<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Problem with Zone_based Firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/problem-with-zone-based-firewall/m-p/2044948#M397996</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello Sarbjit,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have pass configured then you need to have another policy to permit the traffic&amp;nbsp; from outside to inside as follows&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 100 permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-all out_in&lt;/P&gt;&lt;P&gt; match access-group 100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect out_in&lt;/P&gt;&lt;P&gt; class type inspect out_in&lt;/P&gt;&lt;P&gt;&amp;nbsp; pass&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone-pair security out_in source&amp;nbsp; outside destination inside &lt;/P&gt;&lt;P&gt;service-policy type inspect out_in&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you give inspect instead of pass, in your present policy ( please give no pass) and&amp;nbsp; the incoming traffic should work wven without the outside to inside permission&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try it out and let me know&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Harish.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 08 Oct 2012 08:17:26 GMT</pubDate>
    <dc:creator>Harish Balakrishnan</dc:creator>
    <dc:date>2012-10-08T08:17:26Z</dc:date>
    <item>
      <title>Problem with Zone_based Firewall</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-zone-based-firewall/m-p/2044946#M397994</link>
      <description>&lt;P&gt;Hello &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt;"&gt;I have ISR router with (C2800NM-ADVENTERPRISEK9-M), Version 15.1(4)M3. The router has normal internet connection settings with nat &amp;amp; all the users are accessing internet via this router, everything is working fine till this point.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt;"&gt;I decided to configure zone based firewall on the router i have configured my router with basic config to check the results &amp;amp; everything stop working. No one can access internet neither other apps (outlook) after this config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt;"&gt;I am very much new to cisco security &amp;amp; I am looking help if someone checks my config is it correct or not &amp;amp; why these setting are nt working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;N-ROUTER#sh running-config | section class-map&lt;/P&gt;&lt;P&gt;class-map type inspect match-any CLASS_MAP_IN_TO_OUT&lt;/P&gt;&lt;P&gt; match protocol icmp&lt;/P&gt;&lt;P&gt; match protocol http&lt;/P&gt;&lt;P&gt; match protocol https&lt;/P&gt;&lt;P&gt; match protocol pop3&lt;/P&gt;&lt;P&gt; match protocol smtp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;N-ROUTER#sh running-config | section policy-map&lt;/P&gt;&lt;P&gt;policy-map type inspect POLICY_MAP_IN_TO_OUT&lt;/P&gt;&lt;P&gt; class type inspect CLASS_MAP_IN_TO_OUT&lt;/P&gt;&lt;P&gt;&amp;nbsp; pass &lt;SPAN style="color: #ff0000;"&gt;(I used pass &amp;amp; inspect both&lt;/SPAN&gt;)&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp; drop&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;N-ROUTER#s run | sec zone-pair&lt;/P&gt;&lt;P&gt; zone-pair security ZONE_PAIR_IN_TO_OUT source INSIDE destination OUTSIDE&lt;/P&gt;&lt;P&gt; service-policy type inspect POLICY_MAP_IN_TO_OUT&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:05:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-zone-based-firewall/m-p/2044946#M397994</guid>
      <dc:creator>Sabby0115</dc:creator>
      <dc:date>2019-03-12T00:05:53Z</dc:date>
    </item>
    <item>
      <title>Problem with Zone_based Firewall</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-zone-based-firewall/m-p/2044947#M397995</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;could you add in global config: ip inspect log drop-pkt and also add a log&amp;nbsp; to your class-default&lt;/P&gt;&lt;P&gt;You must have an inspect for the traffic in class-map in-to-out otherwise you shall have to do another policy from out to in with a pass for the return traffic.&lt;/P&gt;&lt;P&gt;Could you also post the output of sh run interface to see which is inside and which is outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Don't forget to rate helpful posts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Oct 2012 08:11:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-zone-based-firewall/m-p/2044947#M397995</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2012-10-08T08:11:40Z</dc:date>
