<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Class Maps, Policy Maps and why I cant SSH to my Dialer0 fro in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/class-maps-policy-maps-and-why-i-cant-ssh-to-my-dialer0-from/m-p/1399807#M694693</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks.&amp;nbsp; Here's another one for you since you are on fire!&amp;nbsp; &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After I input the following lines:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;policy-map type inspect inbound-policy&lt;BR /&gt;class type inspect udp514-class&lt;BR /&gt;inspect&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I receive the following message:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;%No specific protocol configured in class udp514-class for inspection. All protocols will be inspected&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this what you expected as part of your recommended configuration?&amp;nbsp; I would think that the intent is to only examine the protocol of interest, which in this case is UDP 514.&amp;nbsp; No?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;James&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 30 Mar 2010 05:17:27 GMT</pubDate>
    <dc:creator>jaesposito</dc:creator>
    <dc:date>2010-03-30T05:17:27Z</dc:date>
    <item>
      <title>Class Maps, Policy Maps and why I cant SSH to my Dialer0 from Internet</title>
      <link>https://community.cisco.com/t5/network-security/class-maps-policy-maps-and-why-i-cant-ssh-to-my-dialer0-from/m-p/1399792#M694536</link>
      <description>&lt;P&gt;All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have the following configuration snippet on my Cisco 881W that I cant make heads or tails of:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any ccp-cls-insp-traffic&lt;BR /&gt; match protocol cuseeme&lt;BR /&gt; match protocol dns&lt;BR /&gt; match protocol ftp&lt;BR /&gt; match protocol h323&lt;BR /&gt; match protocol https&lt;BR /&gt; match protocol icmp&lt;BR /&gt; match protocol imap&lt;BR /&gt; match protocol pop3&lt;BR /&gt; match protocol netshow&lt;BR /&gt; match protocol shell&lt;BR /&gt; match protocol realmedia&lt;BR /&gt; match protocol rtsp&lt;BR /&gt; match protocol smtp extended&lt;BR /&gt; match protocol sql-net&lt;BR /&gt; match protocol streamworks&lt;BR /&gt; match protocol tftp&lt;BR /&gt; match protocol vdolive&lt;BR /&gt; match protocol tcp&lt;BR /&gt; match protocol udp&lt;BR /&gt;class-map type inspect match-all ccp-insp-traffic&lt;BR /&gt; match class-map ccp-cls-insp-traffic&lt;BR /&gt;class-map type inspect match-any ccp-cls-icmp-access&lt;BR /&gt; match protocol icmp&lt;BR /&gt; match protocol tcp&lt;BR /&gt; match protocol udp&lt;BR /&gt;class-map type inspect match-all ccp-invalid-src&lt;BR /&gt; match access-group 100&lt;BR /&gt;class-map type inspect match-all ccp-icmp-access&lt;BR /&gt; match class-map ccp-cls-icmp-access&lt;BR /&gt;class-map type inspect match-all ccp-protocol-http&lt;BR /&gt; match protocol http&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect ccp-permit-icmpreply&lt;BR /&gt; class type inspect ccp-icmp-access&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt;policy-map type inspect ccp-inspect&lt;BR /&gt; class type inspect ccp-invalid-src&lt;BR /&gt;&amp;nbsp; drop log&lt;BR /&gt; class type inspect ccp-protocol-http&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt; class type inspect ccp-insp-traffic&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;policy-map type inspect ccp-permit&lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;!&lt;BR /&gt;zone security out-zone&lt;BR /&gt;zone security in-zone&lt;BR /&gt;zone-pair security ccp-zp-self-out source self destination out-zone&lt;BR /&gt; service-policy type inspect ccp-permit-icmpreply&lt;BR /&gt;zone-pair security ccp-zp-in-out source in-zone destination out-zone&lt;BR /&gt; service-policy type inspect ccp-inspect&lt;BR /&gt;zone-pair security ccp-zp-out-self source out-zone destination self&lt;BR /&gt; service-policy type inspect ccp-permit&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above appears to only apply to my Dialer0 interface as given away by the following snippet of my dialer interface:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Dialer0&lt;BR /&gt; description $FW_OUTSIDE$&lt;BR /&gt; ...&lt;BR /&gt; zone-member security out-zone&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;---------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So here are my two questions:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.)&amp;nbsp; What exactly is the above class-map, policy-map configuration doing?&lt;/P&gt;&lt;P&gt;2.)&amp;nbsp; Secondly, why is it keeping me from SSHing to my Dialer0 interface from the Internet?&lt;/P&gt;&lt;P&gt;(If I remove the 'zone-member security out-zone' from my Dialer0 interface, I can SSH in fine).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any and all comments would be greatly appreciated!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks very much!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;James E&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:26:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/class-maps-policy-maps-and-why-i-cant-ssh-to-my-dialer0-from/m-p/1399792#M694536</guid>
      <dc:creator>jaesposito</dc:creator>
      <dc:date>2019-03-11T17:26:04Z</dc:date>
