<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Zone-based firewall blocks DNS replies, even though configur in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/zone-based-firewall-blocks-dns-replies-even-though-configured-to/m-p/1515685#M607619</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You were passing a packet from the server to any destined to port 53.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But it was a packet source from the server and port 53 and destined to anything. The dns reply is sourced from port 53, the dns request is destined to 53.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please mark this as answere for other people's benefit.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 04 Nov 2010 20:47:34 GMT</pubDate>
    <dc:creator>Panos Kampanakis</dc:creator>
    <dc:date>2010-11-04T20:47:34Z</dc:date>
    <item>
      <title>Zone-based firewall blocks DNS replies, even though configured to allow</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-blocks-dns-replies-even-though-configured-to/m-p/1515680#M607614</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IOS 15.1, Cisco 877.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a rpoblem with zone-based firewalls. With my current configuration, if I use the router as a DNS server then DNS replies get blocked by the firewall, even though I've explicity allowed them. This is true if I ping an external domain from the router, and also if I ping an external domain from the LAN whilst having my DNS pointing to the router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Immediately after executing the ping, this gets logged:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Dropping udp session &amp;lt;OpenDNS IP&amp;gt;:53 &amp;lt;my external IP&amp;gt;:58259 on zone-pair OutsideToRouter class class-default due to&amp;nbsp; DROP action found in policy-map with ip ident 0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Changing the class-default on pm-OutsideToRouter to pass allows DNS to work correctly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My config is below, with the key lines in bold.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jim&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;!&lt;BR /&gt;! Last configuration change at 15:55:15 BST Fri Oct 22 2010 by xx&lt;BR /&gt;!&lt;BR /&gt;version 15.1&lt;BR /&gt;no service pad&lt;BR /&gt;service timestamps debug datetime msec localtime&lt;BR /&gt;service timestamps log datetime msec localtime&lt;BR /&gt;service password-encryption&lt;BR /&gt;service internal&lt;BR /&gt;!&lt;BR /&gt;hostname Cisco877&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot system flash c870-advipservicesk9-mz.151-2.T1.bin&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;logging buffered 16386&lt;BR /&gt;logging rate-limit 100 except warnings&lt;BR /&gt;no logging console&lt;BR /&gt;no logging monitor&lt;BR /&gt;enable secret 5 xxx&lt;BR /&gt;!&lt;BR /&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login default local&lt;BR /&gt;aaa authentication ppp default local&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa session-id common&lt;BR /&gt;!&lt;BR /&gt;clock timezone GMT 0 0&lt;BR /&gt;clock summer-time BST recurring last Sun Mar 1:00 last Sun Oct 2:00&lt;BR /&gt;crypto pki token default removal timeout 0&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;dot11 syslog&lt;BR /&gt;ip source-route&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no ip cef&lt;BR /&gt;ip domain name willsher.local&lt;BR /&gt;&lt;STRONG&gt;ip name-server 208.67.222.222&lt;BR /&gt;ip name-server 208.67.220.220&lt;/STRONG&gt;&lt;BR /&gt;ip port-map user-PassiveFTP port tcp from 50000 to 50050&amp;nbsp; description Passive FTP&lt;BR /&gt;ip port-map user-BNIRDP port tcp xxxxx description BNI Remote Desktop&lt;BR /&gt;ip port-map user-RDP port tcp 3389 description Terminal Services&lt;BR /&gt;ip port-map user-ExtraSMTP port tcp yyyyy description Additional SMTP Listener&lt;BR /&gt;ip inspect log drop-pkt&lt;BR /&gt;ip inspect WAAS flush-timeout 10&lt;BR /&gt;login block-for 180 attempts 3 within 180&lt;BR /&gt;login on-failure log&lt;BR /&gt;login on-success log&lt;BR /&gt;no ipv6 cef&lt;BR /&gt;!