<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Application Inspection of ZBF Router in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/application-inspection-of-zbf-router/m-p/2322813#M311054</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No I am not.. 101 % sure about it!.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You use parameter-maps, L7 class maps and L7 policy-maps in order to do specific L7 tasks such as blocking files that contains certaing strings or block websites, etc. etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But still matching traffic with a match protocol and using the keyword inspect will be a l7 action as the router will get into the content of the packets to make sure the protocol is honored.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hey remember to rate all of the helpful posts,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you do not know how, just let me know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 13 Oct 2013 18:33:42 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2013-10-13T18:33:42Z</dc:date>
    <item>
      <title>Application Inspection of ZBF Router</title>
      <link>https://community.cisco.com/t5/network-security/application-inspection-of-zbf-router/m-p/2322810#M311037</link>
      <description>&lt;P&gt;Hello there,&lt;/P&gt;&lt;P&gt;I just wanna verify what I've learned about:&lt;/P&gt;&lt;P&gt;Stateful Inspection (packet filtering up to L5)&amp;nbsp; and&lt;/P&gt;&lt;P&gt;Application Inspection (packet filtering up to L7)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regarding an IOS ZBF (IOS ver 12.4(20)T on a router, do these commands implement Application Inspection ?&lt;/P&gt;&lt;P&gt;(I mean: do they satisfy a protocol like ftp and enable the router to learn about dynamic ports and unwanted activities?)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;class-map type inspect match-any CM&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; match protocol &lt;SPAN style="color: #ff0000;"&gt;ftp&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; match protocol http&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;policy-map type inspect PM&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp; class type inspect CM &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp; inspect&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;zone-pair security IN-OUT source inside destination outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; service-policy type inspect PM&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or&amp;nbsp; do they implement Stateful Inspection only ? if so yes, how to add&amp;nbsp; Application Inspection feature (on ftp traffic ,for example)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1 more question, is "application-specific matching" another expression of "application inspection feature" ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks !&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:51:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/application-inspection-of-zbf-router/m-p/2322810#M311037</guid>
      <dc:creator>Odys (CSC)</dc:creator>
      <dc:date>2019-03-12T02:51:24Z</dc:date>
    </item>
    <item>
      <title>Application Inspection of ZBF Router</title>
      <link>https://community.cisco.com/t5/network-security/application-inspection-of-zbf-router/m-p/2322811#M311044</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Odysious,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you match traffic on a class-map with the match protocol http or ftp you are indeed matching a L7 protocol so when you inspect this class-map on a policy-map you will be handeling a L7 policy-map which means application stateful (so if a protocol like FTP that uses additional channels the Router will be able to open the right pinholes).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope I was clear hehe &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know anyway &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 12 Oct 2013 19:31:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/application-inspection-of-zbf-router/m-p/2322811#M311044</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-10-12T19:31:41Z</dc:date>
    </item>
    <item>
      <title>Re: Application Inspection of ZBF Router</title>
      <link>https://community.cisco.com/t5/network-security/application-inspection-of-zbf-router/m-p/2322812#M311049</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Julio,&lt;/P&gt;&lt;P&gt;Refering to the following doc, I think you're wrong. L7 inspection uses "parameter-maps" or something like that.&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/sw/secursw/ps1018/products_tech_note09186a00808bc994.shtml" rel="nofollow"&gt;http://www.cisco.com/en/US/products/sw/secursw/ps1018/products_tech_note09186a00808bc994.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually that doc is too tough to me and I can't get the answer from it. I know it's there, but it's very hard to me to find it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 13 Oct 2013 17:43:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/application-inspection-of-zbf-router/m-p/2322812#M311049</guid>