    </item>
    <item>
      <title>Re: Class Maps, Policy Maps and why I cant SSH to my Dialer0 fro</title>
      <link>https://community.cisco.com/t5/network-security/class-maps-policy-maps-and-why-i-cant-ssh-to-my-dialer0-from/m-p/1399793#M694540</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The reason why it is not allowing you to SSH in to Dialer0 interface is because you have the Zone Based Firewall (ZBFW) configured.&lt;/P&gt;&lt;P&gt;The following zone-pair is configured to drop the traffic:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone-pair security ccp-zp-out-self source out-zone destination self&lt;BR /&gt; service-policy type inspect ccp-permit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect ccp-permit&lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you need the extra security configuration?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Mar 2010 02:37:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/class-maps-policy-maps-and-why-i-cant-ssh-to-my-dialer0-from/m-p/1399793#M694540</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-03-26T02:37:21Z</dc:date>
    </item>
    <item>
      <title>Re: Class Maps, Policy Maps and why I cant SSH to my Dialer0 fro</title>
      <link>https://community.cisco.com/t5/network-security/class-maps-policy-maps-and-why-i-cant-ssh-to-my-dialer0-from/m-p/1399794#M694553</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Im not familar at all with the zone-based firewall approach on Cisco IOS.&amp;nbsp; I'm from the older school access-list days.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This was the default that came on the 881W that I bought.&amp;nbsp; I'm not really sure if I need it as long as it drops attempts sourced from the outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Although, I'd really like to be able to SSH to my Dialer interface from the outside.&amp;nbsp; Would you suggest that I just drop the zone-based firewall configuration or is there a simple tweak that I can make to it to accomodate the SSH without compromising my security position?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On a related note, what exactly is the zone based configuration doing for me with this config?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the help!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;James E&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Mar 2010 03:37:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/class-maps-policy-maps-and-why-i-cant-ssh-to-my-dialer0-from/m-p/1399794#M694553</guid>
      <dc:creator>jaesposito</dc:creator>
      <dc:date>2010-03-26T03:37:08Z</dc:date>
    </item>
    <item>
      <title>Re: Class Maps, Policy Maps and why I cant SSH to my Dialer0 fro</title>
      <link>https://community.cisco.com/t5/network-security/class-maps-policy-maps-and-why-i-cant-ssh-to-my-dialer0-from/m-p/1399795#M694575</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you are not familiar with Zone Based FW, I would suggest that you remove it and apply it later when you need it. It is a complicated configuration that mimic the firewall configuration on router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is some reading on ZBFW if you are interested:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6441/products_feature_guide09186a008060f6dd.html"&gt;http://www.cisco.com/en/US/products/ps6441/products_feature_guide09186a008060f6dd.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Mar 2010 05:38:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/class-maps-policy-maps-and-why-i-cant-ssh-to-my-dialer0-from/m-p/1399795#M694575</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-03-26T05:38:36Z</dc:date>
    </item>
    <item>
      <title>Re: Class Maps, Policy Maps and why I cant SSH to my Dialer0 fro</title>
      <link>https://community.cisco.com/t5/network-security/class-maps-policy-maps-and-why-i-cant-ssh-to-my-dialer0-from/m-p/1399796#M694607</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear Halijenn,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks very much for the response.&amp;nbsp; Could you give me a verbal desciption of the default Zone&amp;nbsp; Based Security Policy setup on my Cisco 881W router?&amp;nbsp; I've tried to&amp;nbsp; disect it, but am totally lost.&amp;nbsp; Here are the relevant config lines:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map&amp;nbsp; type inspect match-any ccp-cls-insp-traffic&lt;BR /&gt;&amp;nbsp; match protocol cuseeme&lt;BR /&gt;&amp;nbsp; match protocol dns&lt;BR /&gt;&amp;nbsp; match protocol ftp&lt;BR /&gt;&amp;nbsp; match protocol h323&lt;BR /&gt;&amp;nbsp; match protocol https&lt;BR /&gt;&amp;nbsp; match protocol icmp&lt;BR /&gt;&amp;nbsp; match protocol imap&lt;BR /&gt;&amp;nbsp; match protocol pop3&lt;BR /&gt;&amp;nbsp; match protocol netshow&lt;BR /&gt;&amp;nbsp; match protocol shell&lt;BR /&gt;&amp;nbsp; match protocol realmedia&lt;BR /&gt;&amp;nbsp; match protocol rtsp&lt;BR /&gt;&amp;nbsp; match protocol smtp extended&lt;BR /&gt;&amp;nbsp; match protocol sql-net&lt;BR /&gt;&amp;nbsp; match protocol streamworks&lt;BR /&gt;&amp;nbsp; match protocol tftp&lt;BR /&gt;&amp;nbsp; match protocol vdolive&lt;BR /&gt;&amp;nbsp; match protocol tcp&lt;BR /&gt;&amp;nbsp; match protocol udp&lt;BR /&gt; class-map type inspect match-all ccp-insp-traffic&lt;BR /&gt;&amp;nbsp; match