<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Zone Based Firewall configuration question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/zone-based-firewall-configuration-question/m-p/1567596#M589304</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok so as you've got static NAT then in your ACLs 101 and 102 replace 192.168.1.253 by 134.43.xx.xx which is your public IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 23 Nov 2010 09:35:25 GMT</pubDate>
    <dc:creator>cadet alain</dc:creator>
    <dc:date>2010-11-23T09:35:25Z</dc:date>
    <item>
      <title>Zone Based Firewall configuration question</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-configuration-question/m-p/1567592#M589300</link>
      <description>&lt;P&gt;I'm trying to install an 871 router and having an issue with the zone based firewall. It's by default, it's denying smtp port 25 but allowing me out to the internet.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;The only way I'm able to get email to work and also get internet to work is to apply an acl on the interfaces with a permit any any. I've never seen the ZBF until today, so I'm trying to readup on it and learn, but I have some questions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's my setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Server hosts Exchange, DHCP, DNS, network files, and OMA/OWA. IP is 192.168.1.253&lt;/P&gt;&lt;P&gt;LAN is 192.168.1.0/24&lt;/P&gt;&lt;P&gt;871 Router is 192.168.1.250&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside interface is VLAN1&lt;/P&gt;&lt;P&gt;Outside interface is Dialer0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's the current config right now. I'm not sure on what I need to edit to allow http, https, smtp.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-all sdm-nat-http-1&lt;BR /&gt; match access-group 101&lt;BR /&gt; match protocol http&lt;BR /&gt;class-map type inspect match-all sdm-nat-smtp-1&lt;BR /&gt; match access-group 102&lt;BR /&gt; match protocol smtp&lt;BR /&gt;class-map type inspect match-any SDM_WEBVPN&lt;BR /&gt; match access-group name SDM_WEBVPN&lt;BR /&gt;class-map type inspect match-all SDM_WEBVPN_TRAFFIC&lt;BR /&gt; match class-map SDM_WEBVPN&lt;BR /&gt; match access-group 104&lt;BR /&gt;class-map type inspect match-any sdm-cls-insp-traffic&lt;BR /&gt; match protocol cuseeme&lt;BR /&gt; match protocol dns&lt;BR /&gt; match protocol ftp&lt;BR /&gt; match protocol h323&lt;BR /&gt; match protocol https&lt;BR /&gt; match protocol icmp&lt;BR /&gt; match protocol imap&lt;BR /&gt; match protocol pop3&lt;BR /&gt; match protocol netshow&lt;BR /&gt; match protocol shell&lt;BR /&gt; match protocol realmedia&lt;BR /&gt; match protocol rtsp&lt;BR /&gt; match protocol smtp extended&lt;BR /&gt; match protocol sql-net&lt;BR /&gt; match protocol streamworks&lt;BR /&gt; match protocol tftp&lt;BR /&gt; match protocol vdolive&lt;BR /&gt; match protocol tcp&lt;BR /&gt; match protocol udp&lt;BR /&gt;class-map type inspect match-all sdm-insp-traffic&lt;BR /&gt; match class-map sdm-cls-insp-traffic&lt;BR /&gt;class-map type inspect match-any SDM-Voice-permit&lt;BR /&gt; match protocol h323&lt;BR /&gt; match protocol skinny&lt;BR /&gt; match protocol sip&lt;BR /&gt;class-map type inspect match-any sdm-cls-icmp-access&lt;BR /&gt; match protocol icmp&lt;BR /&gt; match protocol tcp&lt;BR /&gt; match protocol udp&lt;BR /&gt;class-map type inspect match-all sdm-icmp-access&lt;BR /&gt; match class-map sdm-cls-icmp-access&lt;BR /&gt;class-map type inspect match-all sdm-invalid-src&lt;BR /&gt; match access-group 100&lt;BR /&gt;class-map type inspect match-all out_to_in&lt;BR /&gt; match access-group 103&lt;BR /&gt;class-map type inspect match-all sdm-protocol-http&lt;BR /&gt; match protocol http&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect sdm-permit-icmpreply&lt;BR /&gt; class type inspect sdm-icmp-access&lt;BR /&gt; inspect&lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt;policy-map type inspect sdm-pol-NATOutsideToInside-1&lt;BR /&gt; class type inspect sdm-nat-http-1&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt; class type inspect sdm-nat-smtp-1&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt; class type inspect out_to_in&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt; class class-default&lt;BR /&gt;policy-map type inspect sdm-inspect&lt;BR /&gt; class type inspect sdm-invalid-src&lt;BR /&gt;&amp;nbsp; drop log&lt;BR /&gt; class type inspect sdm-insp-traffic&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt; class type inspect sdm-protocol-http&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt; class type inspect SDM-Voice-permit&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt;policy-map type inspect sdm-permit&lt;BR /&gt;class type inspect SDM_WEBVPN_TRAFFIC&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt; class class-default&lt;BR /&gt;!&lt;BR /&gt;zone security out-zone&lt;BR /&gt;zone security in-zone&lt;BR /&gt;zone-pair security sdm-zp-self-out source self destination out-zone&lt;BR /&gt; service-policy type inspect sdm-permit-icmpreply&lt;BR /&gt;zone-pair security sdm-zp-NATOutsideToInside-1 source out-zone destination in-zone&lt;BR /&gt; service-policy type inspect sdm-pol-NATOutsideToInside-1&lt;BR /&gt;zone-pair security sdm-zp-out-self source out-zone destination self&lt;BR /&gt; service-policy type inspect sdm-permit&lt;BR /&gt;zone-pair security sdm-zp-in-out source in-zone destination out-zone&lt;BR /&gt; service-policy type inspect sdm-inspect&lt;BR /&gt;!