<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Unable to connect to SSL VPN website with zone firewall conf in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/unable-to-connect-to-ssl-vpn-website-with-zone-firewall/m-p/2321280#M311630</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Glad is working now. Weird issue, no doubt.&lt;/P&gt;&lt;P&gt;I guess on the deployment guide stated that the firewall wont support TCP inspection to the self zone, however, nested class-maps are used to accomplish that, to be fully honest, I think it is a mess and the best thing to do is have the pass action to self for the protocols you want to and then drop the rest. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let us know if you run into any other issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 04 Oct 2013 16:15:01 GMT</pubDate>
    <dc:creator>Maykol Rojas</dc:creator>
    <dc:date>2013-10-04T16:15:01Z</dc:date>
    <item>
      <title>Unable to connect to SSL VPN website with zone firewall configured</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-connect-to-ssl-vpn-website-with-zone-firewall/m-p/2321273#M311621</link>
      <description>&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;I have recently updated my company 2911 and implemented a Zone Based Firewall.&amp;nbsp; This is my first experience with this and I used Cisco Configuration Professional to build the initial firewall configuration and then edited the names to make it readable by humans.&amp;nbsp; The only problem I can't solve is getting to the SSL VPN website from the outside.&amp;nbsp; I can navigate to the website and connect with no problem from the inside, and even though this was useful to verify that the routing and website was working correctly that's really not what I'm going for.&amp;nbsp; I'm not getting anything on the syslog server for drops due to the firewall or for any other reason but packet captures show that no reply is being received when attempting to navigate to the website from the outside.&amp;nbsp; I'm currently using an IPSEC VPN client solution until I can get this working and have no issues with it.&amp;nbsp; I've attached a sanitized configuration with the relevant lines included (removed ~400 lines including logging, many inspections conducted on traffic from the in-zone to out-zone, and the ipsec vpn that I've mentioned).&amp;nbsp; I've searched for anything relating to this problem and no one has any issue connecting to their website, just in getting other features to work properly.&amp;nbsp; Any thoughts are welcome.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;Show Zone Security&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;zone in-zone&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp; Member Interfaces:&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; GigabitEthernet0/0.15&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; GigabitEthernet0/0.30&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; GigabitEthernet0/0.35&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; GigabitEthernet0/0.45&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;zone out-zone&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp; Member Interfaces:&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;zone sslvpn-zone&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp; Member Interfaces:&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Virtual-Template1&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SSLVPN-VIF0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;I have attempted changing the zone membership on the Virtual-Template1 interface to out-zone to no avail.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;Show Zone-pair Security&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Zone-pair name SSLVPN-TO-IN&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source-Zone sslvpn-zone&amp;nbsp; Destination-Zone in-zone&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; service-policy SSLVPN-TO-IN-POLICY&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Zone-pair name IN-TO-SSLVPN&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source-Zone in-zone&amp;nbsp; Destination-Zone sslvpn-zone&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; service-policy IN-TO-SSLVPN-POLICY&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Zone-pair name SELF-TO-SSLVPN&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source-Zone self&amp;nbsp; Destination-Zone sslvpn-zone&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; service-policy SELF-TO-SSLVPN-POLICY&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Zone-pair name IN-&amp;gt;SELF&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source-Zone in-zone&amp;nbsp; Destination-Zone self&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; service-policy IN-TO-SELF-POLICY&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Zone-pair name IN-&amp;gt;IN&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source-Zone in-zone&amp;nbsp; Destination-Zone in-zone&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; service-policy IN-TO-IN-POLICY&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Zone-pair name SELF-&amp;gt;OUT&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source-Zone self&amp;nbsp; Destination-Zone out-zone&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; service-policy SELF-TO-OUT-POLICY&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Zone-pair name OUT-&amp;gt;SELF&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source-Zone out-zone&amp;nbsp; Destination-Zone self&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; service-policy OUT-TO-SELF-POLICY&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Zone-pair name IN-&amp;gt;OUT&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source-Zone in-zone&amp;nbsp; Destination-Zone out-zone&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; service-policy ALLOW-ALL&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Zone-pair name OUT-&amp;gt;IN&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source-Zone out-zone&amp;nbsp; Destination-Zone in-zone&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; service-policy OUT-TO-IN-POLICY&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Zone-pair name SSLVPN-TO-SELF&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source-Zone sslvpn-zone&amp;nbsp; Destination-Zone self&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; service-policy SSLVPN-TO-SELF-POLICY&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;I have also tried adding a zone-pair for out-zone to sslvpn-zone passing all traffic and it changes nothing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;In-zone Networks&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;G0/0.15&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.16.0.1 /26&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;G0/0.30&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.16.0.65 /26&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;G0/0.35&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.16.0.129 /25&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;G0/0.45&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.18.0.1 /28&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;SSL VPN Pool&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.20.0.1 - 172.20.0.14&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;Current IOS Version:&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Cisco IOS Software, C2900 Software (C2900-UNIVERSALK9-M), Version 15.0(1)M10, RELEASE SOFTWARE (fc1)&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:46:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-connect-to-ssl-vpn-website-with-zone-firewall/m-p/2321273#M311621</guid>
