<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Zone-Based Policy Firewall configuration in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/zone-based-policy-firewall-configuration/m-p/1701687#M562206</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mike:&lt;/P&gt;&lt;P&gt;Thanks for all the help... No joy so far.&lt;/P&gt;&lt;P&gt;Not sure I have a sniffer handy.&amp;nbsp; I'll have to ask around.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ven&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 17 May 2011 21:03:54 GMT</pubDate>
    <dc:creator>Ven Taylor</dc:creator>
    <dc:date>2011-05-17T21:03:54Z</dc:date>
    <item>
      <title>Zone-Based Policy Firewall configuration</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-policy-firewall-configuration/m-p/1701679#M562185</link>
      <description>&lt;P&gt;Hey folks.&amp;nbsp; I need some help with my configs (I think).&amp;nbsp; I have two 1811's connected in a lab using a ipsec vpn tunnel (using a switch to simulate an internet connection between them).&lt;/P&gt;&lt;P&gt;I am trying to configure one of the routers as a ZBPF just to allow a remote windows login (DC on the firewalled side, workstations on the other side).&lt;/P&gt;&lt;P&gt;I'm trying to verify that the zbpf is working, but it doesn't seem to stop anything.&amp;nbsp; I had match icmp added to the class-map, but took it out to test if icmp would fail.&amp;nbsp; It didn't.&amp;nbsp; Basically, I don't think the firewall is working at all.&amp;nbsp; Any thoughts on how I can configure this so that the policies will work between zone-pairs?&lt;/P&gt;&lt;P&gt;Any help would be greatly appreciated!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's an quick drawing:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/0/2/9/47920-ZBPF%20VPN%20Diagram.jpg" alt="ZBPF VPN Diagram.jpg" class="jive-image-thumbnail jive-image" width="450" /&gt;&lt;/P&gt;&lt;P&gt;Here are the configurations:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Local router:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname sdc-1811-LocalLab&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot-start-marker&lt;/P&gt;&lt;P&gt;boot-end-marker&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;no aaa new-model&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;resource policy&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip cef&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;no ip domain lookup&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map type inspect match-any Remote_VPN&lt;/P&gt;&lt;P&gt;match access-group 101&lt;/P&gt;&lt;P&gt;match protocol ldap&lt;/P&gt;&lt;P&gt;match protocol http&lt;/P&gt;&lt;P&gt;match protocol kerberos&lt;/P&gt;&lt;P&gt;match protocol netbios-ns&lt;/P&gt;&lt;P&gt;match protocol dns&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect zbpf_policy&lt;/P&gt;&lt;P&gt;class type inspect Remote_VPN&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;class class-default&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;zone security private&lt;/P&gt;&lt;P&gt;zone security internet&lt;/P&gt;&lt;P&gt;zone security dmz&lt;/P&gt;&lt;P&gt;zone-pair security dmz-to-internet source dmz destination internet&lt;/P&gt;&lt;P&gt;zone-pair security internet-to-dmz source internet destination dmz&lt;/P&gt;&lt;P&gt;service-policy type inspect zbpf_policy&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto isakmp policy 5&lt;/P&gt;&lt;P&gt;encr aes&lt;/P&gt;&lt;P&gt;hash md5&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt;encr 3des&lt;/P&gt;&lt;P&gt;hash md5&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto isakmp policy 15&lt;/P&gt;&lt;P&gt;encr aes 256&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto isakmp policy 20&lt;/P&gt;&lt;P&gt;encr 3des&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto isakmp policy 30&lt;/P&gt;&lt;P&gt;encr aes&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;crypto isakmp key &amp;lt;crypto key&amp;gt; address 10.0.0.6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP_3DES_MD5_HMAC esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP_3DES_SHA_HMAC esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP_AES_SHA_HMAC esp-aes esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP_AES_MD5_HMAC esp-aes esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP_AES256_SHA_HMAC esp-aes 256 esp-sha-hmac&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto map Extranets 10 ipsec-isakmp&lt;/P&gt;&lt;P&gt;set peer 10.0.0.6&lt;/P&gt;&lt;P&gt;set transform-set ESP_3DES_MD5_HMAC&lt;/P&gt;&lt;P&gt;match address Remote_VPN&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0&lt;/P&gt;&lt;P&gt;description "Internet" connection - 3750-Port48&lt;/P&gt;&lt;P&gt;ip address 10.0.0.2 255.255.255.252&lt;/P&gt;&lt;P&gt;zone-member security internet&lt;/P&gt;&lt;P&gt;duplex auto&lt;/P&gt;&lt;P&gt;speed auto&lt;/P&gt;&lt;P&gt;crypto map Extranets&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet1&lt;/P&gt;&lt;P&gt;description Local DMZ&lt;/P&gt;&lt;P&gt;ip address 10.0.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;zone-member security dmz&lt;/P&gt;&lt;P&gt;duplex auto&lt;/P&gt;&lt;P&gt;speed auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Async1&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;encapsulation slip&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip route 10.0.0.4 255.255.255.252 10.0.0.1&lt;/P&gt;&lt;P&gt;ip route 10.0.2.0 255.255.255.0 10.0.0.6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;no ip http server&lt;/P&gt;&lt;P&gt;no ip http secure-server&lt;/P&gt;&lt;P&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;ip access-list extended Remote_VPN&lt;/P&gt;&lt;P&gt;permit ip any any&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;control-plane&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt;line 1&lt;/P&gt;&lt;P&gt;line aux 0&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Remote router:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname sdc-1811-RemoteLab&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot-start-marker&lt;/P&gt;&lt;P&gt;boot-end-marker&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;no aaa new-model&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;resource policy&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip cef&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;no ip domain lookup&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto isakmp policy 5&lt;/P&gt;&lt;P&gt;encr aes&lt;/P&gt;&lt;P&gt;hash md5&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt;encr 