class-map ccp-cls-insp-traffic&lt;BR /&gt; class-map type inspect match-any ccp-cls-icmp-access&lt;BR /&gt;&amp;nbsp; match protocol icmp&lt;BR /&gt;&amp;nbsp; match protocol tcp&lt;BR /&gt;&amp;nbsp; match protocol udp&lt;BR /&gt; class-map type inspect match-all ccp-invalid-src&lt;BR /&gt;&amp;nbsp; match access-group 100&lt;BR /&gt; class-map type inspect match-all ccp-icmp-access&lt;BR /&gt;&amp;nbsp; match class-map ccp-cls-icmp-access&lt;BR /&gt; class-map type inspect match-all ccp-protocol-http&lt;BR /&gt;&amp;nbsp; match protocol http&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; policy-map type inspect ccp-permit-icmpreply&lt;BR /&gt;&amp;nbsp; class type inspect ccp-icmp-access&lt;BR /&gt;&amp;nbsp;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp; class class-default&lt;BR /&gt;&amp;nbsp;&amp;nbsp; pass&lt;BR /&gt; policy-map type inspect ccp-inspect&lt;BR /&gt;&amp;nbsp; class type inspect ccp-invalid-src&lt;BR /&gt;&amp;nbsp;&amp;nbsp; drop log&lt;BR /&gt;&amp;nbsp; class type inspect ccp-protocol-http&lt;BR /&gt;&amp;nbsp;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp; class type inspect ccp-insp-traffic&lt;BR /&gt;&amp;nbsp;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp; class class-default&lt;BR /&gt;&amp;nbsp;&amp;nbsp; drop&lt;BR /&gt; policy-map type inspect ccp-permit&lt;BR /&gt;&amp;nbsp; class class-default&lt;BR /&gt;&amp;nbsp;&amp;nbsp; drop&lt;BR /&gt; !&lt;BR /&gt; zone security out-zone&lt;BR /&gt; zone security in-zone&lt;BR /&gt; zone-pair security ccp-zp-self-out source self destination out-zone&lt;BR /&gt;&amp;nbsp; service-policy type inspect ccp-permit-icmpreply&lt;BR /&gt; zone-pair security ccp-zp-in-out source in-zone destination out-zone&lt;BR /&gt;&amp;nbsp; service-policy type inspect ccp-inspect&lt;BR /&gt; zone-pair security ccp-zp-out-self source out-zone destination self&lt;BR /&gt;&amp;nbsp; service-policy type inspect ccp-permit&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp; description $ETH-SW-LAUNCH$$INTF-INFO-HWIC 4ESW$$ES_LAN$$FW_INSIDE$&lt;BR /&gt;&amp;nbsp; ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;&amp;nbsp; no ip redirects&lt;BR /&gt;&amp;nbsp; no ip unreachables&lt;BR /&gt;&amp;nbsp; no ip proxy-arp&lt;BR /&gt;&amp;nbsp; ip flow ingress&lt;BR /&gt;&amp;nbsp; ip nat inside&lt;BR /&gt;&amp;nbsp; ip virtual-reassembly&lt;BR /&gt;&amp;nbsp; zone-member security in-zone&lt;BR /&gt;&amp;nbsp; ip tcp adjust-mss 1412&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Dialer0&lt;BR /&gt;&amp;nbsp; description $FW_OUTSIDE$&lt;BR /&gt;&amp;nbsp; ip address negotiated&lt;BR /&gt;&amp;nbsp; no ip redirects&lt;BR /&gt;&amp;nbsp; no ip unreachables&lt;BR /&gt;&amp;nbsp; no ip proxy-arp&lt;BR /&gt;&amp;nbsp; ip mtu 1452&lt;BR /&gt;&amp;nbsp; ip flow ingress&lt;BR /&gt;&amp;nbsp; ip nat outside&lt;BR /&gt;&amp;nbsp; ip virtual-reassembly&lt;BR /&gt;&amp;nbsp; zone-member security out-zone&lt;BR /&gt;&amp;nbsp; encapsulation ppp&lt;BR /&gt;&amp;nbsp; dialer pool 1&lt;BR /&gt;&amp;nbsp; dialer-group 1&lt;BR /&gt;&amp;nbsp; no cdp enable&lt;BR /&gt;&amp;nbsp; ppp authentication chap callin&lt;BR /&gt;&amp;nbsp; ppp chap hostname XXXXXXXXX&lt;BR /&gt;&amp;nbsp; ppp chap password 7 XXXXXXXXX&lt;BR /&gt; !&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In&amp;nbsp; addition to understanding how this is setup on my inside and outside&amp;nbsp; interfaces, I want to add a rule that allows UDP 514 from specific&amp;nbsp; Internet hosts via Dialer0) to the inside of my network in Vlan1.&amp;nbsp; So,&amp;nbsp; any additional comments on that would also be helpful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank&amp;nbsp; you very much for the help!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;James E&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Mar 2010 02:48:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/class-maps-policy-maps-and-why-i-cant-ssh-to-my-dialer0-from/m-p/1399796#M694607</guid>
      <dc:creator>jaesposito</dc:creator>
      <dc:date>2010-03-29T02:48:46Z</dc:date>
    </item>
    <item>
      <title>Re: Class Maps, Policy Maps and why I cant SSH to my Dialer0 fro</title>
      <link>https://community.cisco.com/t5/network-security/class-maps-policy-maps-and-why-i-cant-ssh-to-my-dialer0-from/m-p/1399797#M694620</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;High level overview on ZBFW&lt;/SPAN&gt;:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Determine zone for each interface, in your case: in-zone for vlan 1, and out-zone for Dialer 0 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) For every interface to communicate with others, you would need to configure zone pairing. In your case:&lt;/P&gt;&lt;P&gt;--Traffic sourcing from the router towards the out-zone (dialer0 interface), example: VPN traffic outbound, ping out from the router, outbound telnet from the router, etc:&lt;/P&gt;&lt;P&gt;zone-pair security ccp-zp-self-out source self destination out-zone&lt;BR /&gt;&amp;nbsp; service-policy type inspect ccp-permit-icmpreply&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- Traffic sourcing from in-zone (vlan 1 subnet) towards the internet (outside) - out-zone (out Dialer0 interface), example: host from VLAN 1 accessing the Internet:&lt;/P&gt;&lt;P&gt;zone-pair security ccp-zp-in-out source in-zone destination out-zone&lt;BR /&gt;&amp;nbsp; service-policy type inspect