&lt;BR /&gt;multilink bundle-name authenticated&lt;BR /&gt;!&lt;BR /&gt;vpdn enable&lt;BR /&gt;!&lt;BR /&gt;vpdn-group 1&lt;BR /&gt; ! Default PPTP VPDN group&lt;BR /&gt; accept-dialin&lt;BR /&gt;&amp;nbsp; protocol pptp&lt;BR /&gt;&amp;nbsp; virtual-template 1&lt;BR /&gt; l2tp tunnel timeout no-session 15&lt;BR /&gt;!&lt;BR /&gt;parameter-map type inspect global&lt;BR /&gt; log dropped-packets enable&lt;BR /&gt;parameter-map type inspect pmap-audit&lt;BR /&gt; audit-trail on&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;archive&lt;BR /&gt; log config&lt;BR /&gt;&amp;nbsp; hidekeys&lt;BR /&gt;&lt;STRONG&gt;object-group network og-L1-DNS-Servers &lt;BR /&gt; description Allowed external DNS servers&lt;BR /&gt; host 208.67.222.222&lt;BR /&gt; host 208.67.220.220&lt;/STRONG&gt;&lt;BR /&gt;!&lt;BR /&gt;object-group network og-L1-Mermaid &lt;BR /&gt; description Mermaid&lt;BR /&gt; host xx.xx.104.xxx&lt;BR /&gt;!&lt;BR /&gt;object-group network og-L1-NTP-Servers &lt;BR /&gt; description Allowed external NTP servers&lt;BR /&gt; host 129.6.15.28&lt;BR /&gt;!&lt;BR /&gt;object-group network og-L1-Perth &lt;BR /&gt; description Perth&lt;BR /&gt; host xx.xx.152.XXX&lt;BR /&gt;!&lt;BR /&gt;object-group network og-L1-Cub &lt;BR /&gt; description Cub (Main)&lt;BR /&gt; host 109.224.143.242&lt;BR /&gt;!&lt;BR /&gt;object-group network og-L1-Cub-TS &lt;BR /&gt; description Cub (TS)&lt;BR /&gt; host 109.224.143.242&lt;BR /&gt;!&lt;BR /&gt;object-group network og-L2-Allow-SSH &lt;BR /&gt; description Allow SSH to router from these external hosts&lt;BR /&gt; group-object og-L1-Mermaid&lt;BR /&gt; group-object og-L1-Perth&lt;BR /&gt; group-object og-L1-Cub-TS&lt;BR /&gt;!&lt;BR /&gt;username vpn-xx password 7 xx&lt;BR /&gt;username vpn-xx password 7 xx&lt;BR /&gt;username xx privilege 15 secret 5 $1$xx$xx.&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip ssh version 2&lt;BR /&gt;!&lt;BR /&gt;track 10 ip sla 10 reachability&lt;BR /&gt; delay down 180 up 10&lt;BR /&gt;!&lt;BR /&gt;track 20 ip sla 20 reachability&lt;BR /&gt; delay down 180 up 10&lt;BR /&gt;!&lt;BR /&gt;class-map type inspect match-any cm-Allow-SSH&lt;BR /&gt; description Allow SSH access to router&lt;BR /&gt; match access-group name acl-Allow-SSH&lt;BR /&gt;class-map type inspect match-any cm-ExtVisBNIProtocols&lt;BR /&gt; description Externally visible protocols on the BNI VPC&lt;BR /&gt; match protocol user-BNIRDP&lt;BR /&gt;class-map type inspect match-any cm-AllowedOut&lt;BR /&gt; description Permitted Traffic to internet&lt;BR /&gt; match protocol tcp&lt;BR /&gt; match protocol udp&lt;BR /&gt; match protocol icmp&lt;BR /&gt;class-map type inspect match-any cm-ExtVisWebserverProtocols&lt;BR /&gt; description Externally visible protocols on the Webserver&lt;BR /&gt; match protocol http&lt;BR /&gt; match protocol https&lt;BR /&gt; match protocol pop3s&lt;BR /&gt; match protocol user-ExtraSMTP&lt;BR /&gt; match protocol user-PassiveFTP&lt;BR /&gt; match protocol ftp&lt;BR /&gt; match protocol smtp&lt;BR /&gt;class-map type inspect match-all cm-PPTP-Passthrough&lt;BR /&gt; match access-group name acl-PPTP-Passthrough&lt;BR /&gt;class-map type inspect match-all cm-ICMP-Request&lt;BR /&gt; description Only certain pings permitted to router&lt;BR /&gt; match