<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Filtering IPv6 extension headers on FWSM in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/filtering-ipv6-extension-headers-on-fwsm/m-p/1996503#M439962</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To block IPv6 ping/icmp, the access-list should be:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ipv6 access-list OUTSIDE6_IN deny icmp6 any any&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 06 Jul 2012 03:09:13 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2012-07-06T03:09:13Z</dc:date>
    <item>
      <title>Filtering IPv6 extension headers on FWSM</title>
      <link>https://community.cisco.com/t5/network-security/filtering-ipv6-extension-headers-on-fwsm/m-p/1996499#M439958</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We want to filter IPv6 extension headers on FWSM (4.1.x) and we discovered that filtering does not works at all. For example to filter destination options we used the following IPv6 ACE:&lt;/P&gt;&lt;P&gt;ipv6 access-list OUTSIDE6_IN deny 60 any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then packets are sent using extended IPv6 ping from IOS router and FWSM ignores above ACE and forwards the packet to the destination. The same thing happens when using Scapy as packet generator. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The packet is good&amp;nbsp; because it matches IOS IPv6 ACL Destination options ACE. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I didn't checked but my colleague reported me the same issue with filtering Hop-by-hop option on FWSM.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, is something wrong with the procedure or this is about new bug?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Igor&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:26:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/filtering-ipv6-extension-headers-on-fwsm/m-p/1996499#M439958</guid>
      <dc:creator>igor.mamuzic</dc:creator>
      <dc:date>2019-03-11T23:26:45Z</dc:date>
    </item>
    <item>
      <title>Filtering IPv6 extension headers on FWSM</title>
      <link>https://community.cisco.com/t5/network-security/filtering-ipv6-extension-headers-on-fwsm/m-p/1996500#M439959</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did you assign the access-list to the interface using the "access-group" command?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jul 2012 14:34:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/filtering-ipv6-extension-headers-on-fwsm/m-p/1996500#M439959</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-07-05T14:34:19Z</dc:date>
    </item>
    <item>
      <title>Filtering IPv6 extension headers on FWSM</title>
      <link>https://community.cisco.com/t5/network-security/filtering-ipv6-extension-headers-on-fwsm/m-p/1996501#M439960</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Jenifer,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACL is assigned to the interface... Other ACEs are being matched so ACL works but it does not match extension headers correctly:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ipv6 access-list OUTSIDE6_IN line 1 deny 60 any any log debugging interval 300 (hitcnt=0) 0xbb24b0a2 &lt;/P&gt;&lt;P&gt;ipv6 access-list OUTSIDE6_IN line 2 permit tcp any any eq www log debugging interval 300 (hitcnt=2) 0xbde27d7c&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jul 2012 17:33:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/filtering-ipv6-extension-headers-on-fwsm/m-p/1996501#M439960</guid>
      <dc:creator>igor.mamuzic</dc:creator>
      <dc:date>2012-07-05T17:33:14Z</dc:date>
    </item>
    <item>
      <title>Filtering IPv6 extension headers on FWSM</title>
      <link>https://community.cisco.com/t5/network-security/filtering-ipv6-extension-headers-on-fwsm/m-p/1996502#M439961</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Not related to your problem: You know that the FWSM is a really slow Firewall when it comes to IPv6? Everything has to be processed in the CPU as the Network-Processors are not able to process IPv6.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jul 2012 18:14:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/filtering-ipv6-extension-headers-on-fwsm/m-p/1996502#M439961</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-07-05T18:14:08Z</dc:date>
    </item>
    <item>
      <title>Filtering IPv6 extension headers on FWSM</title>
      <link>https://community.cisco.com/t5/network-security/filtering-ipv6-extension-headers-on-fwsm/m-p/1996503#M439962</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To block IPv6 ping/icmp, the access-list should be:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ipv6 access-list OUTSIDE6_IN deny icmp6 any any&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jul 2012 03:09:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/filtering-ipv6-extension-headers-on-fwsm/m-p/1996503#M439962</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-07-06T03:09:13Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering IPv6 extension headers on FWSM</title>
      <link>https://community.cisco.com/t5/network-security/filtering-ipv6-extension-headers-on-fwsm/m-p/1996504#M439963</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My intention was not to block ICMP, what I need is blocking all packets containing IPv6 destination option in extension header. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jul 2012 06:39:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/filtering-ipv6-extension-headers-on-fwsm/m-p/1996504#M439963</guid>
      <dc:creator>igor.mamuzic</dc:creator>
      <dc:date>2012-07-06T06:39:32Z</dc:date>
    </item>
    <item>
      <title>Filtering IPv6 extension headers on FWSM</title>
      <link>https://community.cisco.com/t5/network-security/filtering-ipv6-extension-headers-on-fwsm/m-p/1996505#M439964</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;FWSM does not support inspection of IPv6 and hence no way to block extension headers. This can be achieved in ASA.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Aug 2012 06:24:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/filtering-ipv6-extension-headers-on-fwsm/m-p/1996505#M439964</guid>
      <dc:creator>sumbhat</dc:creator>
      <dc:date>2012-08-09T06:24:18Z</dc:date>
    </item>
  </channel>
</rss>

