<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Query regarding ZBFW configuration in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/query-regarding-zbfw-configuration/m-p/3848910#M31173</link>
    <description>&lt;P&gt;Hi, sure, please see below&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;policy-map type inspect POLICY-TRUSTED-2-INTERNET&lt;BR /&gt;class type inspect CLASS-IN-OUT&lt;BR /&gt;inspect&lt;BR /&gt;class type inspect CLASS-ICMP&lt;BR /&gt;pass&lt;BR /&gt;class type inspect CLASS-IN-OUT-HTTP&lt;BR /&gt;inspect&lt;BR /&gt;class type inspect CLASS-IN-OUT-HTTPS&lt;BR /&gt;inspect&lt;BR /&gt;class type inspect CLASS-IN-OUT-NON-STD-HTTP-HTTPS&lt;BR /&gt;inspect&lt;BR /&gt;class class-default&lt;BR /&gt;drop log&lt;BR /&gt;policy-map type inspect POLICY-INTERNET-2-TRUSTED&lt;BR /&gt;class type inspect CLASS-ICMP&lt;BR /&gt;pass&lt;BR /&gt;class type inspect CLASS-OUT-IN&lt;BR /&gt;pass&lt;BR /&gt;class class-default&lt;BR /&gt;drop&lt;BR /&gt;!&lt;BR /&gt;zone security trusted&lt;BR /&gt;zone security internet&lt;BR /&gt;zone-pair security ZP-INTERNET-2-TRUSTED source internet destination trusted&lt;BR /&gt;service-policy type inspect POLICY-INTERNET-2-TRUSTED&lt;BR /&gt;zone-pair security ZP-TRUSTED-2-INTERNET source trusted destination internet&lt;BR /&gt;service-policy type inspect POLICY-TRUSTED-2-INTERNET&lt;BR /&gt;!&lt;/P&gt;</description>
    <pubDate>Thu, 02 May 2019 08:36:34 GMT</pubDate>
    <dc:creator>darren-carr</dc:creator>
    <dc:date>2019-05-02T08:36:34Z</dc:date>
    <item>
      <title>Query regarding ZBFW configuration</title>
      <link>https://community.cisco.com/t5/network-security/query-regarding-zbfw-configuration/m-p/3848728#M31134</link>
      <description>&lt;P&gt;Hi community,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are experiencing an issue with regards to a specific flow we are trying to permit through and then back in through the ZBFW we have deployed. The flow is defined below. The flow is slightly unusual in that we are using TCP traceroute towards the destination and would like to allow ICMP TTL Exceeded back in. This is to provide path visualisation for a monitoring tool we have deployed in our environment. For the IN traffic source, the source is any as this relates to routed hops in the path towards the destination.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;OUT: src_ip: 10.1.1.1, src_port: random, dst_ip: msft-o365, dst_port: 443&lt;/P&gt;&lt;P&gt;IN: src_ip: any, src_port: N/A, dst_ip: 10.1.1.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have deployed the configuration below. The initial HTTPS communication is permitted and is working (we know this as we have other tests enabled to HTTPS targets) but the ICMP TTL Exeeded we are not getting back.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm looking for some advice as to what might be causing this and what we need to adjust to permit this flow?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ip access-list extended ACL-TEST-AGENTS&lt;BR /&gt;permit ip host 10.1.1.1 any&lt;BR /&gt;permit ip any host 10.1.1.1&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended ACL-TEST-PROTOCOL&lt;BR /&gt;permit icmp any any&lt;BR /&gt;deny ip any any&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended ACL-TRUSTED-LAN&lt;BR /&gt;permit ip 10.1.1.0 0.0.0.255 any&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended ACL-ICMP&lt;BR /&gt;permit icmp any any unreachable&lt;BR /&gt;permit icmp any any source-quench&lt;BR /&gt;permit icmp any any time-exceeded&lt;BR /&gt;deny ip any any&lt;BR /&gt;!&lt;BR /&gt;class-map type inspect match-all CLASS-IN-OUT&lt;BR /&gt;match access-group name ACL-TEST-PROTOCOL&lt;BR /&gt;match access-group name ACL-TEST-AGENTS&lt;BR /&gt;match protocol icmp&lt;BR /&gt;!&lt;BR /&gt;class-map type inspect match-all CLASS-OUT-IN&lt;BR /&gt;match access-group name ACL-TEST-PROTOCOL&lt;BR /&gt;match access-group name ACL-TEST-AGENTS&lt;BR /&gt;match protocol icmp&lt;BR /&gt;!&lt;BR /&gt;class-map type inspect match-all CLASS-ICMP&lt;BR /&gt;match access-group name ACL-ICMP&lt;BR /&gt;match protocol icmp&lt;BR /&gt;!&lt;BR /&gt;class-map type inspect match-all CLASS-IN-OUT-HTTPS&lt;BR /&gt;match access-group name ACL-TRUSTED-LAN&lt;BR /&gt;match protocol https&lt;BR /&gt;!&lt;BR /&gt;class-map type inspect match-all CLASS-IN-OUT-HTTP&lt;BR /&gt;match access-group name ACL-TRUSTED-LAN&lt;BR /&gt;match protocol http&lt;BR /&gt;!&lt;BR /&gt;class type inspect CLASS-IN-OUT&lt;BR /&gt;inspect&lt;BR /&gt;!&lt;BR /&gt;class type inspect CLASS-ICMP&lt;BR /&gt;pass&lt;BR /&gt;!&lt;BR /&gt;class type inspect CLASS-OUT-IN&lt;BR /&gt;pass&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 01 May 2019 21:21:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/query-regarding-zbfw-configuration/m-p/3848728#M31134</guid>
      <dc:creator>darren-carr</dc:creator>
      <dc:date>2019-05-01T21:21:45Z</dc:date>
    </item>
    <item>
      <title>Re: Query regarding ZBFW configuration</title>
      <link>https://community.cisco.com/t5/network-security/query-regarding-zbfw-configuration/m-p/3848907#M31153</link>
      <description>Hi,&lt;BR /&gt;Can you provide the output of the configuration of your zone-pairs and policy-maps please.</description>
