<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco 2911 - VPN Passthrough help in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-2911-vpn-passthrough-help/m-p/2056888#M398436</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Chris,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Okay.. You have not provided any information related to witch is the IP of the external VPN server or if the connection is from inside zone to outside zone.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am going to think that VPN connections are going to be innitiated from both sides of the tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you should create the following:&lt;/P&gt;&lt;P&gt;ip access-list ext VPN_Outbound&lt;/P&gt;&lt;P&gt;permit ip internal_subnet host vpn_server_ip&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;class-map type inspect match-any ccp-protocol-http&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp; match protocol http&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp; match access-group&amp;nbsp; VPN_Outbound&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Then work from outside to inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;zone-pair security sdm-zp-NATOutsideToInside-1 source out-zone destination in-zone&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;service-policy type inspect sdm-pol-NATOutsideToInside-1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list ext vpn_inbound &lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;permit ip vpn_server_ip internal_subnet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any sdm-nat-http-1&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;match access-group name&amp;nbsp; vpn_inbound &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;let me know how it goes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 02 Oct 2012 16:37:00 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2012-10-02T16:37:00Z</dc:date>
    <item>
      <title>Cisco 2911 - VPN Passthrough help</title>
      <link>https://community.cisco.com/t5/network-security/cisco-2911-vpn-passthrough-help/m-p/2056885#M398433</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I few employees within our network require access to an external network using a Nortel VPN client. I am fairly new to firewalls and have configured a simple zone based firewall using Cisco CCP firewall wizard, basic - low security. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Nortel VPN connects successfully but fails at producing a popup that the user has to acknowledge in order for the connection to succeed. &lt;/P&gt;&lt;P&gt;I know the Nortel VPN uses UDP 500 (isakmp), and protocols AH, ESP&lt;/P&gt;&lt;P&gt;I have been able to connect successfully if i change:&lt;/P&gt;&lt;P&gt;class class-default - drop to &lt;/P&gt;&lt;P&gt;class class-default - allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However this is not ideal, how can I allow this traffic without using an allow on unmatched traffic&lt;/P&gt;&lt;P&gt;Hope that makes sense.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect sdm-pol-NATOutsideToInside-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; class type inspect sdm-nat-http-1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; inspect &lt;/P&gt;&lt;P&gt;&amp;nbsp; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; drop&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-all sdm-nat-http-1&lt;/P&gt;&lt;P&gt; match access-group 102&lt;/P&gt;&lt;P&gt; match protocol http&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 102 remark CCP_ACL Category=0&lt;/P&gt;&lt;P&gt;access-list 102 permit ip any host 192.168.0.1&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:02:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-2911-vpn-passthrough-help/m-p/2056885#M398433</guid>
      <dc:creator>Chris Gabel</dc:creator>
      <dc:date>2019-03-12T00:02:34Z</dc:date>
    </item>
    <item>
      <title>Cisco 2911 - VPN Passthrough help</title>
      <link>https://community.cisco.com/t5/network-security/cisco-2911-vpn-passthrough-help/m-p/2056886#M398434</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Chris,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We need more information on this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We need to know the zone-pairs you have set up and their respective policies.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Oct 2012 21:52:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-2911-vpn-passthrough-help/m-p/2056886#M398434</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-10-01T21:52:01Z</dc:date>