ccp-inspect&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- Traffic sourcing from out-zone (Internet) towards the router dialer0 interface, example: when trying to telnet/ssh into the router from the internet:&lt;/P&gt;&lt;P&gt;zone-pair security ccp-zp-out-self source out-zone destination self&lt;BR /&gt;&amp;nbsp; service-policy type inspect ccp-permit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) Once you determine the zone-pair, you would need to determine policy for each of the zone pairing. From the above, the "service-policy" is the policy configuration that is assigned to that zone-pairing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4) To configure policy, you would need to configure class-map to match the traffic that you would like to allow/inspect. For example: if you would like to allow http access from your internal zone towards the Internet, here is how you would configure it:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any any eq 80&lt;/P&gt;&lt;P&gt;class-map&amp;nbsp; type inspect match-any http-class&lt;BR /&gt;&amp;nbsp; match access-group 101&lt;/P&gt;&lt;P&gt;policy-map type inspect outbound-policy&lt;BR /&gt;&amp;nbsp; class type inspect http-class&lt;BR /&gt;&amp;nbsp;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;zone-pair security ccp-zp-in-out source in-zone destination out-zone&lt;BR /&gt;&amp;nbsp; service-policy type inspect outbound-policy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can only assign 1 policy to zone-pair, so if you need to add more policy, you just configure more class-map and configure it under the existing outbound-policy map.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the above example, if you would like to allow SMTP traffic outbound, you can add the following:&lt;/P&gt;&lt;P&gt;class-map type inspect match-any smtp-class&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; match protocol smtp&lt;/P&gt;&lt;P&gt;policy-map type inspect outbound-policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp; class type inspect smtp-class&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OR/ alternatively you can also add into the "http-class" that was configured as follows:&lt;/P&gt;&lt;P&gt;class-map&amp;nbsp; type inspect match-any http-class&lt;BR /&gt;&amp;nbsp;&amp;nbsp; match access-group 101&lt;/P&gt;&lt;P&gt;&amp;nbsp; match protocol smtp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps. Please rate useful post as for every rating, Cisco is matching $1 for the Haiti Earthquake. Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Mar 2010 03:17:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/class-maps-policy-maps-and-why-i-cant-ssh-to-my-dialer0-from/m-p/1399797#M694620</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-03-29T03:17:12Z</dc:date>
    </item>
    <item>
      <title>Re: Class Maps, Policy Maps and why I cant SSH to my Dialer0 fro</title>
      <link>https://community.cisco.com/t5/network-security/class-maps-policy-maps-and-why-i-cant-ssh-to-my-dialer0-from/m-p/1399798#M694635</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For the UDP/514 traffic, you can configure the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 151 permit udp host &lt;SPECIFIC-INTERNET-HOST&gt; host &lt;DIALER0-INTERFACE-IP&gt; eq 514&lt;/DIALER0-INTERFACE-IP&gt;&lt;/SPECIFIC-INTERNET-HOST&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any udp514-class&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; match access-group&lt;/P&gt;&lt;P&gt;policy-map type inspect inbound-policy&lt;BR /&gt;&amp;nbsp; class type inspect udp514-class&lt;BR /&gt;&amp;nbsp;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;zone-pair security ccp-zp-out-in source out-zone destination in-zone&lt;BR /&gt;&amp;nbsp; service-policy type inspect inbound-policy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Mar 2010 03:22:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/class-maps-policy-maps-and-why-i-cant-ssh-to-my-dialer0-from/m-p/1399798#M694635</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-03-29T03:22:02Z</dc:date>
    </item>
    <item>
      <title>Re: Class Maps, Policy Maps and why I cant SSH to my Dialer0 fro</title>
      <link>https://community.cisco.com/t5/network-security/class-maps-policy-maps-and-why-i-cant-ssh-to-my-dialer0-from/m-p/1399799#M694651</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Halijenn,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&amp;nbsp; Looking at your config, I was wondering if you were accidentally missing some config lines / parameters.&amp;nbsp; I think I've added them in &lt;STRONG&gt;bold&lt;/STRONG&gt;:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 151 permit udp host &lt;SPECIFIC-INTERNET-HOST&gt; host&amp;nbsp; &lt;DIALER0-INTERFACE-IP&gt; eq 514&lt;/DIALER0-INTERFACE-IP&gt;&lt;/SPECIFIC-INTERNET-HOST&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list 151 deny any any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;(I'm only interested in UDP 514 from a specific host and want to drop all other attempts)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect&amp;nbsp; match-any udp514-class&lt;/P&gt;&lt;P&gt; match access-group &lt;STRONG&gt;151&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;(I think that you have to specify the access-list 151 here)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you confirm?&amp;nbsp; Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;James&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Mar 2010 03:48:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/class-maps-policy-maps-and-why-i-cant-ssh-to-my-dialer0-from/m-p/1399799#M694651</guid>
