<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Zone-base-firewall configuration in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/zone-base-firewall-configuration/m-p/1540707#M636824</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please enable logging &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IP INSPECT LOG DROP-PKT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check the logs they will tell you who is blocking what.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 03 Sep 2010 20:24:37 GMT</pubDate>
    <dc:creator>Diego Armando Cambronero Arias</dc:creator>
    <dc:date>2010-09-03T20:24:37Z</dc:date>
    <item>
      <title>Zone-base-firewall configuration</title>
      <link>https://community.cisco.com/t5/network-security/zone-base-firewall-configuration/m-p/1540702#M636735</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am tried to understand the zone-base-firewall. I am using it on a cisco 891 with ios c890-universalk9-mz.151-2.T1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With the current configuration, everything is working fin exept the trafic from the private zone to the Internet zone. My vpn tunnel are working, I can ping from the device behind the router on vlan1 to the Internet but traffic like http or dns aren't working and I can't see what could be the issue. Probably I don't understand exacly how the zone base firewall work. My private zone is vlan1 and the Internet is Gi0 and I nat from vlan1 to the Internet. I am separating the protocol in two group, layer 4 and layer 7. In the future I would like to apply only L4 between the private zone to the wan zone and L4 and L7 between the private zone to the Internet but for now I want to concentrate on the problem I have. Any idea what could be the issue?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;TABLE border="1" cellpadding="3" cellspacing="0" style="BORDER-BOTTOM: #000000 1px solid; BORDER-LEFT: #000000 1px solid; WIDTH: 75%; BACKGROUND: #e7e7e7; BORDER-TOP: #000000 1px solid; BORDER-RIGHT: #000000 1px solid"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TH align="center" style="background-color:#6690BC;" valign="middle"&gt;&lt;SPAN style="color: #ffffff;"&gt;&lt;STRONG&gt;firewall configuration&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TH&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;class-map type inspect match-any L4-inspect-class&lt;BR /&gt;match protocol tcp&lt;BR /&gt;match protocol udp&lt;BR /&gt;match protocol icmp&lt;BR /&gt;class-map type inspect match-any L7-inspect-class&lt;BR /&gt;match protocol ssh&lt;BR /&gt;match protocol ftp&lt;BR /&gt;match protocol pop3&lt;BR /&gt;match protocol pop3s&lt;BR /&gt;match protocol imap&lt;BR /&gt;match protocol imap3&lt;BR /&gt;match protocol imaps&lt;BR /&gt;match protocol smtp&lt;BR /&gt;match protocol http&lt;BR /&gt;match protocol https&lt;BR /&gt;match protocol dns&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect private-internet-policy&lt;BR /&gt;class type inspect L7-inspect-class&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;class type inspect L4-inspect-class&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;class class-default&lt;BR /&gt;&amp;nbsp; drop log&lt;BR /&gt;!&lt;BR /&gt;zone security private&lt;BR /&gt;zone security internet&lt;BR /&gt;zone-pair security private-internet source private destination internet&lt;BR /&gt;service-policy type inspect private-internet-policy&lt;BR /&gt;!&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:34:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-base-firewall-configuration/m-p/1540702#M636735</guid>
      <dc:creator>slauzon</dc:creator>
      <dc:date>2019-03-11T18:34:47Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-base-firewall configuration</title>
      <link>https://community.cisco.com/t5/network-security/zone-base-firewall-configuration/m-p/1540703#M636760</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please enable logging on the router and also the command "ip inspect log drop". In the syslogs you should now be able to see drops related to zone based firewall. Once this is odne, try accessing internet and see what logs pop up. Also, when trying to access the internet, please get the output of&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show policy-map type inspect zone-pair private-internet sessions&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, do you have a zone-pair for internet to private? what is the config of that policy-map? please paste the output of "show zone security" and "show zone-pair security" along with the above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Sep 2010 16:20:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-base-firewall-configuration/m-p/1540703#M636760</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-09-03T16:20:20Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-base-firewall configuration</title>
      <link>https://community.cisco.com/t5/network-security/zone-base-firewall-configuration/m-p/1540704#M636782</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Make sure your zones are configure properly on your interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also if you are usinga&amp;nbsp; loopback interface to nat the traffic going out the loopback need to be in the private zone.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Sep 2010 16:25:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-base-firewall-configuration/m-p/1540704#M636782</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-09-03T16:25:13Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-base-firewall configuration</title>