      <dc:creator>Odys (CSC)</dc:creator>
      <dc:date>2013-10-13T17:43:30Z</dc:date>
    </item>
    <item>
      <title>Re: Application Inspection of ZBF Router</title>
      <link>https://community.cisco.com/t5/network-security/application-inspection-of-zbf-router/m-p/2322813#M311054</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No I am not.. 101 % sure about it!.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You use parameter-maps, L7 class maps and L7 policy-maps in order to do specific L7 tasks such as blocking files that contains certaing strings or block websites, etc. etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But still matching traffic with a match protocol and using the keyword inspect will be a l7 action as the router will get into the content of the packets to make sure the protocol is honored.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hey remember to rate all of the helpful posts,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you do not know how, just let me know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 13 Oct 2013 18:33:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/application-inspection-of-zbf-router/m-p/2322813#M311054</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-10-13T18:33:42Z</dc:date>
    </item>
    <item>
      <title>Re: Application Inspection of ZBF Router</title>
      <link>https://community.cisco.com/t5/network-security/application-inspection-of-zbf-router/m-p/2322814#M311056</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have u looked at the example in the above maintioned link ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL type="1"&gt;&lt;LI&gt;&lt;P&gt;Define class-maps that describe the traffic that you want to permit&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; between zones, according to policies described earlier:&lt;/P&gt;&lt;BLOCKQUOTE class="jive-quote"&gt;&lt;PRE&gt;conf t
 class-map type inspect match-any internet-traffic-class
&amp;nbsp; match protocol &lt;STRONG style="color: #0000ff;"&gt;http&lt;/STRONG&gt;&amp;nbsp; match protocol &lt;STRONG style="color: #0000ff;"&gt;https&lt;/STRONG&gt;&amp;nbsp; match protocol &lt;STRONG style="color: #0000ff;"&gt;dns&lt;/STRONG&gt;&amp;nbsp; match protocol &lt;STRONG style="color: #ff0000;"&gt;icmp&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/BLOCKQUOTE&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Configure a policy-map to inspect traffic on the class-maps you&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; just defined: &lt;/P&gt;&lt;BLOCKQUOTE class="jive-quote"&gt;&lt;PRE&gt;conf t
 policy-map type inspect private-internet-policy
&amp;nbsp; class type inspect internet-traffic-class
&amp;nbsp;&amp;nbsp; &lt;STRONG style="color: #0000ff;"&gt;inspect&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/BLOCKQUOTE&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Configure the private and Internet zones and assign router&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; interfaces to their respective zones: &lt;/P&gt;&lt;BLOCKQUOTE class="jive-quote"&gt;&lt;PRE&gt;conf t
zone security private
zone security internet
int bvi1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 
zone-member security private
int fastethernet 0
zone-member security internet&lt;/PRE&gt;&lt;/BLOCKQUOTE&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Configure the zone-pair and apply the appropriate&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; policy-map.&lt;/P&gt;&lt;P&gt; &lt;STRONG&gt;Note: &lt;/STRONG&gt;You only need to configure the private Internet zone pair at&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; present in order to inspect connections sourced in the private zone traveling&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; to the Internet zone:&lt;/P&gt;&lt;BLOCKQUOTE class="jive-quote"&gt;&lt;PRE&gt;conf t
 zone-pair security private-internet source private destination internet
&amp;nbsp; service-policy type inspect private-internet-policy&lt;/PRE&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;This completes the configuration of the Layer 7 inspection policy&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; on the private Internet zone-pair to allow HTTP, HTTPS, DNS, and ICMP&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; connections from the clients zone to the servers zone&lt;/SPAN&gt; and to apply application&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inspection to HTTP traffic to assure that unwanted traffic is not allowed to&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; pass on TCP 80, HTTP’s service port.&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL type="1"&gt;&lt;LI&gt;&lt;P&gt;Define class-maps that describe the traffic that you want to permit&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; between zones, according to policies described earlier: &lt;/P&gt;&lt;BLOCKQUOTE class="jive-quote"&gt;&lt;PRE&gt;conf t