    </item>
    <item>
      <title>Cisco 2911 - VPN Passthrough help</title>
      <link>https://community.cisco.com/t5/network-security/cisco-2911-vpn-passthrough-help/m-p/2056887#M398435</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Julio, Thanks for looking at this. The information requested is below, I also have a cisco ipsec vpn client-server setup running that works perfectly, using ezvpn-zone.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-all sdm-nat-http-1&lt;/P&gt;&lt;P&gt; match access-group 102&lt;/P&gt;&lt;P&gt; match protocol http&lt;/P&gt;&lt;P&gt;class-map type inspect match-any SDM_AH&lt;/P&gt;&lt;P&gt; match access-group name SDM_AH&lt;/P&gt;&lt;P&gt;class-map type inspect match-any CCP-Voice-permit&lt;/P&gt;&lt;P&gt; match protocol h323&lt;/P&gt;&lt;P&gt; match protocol skinny&lt;/P&gt;&lt;P&gt; match protocol sip&lt;/P&gt;&lt;P&gt;class-map type inspect match-any ccp-cls-insp-traffic&lt;/P&gt;&lt;P&gt; match protocol cuseeme&lt;/P&gt;&lt;P&gt; match protocol dns&lt;/P&gt;&lt;P&gt; match protocol ftp&lt;/P&gt;&lt;P&gt; match protocol h323&lt;/P&gt;&lt;P&gt; match protocol https&lt;/P&gt;&lt;P&gt; match protocol icmp&lt;/P&gt;&lt;P&gt; match protocol imap&lt;/P&gt;&lt;P&gt; match protocol pop3&lt;/P&gt;&lt;P&gt; match protocol netshow&lt;/P&gt;&lt;P&gt; match protocol shell&lt;/P&gt;&lt;P&gt; match protocol realmedia&lt;/P&gt;&lt;P&gt; match protocol rtsp&lt;/P&gt;&lt;P&gt; match protocol smtp&lt;/P&gt;&lt;P&gt; match protocol sql-net&lt;/P&gt;&lt;P&gt; match protocol streamworks&lt;/P&gt;&lt;P&gt; match protocol tftp&lt;/P&gt;&lt;P&gt; match protocol vdolive&lt;/P&gt;&lt;P&gt; match protocol tcp&lt;/P&gt;&lt;P&gt; match protocol udp&lt;/P&gt;&lt;P&gt; class-map type inspect match-all ccp-insp-traffic&lt;/P&gt;&lt;P&gt;&amp;nbsp; match class-map ccp-cls-insp-traffic&lt;/P&gt;&lt;P&gt; class-map type inspect match-any SDM_IP&lt;/P&gt;&lt;P&gt;&amp;nbsp; match access-group name SDM_IP&lt;/P&gt;&lt;P&gt; class-map type inspect match-any SDM_ESP&lt;/P&gt;&lt;P&gt;&amp;nbsp; match access-group name SDM_ESP&lt;/P&gt;&lt;P&gt; class-map type inspect match-any SDM_EASY_VPN_SERVER_TRAFFIC&lt;/P&gt;&lt;P&gt;&amp;nbsp; match protocol isakmp&lt;/P&gt;&lt;P&gt;&amp;nbsp; match protocol ipsec-msft&lt;/P&gt;&lt;P&gt;&amp;nbsp; match class-map SDM_AH&lt;/P&gt;&lt;P&gt;&amp;nbsp; match class-map SDM_ESP&lt;/P&gt;&lt;P&gt; class-map type inspect match-all SDM_EASY_VPN_SERVER_PT&lt;/P&gt;&lt;P&gt;&amp;nbsp; match class-map SDM_EASY_VPN_SERVER_TRAFFIC&lt;/P&gt;&lt;P&gt; class-map type inspect match-any ccp-cls-icmp-access&lt;/P&gt;&lt;P&gt;&amp;nbsp; match protocol icmp&lt;/P&gt;&lt;P&gt;&amp;nbsp; match protocol tcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; match protocol udp&lt;/P&gt;&lt;P&gt; class-map type inspect match-all ccp-icmp-access&lt;/P&gt;&lt;P&gt;&amp;nbsp; match class-map ccp-cls-icmp-access&lt;/P&gt;&lt;P&gt; class-map type inspect match-all ccp-invalid-src&lt;/P&gt;&lt;P&gt;&amp;nbsp; match access-group 101&lt;/P&gt;&lt;P&gt; class-map type inspect match-all ccp-protocol-http&lt;/P&gt;&lt;P&gt;&amp;nbsp; match protocol http&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; policy-map type inspect ccp-permit-icmpreply&lt;/P&gt;&lt;P&gt;&amp;nbsp; class type inspect ccp-icmp-access&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;&amp;nbsp; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; pass&lt;/P&gt;&lt;P&gt; policy-map type inspect sdm-pol-NATOutsideToInside-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; class type inspect sdm-nat-http-1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;&amp;nbsp; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; drop&lt;/P&gt;&lt;P&gt; policy-map type inspect ccp-inspect&lt;/P&gt;&lt;P&gt;&amp;nbsp; class type inspect ccp-invalid-src&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; drop log&lt;/P&gt;&lt;P&gt;&amp;nbsp; class type inspect ccp-protocol-http&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;&amp;nbsp; class type inspect ccp-insp-traffic&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;&amp;nbsp; class type inspect CCP-Voice-permit&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;&amp;nbsp; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; pass&lt;/P&gt;&lt;P&gt; policy-map