      <link>https://community.cisco.com/t5/network-security/zone-base-firewall-configuration/m-p/1540705#M636800</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No I don't have a zone-pair from the Internet to private, I think by default the traffic from the Internet zone to the private will be inspected, Am I wrong?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the info I got, I don't see any drop...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;seblab001#show policy-map type inspect zone-pair private-internet sessions&lt;/P&gt;&lt;P&gt;policy exists on zp private-internet&lt;BR /&gt; Zone-pair: private-internet&lt;/P&gt;&lt;P&gt;&amp;nbsp; Service-policy inspect : private-internet-policy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: L7-inspect-class (match-any)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match: protocol ssh&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 packets, 0 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30 second rate 0 bps&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match: protocol ftp&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 packets, 0 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30 second rate 0 bps&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match: protocol pop3&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 packets, 0 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30 second rate 0 bps&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match: protocol pop3s&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7 packets, 224 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30 second rate 0 bps&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match: protocol imap&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 27 packets, 864 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30 second rate 0 bps&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match: protocol imap3&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 packets, 0 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30 second rate 0 bps&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match: protocol imaps&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 packets, 0 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30 second rate 0 bps&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match: protocol smtp&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 packets, 0 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30 second rate 0 bps&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match: protocol http&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 9 packets, 288 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30 second rate 0 bps&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match: protocol https&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 packets, 0 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30 second rate 0 bps&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match: protocol dns&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 321 packets, 14736 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30 second rate 0 bps&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Inspect&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Number of Half-open Sessions = 6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Half-open Sessions&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session 85A7DD00 (192.168.140.74:52838)=&amp;gt;(209.85.225.83:80) http:tcp SIS_OPENING/TCP_SYNSENT&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Created 00:00:29, Last heard 00:00:29&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bytes sent (initiator:responder) [0:0]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session 85A7D600 (192.168.140.74:57640)=&amp;gt;(4.2.2.2:53) dns:udp SIS_OPENING&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Created 00:00:10, Last heard 00:00:02&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bytes sent (initiator:responder) [102:0]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session 85A7C480 (192.168.140.74:57640)=&amp;gt;(4.2.2.3:53) dns:udp SIS_OPENING&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Created 00:00:09, Last heard 00:00:02&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bytes sent (initiator:responder) [136:0]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session 85A7C800 (192.168.140.74:64510)=&amp;gt;(4.2.2.2:53) dns:udp SIS_OPENING&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Created 00:00:08, Last heard 00:00:00&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bytes sent (initiator:responder) [99:0]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session 85A7F580 (192.168.140.74:64510)=&amp;gt;(4.2.2.3:53) dns:udp SIS_OPENING&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Created 00:00:07, Last heard 00:00:00&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bytes sent (initiator:responder) [132:0]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session 85A7E780 (192.168.140.74:64314)=&amp;gt;(4.2.2.2:53) dns:udp SIS_OPENING&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Created 00:00:00, Last heard 00:00:00&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bytes sent (initiator:responder) [32:0]&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: L4-inspect-class (match-any)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match: protocol tcp&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 packets, 32 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30 second rate 0 bps&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match: protocol udp&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 123 packets, 5343 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30 second rate 0 bps&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match: protocol icmp&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 22 packets, 880 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30 second rate 0 bps&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match: protocol http&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 packets, 0 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30 second rate 0 bps&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match: protocol dns&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 packets, 0 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30 second rate 0 