 class-map type inspect match-any L4-inspect-class
 match protocol &lt;STRONG style="color: #339966;"&gt;tcp&lt;/STRONG&gt; match protocol &lt;STRONG style="color: #339966;"&gt;udp&lt;/STRONG&gt; match protocol &lt;STRONG style="color: #ff0000;"&gt;icmp&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/BLOCKQUOTE&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Configure policy-maps to inspect traffic on the class-maps you just&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; defined:&lt;/P&gt;&lt;BLOCKQUOTE class="jive-quote"&gt;&lt;PRE&gt;conf t
 policy-map type inspect clients-servers-policy
 class type inspect L4-inspect-class
&amp;nbsp; &lt;STRONG style="color: #339966;"&gt;inspect&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/BLOCKQUOTE&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Configure the clients and servers zones and assign router&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; interfaces to their respective zones:&lt;/P&gt;&lt;BLOCKQUOTE class="jive-quote"&gt;&lt;PRE&gt;conf t
zone security clients
zone security servers
int vlan 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 
zone-member security clients
int vlan 2
zone-member security servers&lt;/PRE&gt;&lt;/BLOCKQUOTE&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Configure the zone-pair and apply the appropriate&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; policy-map.&lt;/P&gt;&lt;P&gt; &lt;STRONG&gt;Note: &lt;/STRONG&gt;You only need to configure the clients-servers zone-pair at&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; present, to inspect connections sourced in the clients zone traveling to the&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; servers zone:&lt;/P&gt;&lt;BLOCKQUOTE class="jive-quote"&gt;&lt;PRE&gt;conf t
 zone-pair security clients-servers source clients destination servers
&amp;nbsp; service-policy type inspect clients-servers-policy&lt;/PRE&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;This completes the configuration of the Layer 4 inspection policy&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; for the clients-servers zone-pair to allow all TCP, UDP, and ICMP connections&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; from the client zone to the server zone&lt;/SPAN&gt;. The policy does not apply fixup for&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; subordinate channels, but provides an example of simple policy to accommodate&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; most application connections. &lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Obviously, "Inspect" is used for both L4 (tcp, udp) and L7 (http, dns) inspection.&lt;/P&gt;&lt;P&gt;So, It depends on the protocol being inspected, not on the keyword "inspect".&lt;/P&gt;&lt;P&gt;But I'm not sure what's going on with icmp ? It is in both cases matched and inspected.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Oct 2013 08:25:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/application-inspection-of-zbf-router/m-p/2322814#M311056</guid>
      <dc:creator>Odys (CSC)</dc:creator>
      <dc:date>2013-10-14T08:25:39Z</dc:date>
    </item>
    <item>
      <title>Re: Application Inspection of ZBF Router</title>
      <link>https://community.cisco.com/t5/network-security/application-inspection-of-zbf-router/m-p/2322815#M311058</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;match protocol is using PAM entries( show ip port-map) to categorize traffic and the inspect keyword in the policy-map is for enabling stateful inspection. Now according to Cisco:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/ios-xml/ios/sec_data_zbf/configuration/12-4t/sec-zone-pol-fw.html#GUID-0FA87F61-EC84-44BC-B2FD-7DFE01F9AC39" rel="nofollow"&gt;http://www.cisco.com/en/US/docs/ios-xml/ios/sec_data_zbf/configuration/12-4t/sec-zone-pol-fw.html#GUID-0FA87F61-EC84-44BC-B2FD-7DFE01F9AC39&lt;/A&gt;&lt;/P&gt;&lt;H4&gt;Layer 7 Class Maps and Policy Maps&lt;/H4&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt; Layer 7 class maps can be used in inspect policy maps only for&amp;nbsp; deep packet inspection (DPI). The DPI functionality is delivered through&amp;nbsp; Layer 7 class maps and policy maps. &lt;/P&gt;&lt;P&gt; To create a Layer 7 class map, use the&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; class-map&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; type&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inspect command for the desired protocol. For example, for the HTTP protocol, enter the&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; class-map&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; type&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inspect&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; http command. &lt;/P&gt;&lt;P&gt; The type of class map (for example, HTTP) determines the match&amp;nbsp; criteria that you can use. If you want to specify HTTP traffic that&amp;nbsp; contains