      <dc:creator>Matthew Spire</dc:creator>
      <dc:date>2019-03-12T02:46:45Z</dc:date>
    </item>
    <item>
      <title>Unable to connect to SSL VPN website with zone firewall configur</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-connect-to-ssl-vpn-website-with-zone-firewall/m-p/2321274#M311623</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Matthew&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would you enable the ip inspect log drop-pkt and then do term mon? &lt;/P&gt;&lt;P&gt;I think where the problem may reside, I just need a drop log to confirm it. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Oct 2013 00:32:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-connect-to-ssl-vpn-website-with-zone-firewall/m-p/2321274#M311623</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2013-10-04T00:32:28Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to connect to SSL VPN website with zone firewall conf</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-connect-to-ssl-vpn-website-with-zone-firewall/m-p/2321275#M311625</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for taking a look at this &lt;SPAN style="border-collapse: collapse; color: #000000; font-size: 12px; background-color: #f7fafb; font-family: Arial, verdana, sans-serif; list-style: none;"&gt;Maykol.&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&lt;/P&gt;&lt;P&gt;I actually have that line already in and have used it to troubleshoot various issues already.&amp;nbsp; &lt;SPAN style="font-size: 10pt;"&gt;On the production router I have logging and SNMPv3 configured to send everything to my NMS.&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;When accessing the website from an outside network no packets are shown as dropped but no reply is ever received, which has been verified using a packet capture.&amp;nbsp; This is the part that's really stumping me.&amp;nbsp; I don't know of a debug command specific enough not to crash the router that I could use to look into this further either.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;What was the thought you had?&amp;nbsp; I can still look into it especially since I've run into a brick wall on this.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Oct 2013 00:45:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-connect-to-ssl-vpn-website-with-zone-firewall/m-p/2321275#M311625</guid>
      <dc:creator>Matthew Spire</dc:creator>
      <dc:date>2013-10-04T00:45:34Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to connect to SSL VPN website with zone firewall conf</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-connect-to-ssl-vpn-website-with-zone-firewall/m-p/2321276#M311626</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If any debugs, the ones I would suggest are in regards to web-vpn. &lt;/P&gt;&lt;P&gt;Can you see the firewall listening on port 443? &lt;/P&gt;&lt;P&gt;Run show control-plane host open-ports and see if you catch SSL in there. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Oct 2013 00:55:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-connect-to-ssl-vpn-website-with-zone-firewall/m-p/2321276#M311626</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2013-10-04T00:55:16Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to connect to SSL VPN website with zone firewall conf</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-connect-to-ssl-vpn-website-with-zone-firewall/m-p/2321277#M311627</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;More important, was it running prior putting Zone based in? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Oct 2013 00:55:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-connect-to-ssl-vpn-website-with-zone-firewall/m-p/2321277#M311627</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2013-10-04T00:55:44Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to connect to SSL VPN website with zone firewall conf</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-connect-to-ssl-vpn-website-with-zone-firewall/m-p/2321278#M311628</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Unfortunately the license for SSL VPN was purchased for implementation during the outage I used to upgrade the router and implement the zone based firewall so it wasn't there beforehand.&amp;nbsp; I am able to connect to the website from the inside network though.&amp;nbsp; I'll verify the ports first thing tomorrow morning.&amp;nbsp; Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Matt&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Oct 2013 04:16:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-connect-to-ssl-vpn-website-with-zone-firewall/m-p/2321278#M311628</guid>
      <dc:creator>Matthew Spire</dc:creator>
      <dc:date>2013-10-04T04:16:01Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to connect to SSL VPN website with zone firewall conf</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-connect-to-ssl-vpn-website-with-zone-firewall/m-p/2321279#M311629</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The router is listening on the correct ports.&amp;nbsp; I had the idea to try a static nat statement and I was finally able to receive a dropped packet message.&amp;nbsp; Once I took the tcp inspection off the out-zone to self zone-pair I could access the website from the outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't know why I need the nat statement in order for the website to be reachable, especially since I haven't seen a single instance where that was used in a configuration example, but the fact remains that it's working now.&amp;nbsp; I have some more research to do to see if I can't implement a more specific tcp inspection rule but it's up and working now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the help Mike.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Oct 2013 13:59:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-connect-to-ssl-vpn-website-with-zone-firewall/m-p/2321279#M311629</guid>
      <dc:creator>Matthew Spire</dc:creator>
      <dc:date>2013-10-04T13:59:05Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to connect to SSL VPN website with zone firewall conf</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-connect-to-ssl-vpn-website-with-zone-firewall/m-p/2321280#M311630</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Glad is working now. Weird issue, no doubt.&lt;/P&gt;&lt;P&gt;I guess on the deployment guide stated that the firewall wont support TCP inspection to the self zone, however, nested class-maps are used to accomplish that, to be fully honest, I think it is a mess and the best thing to do is have the pass action to self for the protocols you want to and then drop the rest. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let us know if you run into any other issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Oct 2013 16:15:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-connect-to-ssl-vpn-website-with-zone-firewall/m-p/2321280#M311630</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2013-10-04T16:15:01Z</dc:date>
    </item>
  </channel>
</rss>