    </item>
    <item>
      <title>Problem with Zone_based Firewall</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-zone-based-firewall/m-p/2044948#M397996</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello Sarbjit,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have pass configured then you need to have another policy to permit the traffic&amp;nbsp; from outside to inside as follows&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 100 permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-all out_in&lt;/P&gt;&lt;P&gt; match access-group 100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect out_in&lt;/P&gt;&lt;P&gt; class type inspect out_in&lt;/P&gt;&lt;P&gt;&amp;nbsp; pass&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone-pair security out_in source&amp;nbsp; outside destination inside &lt;/P&gt;&lt;P&gt;service-policy type inspect out_in&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you give inspect instead of pass, in your present policy ( please give no pass) and&amp;nbsp; the incoming traffic should work wven without the outside to inside permission&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try it out and let me know&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Harish.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Oct 2012 08:17:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-zone-based-firewall/m-p/2044948#M397996</guid>
      <dc:creator>Harish Balakrishnan</dc:creator>
      <dc:date>2012-10-08T08:17:26Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with Zone_based Firewall</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-zone-based-firewall/m-p/2044949#M397997</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/people/cadetalain" id="jive-712108324113803524726" rel="nofollow" style="border-collapse: collapse; list-style: none; outline: none; color: #000000; font-weight: bold; float: left;"&gt;cadet alain&lt;/A&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; padding: 0px 0px 4px; float: left; width: auto; z-index: 3; zoom: 1; color: #777777; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp; &amp;amp; &lt;A _jive_internal="true" href="https://community.cisco.com/people/haribala" id="jive-5072778324113891911756" rel="nofollow" style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; outline: none; color: #000000; font-weight: bold; font-family: Arial, verdana, sans-serif;"&gt;Harish Balakrishnan&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you to both of you... &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As suggested I changed &lt;STRONG&gt;pass to inspect&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;I believe it was a silly mistake made by me , i did not put match protocol dns now I insert it in class map &amp;amp; everything back on track.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my config kindly check it &amp;amp; please tell me if anything else is wrong with it &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;=========================================&lt;/P&gt;&lt;P&gt;N-ROUTER#sh running-config | section class-map &lt;/P&gt;&lt;P&gt;class-map type inspect match-any CLASS_MAP_IN_TO_OUT&lt;/P&gt;&lt;P&gt; match protocol icmp&lt;/P&gt;&lt;P&gt; match protocol http&lt;/P&gt;&lt;P&gt; match protocol https&lt;/P&gt;&lt;P&gt; match protocol pop3&lt;/P&gt;&lt;P&gt; match protocol smtp&lt;/P&gt;&lt;P&gt; &lt;STRONG&gt;match protocol dns&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;N-ROUTER#sh running-config | section policy-map&lt;/P&gt;&lt;P&gt;policy-map type inspect POLICY_MAP_IN_TO_OUT&lt;/P&gt;&lt;P&gt; class type inspect CLASS_MAP_IN_TO_OUT&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;STRONG&gt;inspect &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;STRONG&gt;drop log&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;N-ROUTER#s run | sec zone&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;zone security INSIDE&lt;/P&gt;&lt;P&gt;zone security OUTSIDE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone-pair security ZONE_PAIR_IN_TO_OUT source INSIDE destination OUTSIDE&lt;/P&gt;&lt;P&gt; service-policy type inspect POLICY_MAP_IN_TO_OUT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; zone-member security OUTSIDE&lt;/P&gt;&lt;P&gt; zone-member security INSIDE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; interface FastEthernet0/0&lt;/P&gt;&lt;P&gt; ip address x.x.x.x 255.255.255.248&lt;/P&gt;&lt;P&gt; ip nat outside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly in&lt;/P&gt;&lt;P&gt; zone-member security OUTSIDE&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface FastEthernet0/1&lt;/P&gt;&lt;P&gt; ip address x.x.x.x 255.255.255.0&lt;/P&gt;&lt;P&gt; ip access-group TRAFFIC_SHAPE in&lt;/P&gt;&lt;P&gt; ip nbar protocol-discovery&lt;/P&gt;&lt;P&gt; ip nat inside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly in&lt;/P&gt;&lt;P&gt; zone-member security INSIDE&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Oct 2012 08:47:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-zone-based-firewall/m-p/2044949#M397997</guid>