type inspect ccp-permit&lt;/P&gt;&lt;P&gt;&amp;nbsp; class type inspect SDM_EASY_VPN_SERVER_PT&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; pass&lt;/P&gt;&lt;P&gt;&amp;nbsp; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; drop&lt;/P&gt;&lt;P&gt; policy-map type inspect sdm-permit-ip&lt;/P&gt;&lt;P&gt;&amp;nbsp; class type inspect SDM_IP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; pass&lt;/P&gt;&lt;P&gt;&amp;nbsp; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; drop log&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;zone security ezvpn-zone&lt;/P&gt;&lt;P&gt;zone security out-zone&lt;/P&gt;&lt;P&gt;zone security in-zone&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone-pair security sdm-zp-in-ezvpn1 source in-zone destination ezvpn-zone&lt;/P&gt;&lt;P&gt; service-policy type inspect sdm-permit-ip&lt;/P&gt;&lt;P&gt;zone-pair security sdm-zp-out-ezpn1 source out-zone destination ezvpn-zone&lt;/P&gt;&lt;P&gt; service-policy type inspect sdm-permit-ip&lt;/P&gt;&lt;P&gt;zone-pair security sdm-zp-ezvpn-out1 source ezvpn-zone destination out-zone&lt;/P&gt;&lt;P&gt; service-policy type inspect sdm-permit-ip&lt;/P&gt;&lt;P&gt;zone-pair security ccp-zp-self-out source self destination out-zone&lt;/P&gt;&lt;P&gt; service-policy type inspect ccp-permit-icmpreply&lt;/P&gt;&lt;P&gt;zone-pair security sdm-zp-NATOutsideToInside-1 source out-zone destination in-zone&lt;/P&gt;&lt;P&gt; service-policy type inspect sdm-pol-NATOutsideToInside-1&lt;/P&gt;&lt;P&gt;zone-pair security sdm-zp-ezvpn-in1 source ezvpn-zone destination in-zone&lt;/P&gt;&lt;P&gt; service-policy type inspect sdm-permit-ip&lt;/P&gt;&lt;P&gt;zone-pair security ccp-zp-in-out source in-zone destination out-zone&lt;/P&gt;&lt;P&gt; service-policy type inspect ccp-inspect&lt;/P&gt;&lt;P&gt;zone-pair security ccp-zp-out-self source out-zone destination self&lt;/P&gt;&lt;P&gt; service-policy type inspect ccp-permit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;&amp;nbsp; description OUTSIDE WAN$FW_OUTSIDE$&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; ip address 184.X.X.X 255.255.255.252&lt;/P&gt;&lt;P&gt;&amp;nbsp; no ip redirects&lt;/P&gt;&lt;P&gt;&amp;nbsp; no ip unreachables&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip verify unicast reverse-path&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip flow ingress&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip nat outside&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip virtual-reassembly&lt;/P&gt;&lt;P&gt;&amp;nbsp; zone-member security out-zone&lt;/P&gt;&lt;P&gt;&amp;nbsp; duplex auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; speed auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; no mop enabled&lt;/P&gt;&lt;P&gt;&amp;nbsp; !&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt;&amp;nbsp; description INSIDE LAN$FW_INSIDE$&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip address 192.168.0.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; no ip redirects&lt;/P&gt;&lt;P&gt;&amp;nbsp; no ip unreachables&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip flow ingress&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip nat inside&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip virtual-reassembly&lt;/P&gt;&lt;P&gt;&amp;nbsp; zone-member security in-zone&lt;/P&gt;&lt;P&gt;&amp;nbsp; duplex auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; speed auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; no mop enabled&lt;/P&gt;&lt;P&gt;&amp;nbsp; !&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; interface Virtual-Template1 type tunnel&lt;/P&gt;&lt;P&gt;&amp;nbsp; description $FW_INSIDE$&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip unnumbered GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no ip redirects&lt;/P&gt;&lt;P&gt;&amp;nbsp; no ip unreachables&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip flow ingress&lt;/P&gt;&lt;P&gt;&amp;nbsp; zone-member security ezvpn-zone&lt;/P&gt;&lt;P&gt;&amp;nbsp; tunnel mode ipsec ipv4&lt;/P&gt;&lt;P&gt;&amp;nbsp; tunnel path-mtu-discovery&lt;/P&gt;&lt;P&gt;&amp;nbsp; tunnel protection ipsec profile EZVPN_PROFILE&lt;/P&gt;&lt;P&gt;&amp;nbsp; !&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Oct 2012 16:16:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-2911-vpn-passthrough-help/m-p/2056887#M398435</guid>
      <dc:creator>Chris Gabel</dc:creator>