access-group name acl-ICMP-Request&lt;BR /&gt; match protocol icmp&lt;BR /&gt;class-map type inspect match-all cm-ICMP-Reply&lt;BR /&gt; description Only certain pings permitted to router&lt;BR /&gt; match access-group name acl-ICMP-Reply&lt;BR /&gt;class-map type inspect match-all cm-ExtVisBNIServices&lt;BR /&gt; description Externally-visible protocols headed to BNI VPC&lt;BR /&gt; match access-group name acl-BNI_VPC&lt;BR /&gt; match class-map cm-ExtVisBNIProtocols&lt;BR /&gt;class-map type inspect match-all cm-PPTP-Terminated-Traffic&lt;BR /&gt; match access-group name acl-PPTP-Terminated&lt;BR /&gt;class-map type inspect match-all cm-ExtVisWebserverServices&lt;BR /&gt; description Externally-visible protocols headed to webserver&lt;BR /&gt; match class-map cm-ExtVisWebserverProtocols&lt;BR /&gt; match access-group name acl-WebServer&lt;BR /&gt;class-map type inspect match-all cm-Allow-NTP-Replies&lt;BR /&gt; description Allow NTP replies&lt;BR /&gt; match access-group name acl-Allow-NTP-Replies&lt;BR /&gt; match protocol ntp&lt;BR /&gt;&lt;STRONG&gt;class-map type inspect match-all cm-Allow-DNS-Replies&lt;BR /&gt; description Allow DNS replies&lt;BR /&gt; match access-group name acl-Allow-DNS-Replies&lt;BR /&gt; match protocol dns&lt;/STRONG&gt;&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect pm-RouterToInside&lt;BR /&gt; description Router to LAN&lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt;policy-map type inspect pm-InsideToRouter&lt;BR /&gt; description LAN to router&lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt;policy-map type inspect pm-InsideToOutside&lt;BR /&gt; description LAN to Internet&lt;BR /&gt; class type inspect cm-AllowedOut&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class type inspect cm-PPTP-Passthrough&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; drop log&lt;BR /&gt;policy-map type inspect pm-OutsideToInside&lt;BR /&gt; description Internet to LAN (server)&lt;BR /&gt; class type inspect cm-ExtVisBNIServices&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class type inspect cm-ExtVisWebserverServices&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class type inspect cm-Allow-NTP-Replies&lt;BR /&gt;&amp;nbsp; inspect pmap-audit&lt;BR /&gt; class type inspect cm-PPTP-Passthrough&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt; class type inspect cm-Allow-DNS-Replies&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; drop log&lt;BR /&gt;&lt;STRONG&gt;policy-map type inspect pm-OutsideToRouter&lt;/STRONG&gt;&lt;BR /&gt; class type inspect cm-Allow-NTP-Replies&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt; class type inspect cm-Allow-SSH&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt; class type inspect cm-ICMP-Reply&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt; class type inspect cm-PPTP-Terminated-Traffic&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt; class type inspect cm-ICMP-Request&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; &lt;STRONG&gt;class type inspect cm-Allow-DNS-Replies&lt;BR /&gt;&amp;nbsp; pass&lt;/STRONG&gt;&lt;BR /&gt; &lt;STRONG&gt;class class-default&lt;BR /&gt;&amp;nbsp; drop log&lt;/STRONG&gt;&lt;BR /&gt;policy-map type inspect pm-RouterToOutside&lt;BR /&gt; description Router to internet&lt;BR /&gt; class type inspect cm-PPTP-Terminated-Traffic&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt;!