<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco IOS Zone Based Firewall and IPv6 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-ios-zone-based-firewall-and-ipv6/m-p/1509148#M803968</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Adding full IOS config for clarity (attached). This config is not in production use so can test changes if needbe.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 05 Oct 2010 02:02:37 GMT</pubDate>
    <dc:creator>mattkjohnson</dc:creator>
    <dc:date>2010-10-05T02:02:37Z</dc:date>
    <item>
      <title>Cisco IOS Zone Based Firewall and IPv6</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-zone-based-firewall-and-ipv6/m-p/1509145#M803960</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to setup IPv6 tunnel to tunnel-broker Hurrican Electrics. IPv6 connection is working OK only if I disable zone security on WAN interface (Fe0 - IPv4 interface).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which protocols must be alloved to and from router?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IOS version: 15.1.2T1 (Adv.ip services)&lt;/P&gt;&lt;P&gt;Setup:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HE (tunnel-broker)&amp;nbsp; --- Internet (IPv4)&amp;nbsp; ---- Cisco 1812 (Fe0 (IPv4) and interface tunnel 1 (IPv6))&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Config on router:&lt;/P&gt;&lt;P&gt;*************************************************************************************************************&lt;/P&gt;&lt;P&gt;IPv4 (self to internet and internet to self)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect Outside2Router-pmap&lt;BR /&gt; class type inspect SSHaccess-cmap&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class type inspect ICMP-cmap&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class type inspect IPSEC-cmap&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt; class type inspect Protocol41-cmap&lt;BR /&gt;&amp;nbsp; pass log&lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;/P&gt;&lt;P&gt;**************************************************************************************************************&lt;/P&gt;&lt;P&gt;interface Tunnel1&lt;BR /&gt; description Hurricane Electric IPv6 Tunnel Broker&lt;BR /&gt; no ip address&lt;BR /&gt; zone-member security IPv6tunnel&lt;BR /&gt; ipv6 address 2001:47:25:105B::2/64&lt;BR /&gt; ipv6 enable&lt;BR /&gt; ipv6 mtu 1300&lt;BR /&gt; tunnel source FastEthernet0&lt;BR /&gt; tunnel mode ipv6ip&lt;BR /&gt; tunnel destination xxx.66.80.98&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface FastEthernet0&lt;BR /&gt; description WAN interface&lt;BR /&gt; ip address xxx.xxx.252.84 255.255.0.0&lt;BR /&gt; no ip redirects&lt;BR /&gt; no ip unreachables&lt;BR /&gt; no ip proxy-arp&lt;BR /&gt; zone-member security WAN&lt;BR /&gt; duplex auto&lt;BR /&gt; speed auto&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone-pair security IPv6Tunnel_2_WAN source IPv6tunnel destination WAN&lt;BR /&gt; service-policy type inspect IPv6-out-pmap&lt;BR /&gt;zone-pair security WAN_2_IPv6tunnel source WAN destination IPv6tunnel&lt;BR /&gt; service-policy type inspect IPv6-out-pmap&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect IPv6-out-pmap&lt;BR /&gt; class type inspect IPv6-internet-class&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-all IPv6-internet-class&lt;BR /&gt; match protocol tcp&lt;BR /&gt; match protocol udp&lt;BR /&gt; match protocol icmp&lt;BR /&gt; match protocol ftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ipv6 route ::/0 Tunnel1&lt;/P&gt;&lt;P&gt;ipv6 unicast-routing&lt;BR /&gt;ipv6 cef&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;parameter-map type inspect v6-param-map&lt;BR /&gt; ipv6 routing-header-enforcement loose&lt;BR /&gt; sessions maximum 10000&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*************************************************************************************************************&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:49:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-zone-based-firewall-and-ipv6/m-p/1509145#M803960</guid>
      <dc:creator>mocah</dc:creator>
      <dc:date>2019-03-11T18:49:55Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IOS Zone Based Firewall and IPv6</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-zone-based-firewall-and-ipv6/m-p/1509146#M803963</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just want to clarify a thing. Is the tunnel not coming up in the first place or is the tunnel up and you are unable to pass traffic?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please paste the entire zone based firewall output (zones with member interfaces, zone-pairs, policy-maps and class-maps) for us to analyze.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Oct 2010 00:23:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-zone-based-firewall-and-ipv6/m-p/1509146#M803963</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-10-05T00:23:54Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IOS Zone Based Firewall and IPv6</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-zone-based-firewall-and-ipv6/m-p/1509147#M803966</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Small world,&lt;/P&gt;&lt;P&gt;I was just about to post a forum thread with exactly the same question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Creating a tunnel (type ipv6ip) to HE's tunnelbroker.net service.&lt;/P&gt;&lt;P&gt;ZBF between WAN and LAN interfaces for existing IPv4 traffic already setup.