      <dc:creator>jaesposito</dc:creator>
      <dc:date>2010-03-29T03:48:54Z</dc:date>
    </item>
    <item>
      <title>Re: Class Maps, Policy Maps and why I cant SSH to my Dialer0 fro</title>
      <link>https://community.cisco.com/t5/network-security/class-maps-policy-maps-and-why-i-cant-ssh-to-my-dialer0-from/m-p/1399800#M694659</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Totally right, forgot the access-list earlier. Apology.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the correct statement:&lt;/P&gt;&lt;P&gt;access-list 151 permit udp host &lt;SPECIFIC-INTERNET-HOST&gt; host&amp;nbsp; &lt;DIALER0-INTERFACE-IP&gt; eq 514&lt;/DIALER0-INTERFACE-IP&gt;&lt;/SPECIFIC-INTERNET-HOST&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect&amp;nbsp; match-any udp514-class&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; match access-group 151&lt;/P&gt;&lt;P&gt;policy-map&amp;nbsp; type inspect inbound-policy&lt;BR /&gt;&amp;nbsp; class type inspect udp514-class&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;zone-pair security ccp-zp-out-in source out-zone&amp;nbsp; destination in-zone&lt;BR /&gt;&amp;nbsp; service-policy type inspect inbound-policy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You do not need to specify "deny ip any any" because there is an implicit deny any statement at the end of all access-list.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Mar 2010 03:52:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/class-maps-policy-maps-and-why-i-cant-ssh-to-my-dialer0-from/m-p/1399800#M694659</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-03-29T03:52:35Z</dc:date>
    </item>
    <item>
      <title>Re: Class Maps, Policy Maps and why I cant SSH to my Dialer0 fro</title>
      <link>https://community.cisco.com/t5/network-security/class-maps-policy-maps-and-why-i-cant-ssh-to-my-dialer0-from/m-p/1399801#M694668</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks.&amp;nbsp; Two more questions... &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.)&amp;nbsp; What do the references to "source self" mean?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone-pair security ccp-zp-self-out &lt;STRONG&gt;source&lt;/STRONG&gt; &lt;STRONG&gt;self &lt;/STRONG&gt;destination out-zone&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2.)&amp;nbsp; Also, I noticed that in my zone-pairs, there is no "source out-zone destination in-zone" pair.&amp;nbsp; Here are the pairs from the config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone-pair security ccp-zp-self-out source self destination out-zone&lt;BR /&gt; service-policy type inspect ccp-permit-icmpreply&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone-pair security&amp;nbsp; ccp-zp-in-out source in-zone destination out-zone&lt;BR /&gt; service-policy&amp;nbsp; type inspect ccp-inspect&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone-pair security ccp-zp-out-self source&amp;nbsp; out-zone destination self&lt;BR /&gt; service-policy type inspect ccp-permit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With this being the case, that must mean that such a pairing does NOT exist.&amp;nbsp; Therefore, does this mean that all traffic sourced from outside and attempts to speak to the inside is dropped?&amp;nbsp; I know that this probably seems obvious.&amp;nbsp; But, I just want to double check. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I create the pairing that you suggested below, I think that I also need to create a NAT rule to get the UDP 514 traffic to my Syslog box, which exists in Vlan1.&amp;nbsp; Let me know if there are any other config lines I need to get this done beyond a single NAT statement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for the help!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;James&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Mar 2010 04:46:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/class-maps-policy-maps-and-why-i-cant-ssh-to-my-dialer0-from/m-p/1399801#M694668</guid>
      <dc:creator>jaesposito</dc:creator>
      <dc:date>2010-03-29T04:46:40Z</dc:date>
    </item>
    <item>
      <title>Re: Class Maps, Policy Maps and why I cant SSH to my Dialer0 fro</title>
      <link>https://community.cisco.com/t5/network-security/class-maps-policy-maps-and-why-i-cant-ssh-to-my-dialer0-from/m-p/1399802#M694675</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1) Self zone means the router itself, ie: traffic to and from the router.&lt;/P&gt;&lt;P&gt;In your example: "zone-pair security ccp-zp-self-out &lt;STRONG&gt;source&lt;/STRONG&gt; &lt;STRONG&gt;self &lt;/STRONG&gt;destination&amp;nbsp; out-zone", that means traffic from the router towards the out-zone (Internet).&lt;/P&gt;&lt;P&gt;When this situation will be used is for example you would like to perform a ping test from the router towards the Internet, or you would like to test connectivity from the router towards the Internet on TCP port 80.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) You are right. Originally you do not have zone-pair from out-zone to in-zone. However, when we configure the UDP/514 traffic, that is when the zone-pair is created as per my earlier post.