&lt;BR /&gt;zone security Inside&lt;BR /&gt;zone security Outside&lt;BR /&gt;zone-pair security InsideToOutside source Inside destination Outside&lt;BR /&gt; service-policy type inspect pm-InsideToOutside&lt;BR /&gt;zone-pair security RouterToInside source self destination Inside&lt;BR /&gt; service-policy type inspect pm-RouterToInside&lt;BR /&gt;zone-pair security InsideToRouter source Inside destination self&lt;BR /&gt; service-policy type inspect pm-InsideToRouter&lt;BR /&gt;zone-pair security OutsideToRouter source Outside destination self&lt;BR /&gt; service-policy type inspect pm-OutsideToRouter&lt;BR /&gt;zone-pair security RouterToOutside source self destination Outside&lt;BR /&gt; service-policy type inspect pm-RouterToOutside&lt;BR /&gt;zone-pair security OutsideToInside source Outside destination Inside&lt;BR /&gt; service-policy type inspect pm-OutsideToInside&lt;BR /&gt;!&lt;BR /&gt;! &lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface ATM0&lt;BR /&gt; description ADSL Connection&lt;BR /&gt; no ip address&lt;BR /&gt; no atm ilmi-keepalive&lt;BR /&gt; dsl enable-training-log &lt;BR /&gt; dsl bitswap both&lt;BR /&gt; hold-queue 200 in&lt;BR /&gt; pvc 0/38 &lt;BR /&gt;&amp;nbsp; encapsulation aal5mux ppp dialer&lt;BR /&gt;&amp;nbsp; dialer pool-member 1&lt;BR /&gt; !&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet2&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet3&lt;BR /&gt;!&lt;BR /&gt;interface Virtual-Template1&lt;BR /&gt; ip unnumbered Vlan1&lt;BR /&gt; ip nat inside&lt;BR /&gt; ip virtual-reassembly in&lt;BR /&gt; zone-member security Inside&lt;BR /&gt; peer default ip address pool VPNPOOL&lt;BR /&gt; no keepalive&lt;BR /&gt; ppp encrypt mppe auto required&lt;BR /&gt; ppp authentication ms-chap-v2&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; description An Teallach LAN&lt;BR /&gt; ip address 192.168.0.252 255.255.255.0 secondary&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0&lt;BR /&gt; ip nat inside&lt;BR /&gt; ip nat enable&lt;BR /&gt; ip virtual-reassembly in&lt;BR /&gt; zone-member security Inside&lt;BR /&gt; ip tcp adjust-mss 1452&lt;BR /&gt; hold-queue 100 in&lt;BR /&gt; hold-queue 100 out&lt;BR /&gt;!&lt;BR /&gt;interface Dialer0&lt;BR /&gt; bandwidth inherit&lt;BR /&gt; ip address negotiated&lt;BR /&gt; ip nat outside&lt;BR /&gt; ip virtual-reassembly in&lt;BR /&gt; zone-member security Outside&lt;BR /&gt; encapsulation ppp&lt;BR /&gt; ip tcp header-compression iphc-format&lt;BR /&gt; ip tcp adjust-mss 1452&lt;BR /&gt; dialer pool 1&lt;BR /&gt; dialer-group 1&lt;BR /&gt; ppp authentication pap chap callin&lt;BR /&gt;&lt;SPAN&gt; ppp chap hostname &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:xx@xx.xx.co.uk" target="_blank"&gt;xx@xx.xx.co.uk&lt;/A&gt;&lt;BR /&gt; ppp chap password 7 xx&lt;BR /&gt; ppp ipcp dns request&lt;BR /&gt; ppp ipcp wins request&lt;BR /&gt; no cdp enable&lt;BR /&gt; ip rtp header-compression iphc-format&lt;BR /&gt;!&lt;BR /&gt;ip local pool VPNPOOL 192.168.1.251 192.168.1.253&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;no ip http server&lt;BR /&gt;no ip http secure-server&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;&lt;STRONG&gt;ip dns server&lt;/STRONG&gt;&lt;BR /&gt;no ip nat service sip udp port 5060&lt;BR /&gt;ip nat inside source static tcp 192.168.1.50 25 interface Dialer0 25&lt;BR /&gt;ip nat inside source static tcp 192.168.1.50 80 interface Dialer0 80&lt;BR /&gt;ip nat inside source static tcp 192.168.1.50 443 interface Dialer0 443&lt;BR /&gt;ip nat inside source static tcp 192.168.1.50 995 interface Dialer0 995&lt;BR /&gt;ip nat inside source static tcp 192.168.1.50 yyyyy interface Dialer0 yyyyy&lt;BR /&gt;ip nat inside source static tcp 192.168.1.50 20 interface Dialer0 20&lt;BR /&gt;ip nat inside source static tcp 192.168.1.50 21 interface Dialer0 21&lt;BR /&gt;ip nat inside source static tcp 192.168.1.20 3389 interface Dialer0 3389&lt;BR /&gt;ip nat inside source static tcp 192.168.1.65 xxxxx interface Dialer0 xxxxx&lt;BR /&gt;ip nat inside source list acl-NAT-Ranges interface Dialer0 overload&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 Dialer0&lt;BR /&gt;!