&lt;/P&gt;&lt;P&gt;As I understand it, IPv6 traffic will be ignored by ZBF and indeed I do see this behaviour, as I can ping the LOCAL tunnel endpoint IPv6 IP from a host on my LAN with an IPv6 address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, I cannot get IPv6 traffic any further (ie, up the tunnel) unless I remove the WAN interface from the ZBF configuration.&lt;/P&gt;&lt;P&gt;I have tried the following to get around this but to no avail:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- policy map to 'pass' IP ANY ANY to the dest of the tunnel brokers IPv4 address on a SELF to WAN zone pair&lt;/P&gt;&lt;P&gt;- policy map to 'pass' IP ANY ANY from the dest of the tunnel brokers IPv4 address on a WAN to SELF zone pair&lt;/P&gt;&lt;P&gt;- both of the policy maps above at the same time&lt;/P&gt;&lt;P&gt;- both of the policy maps above with inspect actions instead of pass&lt;/P&gt;&lt;P&gt;- both of the policy maps above but with IP proto 41 any any instead of IP any any with the IP of the remote tunnel endpoint (as proto 41 is ipv6ip)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But NONE of these work, if I ping6 ipv6.google.com I get no replies, as soon as I do a 'no zone-member security ZBF-WAN' on the WAN interface, the pings are fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only other thing I could think of is where within the black box of cisco IOS does IOS actually 'create' the tunnel traffic, ie, is it from SELF zone or is it from the tunnel interface itself?&lt;/P&gt;&lt;P&gt;To test this I added the tunnel interface to the WAN ZBF zone (as interfaces in the same zone should be able to communicate) but this did not help either.&lt;/P&gt;&lt;P&gt;Have spent two days on this and am fully stumped!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, there don't seem to be any decent ZBF debug commands that show you each dropped packet and why they were dropped (ie which pmap/inspect class map caused the drop) if you know any please let me know &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance,&lt;/P&gt;&lt;P&gt;//TrX&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Oct 2010 01:41:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-zone-based-firewall-and-ipv6/m-p/1509147#M803966</guid>
      <dc:creator>mattkjohnson</dc:creator>
      <dc:date>2010-10-05T01:41:04Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IOS Zone Based Firewall and IPv6</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-zone-based-firewall-and-ipv6/m-p/1509148#M803968</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Adding full IOS config for clarity (attached). This config is not in production use so can test changes if needbe.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Oct 2010 02:02:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-zone-based-firewall-and-ipv6/m-p/1509148#M803968</guid>
      <dc:creator>mattkjohnson</dc:creator>
      <dc:date>2010-10-05T02:02:37Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IOS Zone Based Firewall and IPv6</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-zone-based-firewall-and-ipv6/m-p/1509149#M803972</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To have the IOS produce logs when znoe based firewall drops the packet, please enable "ip inspect log drop-pkt". Then you should see logs with the details you have mentioned.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Oct 2010 02:05:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-zone-based-firewall-and-ipv6/m-p/1509149#M803972</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-10-05T02:05:27Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IOS Zone Based Firewall and IPv6</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-zone-based-firewall-and-ipv6/m-p/1509150#M803974</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #333333;"&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;That makes sense as ZBF is still using the underlying ip inspect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway, on ping6 ipv6.google.com I get the following single line of drop log:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*Oct&amp;nbsp; 5 02:21:24.740 GMT: %FW-6-DROP_PKT: Dropping Unknown-l4 session &lt;PUBIP&gt;:0 216.66.80.26:0 on zone-pair selftowan class cm-selftowan due to&amp;nbsp; Invalid Segment with ip ident 0&lt;/PUBIP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unknown L4 session, suggests my outbound Self to WAN zone does not have a classmap matching the outbound traffic type.&lt;/P&gt;&lt;P&gt;Also, doing a quick google (found one of your other forum posts in the result actually) suggests 'Invalid Segment with ip ident 0' issues on ZBF could be caused by a class-map matching an access-list with more than one entry.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, as you can see from my config, the only entry I have in cm-selftowan is a 'permit ip any any' ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The traffic does not seem to be getting past this cmap though and onto the specially defined cmap below it which permit's the HE.net tunnel dest address (this logic coming from the fact that 'class cm-selftowan' is listed in the drop log above)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will try removing this cmap and just leaving the cm-selftowan-he-out cmap in place (so we know the ZBF is looking at that cmap first).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, can you think of a reason why 'permit ip any any' wlould not be working :S? Due to this I don't have much hope that what I am about to try will work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Back with updates soon.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Oct 2010 02:24:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-zone-based-firewall-and-ipv6/m-p/1509150#M803974</guid>
      <dc:creator>mattkjohnson</dc:creator>
