<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Trend Content Filtering in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/trend-content-filtering/m-p/1606955#M590962</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Some more information, We have 2 vlans configured on the router.&lt;/P&gt;&lt;P&gt; Vlan 1 for the seperate users traffic and Vlan 2 for the management traffic we use for the vpn.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Vlan 1 is currently the inside zone for the security and dialer 0 is the outside, I have attached a copy of the currnt content filtering configuration&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 23 Feb 2011 14:26:23 GMT</pubDate>
    <dc:creator>steve-gates</dc:creator>
    <dc:date>2011-02-23T14:26:23Z</dc:date>
    <item>
      <title>Trend Content Filtering</title>
      <link>https://community.cisco.com/t5/network-security/trend-content-filtering/m-p/1606952#M590959</link>
      <description>&lt;P&gt;Morning&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; I currently have a Cisco 887 running Trend filtering which is all running fine and blocking url's etc. I also have a Cisco 2960 and 3 x AP's running behind the 887. I have a VPN running on the 887 to enable us to connect remotely to the devices.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; My problem is with the zone security outside not enabled on the dialer interface I can telnet,ping,ftp etc fine to the devices. As soon as I enable the zone security my ability to do any of this stops. Any ideas as to what else i need to configure would be appreciated..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Cheers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Steve&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:55:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trend-content-filtering/m-p/1606952#M590959</guid>
      <dc:creator>steve-gates</dc:creator>
      <dc:date>2019-03-11T19:55:14Z</dc:date>
    </item>
    <item>
      <title>Re: Trend Content Filtering</title>
      <link>https://community.cisco.com/t5/network-security/trend-content-filtering/m-p/1606953#M590960</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, once you applied a zone to an interface, you will have to explicitly configure rules to allow access to those devices.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you are connecting to the VPN first, I assume you have a VPN zone configured? If you do, then you will need to configure zone-pair between the VPN zone towards the inside zone, and the class map will match the traffic that you would like to allow, ie: FTP, telnet, ping,etc, with a policy-map set to "inspect".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a sample configuration on ZBFW:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/prod/collateral/vpndevc/ps5708/ps5710/ps1018/prod_white_paper0900aecd8062a909.html"&gt;http://www.cisco.com/en/US/prod/collateral/vpndevc/ps5708/ps5710/ps1018/prod_white_paper0900aecd8062a909.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Feb 2011 11:45:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trend-content-filtering/m-p/1606953#M590960</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-02-23T11:45:32Z</dc:date>
    </item>
    <item>
      <title>Re: Trend Content Filtering</title>
      <link>https://community.cisco.com/t5/network-security/trend-content-filtering/m-p/1606954#M590961</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Thanks for the reply. I don't have anything like a VPN Zone configured, can't seem to cut and paste my config onto here either..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Feb 2011 12:48:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trend-content-filtering/m-p/1606954#M590961</guid>
      <dc:creator>steve-gates</dc:creator>
      <dc:date>2011-02-23T12:48:48Z</dc:date>
    </item>
    <item>
      <title>Re: Trend Content Filtering</title>
      <link>https://community.cisco.com/t5/network-security/trend-content-filtering/m-p/1606955#M590962</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Some more information, We have 2 vlans configured on the router.&lt;/P&gt;&lt;P&gt; Vlan 1 for the seperate users traffic and Vlan 2 for the management traffic we use for the vpn.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Vlan 1 is currently the inside zone for the security and dialer 0 is the outside, I have attached a copy of the currnt content filtering configuration&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Feb 2011 14:26:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trend-content-filtering/m-p/1606955#M590962</guid>
      <dc:creator>steve-gates</dc:creator>
      <dc:date>2011-02-23T14:26:23Z</dc:date>
    </item>
    <item>
      <title>Re: Trend Content Filtering</title>
      <link>https://community.cisco.com/t5/network-security/trend-content-filtering/m-p/1606956#M590964</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1) You will need to create an access-list that says permit from VPN Client pool subnet to internal subnets&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Create a class-map to match the access-list above&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) Create a policy-map for the above class with the action as inspect&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4) Apply the policy-map to zone-pair:&lt;/P&gt;&lt;P&gt;zone-pair security out-to-in source outside destination inside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN class="content"&gt;service-policy type inspect &lt;NAME-OF-THE-POLICY-MAP-CREATED-AT-STEP3&gt;&lt;BR /&gt;&lt;/NAME-OF-THE-POLICY-MAP-CREATED-AT-STEP3&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Feb 2011 10:58:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trend-content-filtering/m-p/1606956#M590964</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-02-24T10:58:39Z</dc:date>
    </item>
  </channel>
</rss>