3des&lt;/P&gt;&lt;P&gt;hash md5&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto isakmp policy 15&lt;/P&gt;&lt;P&gt;encr aes 256&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;crypto isakmp policy 20&lt;/P&gt;&lt;P&gt;encr 3des&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto isakmp policy 30&lt;/P&gt;&lt;P&gt;encr aes&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;crypto isakmp key &amp;lt;crypto key&amp;gt; address 10.0.0.2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP_3DES_MD5_HMAC esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP_3DES_SHA_HMAC esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP_AES_SHA_HMAC esp-aes esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP_AES_MD5_HMAC esp-aes esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP_AES256_SHA_HMAC esp-aes 256 esp-sha-hmac&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto map Extranets 10 ipsec-isakmp&lt;/P&gt;&lt;P&gt;set peer 10.0.0.2&lt;/P&gt;&lt;P&gt;set transform-set ESP_3DES_MD5_HMAC&lt;/P&gt;&lt;P&gt;match address Remote_VPN&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0&lt;/P&gt;&lt;P&gt;ip address 10.0.0.6 255.255.255.252&lt;/P&gt;&lt;P&gt;duplex auto&lt;/P&gt;&lt;P&gt;speed auto&lt;/P&gt;&lt;P&gt;crypto map Extranets&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet1&lt;/P&gt;&lt;P&gt;description Remote LAN&lt;/P&gt;&lt;P&gt;ip address 10.0.2.1 255.255.255.0&lt;/P&gt;&lt;P&gt;duplex auto&lt;/P&gt;&lt;P&gt;speed auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Async1&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;encapsulation slip&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip route 10.0.0.0 255.255.255.252 10.0.0.5&lt;/P&gt;&lt;P&gt;ip route 10.0.1.0 255.255.255.0 10.0.0.2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;no ip http server&lt;/P&gt;&lt;P&gt;no ip http secure-server&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip access-list extended Remote_VPN&lt;/P&gt;&lt;P&gt;permit ip any any&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;control-plane&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt;line 1&lt;/P&gt;&lt;P&gt;line aux 0&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:34:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-policy-firewall-configuration/m-p/1701679#M562185</guid>
      <dc:creator>Ven Taylor</dc:creator>
      <dc:date>2019-03-11T20:34:24Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-Based Policy Firewall configuration</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-policy-firewall-configuration/m-p/1701680#M562192</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Ven,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your problem is the acl 101 that is on the class-map&amp;nbsp; Remote_VPN. The packets are going to first hit that acl, and since the class map is a match any, is only going to match the access list and let the packet in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remove the acl from the class map and you should have the desire expectations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 May 2011 19:47:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-policy-firewall-configuration/m-p/1701680#M562192</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-05-17T19:47:21Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-Based Policy Firewall configuration</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-policy-firewall-configuration/m-p/1701681#M562195</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Took out acl 101 and removed the match access-group 101 from the class-map and it still works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map type inspect match-any Remote_VPN&lt;/P&gt;&lt;P&gt; match protocol http&lt;/P&gt;&lt;P&gt; match protocol kerberos&lt;/P&gt;&lt;P&gt; match protocol netbios-ns&lt;/P&gt;&lt;P&gt; match protocol dns&lt;/P&gt;&lt;P&gt; match protocol ldap&lt;/P&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;I had match protocol icmp added, but it doesn't change anything either way.&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Ven &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/sad.gif"&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 May 2011 20:12:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-policy-firewall-configuration/m-p/1701681#M562195</guid>
      <dc:creator>Ven Taylor</dc:creator>
      <dc:date>2011-05-17T20:12:08Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-Based Policy Firewall configuration</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-policy-firewall-configuration/m-p/1701682#M562196</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let a continuos ping and do the following command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show policy-map type inspect zone-pair sessions&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Send me the output.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 May 2011 20:21:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-policy-firewall-configuration/m-p/1701682#M562196</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-05-17T20:21:24Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-Based Policy Firewall configuration</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-policy-firewall-configuration/m-p/1701683#M562199</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here it is!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sdc-1811-LocalLab#show policy-map type inspect zone-pair sessions&lt;/P&gt;&lt;P&gt; Zone-pair: internet-to-dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Service-policy inspect : zbpf_policy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: Remote_VPN (match-any)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match: protocol http&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 packets, 0 bytes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30 second rate 0 bps&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match: protocol kerberos&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 packets, 0 bytes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30 second rate 0 bps&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match: protocol netbios-ns&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 packets, 0 bytes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30 second rate 0 bps&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match: protocol dns&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 packets, 0 bytes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30 second rate 0 bps&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match: protocol ldap&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 packets, 0 bytes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30 second rate 0 bps&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inspect&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: class-default (match-any)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match: any &lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Thanks!&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 May 2011 20:26:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-policy-firewall-configuration/m-p/1701683#M562199</guid>