&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;BR /&gt; description $FW_INSIDE$&lt;BR /&gt; ip address 192.168.1.250 255.255.255.0&lt;BR /&gt; ip access-group 110 in&lt;BR /&gt; ip nat inside&lt;BR /&gt; ip virtual-reassembly&lt;BR /&gt; zone-member security in-zone&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface Dialer0&lt;BR /&gt; description $FW_OUTSIDE$&lt;BR /&gt; ip address negotiated&lt;BR /&gt; ip mtu 1492&lt;BR /&gt; ip nat outside&lt;BR /&gt; ip virtual-reassembly&lt;BR /&gt; zone-member security out-zone&lt;BR /&gt; encapsulation ppp&lt;BR /&gt; ip tcp adjust-mss 1452&lt;BR /&gt; dialer pool 1&lt;BR /&gt; dialer-group 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;access-list 1 remark SDM_ACL Category=18&lt;BR /&gt;access-list 1 permit 192.168.1.0 0.0.0.255&lt;BR /&gt;access-list 100 remark SDM_ACL Category=128&lt;BR /&gt;access-list 100 permit ip host 255.255.255.255 any&lt;BR /&gt;access-list 100 permit ip 127.0.0.0 0.255.255.255 any&lt;BR /&gt;access-list 101 remark SDM_ACL Category=0&lt;BR /&gt;access-list 101 permit ip any host 192.168.1.253&lt;BR /&gt;access-list 102 remark SDM_ACL Category=0&lt;BR /&gt;access-list 102 permit ip any host 192.168.1.253&lt;BR /&gt;access-list 103 permit ip any any&lt;BR /&gt;access-list 110 remark inside_access_out&lt;BR /&gt;access-list 110 permit ip any any&lt;BR /&gt;dialer-list 1 protocol ip permit&lt;BR /&gt;!&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any tips? I'm reading this article right now and trying to learn as fast as possible, but thought I'd post up hoping someone could give some guidance.&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/sw/secursw/ps1018/products_tech_note09186a00808bc994.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/sw/secursw/ps1018/products_tech_note09186a00808bc994.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I set somethign to "inspect" does that allow it by default until it sees an issue, then drops the traffic?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FastEthernet0 is up, line protocol is down&lt;BR /&gt;&amp;nbsp; Internet protocol processing disabled&lt;BR /&gt;FastEthernet1 is up, line protocol is up&lt;BR /&gt;&amp;nbsp; Internet protocol processing disabled&lt;BR /&gt;FastEthernet2 is up, line protocol is down&lt;BR /&gt;&amp;nbsp; Internet protocol processing disabled&lt;BR /&gt;FastEthernet3 is up, line protocol is down&lt;BR /&gt;&amp;nbsp; Internet protocol processing disabled&lt;BR /&gt;FastEthernet4 is up, line protocol is up&lt;BR /&gt;&amp;nbsp; Internet protocol processing disabled&lt;BR /&gt;Vlan1 is up, line protocol is up&lt;BR /&gt;&amp;nbsp; Internet address is 192.168.1.250/24&lt;BR /&gt;&amp;nbsp; Broadcast address is 255.255.255.255&lt;BR /&gt;&amp;nbsp; Outgoing access list is not set&lt;BR /&gt;&amp;nbsp; Inbound&amp;nbsp; access list is 110&lt;/P&gt;&lt;P&gt;Loopback0 is up, line protocol is up&lt;BR /&gt;&amp;nbsp; Internet address is 10.1.1.1/24&lt;BR /&gt;&amp;nbsp; Broadcast address is 255.255.255.255&lt;BR /&gt;&amp;nbsp; Outgoing access list is not set&lt;BR /&gt;&amp;nbsp; Inbound&amp;nbsp; access list is not set&lt;/P&gt;&lt;P&gt;NVI0 is up, line protocol is up&lt;BR /&gt;&amp;nbsp; Interface is unnumbered. Using address of Loopback0 (10.1.1.1)&lt;BR /&gt;&amp;nbsp; Broadcast address is 255.255.255.255&lt;BR /&gt;&amp;nbsp; Outgoing access list is not set&lt;BR /&gt;&amp;nbsp; Inbound&amp;nbsp; access list is not set&lt;/P&gt;&lt;P&gt;Dialer0 is up, line protocol is up&lt;BR /&gt;&amp;nbsp; Internet address is x.x.x.x/32&lt;BR /&gt;&amp;nbsp; Broadcast address is 255.255.255.255&lt;BR /&gt;&amp;nbsp; Outgoing access list is not set&lt;BR /&gt;&amp;nbsp; Inbound&amp;nbsp; access list is not set&lt;/P&gt;&lt;P&gt;Virtual-Access1 is up, line protocol is up&lt;BR /&gt;&amp;nbsp; Peer address is x.x.x.x&lt;/P&gt;&lt;P&gt;&amp;nbsp; Dialer interface is Dialer0&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:13:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-configuration-question/m-p/1567592#M589300</guid>
      <dc:creator>abrrymnvette</dc:creator>
      <dc:date>2019-03-11T19:13:05Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall configuration question</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-configuration-question/m-p/1567593#M589301</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In your zbf config you are inspecting http and smtp traffic destined for the ip address of your server which is private.&lt;/P&gt;&lt;P&gt;I suppose you have a static nat to enable access to your server from outside if so then in your zbf you must permit the natted public ip address in your class-maps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Nov 2010 22:41:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-configuration-question/m-p/1567593#M589301</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2010-11-22T22:41:38Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall configuration question</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-configuration-question/m-p/1567594#M589302</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I do have NAT done.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat inside source list 1 interface Dialer0 overload&lt;BR /&gt;ip nat inside source static tcp 192.168.1.253 25 134.43.23.11 25 extendable&lt;BR /&gt;ip nat inside source static tcp 192.168.1.253 80 134.43.23.11&amp;nbsp; 80 extendable&lt;BR /&gt;ip nat inside source static tcp 192.168.1.253 443 134.43.23.11&amp;nbsp; 443 extendable&lt;BR /&gt;ip nat inside source static 192.168.1.253 134.43.23.11&amp;nbsp; extendable&lt;BR /&gt;ip nat inside source static tcp 192.168.1.250 22 134.43.23.12 22 extendable&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Nov 2010 23:26:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-configuration-question/m-p/1567594#M589302</guid>