&lt;BR /&gt;ip access-list standard Allowed_SNMP&lt;BR /&gt;ip access-list standard acl-NAT-Ranges&lt;BR /&gt; remark Define NAT internal ranges&lt;BR /&gt; permit 192.168.1.0 0.0.0.255&lt;BR /&gt; permit 192.168.9.0 0.0.0.255&lt;BR /&gt;!&lt;BR /&gt;&lt;STRONG&gt;ip access-list extended acl-Allow-DNS-Replies&lt;BR /&gt; permit udp object-group og-L1-DNS-Servers any eq domain&lt;/STRONG&gt;&lt;BR /&gt;ip access-list extended acl-Allow-NTP-Replies&lt;BR /&gt; permit udp object-group og-L1-NTP-Servers any eq ntp&lt;BR /&gt;ip access-list extended acl-Allow-SSH&lt;BR /&gt; remark Allow SSH from these external hosts&lt;BR /&gt; permit tcp object-group og-L2-Allow-SSH any eq 22&lt;BR /&gt;ip access-list extended acl-BNI_VPC&lt;BR /&gt; remark Traffic to BNI VPN&lt;BR /&gt; permit ip any host 192.168.1.65&lt;BR /&gt;ip access-list extended acl-ICMP-Reply&lt;BR /&gt; permit icmp any any host-unreachable&lt;BR /&gt; permit icmp any any port-unreachable&lt;BR /&gt; permit icmp any any ttl-exceeded&lt;BR /&gt; permit icmp any any packet-too-big&lt;BR /&gt; permit icmp any any echo-reply&lt;BR /&gt;ip access-list extended acl-ICMP-Request&lt;BR /&gt; permit icmp any any echo&lt;BR /&gt;ip access-list extended acl-PPTP-Passthrough&lt;BR /&gt; permit gre any any&lt;BR /&gt;ip access-list extended acl-PPTP-Terminated&lt;BR /&gt; permit gre any any&lt;BR /&gt; permit tcp any any eq 1723&lt;BR /&gt;ip access-list extended acl-SSH-Port&lt;BR /&gt; permit tcp any any eq 22&lt;BR /&gt;ip access-list extended acl-WebServer&lt;BR /&gt; remark Traffic to Webserver&lt;BR /&gt; permit ip any host 192.168.1.50&lt;BR /&gt;!&lt;BR /&gt;ip sla 10&lt;BR /&gt; icmp-echo 8.8.8.8 source-interface Vlan1&lt;BR /&gt; threshold 3000&lt;BR /&gt; timeout 3000&lt;BR /&gt; frequency 10&lt;BR /&gt;ip sla schedule 10 life forever start-time after 00:10:00&lt;BR /&gt;ip sla 20&lt;BR /&gt; icmp-echo 208.67.222.222 source-interface Vlan1&lt;BR /&gt; threshold 3000&lt;BR /&gt; timeout 3000&lt;BR /&gt; frequency 10&lt;BR /&gt;ip sla schedule 20 life forever start-time after 00:10:00&lt;BR /&gt;ip access-list logging interval 10&lt;BR /&gt;logging esm config&lt;BR /&gt;logging trap debugging&lt;BR /&gt;logging facility local6&lt;BR /&gt;logging 192.168.1.50&lt;BR /&gt;dialer-list 1 protocol ip permit&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;snmp-server community XXX RW Allowed_SNMP&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;control-plane&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt; exec-timeout 0 0&lt;BR /&gt; no modem enable&lt;BR /&gt; transport output all&lt;BR /&gt;line aux 0&lt;BR /&gt; transport output all&lt;BR /&gt;line vty 0 4&lt;BR /&gt; exec-timeout 0 0&lt;BR /&gt; privilege level 15&lt;BR /&gt; length 40&lt;BR /&gt; width 160&lt;BR /&gt; transport input ssh&lt;BR /&gt; transport output all&lt;BR /&gt;!&lt;BR /&gt;scheduler max-task-time 5000&lt;BR /&gt;scheduler allocate 20000 1000&lt;BR /&gt;ntp logging&lt;BR /&gt;ntp master&lt;BR /&gt;ntp server 129.6.15.28&lt;BR /&gt;time-range WEEKDAY&lt;BR /&gt; periodic weekdays 8:00 to 18:00&lt;BR /&gt;!&lt;BR /&gt;event manager applet ema-ADSL-Down &lt;BR /&gt; event tag PingDown1 track 10 state down&lt;BR /&gt; event tag PingDown2 track 20 state down&lt;BR /&gt; trigger&lt;BR /&gt;&amp;nbsp; correlate event PingDown1 and event PingDown2&lt;BR /&gt; action 10 syslog msg "********** WARNING! ADSL Line Down! **********"&lt;BR /&gt; action 20 reload&lt;BR /&gt;event manager applet ema-ADSL-Up &lt;BR /&gt; event tag PingUp1 track 10 state up&lt;BR /&gt; event tag PingUp2 track 20 state up&lt;BR /&gt; trigger&lt;BR /&gt;&amp;nbsp; correlate event PingUp1 or event PingUp2&lt;BR /&gt; action 10 syslog msg "********** ADSL Line UP **********"&lt;BR /&gt;!&lt;BR /&gt;end&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:04:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-blocks-dns-replies-even-though-configured-to/m-p/1515680#M607614</guid>