Java applets, you must specify a “match response body java”&amp;nbsp; statement in the context of an “inspect HTTP” class map. &lt;/P&gt;&lt;P&gt; A Layer 7 policy map provides application level inspection of traffic. The policy map can include class maps of the same type. &lt;/P&gt;&lt;P&gt; To create a Layer 7 policy map, specify the protocol in the&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; policy-map&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; type&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inspect command. For example, to create a Layer 7 HTTP policy map, use the&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; policy-map&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; type&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inspect&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; http&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; policy-map-name command. Enter the name of the HTTP policy-map for the&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; policy-map-name argument. &lt;/P&gt;&lt;P&gt; If you do not specify a protocol name (for example, if you use the&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; policy-map&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; type&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inspect command), you will create a Layer 3 or Layer 4 policy map, which can only be an inspect type policy map. &lt;/P&gt;&lt;P&gt; A Layer 7 policy map must be contained in a Layer 3 or Layer 4&amp;nbsp; policy map; it cannot be attached directly to a target. To attach a&amp;nbsp; Layer 7 policy map to a top-level policy map, use the&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; service-policy&amp;nbsp; command and specify the application name (that is, HTTP, Internet&amp;nbsp; Message Access Protocol [IMAP], Post Office Protocol, version 3 [POP3],&amp;nbsp; Simple Mail Transfer Protocol [SMTP], or SUN Remote Procedure Call&amp;nbsp; [SUNRPC]). The parent class for a Layer 7 policy should have an explicit&amp;nbsp; match criterion that matches only one Layer 7 protocol before the&amp;nbsp; policy is attached. &lt;/P&gt;&lt;P&gt; If the Layer 7 policy map is in a lower level, you must specify the&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inspect action at the parent level for a Layer 7 policy map. &lt;/P&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So there is indeed a difference between a L3-L4 inspection and a L7 inspection according to this document.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Don't forget to rate helpful posts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Oct 2013 08:43:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/application-inspection-of-zbf-router/m-p/2322815#M311058</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2013-10-14T08:43:26Z</dc:date>
    </item>
    <item>
      <title>Re: Application Inspection of ZBF Router</title>
      <link>https://community.cisco.com/t5/network-security/application-inspection-of-zbf-router/m-p/2322816#M311060</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Cadet,&lt;/P&gt;&lt;P&gt;This is a very helpful reply from you. the following line reveals the mystery of "inspect" within ZFW:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;If you do not specify a protocol name (for example, if you use the&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; policy-map&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; type&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inspect command), you will create a Layer 3 or Layer 4 policy map, which can only be an inspect type policy map. &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In short, it depends on the "type inspect" in the policy-map, not on the "match" in the class-map neither on the "action" in the policy-map.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This implements a L4 inspection&lt;/P&gt;&lt;PRE&gt;&lt;KBD&gt;&lt;STRONG&gt;class-map type inspect match-all c-name&lt;/STRONG&gt;&lt;/KBD&gt;&lt;KBD&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/KBD&gt;&lt;STRONG&gt;&amp;nbsp; &lt;/STRONG&gt;&lt;KBD&gt;&lt;STRONG&gt;match protocol http&lt;/STRONG&gt;&lt;/KBD&gt;&lt;KBD&gt;&lt;STRONG&gt;policy-map type inspect p-name&lt;/STRONG&gt;&lt;/KBD&gt;&lt;KBD&gt;&lt;STRONG&gt;&amp;nbsp; class type inspect c-name&lt;/STRONG&gt;&lt;/KBD&gt;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;inspect&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And this implements a L7 inspection:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&lt;STRONG&gt;class-map type &lt;SPAN style="color: #ff0000;"&gt;inspect http&lt;/SPAN&gt; match-any c-name-httpmethods&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp; match request method bpropfind&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp; match request method bproppatch&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp; match request method connect&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp; match request method index&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp; match request method notify&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-family: courier new,courier; "&gt;policy-map type &lt;SPAN style="color: #ff0000;"&gt;inspect http&lt;/SPAN&gt; p-name-app-http&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-family: courier new,courier; "&gt;&amp;nbsp;&amp;nbsp; class type inspect http &lt;/STRONG&gt;&lt;STRONG&gt;c-name-httpmethods&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-family: courier new,courier; "&gt;&amp;nbsp;&amp;nbsp; log&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-family: courier new,courier; "&gt;&amp;nbsp;&amp;nbsp; reset&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Thank you !