      <dc:creator>Sabby0115</dc:creator>
      <dc:date>2012-10-08T08:47:43Z</dc:date>
    </item>
    <item>
      <title>Problem with Zone_based Firewall</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-zone-based-firewall/m-p/2044950#M397998</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello Sarbjit,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you remove the ACL TRAFFIC_SHAPE&amp;nbsp; from the interface f0/1 as zone based firewall and acl are not advisable to use together&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;Harish.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Oct 2012 09:20:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-zone-based-firewall/m-p/2044950#M397998</guid>
      <dc:creator>Harish Balakrishnan</dc:creator>
      <dc:date>2012-10-08T09:20:28Z</dc:date>
    </item>
    <item>
      <title>Problem with Zone_based Firewall</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-zone-based-firewall/m-p/2044951#M397999</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="margin: 0in 0in 0.0001pt; background-color: #f7fafb;"&gt;Hello&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt; background-color: #f7fafb;"&gt;I removed the acl &amp;amp; checked it is working fine but I have proxy server configure inside my network &amp;amp; I am using that access list to block uncontrolled users it is just one one allowed statement...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt; background-color: #f7fafb;"&gt; one more thing after configuring ios firewll i have notice that my sip link is not working. which is configured on PBX (panasonic). but if i am using same sip link from my mobile (connected to wireless) it is working... any idea?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt; background-color: #f7fafb;"&gt;Ip access-list ext TRAFFIC_SHAPE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;permit tcp host x.x.x.x&amp;nbsp; any eq www &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0.0001pt; background-color: #f7fafb;"&gt;Pls suggest will it ok to use or not? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Oct 2012 10:05:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-zone-based-firewall/m-p/2044951#M397999</guid>
      <dc:creator>Sabby0115</dc:creator>
      <dc:date>2012-10-09T10:05:43Z</dc:date>
    </item>
    <item>
      <title>Problem with Zone_based Firewall</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-zone-based-firewall/m-p/2044952#M398000</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For SIP to work, you can modify the class map to accomodate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;match protocol sip&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regarding the proxy you can achive this with the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 100 permit ip host &lt;PROXY&gt; any&lt;/PROXY&gt;&lt;/P&gt;&lt;P&gt;access-list 100 deny&amp;nbsp;&amp;nbsp; ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-all NEW_CLASS&lt;/P&gt;&lt;P&gt; match class-map CLASS_MAP_IN_TO_OUT&lt;/P&gt;&lt;P&gt; match access-group 100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect POLICY_MAP_IN_TO_OUT&lt;/P&gt;&lt;P&gt;no class type inspect CLASS_MAP_IN_TO_OUT&lt;/P&gt;&lt;P&gt;class-map type inspect match-all NEW_CLASS&lt;/P&gt;&lt;P&gt;inspect&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;.. and you should be done &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please rate all helpful post!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Harish.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Oct 2012 10:25:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-zone-based-firewall/m-p/2044952#M398000</guid>
      <dc:creator>Harish Balakrishnan</dc:creator>