bps&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Inspect&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: class-default (match-any)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match: any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Drop&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 packets, 0 bytes&lt;/P&gt;&lt;P&gt;seblab001#show zone security&lt;BR /&gt;zone self&lt;BR /&gt;&amp;nbsp; Description: System defined zone&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;zone private&lt;BR /&gt;&amp;nbsp; Member Interfaces:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Vlan1&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;zone internet&lt;BR /&gt;&amp;nbsp; Member Interfaces:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; GigabitEthernet0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;zone wan&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;seblab001#show zone-pair security&lt;BR /&gt;Zone-pair name private-internet&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source-Zone private&amp;nbsp; Destination-Zone internet&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; service-policy private-internet-policy&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Sep 2010 17:08:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-base-firewall-configuration/m-p/1540705#M636800</guid>
      <dc:creator>slauzon</dc:creator>
      <dc:date>2010-09-03T17:08:05Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-base-firewall configuration</title>
      <link>https://community.cisco.com/t5/network-security/zone-base-firewall-configuration/m-p/1540706#M636812</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Since you are Inspecting the traffic then yes the return traffic will be allowed. Im seeing that you have the private security zone associated with VLAN1 could you associate the private&amp;nbsp; zone to a physical interface insteat.. just for testing.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Sep 2010 20:22:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-base-firewall-configuration/m-p/1540706#M636812</guid>
      <dc:creator>Diego Armando Cambronero Arias</dc:creator>
      <dc:date>2010-09-03T20:22:39Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-base-firewall configuration</title>
      <link>https://community.cisco.com/t5/network-security/zone-base-firewall-configuration/m-p/1540707#M636824</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please enable logging &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IP INSPECT LOG DROP-PKT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check the logs they will tell you who is blocking what.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Sep 2010 20:24:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-base-firewall-configuration/m-p/1540707#M636824</guid>
      <dc:creator>Diego Armando Cambronero Arias</dc:creator>
      <dc:date>2010-09-03T20:24:37Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-base-firewall configuration</title>
      <link>https://community.cisco.com/t5/network-security/zone-base-firewall-configuration/m-p/1540708#M636836</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;WHat happens if you remove the zone-member of the interfaces? If you still have the problem after removing them, then it's not the ZBF it something else&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Sep 2010 20:28:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-base-firewall-configuration/m-p/1540708#M636836</guid>
      <dc:creator>Diego Armando Cambronero Arias</dc:creator>
      <dc:date>2010-09-03T20:28:54Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-base-firewall configuration</title>
      <link>https://community.cisco.com/t5/network-security/zone-base-firewall-configuration/m-p/1540709#M636847</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Based on the output, i can see a number of sessions being created for DNS and one HTTP (Google's IP address):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Session 85A7DD00 (192.168.140.74:52838)=&amp;gt;(209.85.225.83:80) http:tcp&amp;nbsp; SIS_OPENING/TCP_SYNSENT&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Created 00:00:29, Last heard&amp;nbsp; 00:00:29&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bytes sent (initiator:responder) [0:0]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session 85A7D600 (192.168.140.74:57640)=&amp;gt;(4.2.2.2:53) dns:udp&amp;nbsp; SIS_OPENING&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Created 00:00:10, Last heard 00:00:02&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bytes sent (initiator:responder) [102:0]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session 85A7C480&amp;nbsp; (192.168.140.74:57640)=&amp;gt;(4.2.2.3:53) dns:udp SIS_OPENING&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Created 00:00:09, Last heard 00:00:02&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bytes sent&amp;nbsp; (initiator:responder) [136:0]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alaso, it can be seen from the bytes sent that we do not see anything from the server back. Well i am not blaming that the ISP is blocking something but i have seen before that if we have a zone-pair from inside to internet but no zone-pair from internet private, even though we inspect packets from provate to internet, traffic does not pass through.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To check what's going on, please enable logging and also "ip inspect log drop-pkt" and we can see logs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, plese try creating just a zone-pair from internet-private and see if it make any difference.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know how it goes!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 04 Sep 2010 00:14:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-base-firewall-configuration/m-p/1540709#M636847</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-09-04T00:14:15Z</dc:date>
    </item>
  </channel>
</rss>