      <dc:creator>abrrymnvette</dc:creator>
      <dc:date>2010-11-22T23:26:22Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall configuration question</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-configuration-question/m-p/1567595#M589303</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is a command that can tell you which part of the config is dropping you the packet (If dropped by the ZBF). Would you please go to enable mode and do the following?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip inspect log drop-pkt&lt;/P&gt;&lt;P&gt;do term mon&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try to send and or receive mails, we will be able to see the Zone based dropping the sessions, after this... we can go two ways, one would be configuring just inspection of general TCP for this traffic or the other one, correct the problem on the config (if any)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Nov 2010 23:56:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-configuration-question/m-p/1567595#M589303</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2010-11-22T23:56:13Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall configuration question</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-configuration-question/m-p/1567596#M589304</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok so as you've got static NAT then in your ACLs 101 and 102 replace 192.168.1.253 by 134.43.xx.xx which is your public IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Nov 2010 09:35:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-configuration-question/m-p/1567596#M589304</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2010-11-23T09:35:25Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall configuration question</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-configuration-question/m-p/1567597#M589305</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the tip on the logging. Turned that on and tried to send/receive emails. Saw this in the log:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Apr 20 14:27:26.735: %FW-6-DROP_PKT: Dropping Other session 166.137.143.92:8562 192.168.1.253:443 on zone-pair sdm-zp-NATOutsideToInside-1 class class-default due to&amp;nbsp; policy match failure with ip ident 23252 tcpflags 0x7002 seq.no 2651868498 ack 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once I saw that I noticed I needed to add https to the class map. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, I added this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class type inspect sdm-nat-https-1&lt;/P&gt;&lt;P&gt;inspect&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And I added that class type to the already existing policy map and it looks like this now&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect sdm-pol-NATOutsideToInside-1&lt;BR /&gt; class type inspect sdm-nat-http-1&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt; class type inspect sdm-nat-smtp-1&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt; class type inspect out_to_in&lt;BR /&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt; class type inspect sdm-nat-https-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;BR /&gt; class class-default&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I then did a copy run start, and reloaded. After that I was able to send and receive email, OWA is working and internet is working. Only thing that I don't like is that it looks like the ip 192.168.1.253 is open from everything on the internet? Am I reading that right? Basically the only things that should be open are DNS (53) http (80) which redirects to https (443) and smtp (25). We don't run a company website, only OWA.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Nov 2010 14:24:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-configuration-question/m-p/1567597#M589305</guid>
      <dc:creator>abrrymnvette</dc:creator>
