&gt;&lt;P&gt;class type inspect TCP-UDP&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp; drop&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Policy from Out to Private &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect FIREWALL_EXCEPTIONS_POLICY&lt;/P&gt;&lt;P&gt;class type inspect FIREWALL_EXCEPTIONS_CLASS&lt;/P&gt;&lt;P&gt;&amp;nbsp; pass&lt;/P&gt;&lt;P&gt;class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp; drop&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With that confiuration this will never work as you are inspecting traffic on one way and on the other just let it go through with no stateful checks at all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To resolve it&amp;nbsp; &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list Extended Julio_Rocks&lt;/P&gt;&lt;P&gt;permit udp any host 192.168.10.210 eq 88&lt;/P&gt;&lt;P&gt;permit udp any host 192.168.10.210 eq 3074&lt;/P&gt;&lt;P&gt;permit tcp any host 192.168.10.210 eq 3074&lt;/P&gt;&lt;P&gt;permit tcp any host 192.168.10.6 eq 32400&lt;/P&gt;&lt;P&gt;permit udp any host 192.168.10.6 eq 32400&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map&amp;nbsp; type inspect Julio_Rocks&lt;/P&gt;&lt;P&gt;match access-group name Julio_Rocks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect &lt;SPAN style="font-size: 10pt;"&gt;FIREWALL_EXCEPTIONS_POLICY&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;no&amp;nbsp; &lt;SPAN style="font-size: 10pt;"&gt;class FIREWALL_EXCEPTIONS_CLASS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;class Julio_Rocks&lt;/P&gt;&lt;P&gt;inspect&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; Looking for a Network engineer, contact me directly at&amp;nbsp; &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:julio17carvajal@hotmail.com"&gt;julio17carvajal@hotmail.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I will fix your problem ASAP. &lt;BR /&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segura &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Dec 2013 19:00:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-in-zone-based-firewall/m-p/2417745#M309661</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-12-23T19:00:49Z</dc:date>
    </item>
    <item>
      <title>Port Forwarding In Zone Based Firewall</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-in-zone-based-firewall/m-p/2417746#M309662</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nice one on fixing the problem.&lt;/P&gt;&lt;P&gt;Still cant see why traffic has to be treated the same way on out and in, thought if the inspect is set to allow the traffic in, then permitting without inspect on the way out just seems to make sense if the traffic is allowed both ways things would work.&lt;/P&gt;&lt;P&gt;Why does it have to be the same?&lt;/P&gt;&lt;P&gt;On another note; have you had any experience with VPN’s and ZBW? I have a config where there is a tunnel created and traffic sent out from the router seems fine (full bandwidth 70% CPU) yet on traffic coming in, the router hits about 80% usage and the speed is nowhere near when its capable of.&lt;/P&gt;&lt;P&gt;Bit stumped on this.. Does the VPN actually go to the router itself, thus using the outzone to self policy?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Marcus.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Feb 2014 11:53:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-in-zone-based-firewall/m-p/2417746#M309662</guid>
      <dc:creator>markieparkie</dc:creator>
      <dc:date>2014-02-11T11:53:33Z</dc:date>
    </item>
    <item>
      <title>Port Forwarding In Zone Based Firewall</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-in-zone-based-firewall/m-p/2417747#M309664</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you are inspecting traffic from Out-To-In&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10pt;"&gt;Traffic reaches outside Interface, its inspectioned and allowed trought (While added to the stateful table of the FW so the reply of the client is allowed).SYN&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10pt;"&gt;Reply from the client comes and it's passed (No information is saved into the Firewall table as we are just passing the traffic and not inspectioning). SYN-ACK&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10pt;"&gt;Traffic comes back for the server and reaches the Firewall but then this one says" OK I see the SYN, I do not see the SYN-ACK why should I allow this ACK and drops it" Clear enough????&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yeah I have experience with VPN .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check my website for more info regarding ZBFW&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.laguiadelnetworking.com/zone-based-firewall-and-the-self-zone-integration/"&gt;http://www.laguiadelnetworking.com/zone-based-firewall-and-the-self-zone-integration/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking for some Networking Assistance?&amp;nbsp; &lt;BR /&gt;&lt;SPAN&gt;Contact me directly at &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:jcarvaja@laguiadelnetworking.com"&gt;jcarvaja@laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;I will fix your problem ASAP. &lt;BR /&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segura &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Feb 2014 12:09:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-in-zone-based-firewall/m-p/2417747#M309664</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2014-02-11T12:09:37Z</dc:date>
    </item>
  </channel>
</rss>