      <dc:creator>jimwillsher</dc:creator>
      <dc:date>2019-03-11T19:04:45Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-based firewall blocks DNS replies, even though configur</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-blocks-dns-replies-even-though-configured-to/m-p/1515681#M607615</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are probably not matching that class that passes dns. And the reason is that your ACL is wrong. Change it to &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;&lt;STRONG&gt;ip access-list extended acl-Allow-DNS-Replies&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit udp object-group og-L1-DNS-Servers &lt;/STRONG&gt;&lt;STRONG&gt;&lt;SPAN style="color: #ff0000;"&gt;eq domain&lt;/SPAN&gt; &lt;/STRONG&gt;&lt;STRONG&gt;any &amp;lt;----&lt;/STRONG&gt;&lt;STRONG&gt;og-L1-DNS-Servers should be matching the OpenDNS ip address&lt;/STRONG&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I suggest to change the class-map also&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;&lt;STRONG&gt;class-map type inspect match-all cm-Allow-DNS-Replies&lt;BR /&gt;&amp;nbsp; description Allow DNS replies&lt;BR /&gt;&amp;nbsp; match access-group name acl-Allow-DNS-Replies &lt;BR /&gt;&amp;nbsp; match protocol dns&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN style="color: #ff0000;"&gt;&amp;lt;-------- remove this no need for it&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Nov 2010 18:32:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-blocks-dns-replies-even-though-configured-to/m-p/1515681#M607615</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-11-04T18:32:18Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-based firewall blocks DNS replies, even though configur</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-blocks-dns-replies-even-though-configured-to/m-p/1515682#M607616</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Many thanks pk. Unfortunate that OG *is* matching the OpenDNS servers, and removing the match line didn't work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for taking the time to reply though.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Nov 2010 19:58:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-blocks-dns-replies-even-though-configured-to/m-p/1515682#M607616</guid>
      <dc:creator>jimwillsher</dc:creator>
      <dc:date>2010-11-04T19:58:12Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-based firewall blocks DNS replies, even though configur</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-blocks-dns-replies-even-though-configured-to/m-p/1515683#M607617</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Note the port. The source port of the dns reply should be 53, not the destination&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;&lt;STRONG&gt;permit udp object-group og-L1-DNS-Servers &lt;/STRONG&gt;&lt;STRONG&gt;&lt;SPAN style="color: #ff0000;"&gt;eq domain&lt;/SPAN&gt; &lt;/STRONG&gt;&lt;STRONG&gt;any&lt;/STRONG&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did it help?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Nov 2010 20:24:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-blocks-dns-replies-even-though-configured-to/m-p/1515683#M607617</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-11-04T20:24:49Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-based firewall blocks DNS replies, even though configur</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-blocks-dns-replies-even-though-configured-to/m-p/1515684#M607618</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hmmm....yes, actually it did. It worked &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; Thank you!