      <dc:date>2010-11-23T14:24:11Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall configuration question</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-configuration-question/m-p/1567598#M589306</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not really, the first class map says that it needs to match everything that is on it... currently, it has an http class map and the ACL 101.. so the packet would need to come from anyone in http, if the packet comes from anyone on another port, it will not match that class map and will go down the list until it finds a match... thats why https was getting dropped, at the moment you added the new class map it did not hit the first, went to the bottom and then matched the last class map which only had the inspection for https.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have any doubts please let me know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Nov 2010 15:01:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-configuration-question/m-p/1567598#M589306</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2010-11-23T15:01:44Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall configuration question</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-configuration-question/m-p/1567599#M589307</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-all sdm-nat-http-1&lt;/P&gt;&lt;P&gt;match access-group 101&lt;/P&gt;&lt;P&gt;match protocol http&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit ip any host 192.168.1.253&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone-pair security sdm-zp-NATOutsideToInside-1 source out-zone destination in-zone&lt;/P&gt;&lt;P&gt;service-policy type inspect sdm-pol-NATOutsideToInside-1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect sdm-pol-NATOutsideToInside-1&lt;/P&gt;&lt;P&gt;class type inspect sdm-nat-http-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;class type inspect sdm-nat-smtp-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;class type inspect out_to_in&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;class class-default&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect sdm-inspect&lt;/P&gt;&lt;P&gt;class type inspect sdm-invalid-src&lt;/P&gt;&lt;P&gt;&amp;nbsp; drop log&lt;/P&gt;&lt;P&gt;class type inspect sdm-insp-traffic&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;class type inspect sdm-protocol-http&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone-pair security sdm-zp-in-out source in-zone destination out-zone&lt;/P&gt;&lt;P&gt;service-policy type inspect sdm-inspect&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;People trying to gain access to inside web services&amp;nbsp; from outside will have th public ip address as destination no?&lt;/P&gt;&lt;P&gt;if so then acl 101 explicit permit is not matched and so class-map sdm-nat-http-1 is not matched either because it is a match-all class-map.&lt;/P&gt;&lt;P&gt;so the traffic will be classified as class-default, correct?&lt;/P&gt;&lt;P&gt;what is the class-default action in the policy if it's a pass then that traffic is permitted from out to in and dest ip address is natted back to the private ip add, correct?&lt;/P&gt;&lt;P&gt;then we need to have a service-policy from in to out which permits http which is the case, correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If class-default action was inspect ther was no need for a service-policy in-to-out, correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and if class-default was drop then there was no communication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So my question is how wasn't it not working before and now it's ok if he didn't change the ACLs referenced in the class-maps but just added&amp;nbsp; a class-map for https.&lt;/P&gt;&lt;P&gt;Was he only trying https before?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Nov 2010 15:56:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-configuration-question/m-p/1567599#M589307</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2010-11-23T15:56:00Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall configuration question</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-configuration-question/m-p/1567600#M589308</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yup, seems like it was only trying https. If I am not mistaken, OWA uses SSL to protect the communication between the host and the client. I totally understand your question... You must be thinking... well if OWA says to me open 80, 443 and 25.... why it was only trying 443? The answer (And this is a personal Opinion) is that the first contact that you do for authentication to the OWA server is on port 443...If this authentication is not successful, then the other ports are not needed.....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Defaul action of every class default is drop... execept for the one that goes to the Self-zone...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it makes sense.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Nov 2010 17:04:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-configuration-question/m-p/1567600#M589308</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2010-11-23T17:04:03Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall configuration question</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-configuration-question/m-p/1567601#M589309</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So, when I add ACL's do I want the destinations to be my private IP or the Public NAT'd IP?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, say I want to block 192.168.53.0/24 from getting out of the network. SO, I would put an ACL inbound on the VLAN1 interface. But, if I do that, it doesn't seem to have any effect. Do I have to do it with a zone policy basically?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I tried was:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 125 deny IP 192.168.53.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then I did the following:&lt;/P&gt;&lt;P&gt;conf t&lt;/P&gt;&lt;P&gt;interface vlan1&lt;/P&gt;&lt;P&gt;ip access-class 125 in&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But it didn't seem to have any effect.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Nov 2010 17:38:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-configuration-question/m-p/1567601#M589309</guid>
