<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IOS ZONE based FW with gre in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ios-zone-based-fw-with-gre/m-p/1990351#M439341</link>
    <description>&lt;P&gt;I have configured a cisco 2911 router with security bundle, as a zone based firewall.&amp;nbsp; &lt;/P&gt;&lt;P&gt;Configurations,&lt;/P&gt;&lt;P&gt;Gi0/1 - Internet connection - (outside-zone)&lt;/P&gt;&lt;P&gt;Gi0/0 - Internal&amp;nbsp; users -(inside-zone)&lt;/P&gt;&lt;P&gt;Gi0/2 - ISA server - (ISA-zone) this is use for just connct to VPN from outside for just one user&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I got an issue , when connection establish&amp;nbsp; From outsid zone to ISA-zone , configurations given bellow ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extenderd Outside-to-ISA&lt;/P&gt;&lt;P&gt;permit tcp any host 202.124.161.5 eq 1723 &lt;/P&gt;&lt;P&gt;permit gre any host 202.124.161.5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any Outside-to-ISA&lt;/P&gt;&lt;P&gt;match access-group name Outside-to-ISA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect Outside-to-ISA&lt;/P&gt;&lt;P&gt;class type inspect Outside-to-ISA&lt;/P&gt;&lt;P&gt;inspect&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then i have configurd zone-pair configs as perspective, &lt;STRONG&gt;But VPN connection has not established... &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;then i have create another access-list, class-map , and policy-map as well as zone-pair to ISA-zone to outside-zone and &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;ip access-list extenderd ISA-to-Outside&lt;/P&gt;&lt;P&gt;permit tcp host 202.124.161.5 any &lt;/P&gt;&lt;P&gt;permit gre&amp;nbsp; host 202.124.161.5 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any ISA-to-Outside&lt;/P&gt;&lt;P&gt;match access-group name ISA-to-Outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect ISA-to-Outside&lt;/P&gt;&lt;P&gt;class type inspect ISA-to-Outside&lt;/P&gt;&lt;P&gt;inspect&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Result is same But VPN connection has not established... &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt; . &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then i have configured&amp;nbsp; traffic to&lt;STRONG&gt; pass &lt;/STRONG&gt;instead of&lt;STRONG&gt; inspect &lt;/STRONG&gt;to&lt;STRONG&gt; both directions &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;eg.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect ISA-to-Outside&lt;/P&gt;&lt;P&gt;class type inspect ISA-to-Outside&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no inspect &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;pass&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then it worked, but this is no secure it's like trditional access-control, so please help me someone sortout this problem,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanx,&lt;/P&gt;&lt;P&gt;namal.&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 23:38:40 GMT</pubDate>
    <dc:creator>Namal Suranga</dc:creator>
    <dc:date>2019-03-11T23:38:40Z</dc:date>
    <item>
      <title>IOS ZONE based FW with gre</title>
      <link>https://community.cisco.com/t5/network-security/ios-zone-based-fw-with-gre/m-p/1990351#M439341</link>
      <description>&lt;P&gt;I have configured a cisco 2911 router with security bundle, as a zone based firewall.&amp;nbsp; &lt;/P&gt;&lt;P&gt;Configurations,&lt;/P&gt;&lt;P&gt;Gi0/1 - Internet connection - (outside-zone)&lt;/P&gt;&lt;P&gt;Gi0/0 - Internal&amp;nbsp; users -(inside-zone)&lt;/P&gt;&lt;P&gt;Gi0/2 - ISA server - (ISA-zone) this is use for just connct to VPN from outside for just one user&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I got an issue , when connection establish&amp;nbsp; From outsid zone to ISA-zone , configurations given bellow ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extenderd Outside-to-ISA&lt;/P&gt;&lt;P&gt;permit tcp any host 202.124.161.5 eq 1723 &lt;/P&gt;&lt;P&gt;permit gre any host 202.124.161.5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any Outside-to-ISA&lt;/P&gt;&lt;P&gt;match access-group name Outside-to-ISA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect Outside-to-ISA&lt;/P&gt;&lt;P&gt;class type inspect Outside-to-ISA&lt;/P&gt;&lt;P&gt;inspect&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then i have configurd zone-pair configs as perspective, &lt;STRONG&gt;But VPN connection has not established... &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;then i have create another access-list, class-map , and policy-map as well as zone-pair to ISA-zone to outside-zone and &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;ip access-list extenderd ISA-to-Outside&lt;/P&gt;&lt;P&gt;permit tcp host 202.124.161.5 any &lt;/P&gt;&lt;P&gt;permit gre&amp;nbsp; host 202.124.161.5 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any ISA-to-Outside&lt;/P&gt;&lt;P&gt;match access-group name ISA-to-Outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect ISA-to-Outside&lt;/P&gt;&lt;P&gt;class type inspect ISA-to-Outside&lt;/P&gt;&lt;P&gt;inspect&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Result is same But VPN connection has not established... &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt; . &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then i have configured&amp;nbsp; traffic to&lt;STRONG&gt; pass &lt;/STRONG&gt;instead of&lt;STRONG&gt; inspect &lt;/STRONG&gt;to&lt;STRONG&gt; both directions &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;eg.