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone-pair security ccp-zp-out-in source out-zone&amp;nbsp; destination in-zone&lt;BR /&gt;&amp;nbsp;&amp;nbsp; service-policy type inspect inbound-policy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That means, only UDP/514 that you have specified in access-list 151 will be allowed from the Internet towards your internal network. Anything else will be dropped.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) You are right. On top of the above zone-pair configuration, you would also need to configure NAT statement.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Mar 2010 05:00:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/class-maps-policy-maps-and-why-i-cant-ssh-to-my-dialer0-from/m-p/1399802#M694675</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-03-29T05:00:25Z</dc:date>
    </item>
    <item>
      <title>Re: Class Maps, Policy Maps and why I cant SSH to my Dialer0 fro</title>
      <link>https://community.cisco.com/t5/network-security/class-maps-policy-maps-and-why-i-cant-ssh-to-my-dialer0-from/m-p/1399803#M694679</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think we've almost got it.&amp;nbsp; But, something isnt quite right just yet.&amp;nbsp; I hope you can still help me!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, I added all of the configuration lines you suggested so I could allow UDP 514 from the outside to the inside. However, there appears to be one problem.&amp;nbsp; No matter how many times I try, I cannot add the &lt;STRONG&gt;match access-group 151&lt;/STRONG&gt; line underneath the "&lt;STRONG&gt;class-map type inspect match-any udp514-class&lt;/STRONG&gt;".&amp;nbsp; It allows me to type in the line, but does not add it to the configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the resulting configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any udp514-class &lt;SPAN style="color: #ff0000;"&gt; (notice the missing &lt;STRONG&gt;match access-group 151&lt;/STRONG&gt; line)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any ccp-cls-insp-traffic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; match protocol cuseeme&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; match protocol dns&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; match protocol ftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; match protocol h323&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; match protocol https&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; match protocol icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; match protocol imap&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; match protocol pop3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; match protocol netshow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; match protocol shell&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; match protocol realmedia&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; match protocol rtsp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; match protocol smtp extended&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; match protocol sql-net&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; match protocol streamworks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; match protocol tftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; match protocol vdolive&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; match protocol tcp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; match protocol udp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-all ccp-insp-traffic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; match class-map ccp-cls-insp-traffic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any ccp-cls-icmp-access&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; match protocol icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; match protocol tcp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; match protocol udp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-all ccp-invalid-src&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; match access-group 100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-all ccp-icmp-access&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; match class-map ccp-cls-icmp-access&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-all ccp-protocol-http&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; match protocol http&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect ccp-permit-icmpreply&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; class type inspect ccp-icmp-access&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; pass&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect ccp-inspect&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; class type inspect ccp-invalid-src&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; drop log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; class type inspect ccp-protocol-http&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; class type inspect ccp-insp-traffic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; drop&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect ccp-permit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; drop&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect inbound-policy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; class type inspect udp514-class&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; drop&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone security out-zone&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone security in-zone&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone-pair security ccp-zp-self-out source self destination out-zone&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; service-policy type inspect ccp-permit-icmpreply&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone-pair security ccp-zp-in-out source in-zone destination out-zone&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; service-policy type inspect ccp-inspect&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone-pair security ccp-zp-out-self source out-zone destination self&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; service-policy type inspect ccp-permit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone-pair security ccp-zp-out-in source out-zone destination in-zone&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; service-policy type inspect inbound-policy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 151 permit udp any host 74.233.55.33 eq syslog log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;---------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas on what I'm doing wrong when I try to input that &lt;STRONG&gt;match access-group 151&lt;/STRONG&gt; line?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;James&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Mar 2010 03:38:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/class-maps-policy-maps-and-why-i-cant-ssh-to-my-dialer0-from/m-p/1399803#M694679</guid>
      <dc:creator>jaesposito</dc:creator>
      <dc:date>2010-03-30T03:38:45Z</dc:date>
    </item>
    <item>
      <title>Re: Class Maps, Policy Maps and why I cant SSH to my Dialer0 fro</title>
      <link>https://community.cisco.com/t5/network-security/class-maps-policy-maps-and-why-i-cant-ssh-to-my-dialer0-from/m-p/1399804#M694682</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please remove the "log" keyword at the end of your access-list, and try to add the "match access-group 151" again under the class-map.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Mar 2010 03:45:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/class-maps-policy-maps-and-why-i-cant-ssh-to-my-dialer0-from/m-p/1399804#M694682</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-03-30T03:45:19Z</dc:date>
    </item>
    <item>
      <title>Re: Class Maps, Policy Maps and why I cant SSH to my Dialer0 fro</title>
      <link>https://community.cisco.com/t5/network-security/class-maps-policy-maps-and-why-i-cant-ssh-to-my-dialer0-from/m-p/1399805#M694686</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks.&amp;nbsp; That did it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you advise me on how to correctly configure the policy so that any hits are logged?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to make sure that I can view hits to the policy when I perform a "show log."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for the help!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;James&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Mar 2010 03:57:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/class-maps-policy-maps-and-why-i-cant-ssh-to-my-dialer0-from/m-p/1399805#M694686</guid>
      <dc:creator>jaesposito</dc:creator>
      <dc:date>2010-03-30T03:57:19Z</dc:date>
    </item>
    <item>
      <title>Re: Class Maps, Policy Maps and why I cant SSH to my Dialer0 fro</title>
      <link>https://community.cisco.com/t5/network-security/class-maps-policy-maps-and-why-i-cant-ssh-to-my-dialer0-from/m-p/1399806#M694691</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Under the class-map, you should be able to add the command "log" to log those:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any udp514-class&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; match access-group 151&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;log&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Mar 2010 04:50:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/class-maps-policy-maps-and-why-i-cant-ssh-to-my-dialer0-from/m-p/1399806#M694691</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-03-30T04:50:16Z</dc:date>
    </item>
    <item>
      <title>Re: Class Maps, Policy Maps and why I cant SSH to my Dialer0 fro</title>
      <link>https://community.cisco.com/t5/network-security/class-maps-policy-maps-and-why-i-cant-ssh-to-my-dialer0-from/m-p/1399807#M694693</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks.&amp;nbsp; Here's another one for you since you are on fire!&amp;nbsp; &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After I input the following lines:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;policy-map type inspect inbound-policy&lt;BR /&gt;class type inspect udp514-class&lt;BR /&gt;inspect&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I receive the following message:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;%No specific protocol configured in class udp514-class for inspection. All protocols will be inspected&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this what you expected as part of your recommended configuration?&amp;nbsp; I would think that the intent is to only examine the protocol of interest, which in this case is UDP 514.&amp;nbsp; No?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;James&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Mar 2010 05:17:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/class-maps-policy-maps-and-why-i-cant-ssh-to-my-dialer0-from/m-p/1399807#M694693</guid>