      <dc:creator>abrrymnvette</dc:creator>
      <dc:date>2010-11-23T17:38:30Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall configuration question</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-configuration-question/m-p/1567602#M589310</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When using Zone based firewall, you will use the Private IP address instead of the public. This feature is called "Real IP address". It has been also added to the ASA on version 8.3. Regarding to your question, as per the documentation on the zone based firewall design guide. ACLs and Zone based&amp;nbsp; should not be applied at the same time.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regarding to your concern, yes, you will need to block this network using the Zone based firewall. There are several ways that you can achieve this, but I see one that seems to be the easiest.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have already a class map that is called invalid source. It is matching an ACL with several IP addresses that are not meant to come as source Address in a packet. The action of this class map is drop, If you add Lines to the acl 100 (which is the one that is being matched to drop packets) the packets will be dropped.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By simply adding this line&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 100 deny IP 192.168.53.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That network should be block.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please try it and let me know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Nov 2010 18:03:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-configuration-question/m-p/1567602#M589310</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2010-11-23T18:03:07Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall configuration question</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-configuration-question/m-p/1567603#M589311</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for all the help and it's helping tons. Issue resolved.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Nov 2010 22:16:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-configuration-question/m-p/1567603#M589311</guid>
      <dc:creator>abrrymnvette</dc:creator>
      <dc:date>2010-11-23T22:16:31Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall configuration question</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-configuration-question/m-p/1567604#M589312</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;By default all traffic to or from&amp;nbsp; your router interfaces( or self zone from a zbf standpoint) is permitted so no need to add a service-policy unless you want to deny some traffic.&lt;/P&gt;&lt;P&gt;So I would get rid of this config lines you added in your zone based firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Nov 2010 10:47:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-configuration-question/m-p/1567604#M589312</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2010-11-24T10:47:36Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall configuration question</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-configuration-question/m-p/1567605#M589313</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;But that's what I'm trying to do. I'm trying to block ssh access from everything but my 1 IP.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Nov 2010 13:06:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-configuration-question/m-p/1567605#M589313</guid>
      <dc:creator>abrrymnvette</dc:creator>
      <dc:date>2010-11-24T13:06:25Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall configuration question</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-configuration-question/m-p/1567606#M589314</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;then you can try applying an ACL permitting only your ip&amp;nbsp; as an inbound access-class to your vty line.&lt;/P&gt;&lt;P&gt;If it's compatible with ZBF, give it a try.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Nov 2010 13:39:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-configuration-question/m-p/1567606#M589314</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2010-11-24T13:39:52Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall configuration question</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-configuration-question/m-p/1567607#M589315</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm a moron, it was my local firwall blocking my access.I had it setup right all along. Thanks for the help guys!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Nov 2010 13:48:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-configuration-question/m-p/1567607#M589315</guid>
      <dc:creator>abrrymnvette</dc:creator>
      <dc:date>2010-11-24T13:48:41Z</dc:date>
    </item>
  </channel>
</rss>