&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Oct 2013 12:12:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/application-inspection-of-zbf-router/m-p/2322816#M311060</guid>
      <dc:creator>Odys (CSC)</dc:creator>
      <dc:date>2013-10-14T12:12:55Z</dc:date>
    </item>
    <item>
      <title>Re: Application Inspection of ZBF Router</title>
      <link>https://community.cisco.com/t5/network-security/application-inspection-of-zbf-router/m-p/2322817#M311063</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Oydious,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Obviously, "Inspect" is used for both L4 (tcp, udp) and L7 (http, dns) inspection.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;So, It depends on the protocol being inspected, not on the keyword "inspect".&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;But I'm not sure what's going on with icmp ? It is in both cases matched and inspected.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Answer/&lt;/P&gt;&lt;P&gt;Here is were most people get confused.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using class-maps:&lt;/P&gt;&lt;P&gt;You can match traffic at layer 7,layer 3 or Layer4.&lt;/P&gt;&lt;P&gt;Using match access-list = Layer 4 or layer 3 depending on the structure.&lt;/P&gt;&lt;P&gt;Using match protocol = Matching layer 7 ( layer 4 if match protocol tcp,udp)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, what happens if you want to inspect FTP packets to open additional channels?&lt;/P&gt;&lt;P&gt;You should use a class-map matching the protocol (L7) and then inspect it otherwise the Router will only care about matching the TCP port 21 for FTP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know, it might be difficult to understand it but after taking cases for more than 2 years on TAC regarding this feature I can ensure that I know what I am talking about &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So when talking about Class-maps you can match L7 or L4, what to use will depend on the protocol and what you want to do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Oct 2013 13:20:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/application-inspection-of-zbf-router/m-p/2322817#M311063</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-10-14T13:20:13Z</dc:date>
    </item>
    <item>
      <title>Application Inspection of ZBF Router</title>
      <link>https://community.cisco.com/t5/network-security/application-inspection-of-zbf-router/m-p/2322818#M311065</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI Julio,&lt;/P&gt;&lt;P&gt;So why does Cisco seem to tell the opposite, it's very confusing from them especially when using protocol is only using PAM to get the match instead of an access-list. I didn't say I don't believe you because you seem to have much experience about this but in this case the Cisco documentation is rather misleading( not to say the least).&lt;/P&gt;&lt;P&gt;To add to the confusion this link says exactly what you're telling:&amp;nbsp; &lt;A href="http://www.cisco.com/en/US/products/sw/secursw/ps1018/products_tech_note09186a00808bc994.shtml#stateful-1"&gt;http://www.cisco.com/en/US/products/sw/secursw/ps1018/products_tech_note09186a00808bc994.shtml#stateful-1&lt;/A&gt;&lt;/P&gt;&lt;P&gt;If you're still working with TAC it could be interesting pointing out to Cisco that their docs are inconsistent and/or misleading about this subject.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Don't forget to rate helpful posts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Oct 2013 13:41:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/application-inspection-of-zbf-router/m-p/2322818#M311065</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2013-10-14T13:41:23Z</dc:date>
    </item>
    <item>
      <title>Re: Application Inspection of ZBF Router</title>