      <dc:date>2012-10-02T16:16:28Z</dc:date>
    </item>
    <item>
      <title>Cisco 2911 - VPN Passthrough help</title>
      <link>https://community.cisco.com/t5/network-security/cisco-2911-vpn-passthrough-help/m-p/2056888#M398436</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Chris,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Okay.. You have not provided any information related to witch is the IP of the external VPN server or if the connection is from inside zone to outside zone.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am going to think that VPN connections are going to be innitiated from both sides of the tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you should create the following:&lt;/P&gt;&lt;P&gt;ip access-list ext VPN_Outbound&lt;/P&gt;&lt;P&gt;permit ip internal_subnet host vpn_server_ip&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;class-map type inspect match-any ccp-protocol-http&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp; match protocol http&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp; match access-group&amp;nbsp; VPN_Outbound&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Then work from outside to inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;zone-pair security sdm-zp-NATOutsideToInside-1 source out-zone destination in-zone&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;service-policy type inspect sdm-pol-NATOutsideToInside-1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list ext vpn_inbound &lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;permit ip vpn_server_ip internal_subnet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any sdm-nat-http-1&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;match access-group name&amp;nbsp; vpn_inbound &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;let me know how it goes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Oct 2012 16:37:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-2911-vpn-passthrough-help/m-p/2056888#M398436</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-10-02T16:37:00Z</dc:date>
    </item>
    <item>
      <title>Cisco 2911 - VPN Passthrough help</title>
      <link>https://community.cisco.com/t5/network-security/cisco-2911-vpn-passthrough-help/m-p/2056889#M398437</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Thanks for your help again. I added the above lines and it's still not working. I had issues adding the ext access-lists, your example did not work in that order so I tried to make it work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;P.S. VPN will be initiated only internally.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended VPN_Inbound_Nortel&lt;/P&gt;&lt;P&gt; permit ip 198.161.2.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;ip access-list extended VPN_Outbound_Nortel&lt;/P&gt;&lt;P&gt; permit ip any host 198.161.2.XXX&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone-pair security sdm-zp-NATOutsideToInside-1 source out-zone destination in-zone&lt;/P&gt;&lt;P&gt; service-policy type inspect sdm-pol-NATOutsideToInside-1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any ccp-protocol-http&lt;/P&gt;&lt;P&gt; match protocol http&lt;/P&gt;&lt;P&gt; match access-group name VPN_Outbound_Nortel&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any sdm-nat-http-1&lt;/P&gt;&lt;P&gt; match access-group 102&lt;/P&gt;&lt;P&gt; match protocol http&lt;/P&gt;&lt;P&gt; match access-group name VPN_Inbound_Nortel&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 102 remark CCP_ACL Category=0&lt;/P&gt;&lt;P&gt;access-list 102 permit ip any host 192.168.0.1&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Oct 2012 21:26:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-2911-vpn-passthrough-help/m-p/2056889#M398437</guid>
      <dc:creator>Chris Gabel</dc:creator>
      <dc:date>2012-10-05T21:26:27Z</dc:date>
    </item>
    <item>
      <title>Cisco 2911 - VPN Passthrough help</title>
      <link>https://community.cisco.com/t5/network-security/cisco-2911-vpn-passthrough-help/m-p/2056890#M398438</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Bump!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Oct 2012 20:58:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-2911-vpn-passthrough-help/m-p/2056890#M398438</guid>
      <dc:creator>Chris Gabel</dc:creator>
      <dc:date>2012-10-23T20:58:05Z</dc:date>
    </item>
  </channel>
</rss>