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But why &lt;SPAN __jive_emoticon_name="confused" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/confused.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Shouldn't the packets be returning back to the source port of 53?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Nov 2010 20:31:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-blocks-dns-replies-even-though-configured-to/m-p/1515684#M607618</guid>
      <dc:creator>jimwillsher</dc:creator>
      <dc:date>2010-11-04T20:31:57Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-based firewall blocks DNS replies, even though configur</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-blocks-dns-replies-even-though-configured-to/m-p/1515685#M607619</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You were passing a packet from the server to any destined to port 53.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But it was a packet source from the server and port 53 and destined to anything. The dns reply is sourced from port 53, the dns request is destined to 53.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please mark this as answere for other people's benefit.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Nov 2010 20:47:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-blocks-dns-replies-even-though-configured-to/m-p/1515685#M607619</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-11-04T20:47:34Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-based firewall blocks DNS replies, even though configur</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-blocks-dns-replies-even-though-configured-to/m-p/1515686#M607620</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Gotcha&amp;nbsp; &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt; Thank you! Can;t believe I missed that &lt;SPAN __jive_emoticon_name="blush" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/blush.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ok,, i just changed my ACL to this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended acl-Allow-DNS-Replies&lt;BR /&gt; permit udp object-group og-L1-DNS-Servers eq domain any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;from this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended acl-Allow-DNS-Replies&lt;BR /&gt; permit udp object-group og-L1-DNS-Servers any eq domain&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and it works. So yes, I was lookigng for packets return TO port 53 instead of FROM 53. Doh &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Very much appreciated. Thank you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Nov 2010 22:13:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-blocks-dns-replies-even-though-configured-to/m-p/1515686#M607620</guid>
      <dc:creator>jimwillsher</dc:creator>
      <dc:date>2010-11-04T22:13:54Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-based firewall blocks DNS replies, even though configur</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-blocks-dns-replies-even-though-configured-to/m-p/1515687#M607621</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Take care,&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Nov 2010 23:10:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-blocks-dns-replies-even-though-configured-to/m-p/1515687#M607621</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-11-04T23:10:13Z</dc:date>
    </item>
  </channel>
</rss>