      <dc:date>2012-10-09T10:25:33Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with Zone_based Firewall</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-zone-based-firewall/m-p/2044953#M398001</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry I am troubling you&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think this is typo &lt;STRONG style="color: #3366ff; "&gt;class-map type inspect match-all NEW_CLASS&lt;/STRONG&gt; it should be class &lt;STRONG style="color: #ff9900;"&gt;class type inspect NEW_CLASS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;====&lt;/P&gt;&lt;P&gt;match protocol sip&lt;/P&gt;&lt;P&gt;i already configured, but as i mentioned it is working on cell phones but it is not working from PBX.....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;====&lt;/P&gt;&lt;P&gt;as i understand, is it gouping the multiple&amp;nbsp; class-maps under another class-map?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for you kind help&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Oct 2012 11:22:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-zone-based-firewall/m-p/2044953#M398001</guid>
      <dc:creator>Sabby0115</dc:creator>
      <dc:date>2012-10-09T11:22:39Z</dc:date>
    </item>
    <item>
      <title>Problem with Zone_based Firewall</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-zone-based-firewall/m-p/2044954#M398002</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; hello Sarbjit,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No problem at all...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no it is not a typo.. it should be like that only.. yes they are nested class maps and new class map with match all tag..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regarding SIP .. Not sure.. why it is broken.. i have faced the issue in ASA but after disabling the inspection it got worked.. what you can do here is to create another access list that matches SIP device IP and create another class map and call that as the first class map in policy map then 'pass' it instead of 'inspect'.. but then you need to have another policy map in outside- inside direction to allow the retun traffic to the SIP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hope this helps&lt;/P&gt;&lt;P&gt;Harish.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Oct 2012 11:56:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-zone-based-firewall/m-p/2044954#M398002</guid>
      <dc:creator>Harish Balakrishnan</dc:creator>
      <dc:date>2012-10-09T11:56:31Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with Zone_based Firewall</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-zone-based-firewall/m-p/2044955#M398003</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;kindly chk my config.....&amp;amp; pls make the changes if requried&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh run | sec policy-map &lt;/P&gt;&lt;P&gt;policy-map type inspect POLICY_MAP_IN_TO_OUT&lt;/P&gt;&lt;P&gt; class type inspect CLASS_MAP_TORRENT&lt;/P&gt;&lt;P&gt;&amp;nbsp; drop log&lt;/P&gt;&lt;P&gt; class type inspect PROXY_CLIENTS&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect &lt;/P&gt;&lt;P&gt; class type inspect CLASS_MAP_IN_TO_OUT&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp; drop log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh run | sec class-map&lt;/P&gt;&lt;P&gt;class-map type inspect match-any CLASS_MAP_IN_TO_OUT&lt;/P&gt;&lt;P&gt; match protocol icmp&lt;/P&gt;&lt;P&gt; match protocol http&lt;/P&gt;&lt;P&gt; match protocol https&lt;/P&gt;&lt;P&gt; match protocol pop3&lt;/P&gt;&lt;P&gt; match protocol smtp&lt;/P&gt;&lt;P&gt; match protocol dns&lt;/P&gt;&lt;P&gt; match protocol sip&lt;/P&gt;&lt;P&gt; match protocol stun&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any CLASS_MAP_TORRENT&lt;/P&gt;&lt;P&gt; match protocol bittorrent&lt;/P&gt;&lt;P&gt; match protocol kazaa2&lt;/P&gt;&lt;P&gt; match protocol edonkey&lt;/P&gt;&lt;P&gt; match protocol gnutella&lt;/P&gt;&lt;P&gt; match protocol winmx&lt;/P&gt;&lt;P&gt; match protocol rtsp&lt;/P&gt;&lt;P&gt; match protocol realmedia&lt;/P&gt;&lt;P&gt; match protocol streamworks&lt;/P&gt;&lt;P&gt; match protocol fasttrack&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-all PROXY_CLIENTS&lt;/P&gt;&lt;P&gt; match class-map CLASS_MAP_IN_TO_OUT&lt;/P&gt;&lt;P&gt; match access-group 101&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Oct 2012 14:07:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-zone-based-firewall/m-p/2044955#M398003</guid>
      <dc:creator>Sabby0115</dc:creator>
      <dc:date>2012-10-09T14:07:10Z</dc:date>
    </item>
  </channel>
</rss>

