<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ZBFW passing SCTP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/zbfw-passing-sctp/m-p/1840207#M459214</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It doesn't, that is my problem &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/sad.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am working on just a pass at this point, but that seems to not be matching either.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 21 Feb 2012 20:14:36 GMT</pubDate>
    <dc:creator>Keith McElroy</dc:creator>
    <dc:date>2012-02-21T20:14:36Z</dc:date>
    <item>
      <title>ZBFW passing SCTP</title>
      <link>https://community.cisco.com/t5/network-security/zbfw-passing-sctp/m-p/1840200#M459203</link>
      <description>&lt;P&gt;I have a 7204VXR NPE-400 running c7200-adventerprisek9-mz.124-24.T3.bin at the moment. This device is being used as a firewall between zones in a service provider network. My issue is we have a lab device on the corporate side that needs to talk SCTP to the core device. Since there is no option to match SCTP in ACLs or protcol matching, I can't really get this to pass properly. Does anyone know if the new IOS versions support SCTP? Does anyone know of any options to pass this traffic through the firewall?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:31:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbfw-passing-sctp/m-p/1840200#M459203</guid>
      <dc:creator>Keith McElroy</dc:creator>
      <dc:date>2019-03-11T22:31:24Z</dc:date>
    </item>
    <item>
      <title>ZBFW passing SCTP</title>
      <link>https://community.cisco.com/t5/network-security/zbfw-passing-sctp/m-p/1840201#M459205</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just bumping this as I haven't found a fix yet. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Feb 2012 15:46:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbfw-passing-sctp/m-p/1840201#M459205</guid>
      <dc:creator>Keith McElroy</dc:creator>
      <dc:date>2012-02-21T15:46:36Z</dc:date>
    </item>
    <item>
      <title>ZBFW passing SCTP</title>
      <link>https://community.cisco.com/t5/network-security/zbfw-passing-sctp/m-p/1840202#M459207</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Keith, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you tried :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-l ex SCTP&lt;/P&gt;&lt;P&gt;permit 132 any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've saw that SCTP is protocol 132, using extended access-list you can match protocol number.Then used in a class map.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Feb 2012 16:11:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbfw-passing-sctp/m-p/1840202#M459207</guid>
      <dc:creator>Dan-Ciprian Cicioiu</dc:creator>
      <dc:date>2012-02-21T16:11:05Z</dc:date>
    </item>
    <item>
      <title>ZBFW passing SCTP</title>
      <link>https://community.cisco.com/t5/network-security/zbfw-passing-sctp/m-p/1840203#M459209</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, this still won't function. From what I can tell, it still wants the transport layer protocol for session information and it just ends up dropping.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Feb 2012 16:27:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbfw-passing-sctp/m-p/1840203#M459209</guid>
      <dc:creator>Keith McElroy</dc:creator>
      <dc:date>2012-02-21T16:27:59Z</dc:date>
    </item>
    <item>
      <title>ZBFW passing SCTP</title>
      <link>https://community.cisco.com/t5/network-security/zbfw-passing-sctp/m-p/1840204#M459211</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Keith, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you show me your config ( class , acl , policy ) for the SCTP ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Feb 2012 18:02:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbfw-passing-sctp/m-p/1840204#M459211</guid>
      <dc:creator>Dan-Ciprian Cicioiu</dc:creator>
      <dc:date>2012-02-21T18:02:12Z</dc:date>
    </item>
    <item>
      <title>ZBFW passing SCTP</title>
      <link>https://community.cisco.com/t5/network-security/zbfw-passing-sctp/m-p/1840205#M459212</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;zone-pair security InsideCore source Inside destination Core&lt;/P&gt;&lt;P&gt; description Inside network to Inside Core&lt;/P&gt;&lt;P&gt; service-policy type inspect Inside-to-Core&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; class-map type inspect match-all Inside-to-Core&lt;/P&gt;&lt;P&gt; match access-group name InsideNet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; policy-map type inspect Inside-to-Core&lt;/P&gt;&lt;P&gt; class type inspect Inside-to-Core&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp; drop&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip access-list extended InsideNet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, under the ACL, I have tried to match SCTP directly, doesn't work with this code of course. I have tried matching IP protocol 132, issue there being it still looks for a TCP or UDP header or it drops the traffic. SCTP isn't a protcol that can be inspected under the class either, so I am at a standstill. The hosts don't have the ability to encapsulate SCTP in UDP from what I have been told. This seems to be working on the newest IOS XR code, but not the main train of IOS (at least to my knowledge, I haven't checked it on the 15.x release yet.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not sure about your familiarity with SCTP, but it being an entirely new transport layer protocol tertiary to UDP and TCP causes a lot of issues with firewalls from what I have found and I am basically just hoping for a work around or a code change to fix this if anyone knows.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Feb 2012 19:31:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbfw-passing-sctp/m-p/1840205#M459212</guid>
      <dc:creator>Keith McElroy</dc:creator>
      <dc:date>2012-02-21T19:31:24Z</dc:date>
    </item>
    <item>
      <title>ZBFW passing SCTP</title>
      <link>https://community.cisco.com/t5/network-security/zbfw-passing-sctp/m-p/1840206#M459213</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The think is that I do not know if ZBFW inspects SCTP ... I would try to see if the return packet is allowed or not, because this is what I think hapends.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip inspect log drop-pkt&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even though I do not think that is a long term solution , I would pass un-inspected this traffic ( create a new class-map for SCTP traffic ) also you will have to pass for the return traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Feb 2012 19:56:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbfw-passing-sctp/m-p/1840206#M459213</guid>
      <dc:creator>Dan-Ciprian Cicioiu</dc:creator>
      <dc:date>2012-02-21T19:56:17Z</dc:date>
    </item>
    <item>
      <title>ZBFW passing SCTP</title>
      <link>https://community.cisco.com/t5/network-security/zbfw-passing-sctp/m-p/1840207#M459214</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It doesn't, that is my problem &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/sad.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am working on just a pass at this point, but that seems to not be matching either.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Feb 2012 20:14:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbfw-passing-sctp/m-p/1840207#M459214</guid>
      <dc:creator>Keith McElroy</dc:creator>
      <dc:date>2012-02-21T20:14:36Z</dc:date>
    </item>
  </channel>
</rss>