      <dc:creator>jaesposito</dc:creator>
      <dc:date>2010-03-30T05:17:27Z</dc:date>
    </item>
    <item>
      <title>Re: Class Maps, Policy Maps and why I cant SSH to my Dialer0 fro</title>
      <link>https://community.cisco.com/t5/network-security/class-maps-policy-maps-and-why-i-cant-ssh-to-my-dialer0-from/m-p/1399808#M694695</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also, when I attempt to add "log" as you recommended, I'm receiving the following error message suggesting that I'm attempting an invalid configuration command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;% Invalid input detected at '^' marker.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the full output:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco(config)#class-map type inspect match-any udp514-class&lt;BR /&gt;Cisco(config-cmap)#match access-group 151&lt;BR /&gt;Cisco(config-cmap)#log&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ^&lt;BR /&gt;&lt;STRONG&gt;% Invalid input detected at '^' marker.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco(config-cmap)#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;James&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Mar 2010 05:20:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/class-maps-policy-maps-and-why-i-cant-ssh-to-my-dialer0-from/m-p/1399808#M694695</guid>
      <dc:creator>jaesposito</dc:creator>
      <dc:date>2010-03-30T05:20:31Z</dc:date>
    </item>
    <item>
      <title>Re: Class Maps, Policy Maps and why I cant SSH to my Dialer0 fro</title>
      <link>https://community.cisco.com/t5/network-security/class-maps-policy-maps-and-why-i-cant-ssh-to-my-dialer0-from/m-p/1399809#M694696</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I assume that within the class-map you have match ACL 151, right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you check: sh run | s class-map&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I assume based on the previous configuration, the class-map "udp514-class" would have ACL 151 under the match statement.&lt;/P&gt;&lt;P&gt;Anyway, without NAT translation configured, nothing inbound would be able to initiate connection except the specific NAT statement that you configure.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Mar 2010 05:41:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/class-maps-policy-maps-and-why-i-cant-ssh-to-my-dialer0-from/m-p/1399809#M694696</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-03-30T05:41:00Z</dc:date>
    </item>
    <item>
      <title>Re: Class Maps, Policy Maps and why I cant SSH to my Dialer0 fro</title>
      <link>https://community.cisco.com/t5/network-security/class-maps-policy-maps-and-why-i-cant-ssh-to-my-dialer0-from/m-p/1399810#M694698</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have the class-map as such:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any udp514-class&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; match access-group 151&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, when I attempt to add "log" as you recommended, I'm receiving the following error message suggesting that I'm attempting an invalid configuration command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;% Invalid input detected at '^' marker.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the full output when I attempt the configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco(config)#class-map type inspect match-any udp514-class&lt;BR /&gt;Cisco(config-cmap)#match access-group 151&lt;BR /&gt;Cisco(config-cmap)#log&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ^&lt;BR /&gt;&lt;STRONG&gt;% Invalid input detected at '^' marker.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco(config-cmap)#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'd really like to be able to "log" the matches.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;James&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Mar 2010 14:21:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/class-maps-policy-maps-and-why-i-cant-ssh-to-my-dialer0-from/m-p/1399810#M694698</guid>
      <dc:creator>jaesposito</dc:creator>
      <dc:date>2010-03-30T14:21:25Z</dc:date>
    </item>
    <item>
      <title>Re: Class Maps, Policy Maps and why I cant SSH to my Dialer0 fro</title>
      <link>https://community.cisco.com/t5/network-security/class-maps-policy-maps-and-why-i-cant-ssh-to-my-dialer0-from/m-p/1399811#M694700</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The inspect traffic should by default already logging without having to specify the logging. Only the "drop" action needs to have the logging specified.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Mar 2010 00:45:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/class-maps-policy-maps-and-why-i-cant-ssh-to-my-dialer0-from/m-p/1399811#M694700</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-03-31T00:45:52Z</dc:date>
    </item>
  </channel>
</rss>