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect ISA-to-Outside&lt;/P&gt;&lt;P&gt;class type inspect ISA-to-Outside&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no inspect &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;pass&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then it worked, but this is no secure it's like trditional access-control, so please help me someone sortout this problem,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanx,&lt;/P&gt;&lt;P&gt;namal.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:38:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-zone-based-fw-with-gre/m-p/1990351#M439341</guid>
      <dc:creator>Namal Suranga</dc:creator>
      <dc:date>2019-03-11T23:38:40Z</dc:date>
    </item>
    <item>
      <title>IOS ZONE based FW with gre</title>
      <link>https://community.cisco.com/t5/network-security/ios-zone-based-fw-with-gre/m-p/1990352#M439342</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You would need to configure action as "pass" for the GRE traffic on both direction because GRE is a stateless protocol.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For TCP/1723 you can configure just in one direction, ie: outside to ISA zone, and with the action "inspect" because TCP is stateful protocol.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Aug 2012 11:32:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-zone-based-fw-with-gre/m-p/1990352#M439342</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-08-06T11:32:40Z</dc:date>
    </item>
    <item>
      <title>IOS ZONE based FW with gre</title>
      <link>https://community.cisco.com/t5/network-security/ios-zone-based-fw-with-gre/m-p/1990353#M439343</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thats very clear...&lt;/P&gt;&lt;P&gt;Thank you very much !!!&amp;nbsp; &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt; &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Aug 2012 11:40:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-zone-based-fw-with-gre/m-p/1990353#M439343</guid>
      <dc:creator>Namal Suranga</dc:creator>
      <dc:date>2012-08-06T11:40:31Z</dc:date>
    </item>
    <item>
      <title>IOS ZONE based FW with gre</title>
      <link>https://community.cisco.com/t5/network-security/ios-zone-based-fw-with-gre/m-p/1990354#M439344</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great to hear it's clear. Pls kindly mark the post answered so others can learn from your question. Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Aug 2012 11:50:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-zone-based-fw-with-gre/m-p/1990354#M439344</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-08-06T11:50:46Z</dc:date>
    </item>
    <item>
      <title>IOS ZONE based FW with gre</title>
      <link>https://community.cisco.com/t5/network-security/ios-zone-based-fw-with-gre/m-p/1990355#M439345</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;I have configured as above, but it's no working properly, i can initiate tcp connection with port 1723 but i can't connect vpn .....&lt;/P&gt;&lt;P&gt;is there any more ... &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_macro_emoticon" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Configs&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt; &lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;ip access-list extended ISA-SERVER-TO-OUTSIDE-ANY&lt;/P&gt;&lt;P&gt; permit ip host 202.124.160.2 any&lt;/P&gt;&lt;P&gt; ip access-list extended ISA-SERVER-TO-OUTSIDE-GRE&lt;/P&gt;&lt;P&gt; permit gre host 202.124.160.2 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-all ISA-SERVER-TO-OUTSIDE-GRE-CM&lt;/P&gt;&lt;P&gt; match access-group name ISA-SERVER-TO-OUTSIDE-GRE&lt;/P&gt;&lt;P&gt;class-map type inspect match-all ISA-SERVER-TO-OUTSIDE-ANY-CM&lt;/P&gt;&lt;P&gt; match access-group name ISA-SERVER-TO-OUTSIDE-ANY&lt;BR /&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect ISA-SERVER-TO-OUTSIDE-PM&lt;/P&gt;&lt;P&gt; class type inspect ISA-SERVER-TO-OUTSIDE-ANY-CM&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect &lt;/P&gt;&lt;P&gt; class type inspect ISA-SERVER-TO-OUTSIDE-GRE-CM&lt;/P&gt;&lt;P&gt;&amp;nbsp; pass&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp; drop&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone-pair security ISA-SERVER-TO-OUTSIDE source ISA-SERVER-ZONE destination OUTSIDE-ZONE&lt;/P&gt;&lt;P&gt; service-policy type inspect ISA-SERVER-TO-OUTSIDE-PM&lt;BR /&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;***************************************************************************&lt;/P&gt;&lt;P&gt;ip access-list extended OUTSIDE-TO-ISA-SERVER-GRE&lt;/P&gt;&lt;P&gt; permit gre any host 220.247.219.38&lt;BR /&gt; ip access-list extended OUTSIDE-TO-ISA-SERVER-TCP&lt;/P&gt;&lt;P&gt; permit tcp any host 