<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Save running-config out WAN port? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/save-running-config-out-wan-port/m-p/2099636#M392452</link>
    <description>&lt;P&gt;Hi all.&amp;nbsp; As I look at the thread headings fo rthe other posts I'm struck by how simple my request must seem &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; I hope this is an easy one!&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using 891W routers, I would like to be able to save the running-config out the WAN port (gig0).&amp;nbsp; The most common scenario is that I am SSH'd into a router, but the LAN doesn't have a TFTP server nor is it ideal to put one in there.&amp;nbsp; So I want to save the routers config to myself here somehow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The site that has the rotuer I want to save from is connected via L2L IPSec VPN to head office, and through that tunnel I can ping, RDP, whatever.&amp;nbsp; However, I cannot save the running-config even to a machine on that LAN that has a TFTP server.&amp;nbsp; It just seems TFTP is blocked by default from sending anything out on the WAN port.&amp;nbsp; I've enabled all traffic between these two routers in the ZBFW, but still it doesn't work.&amp;nbsp; I think blocking TFTP from sending out the WAN port might be hard-coded into the IOS or something. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anybody have thoughts on this?&amp;nbsp; Thank you.&amp;nbsp; &lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 00:50:09 GMT</pubDate>
    <dc:creator>cluovpemb</dc:creator>
    <dc:date>2019-03-12T00:50:09Z</dc:date>
    <item>
      <title>Save running-config out WAN port?</title>
      <link>https://community.cisco.com/t5/network-security/save-running-config-out-wan-port/m-p/2099636#M392452</link>
      <description>&lt;P&gt;Hi all.&amp;nbsp; As I look at the thread headings fo rthe other posts I'm struck by how simple my request must seem &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; I hope this is an easy one!&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using 891W routers, I would like to be able to save the running-config out the WAN port (gig0).&amp;nbsp; The most common scenario is that I am SSH'd into a router, but the LAN doesn't have a TFTP server nor is it ideal to put one in there.&amp;nbsp; So I want to save the routers config to myself here somehow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The site that has the rotuer I want to save from is connected via L2L IPSec VPN to head office, and through that tunnel I can ping, RDP, whatever.&amp;nbsp; However, I cannot save the running-config even to a machine on that LAN that has a TFTP server.&amp;nbsp; It just seems TFTP is blocked by default from sending anything out on the WAN port.&amp;nbsp; I've enabled all traffic between these two routers in the ZBFW, but still it doesn't work.&amp;nbsp; I think blocking TFTP from sending out the WAN port might be hard-coded into the IOS or something. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anybody have thoughts on this?&amp;nbsp; Thank you.&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:50:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/save-running-config-out-wan-port/m-p/2099636#M392452</guid>
      <dc:creator>cluovpemb</dc:creator>
      <dc:date>2019-03-12T00:50:09Z</dc:date>
    </item>
    <item>
      <title>Save running-config out WAN port?</title>
      <link>https://community.cisco.com/t5/network-security/save-running-config-out-wan-port/m-p/2099637#M392456</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Colin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you see a log from the ZBFW while you perform the TFTP transaction?? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you using self-zones??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Jan 2013 18:26:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/save-running-config-out-wan-port/m-p/2099637#M392456</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-01-21T18:26:57Z</dc:date>
    </item>
    <item>
      <title>Save running-config out WAN port?</title>
      <link>https://community.cisco.com/t5/network-security/save-running-config-out-wan-port/m-p/2099638#M392458</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ZBF can't inspect TFTP because the intial traffic from client to server goes to UDP port 69 but the return traffic comes from a high number port that is not 69. So you'll have to do a policy-map that has an action of pass from your TFTP server and apply it on a zone-pair with source as zone where this server is located and destination is the zone where the client is located.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Don't forget to rate helpful posts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Jan 2013 20:05:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/save-running-config-out-wan-port/m-p/2099638#M392458</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2013-01-21T20:05:57Z</dc:date>
    </item>
    <item>
      <title>Save running-config out WAN port?</title>