      <pubDate>Thu, 02 May 2019 08:31:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/query-regarding-zbfw-configuration/m-p/3848907#M31153</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-05-02T08:31:34Z</dc:date>
    </item>
    <item>
      <title>Re: Query regarding ZBFW configuration</title>
      <link>https://community.cisco.com/t5/network-security/query-regarding-zbfw-configuration/m-p/3848910#M31173</link>
      <description>&lt;P&gt;Hi, sure, please see below&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;policy-map type inspect POLICY-TRUSTED-2-INTERNET&lt;BR /&gt;class type inspect CLASS-IN-OUT&lt;BR /&gt;inspect&lt;BR /&gt;class type inspect CLASS-ICMP&lt;BR /&gt;pass&lt;BR /&gt;class type inspect CLASS-IN-OUT-HTTP&lt;BR /&gt;inspect&lt;BR /&gt;class type inspect CLASS-IN-OUT-HTTPS&lt;BR /&gt;inspect&lt;BR /&gt;class type inspect CLASS-IN-OUT-NON-STD-HTTP-HTTPS&lt;BR /&gt;inspect&lt;BR /&gt;class class-default&lt;BR /&gt;drop log&lt;BR /&gt;policy-map type inspect POLICY-INTERNET-2-TRUSTED&lt;BR /&gt;class type inspect CLASS-ICMP&lt;BR /&gt;pass&lt;BR /&gt;class type inspect CLASS-OUT-IN&lt;BR /&gt;pass&lt;BR /&gt;class class-default&lt;BR /&gt;drop&lt;BR /&gt;!&lt;BR /&gt;zone security trusted&lt;BR /&gt;zone security internet&lt;BR /&gt;zone-pair security ZP-INTERNET-2-TRUSTED source internet destination trusted&lt;BR /&gt;service-policy type inspect POLICY-INTERNET-2-TRUSTED&lt;BR /&gt;zone-pair security ZP-TRUSTED-2-INTERNET source trusted destination internet&lt;BR /&gt;service-policy type inspect POLICY-TRUSTED-2-INTERNET&lt;BR /&gt;!&lt;/P&gt;</description>
      <pubDate>Thu, 02 May 2019 08:36:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/query-regarding-zbfw-configuration/m-p/3848910#M31173</guid>
      <dc:creator>darren-carr</dc:creator>
      <dc:date>2019-05-02T08:36:34Z</dc:date>
    </item>
    <item>
      <title>Re: Query regarding ZBFW configuration</title>
      <link>https://community.cisco.com/t5/network-security/query-regarding-zbfw-configuration/m-p/3848939#M31188</link>
      <description>&lt;P&gt;I would imagine the inbound ICMP time-exceeded would match correctly and be permitted.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What OS are you running the traceroute on? Can you run a packet capture, guide &lt;A href="https://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-embedded-packet-capture/116045-productconfig-epc-00.html" target="_self"&gt;here.&lt;/A&gt; Upload the pcap for review&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Does the ICMP time-exceeded match the ACL and policy map? &lt;/P&gt;
&lt;P&gt;"show policy-firewall stats zone-pair ZP-INTERNET-2-TRUSTED"&lt;BR /&gt;"show ip access-list ACL-ICMP"&lt;/P&gt;</description>
      <pubDate>Thu, 02 May 2019 09:43:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/query-regarding-zbfw-configuration/m-p/3848939#M31188</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-05-02T09:43:52Z</dc:date>
    </item>
    <item>
      <title>Re: Query regarding ZBFW configuration</title>
      <link>https://community.cisco.com/t5/network-security/query-regarding-zbfw-configuration/m-p/3856292#M31206</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Apologies for the delay. The ZBF that I created the post for is deployed the other side of the world so I have had to simulate the configuration in our lab. I've managed to do this now and have the captures.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The trace is being executed on a ThousandEyes agent (Linux based). The trace is using TCP. In this case it is using HTTPS for the SYN with an incremental TTL. As part of the configured trace the agent executes three traces. The agent attempts to re-use the same source port for each of the traces as it executes. So for example, it would use source port 50001 with a TTL of 1, it would receive the response back then use the source port of 50001 with a TTL of 2, etc.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are seeing no hits on the ICMP ACL.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So in our scenario we are sending a TCP (HTTPS) payload and expecting an ICMP TTL exceed back. I have captured either side of the firewall and we are seeing HTTPS going out towards the target (from another test) but it appears as though the ZBF is blocking the packets we are using for the TCP traceroute as I don't see these coming out of the ZBF on the INTERNET side of the ZBF. We have proven the ZBF is blocking the traffic as when we change the inside (TRUSTED) interface to (INTERNET - effectively disabling the policy) these packets flow through. So it appears as though the ZBF is dropping these packets. The logging does not reveal much on the TRUSTED-2-INTERNET policy (I need to get the logging adjusted by the ISP).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is this an expected behaviour and do we need to alter the config or enable something to permit this in the ZBF? We tried adjust the HTTPS rule to 'pass' from 'inspect' but this did not appear to have the desired effect.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 May 2019 20:43:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/query-regarding-zbfw-configuration/m-p/3856292#M31206</guid>
      <dc:creator>darren-carr</dc:creator>
      <dc:date>2019-05-14T20:43:08Z</dc:date>
    </item>
  </channel>
</rss>