220.247.219.38 eq 1723&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any OUTSIDE-TO-ISA-SERVER-GRE-CM&lt;/P&gt;&lt;P&gt; match access-group name OUTSIDE-TO-ISA-SERVER-GRE&lt;/P&gt;&lt;P&gt;class-map type inspect match-any OUTSIDE-TO-ISA-SERVER-TCP-CM&lt;/P&gt;&lt;P&gt; match access-group name OUTSIDE-TO-ISA-SERVER-TCP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect OUTSIDE-TO-ISA-SERVER-TCP-PM&lt;/P&gt;&lt;P&gt; class type inspect OUTSIDE-TO-ISA-SERVER-TCP-CM&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect &lt;/P&gt;&lt;P&gt; class type inspect OUTSIDE-TO-ISA-SERVER-GRE-CM&lt;/P&gt;&lt;P&gt;&amp;nbsp; pass&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp; drop&lt;BR /&gt; &lt;/P&gt;&lt;P&gt;zone-pair security OUTSIDE-TO-ISA-SERVER source OUTSIDE-ZONE destination ISA-SERVER-ZONE&lt;/P&gt;&lt;P&gt; service-policy type inspect OUTSIDE-TO-ISA-SERVER-TCP-PM&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Aug 2012 15:01:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-zone-based-fw-with-gre/m-p/1990355#M439345</guid>
      <dc:creator>Namal Suranga</dc:creator>
      <dc:date>2012-08-07T15:01:34Z</dc:date>
    </item>
    <item>
      <title>IOS ZONE based FW with gre</title>
      <link>https://community.cisco.com/t5/network-security/ios-zone-based-fw-with-gre/m-p/1990356#M439346</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You don't need the following as it also covers the GRE traffic which needs "pass" instead of "inspect":&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect ISA-SERVER-TO-OUTSIDE-PM&lt;/P&gt;&lt;P&gt; &lt;STRONG&gt;class type inspect ISA-SERVER-TO-OUTSIDE-ANY-CM&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; inspect &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All you need is the second class-map if the ISA server does not need to initiate any traffic outbound. If it does need to initiate traffic outbound then you should have the GRE class map on top and the ANY class map as the second class map as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect ISA-SERVER-TO-OUTSIDE-PM&lt;/P&gt;&lt;P&gt; class type inspect ISA-SERVER-TO-OUTSIDE-GRE-CM&lt;/P&gt;&lt;P&gt;&amp;nbsp; pass&lt;/P&gt;&lt;P&gt;class type inspect ISA-SERVER-TO-OUTSIDE-ANY-CM&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Aug 2012 15:45:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-zone-based-fw-with-gre/m-p/1990356#M439346</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-08-07T15:45:31Z</dc:date>
    </item>
    <item>
      <title>IOS ZONE based FW with gre</title>
      <link>https://community.cisco.com/t5/network-security/ios-zone-based-fw-with-gre/m-p/1990357#M439347</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; thanks your update... i have change as above .. .but still not working .... &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Aug 2012 17:00:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-zone-based-fw-with-gre/m-p/1990357#M439347</guid>
      <dc:creator>Namal Suranga</dc:creator>
      <dc:date>2012-08-07T17:00:24Z</dc:date>
    </item>
    <item>
      <title>IOS ZONE based FW with gre</title>
      <link>https://community.cisco.com/t5/network-security/ios-zone-based-fw-with-gre/m-p/1990358#M439348</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you share the whole policy again after the changes?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, if you just have the GRE class map with action "pass", does it work?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Aug 2012 08:40:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-zone-based-fw-with-gre/m-p/1990358#M439348</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-08-08T08:40:57Z</dc:date>
    </item>
    <item>
      <title>IOS ZONE based FW with gre</title>
      <link>https://community.cisco.com/t5/network-security/ios-zone-based-fw-with-gre/m-p/1990359#M439349</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jennifer,&lt;/P&gt;&lt;P&gt;Thanks for comment, It's working now , not the issue with&amp;nbsp; router config , we found some problem with a smartphone, becoz we used a smart phone for checking VPN connection that the issue. &lt;SPAN __jive_emoticon_name="plain" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt; as you told, GRE class-map must be top of the table and it's must be&amp;nbsp; " PASS " thats all. so thank you very much for ur support.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Aug 2012 04:15:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-zone-based-fw-with-gre/m-p/1990359#M439349</guid>
      <dc:creator>Namal Suranga</dc:creator>
      <dc:date>2012-08-09T04:15:50Z</dc:date>
    </item>
    <item>
      <title>IOS ZONE based FW with gre</title>
      <link>https://community.cisco.com/t5/network-security/ios-zone-based-fw-with-gre/m-p/1990360#M439350</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great to hear, and thanks for the update and ratings.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Aug 2012 12:55:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-zone-based-fw-with-gre/m-p/1990360#M439350</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-08-09T12:55:11Z</dc:date>
    </item>
  </channel>
</rss>

