<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Zone Based Firewall and user defined IP Port Maps in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/zone-based-firewall-and-user-defined-ip-port-maps/m-p/1539121#M611520</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason why you are able to telnet on port 7777 though you have specified it as match ACL and match protcol http is as below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) When you do a telnet on tcp/7777, all that happens is the 3-way handshake for the TCP connection. Now, based on this exchange, the router can not decide if this a TELNET connection or a HTTP connection becasue even for a HTTP connection on tcp 7777, the first three packets are going to be the same (SYN, SYN-ACK and ACK).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Now, the reason why FTP on 7777 was dropped due to the fact that though even in this case the initial 3 packets are going to be a SYN,SYN-ACK and ACK like for any other TCP connection, the packets following that from the client that are going to be specific to FTP. So, when the router sees such packets, that is, non HTTP packets on port 7777, it drops it as per the configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can confirm the above facts by running wireshark on the client from where you are trying the TELNET and FTP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope i was clear enough. Let me know if this helps!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 15 Sep 2010 16:20:50 GMT</pubDate>
    <dc:creator>praprama</dc:creator>
    <dc:date>2010-09-15T16:20:50Z</dc:date>
    <item>
      <title>Zone Based Firewall and user defined IP Port Maps</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-and-user-defined-ip-port-maps/m-p/1539115#M611508</link>
      <description>&lt;P&gt;Hey,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is driving us nuts. I have configured a Zone Based Firewall policy on an 800 series router but its not behaving as we expected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For traffic coming in from the outside to the inside i have a class-map that matches an ACL and a match protocol.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The match protocol states match protocol http. I have a user defined entry for HTTP - ip port-map http port 7777.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, if i telnet in on 7777, the packet passes the outside in ACL, then its NAT'd then it hits the ZBW but the packet is permitted. I would of thought the packet would be dropped as Telnet 7777 is not an HTTP request on TCP 777. If i change the ip port-map &lt;SPAN style="font-weight: bold;"&gt;http &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;port 7777 to ip port-map &lt;SPAN style="font-weight: bold;"&gt;ftp &lt;/SPAN&gt;port 7777 and try again - telnet in on 7777 the packet is dropped as i would of expected with the following message&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sep 15 08:11:27.849: %FW-6-DROP_PKT: Dropping ftp session x.x.x.x:58923 x.x.x.x:7777 on zone-pair Extern-Intern class class-default due to policy match failure with ip ident 16073 tcpflags 0x7002 seq.no 383992111 ack 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Has anyone got any ideas why the inspect doesn't work correctly with the user defined HTTP port map?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've been reading lots of documentation but not found the answer yet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Garry&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:40:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-and-user-defined-ip-port-maps/m-p/1539115#M611508</guid>
      <dc:creator>grichardson661</dc:creator>
      <dc:date>2019-03-11T18:40:38Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall and user defined IP Port Maps</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-and-user-defined-ip-port-maps/m-p/1539116#M611509</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hmm...this is policy-match failure. It is falling under the class-default and getting dropped.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That class-map that you say is this match-any or match-all? With ZBF you dont' apply an ACL "IN" on the outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can issue "sh policy-map type inspect zone-pair &lt;NAME of="" the="" zone="" pair=""&gt; sessions&lt;/NAME&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and see if the flow matched the class-map that you configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Sep 2010 14:47:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-and-user-defined-ip-port-maps/m-p/1539116#M611509</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-09-15T14:47:31Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall and user defined IP Port Maps</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-and-user-defined-ip-port-maps/m-p/1539117#M611511</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-family: Arial; color: #333333; font-size: 10pt;"&gt;Thanks Kusanker for you reply.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Arial; color: #333333; font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Arial; color: #333333; font-size: 10pt;"&gt;I think we're on a different lines here.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Arial; color: #333333; font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Arial; color: #333333; font-size: 10pt;"&gt;I want my ZBF policy to match an ACL (which is fine by the way) and inspect HTTP on port 7777. Anything else should be dropped if it’s not HTTP:7777 traffic coming from the IPs listed in the ACL. With this config applied i can telnet through on port 7777 successfully but i would of expected this to fail due to the inspect HTTP:7777. I want the ZBF policy to look at the traffic coming into on port 7777 and to ensure this is HTTP traffic and not anything else, ie snmp, telnet ssh on port 7777. Does that make sense? &lt;/SPAN&gt;&lt;SPAN style="mso-bidi-font-family: Arial; mso-symbol-font-family: Wingdings; color: #333333; font-size: 10pt; mso-char-type: symbol; mso-ascii-font-family: Arial; font-family: Wingdings; mso-hansi-font-family: Arial; "&gt;J&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Arial; color: #333333; font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Arial; color: #333333; font-size: 10pt;"&gt;Regarding the ACLs on the outside interface. I know what you are saying but I thought I would drop any packets at the edge that i'm not interested in before they start moving through the router phases - check input rate limits, policy routing, nat etc... I dont think this has any impact on this problem.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Arial; color: #333333; font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Arial; color: #333333; font-size: 10pt;"&gt;Cheers,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Arial; color: #333333; font-size: 10pt;"&gt;Garry&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Sep 2010 15:13:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-and-user-defined-ip-port-maps/m-p/1539117#M611511</guid>
      <dc:creator>grichardson661</dc:creator>
      <dc:date>2010-09-15T15:13:28Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall and user defined IP Port Maps</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-and-user-defined-ip-port-maps/m-p/1539118#M611514</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So your class-map is match-all. once you telnet on port 7777 you need to send a "get" request and then see if the inspection drops it as expected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Sep 2010 15:20:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-and-user-defined-ip-port-maps/m-p/1539118#M611514</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-09-15T15:20:43Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall and user defined IP Port Maps</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-and-user-defined-ip-port-maps/m-p/1539119#M611517</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok cool, not sure how we can send a get request via telnet but thanks for clarifying this. I just assumed the ZBF would drop the initial packet with it being telnet and not HTTP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Sep 2010 15:40:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-and-user-defined-ip-port-maps/m-p/1539119#M611517</guid>