      <dc:creator>Ven Taylor</dc:creator>
      <dc:date>2011-05-17T20:26:00Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-Based Policy Firewall configuration</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-policy-firewall-configuration/m-p/1701684#M562201</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are pinging to a host on the inside right?Class default should be dropped by default, please enter the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Policy-map type inspect zbpf_policy&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; drop&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If that does not solve the issue, do the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Class-map type inspect deny-all&lt;/P&gt;&lt;P&gt; match access-group 101&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Policy-map type inspect zbpf_policy&lt;/P&gt;&lt;P&gt;&amp;nbsp; Class deny-all&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; drop&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If that does not solve it, please take a capture on the receiving host and gather the show arp of the router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 May 2011 20:41:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-policy-firewall-configuration/m-p/1701684#M562201</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-05-17T20:41:29Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-Based Policy Firewall configuration</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-policy-firewall-configuration/m-p/1701685#M562203</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;First one didn't work by itself.&amp;nbsp; I'll add the second part... but I see you added the match access-group 101, but no access-list 101 exists.&lt;/P&gt;&lt;P&gt;If I create one, what should it look like?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ven&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 May 2011 20:46:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-policy-firewall-configuration/m-p/1701685#M562203</guid>
      <dc:creator>Ven Taylor</dc:creator>
      <dc:date>2011-05-17T20:46:01Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-Based Policy Firewall configuration</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-policy-firewall-configuration/m-p/1701686#M562205</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Access-list 101 deny ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 May 2011 20:50:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-policy-firewall-configuration/m-p/1701686#M562205</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-05-17T20:50:21Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-Based Policy Firewall configuration</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-policy-firewall-configuration/m-p/1701687#M562206</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mike:&lt;/P&gt;&lt;P&gt;Thanks for all the help... No joy so far.&lt;/P&gt;&lt;P&gt;Not sure I have a sniffer handy.&amp;nbsp; I'll have to ask around.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ven&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 May 2011 21:03:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-policy-firewall-configuration/m-p/1701687#M562206</guid>
      <dc:creator>Ven Taylor</dc:creator>
      <dc:date>2011-05-17T21:03:54Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-Based Policy Firewall configuration</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-policy-firewall-configuration/m-p/1701688#M562207</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sure thing is an extrange issue. You can download wireshark and start it, that should do it, then start the ping and gather the show arp from the router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 May 2011 21:07:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-policy-firewall-configuration/m-p/1701688#M562207</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-05-17T21:07:08Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-Based Policy Firewall configuration</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-policy-firewall-configuration/m-p/1701689#M562208</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry about the delay.&amp;nbsp; I was at a new site doing a wireless survey.&lt;/P&gt;&lt;P&gt;I missed a MAJOR part of this.&amp;nbsp; Self zone.&amp;nbsp; I was trying to ping the router interface... Not a device hanging off the router.&amp;nbsp; &lt;SPAN __jive_emoticon_name="angry" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/angry.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I went back to my original config and it worked just fine.&lt;/P&gt;&lt;P&gt;Now I just have to lock down the router with self-zone pairs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for all your help!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ven&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 May 2011 15:37:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-policy-firewall-configuration/m-p/1701689#M562208</guid>
      <dc:creator>Ven Taylor</dc:creator>
      <dc:date>2011-05-24T15:37:46Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-Based Policy Firewall configuration</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-policy-firewall-configuration/m-p/1701690#M562209</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am glad, if you need further assistance let me know, I will be more than glad to help.&lt;/P&gt;&lt;P&gt;Have this question as marked so other people can follow the steps of troubleshooting we did.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 May 2011 23:47:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-policy-firewall-configuration/m-p/1701690#M562209</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-05-24T23:47:46Z</dc:date>
    </item>
  </channel>
</rss>