      <link>https://community.cisco.com/t5/network-security/save-running-config-out-wan-port/m-p/2099639#M392460</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Julio, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Self zones in use are only the OUT-SELF.&amp;nbsp; No SELF-OUT.&amp;nbsp; The L2L VPN works now.&amp;nbsp; The ZBFW setup to allow the VPN to work is one ACL within a 2nd class map inside the OUTSIDE-INSIDE policy map allowing all traffic from one LAN network to the other and this is set on both routers (inversing the network IDs of course).&amp;nbsp; Also to allow the VPN tunnel itself to form, there is an ACL in a 2nd class map on within the OUT-SELF policy map, which allows traffic between the two rouer WAN port IP's (allowing port 500, non500, and all esp).&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But what confuses me is this.&amp;nbsp; If I edit that ACL governing the two VPN endpoints, so that instead of just port 500 and such I also say to permit ip any any, I can for example SSH from one router CLI to the other router CLI, whereas without adding this entry to the ACL, I cannot so I know failry surely that this perit ip any any opens any traffic between the two routers.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But this is likely where my lack of understanding of VPN comes in.&amp;nbsp; I imagine I am not actually sending TFTP files through the VPN then...in effect I'm trying to send a TFTP file from one router, to the LAN side of the other router.&amp;nbsp; Perhaps not possible?&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm actally confusing myself here the more I type.&amp;nbsp; I'll leave this post for now, read Alain's and will reply there.&amp;nbsp; &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" height="16" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif" width="16"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jan 2013 22:06:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/save-running-config-out-wan-port/m-p/2099639#M392460</guid>
      <dc:creator>cluovpemb</dc:creator>
      <dc:date>2013-01-22T22:06:56Z</dc:date>
    </item>
    <item>
      <title>Save running-config out WAN port?</title>
      <link>https://community.cisco.com/t5/network-security/save-running-config-out-wan-port/m-p/2099640#M392463</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Colin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yeah, just try to use a Pass rule between the self-out, out-self so this can work &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could also add the &lt;/P&gt;&lt;P&gt;ip inspect log drop-pkt &lt;/P&gt;&lt;P&gt;so you can determine where the packet is being dropped,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jan 2013 22:13:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/save-running-config-out-wan-port/m-p/2099640#M392463</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-01-22T22:13:47Z</dc:date>
    </item>
    <item>
      <title>Save running-config out WAN port?</title>
      <link>https://community.cisco.com/t5/network-security/save-running-config-out-wan-port/m-p/2099641#M392466</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I guess where I get confused most with this is that the destination is the TFTP server on the Inside zone (LAN) on one router, and the source is the self zone on a different router.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is really confusing me is this VPN thing.&amp;nbsp; I have much reading to do still (I'm still not at the VPN/security portion of my CCNA study), but as I undeerstand it, anything destined for the LAN of the remote router will tunnel through the VPN.&amp;nbsp; With that in mind, my current setup is to allow all traffic between the two LANs via a simple permit ip any any ACL on each router and an nispect action applied.&amp;nbsp; Via this tunnel I can ping, do RDP, and so on.&amp;nbsp; However this is from LAN to LAN, not Router1 to LAN on the other router.&amp;nbsp; Hence why I thought also having permit ip any any on the ACL governing the traffic from one router's WAN IP to the local router's WAN IP would do it. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But now that I think about it, back when I had these routers in the lab and not in production, before I even knew what ZBFW was , I aso could not TFTP out of the WAN port I don't think.&amp;nbsp; If only I could test right now! &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" height="16" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif" width="16"&gt;&lt;/SPAN&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jan 2013 22:24:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/save-running-config-out-wan-port/m-p/2099641#M392466</guid>
      <dc:creator>cluovpemb</dc:creator>
      <dc:date>2013-01-22T22:24:04Z</dc:date>
    </item>
    <item>
      <title>Save running-config out WAN port?</title>
      <link>https://community.cisco.com/t5/network-security/save-running-config-out-wan-port/m-p/2099642#M392469</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Sorry Julio, I just realized I never answered about the packet log.&amp;nbsp; Well first of all, there is no self-out zone pair, just out-self.&amp;nbsp; As I udnerstand it, no self-out means that since no pair is defined, all traffic in that direction is allowed.&amp;nbsp; but in any case, I didn't see anything in the packet log, I think, however I'll try it again today to be sure.&amp;nbsp; Both routers were accessed via ssh and perhaps I forgot to do terminal monitor to see the console output.&amp;nbsp; Can't troubleshoot much if I don't even know what's blocking it right?&amp;nbsp; Will post back again later. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jan 2013 13:26:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/save-running-config-out-wan-port/m-p/2099642#M392469</guid>
      <dc:creator>cluovpemb</dc:creator>
      <dc:date>2013-01-23T13:26:57Z</dc:date>
    </item>
    <item>
      <title>Save running-config out WAN port?</title>
      <link>https://community.cisco.com/t5/network-security/save-running-config-out-wan-port/m-p/2099643#M392471</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As soon as you set a zone-pair for the self-zone traffic on the opposite way will be restricted ( This is the default behavior for any zone)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please provide the logs and add the out-self self-out zone-pair &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jan 2013 16:36:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/save-running-config-out-wan-port/m-p/2099643#M392471</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-01-23T16:36:29Z</dc:date>
    </item>
  </channel>
</rss>