      <dc:creator>grichardson661</dc:creator>
      <dc:date>2010-09-15T15:40:53Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall and user defined IP Port Maps</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-and-user-defined-ip-port-maps/m-p/1539120#M611518</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In fact i've just checked. If we remove the ip port-map http 7777 and we telnet the packet is dropped which is expected behaviour.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is my policy-map. The class class-default drops the packet and the counter increases&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect Extern-Intern&lt;BR /&gt; class type inspect ExternIntern&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt; class class-default&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Still not sure why when the the user defined port map http:7777 exists the telnet on 7777 is permitted.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Sep 2010 15:56:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-and-user-defined-ip-port-maps/m-p/1539120#M611518</guid>
      <dc:creator>grichardson661</dc:creator>
      <dc:date>2010-09-15T15:56:22Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall and user defined IP Port Maps</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-and-user-defined-ip-port-maps/m-p/1539121#M611520</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason why you are able to telnet on port 7777 though you have specified it as match ACL and match protcol http is as below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) When you do a telnet on tcp/7777, all that happens is the 3-way handshake for the TCP connection. Now, based on this exchange, the router can not decide if this a TELNET connection or a HTTP connection becasue even for a HTTP connection on tcp 7777, the first three packets are going to be the same (SYN, SYN-ACK and ACK).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Now, the reason why FTP on 7777 was dropped due to the fact that though even in this case the initial 3 packets are going to be a SYN,SYN-ACK and ACK like for any other TCP connection, the packets following that from the client that are going to be specific to FTP. So, when the router sees such packets, that is, non HTTP packets on port 7777, it drops it as per the configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can confirm the above facts by running wireshark on the client from where you are trying the TELNET and FTP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope i was clear enough. Let me know if this helps!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Sep 2010 16:20:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-and-user-defined-ip-port-maps/m-p/1539121#M611520</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-09-15T16:20:50Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall and user defined IP Port Maps</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-and-user-defined-ip-port-maps/m-p/1539122#M611522</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Prapanch, yeah what you are saying makes sense. Cheers for the clear explanation&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So i've changed the order round as follows (to match HTTP first)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-all ExternIntern&lt;BR /&gt;match protocol http&lt;BR /&gt;match access-group name Extern2Intern&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But i can still get through via a telnet request on port 7777. Its confusing me.&lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" height="1" src="https://community.cisco.com/images/emoticons/happy.gif" width="1"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it worth adding the ports to the access-group ACL? I read a Cisco document and it did say, if you match-all then the ACL should just be IP based and then you permit ports with match protocol&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Sep 2010 17:11:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-and-user-defined-ip-port-maps/m-p/1539122#M611522</guid>
      <dc:creator>grichardson661</dc:creator>
      <dc:date>2010-09-15T17:11:42Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall and user defined IP Port Maps</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-and-user-defined-ip-port-maps/m-p/1539123#M611524</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;To use services on non-standard ports you need to implement something&lt;BR /&gt;called PAM. PAM can associate common services like ftp and http to ports&lt;BR /&gt;that are non-standard. You have done that for http&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip port-map http port 7777&lt;BR /&gt;&lt;BR /&gt;Now, any traffic that the router receives on port 7777 it will assume it is http traffic.&lt;BR /&gt;&lt;BR /&gt;You are matching the acl (for source IP may be) and http and if both are true then you &lt;BR /&gt;have enabled inspection.&lt;BR /&gt;&lt;BR /&gt;When you telnet on port 7777 it will be allowed. Why do you think it should not be?&lt;BR /&gt;Once you telnet if you send a non rfc compliant GET reqest then inspection may kick in &lt;BR /&gt;and drop it due to rfc non-compliant. &lt;BR /&gt;&lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://projects.webappsec.org/HTTP-Request-Smuggling"&gt;http://projects.webappsec.org/HTTP-Request-Smuggling&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;-KS&lt;BR /&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Sep 2010 21:23:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-and-user-defined-ip-port-maps/m-p/1539123#M611524</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-09-15T21:23:11Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall and user defined IP Port Maps</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-and-user-defined-ip-port-maps/m-p/1539124#M611525</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well ideally the order in which you specify will not make any difference. The reason why it is permitted is still the same as i mentioned above. Even if yoiu use a port based ACL (mentioning tcp and destination port as tcp 7777), the behavior is still going ot same as based on he 3-way handshake alone, the router will not be able to distinguis between an HTTP connection or a TELNET connection. I am afraid there is no way you can block this telnet on port 7777, at least that i can think of.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Sep 2010 00:13:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-and-user-defined-ip-port-maps/m-p/1539124#M611525</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-09-16T00:13:58Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall and user defined IP Port Maps</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-and-user-defined-ip-port-maps/m-p/1539125#M611527</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Cheers for all your comments guys, very helpful!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Sep 2010 09:43:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-and-user-defined-ip-port-maps/m-p/1539125#M611527</guid>
      <dc:creator>grichardson661</dc:creator>
      <dc:date>2010-09-16T09:43:47Z</dc:date>
    </item>
  </channel>
</rss>