      <link>https://community.cisco.com/t5/network-security/application-inspection-of-zbf-router/m-p/2322819#M311066</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Cadet,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How are you man?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not with Cisco any more, I moved to a different company last week actually &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, as we all know there has been always problems with some Cisco documentation (I have found at least 2 documentation bugs related to ZBFW).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At the end all comes to this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if you use a class-map as follows&lt;/P&gt;&lt;P&gt;ip access-list extended test&lt;/P&gt;&lt;P&gt;permit tcp any any eq 21&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect test&lt;/P&gt;&lt;P&gt;match access-group name test&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are basically telling the router whenever you see&amp;nbsp; a packet with TCP destination port 21, it's a match for this class-map&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And U have a policy like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect In-out&lt;/P&gt;&lt;P&gt;class test&lt;/P&gt;&lt;P&gt;inspect&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will be inspecting that traffic but what the router will care about is:&lt;/P&gt;&lt;P&gt;Just inspect traffic that matches destination port 21.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you do it like this instead&lt;/P&gt;&lt;P&gt;class-map type inspect test&lt;/P&gt;&lt;P&gt;match protocol ftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The router will now inspect the traffic as FTP traffic not just as TCP destination port 21.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That's it &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that I explained it properly&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jcarvaja&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Oct 2013 13:53:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/application-inspection-of-zbf-router/m-p/2322819#M311066</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-10-14T13:53:07Z</dc:date>
    </item>
    <item>
      <title>Application Inspection of ZBF Router</title>
      <link>https://community.cisco.com/t5/network-security/application-inspection-of-zbf-router/m-p/2322820#M311070</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm doing fine,thanks and I hope you too&amp;nbsp; &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I wish you the best in your new position.&lt;/P&gt;&lt;P&gt;Thanks for the explanation and&amp;nbsp; sorry for misleading the OP with this link content which is very confusing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Don't forget to rate helpful posts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Oct 2013 14:08:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/application-inspection-of-zbf-router/m-p/2322820#M311070</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2013-10-14T14:08:47Z</dc:date>
    </item>
    <item>
      <title>Re: Application Inspection of ZBF Router</title>
      <link>https://community.cisco.com/t5/network-security/application-inspection-of-zbf-router/m-p/2322821#M311072</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Cadet,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank U man,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's always a pleasure to help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jcarvaja&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Oct 2013 14:41:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/application-inspection-of-zbf-router/m-p/2322821#M311072</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-10-14T14:41:22Z</dc:date>
    </item>
    <item>
      <title>Re: Application Inspection of ZBF Router</title>
      <link>https://community.cisco.com/t5/network-security/application-inspection-of-zbf-router/m-p/2322822#M311075</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great Example... Jcarvaja&lt;/P&gt;&lt;P&gt;I've got it&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would you please post your answer here too:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://learningnetwork.cisco.com/thread/61307?tstart=0"&gt;https://learningnetwork.cisco.com/thread/61307?tstart=0&lt;/A&gt;&lt;/P&gt;&lt;P&gt;It's the same question, but no one could answer it yet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks a lot !&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Oct 2013 15:00:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/application-inspection-of-zbf-router/m-p/2322822#M311075</guid>
      <dc:creator>Odys (CSC)</dc:creator>
      <dc:date>2013-10-14T15:00:19Z</dc:date>
    </item>
    <item>
      <title>Re: Application Inspection of ZBF Router</title>
      <link>https://community.cisco.com/t5/network-security/application-inspection-of-zbf-router/m-p/2322823#M311077</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sure, I will.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Was a pleasure to help &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Oct 2013 15:07:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/application-inspection-of-zbf-router/m-p/2322823#M311077</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-10-14T15:07:27Z</dc:date>
    </item>
  </channel>
</rss>