      <dc:date>2010-10-05T02:24:57Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IOS Zone Based Firewall and IPv6</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-zone-based-firewall-and-ipv6/m-p/1509151#M803976</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, removed the cmap the packet was getting dropped on, so the current self to wan zone-pair policy map looks like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect pm-selftowan&lt;BR /&gt; class type inspect cm-selftowan-he-out&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class type inspect cm-dhcpwan&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-all cm-selftowan-he-out&lt;BR /&gt; match access-group name HETunnelOutbound&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended HETunnelOutbound&lt;BR /&gt; permit 41 any any&lt;BR /&gt; permit ip any host 64.62.200.2&lt;BR /&gt; permit ip any host 66.220.2.74&lt;BR /&gt; permit ip any host 216.66.80.26&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now we see the same error, just on the 'new' first cmap in the pmap:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*Oct&amp;nbsp; 5 02:39:31.316 GMT: %FW-6-DROP_PKT: Dropping Unknown-l4 session &lt;IPADDR&gt;:0 216.66.80.26:0 on zone-pair selftowan class cm-selftowan-he-out due to&amp;nbsp; Invalid Segment with ip ident 0&lt;/IPADDR&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yet as you can see above, we are allowing proto 41 any any.&lt;/P&gt;&lt;P&gt;I didn't expect any other result really since the previous cmap had 'permit ip any any' but still &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/sad.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;//TrX&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;EDIT: Out of curiosity after reading this post: &lt;/SPAN&gt;&lt;A class="jive-link-thread-small" href="https://community.cisco.com/thread/2043222"&gt;https://supportforums.cisco.com/thread/2043222?decorator=print&amp;amp;displayFullThread=true&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I decided to change the outbound cm-selftowan-he-out action to 'pass'.&lt;/P&gt;&lt;P&gt;I suddently noticed the following log:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*Oct&amp;nbsp; 5 02:39:31.316 GMT: %FW-6-DROP_PKT: Dropping Unknown-l4 session&amp;nbsp; 216.66.80.26:0 &lt;IPADDR&gt;:0 on zone-pair &lt;SPAN style="color: #ff0000;"&gt;wantoself&lt;/SPAN&gt; class&amp;nbsp; cm-&lt;SPAN style="color: #ff0000;"&gt;wantoself-he-in&lt;/SPAN&gt; due to&amp;nbsp; Invalid Segment with ip ident 0&lt;/IPADDR&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Notice this is now inbound having trouble where as before was outbound.&lt;/P&gt;&lt;P&gt;I changed the inbound pmap policy for cmap cm-wantoself-he-in to pass also and &lt;SPAN style="color: #00ff00;"&gt;IPv6 PACKETS ARE GETTING ICMP6 REPLIES FROM GOOGLE!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking at the original outbound PMAP:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect pm-selftowan&lt;BR /&gt; class type inspect cm-selftowan&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class type inspect cm-selftowan-he-out&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class type inspect cm-dhcpwan&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cm-selftowan has always been infront of cm-selftowan-he-out, and because that is ip any any, it has been 'grabbing' the IP proto 41 packets and doing ip inspect on them (which fails as it seems ip inspect only handles a handful of proto's).&lt;/P&gt;&lt;P&gt;This is why setting cm-selftowan-he-out and cm-wantoself-he-in both to 'pass' instead of 'inspect' in the past has not been doing anything, because the outbound packets were never getting to the cm-selftowan-he-out cmap.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would never have got to this without ip inspect log. Why didn't I think of just trying ip inspect logging two days ago!&lt;/P&gt;&lt;P&gt;Anyway, thank you, I have now restored my faith in my own knowledge of ZBF!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps the OP too &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;//TrX&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Oct 2010 02:34:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-zone-based-firewall-and-ipv6/m-p/1509151#M803976</guid>
      <dc:creator>mattkjohnson</dc:creator>
      <dc:date>2010-10-05T02:34:22Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IOS Zone Based Firewall and IPv6</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-zone-based-firewall-and-ipv6/m-p/1509152#M803978</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel is up/up. I have&amp;nbsp; attached config and debug messages in attachment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;sh interfaces tunnel 1&lt;BR /&gt;Tunnel1 is up, line protocol is up &lt;BR /&gt;&amp;nbsp; Hardware is Tunnel&lt;BR /&gt;&amp;nbsp; Description: Hurricane Electric IPv6 Tunnel Broker&lt;BR /&gt;&amp;nbsp; MTU 17920 bytes, BW 100 Kbit/sec, DLY 50000 usec, &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; reliability 255/255, txload 1/255, rxload 1/255&lt;BR /&gt;&amp;nbsp; Encapsulation TUNNEL, loopback not set&lt;BR /&gt;&amp;nbsp; Keepalive not set&lt;BR /&gt;&amp;nbsp; Tunnel source 89.212.252.184 (FastEthernet0), destination 216.66.80.98&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Tunnel Subblocks:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src-track:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Tunnel1 source tracking subblock associated with FastEthernet0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set of tunnels with source FastEthernet0, 2 members (includes iterators), on interface &lt;OK&gt;&lt;BR /&gt;&amp;nbsp; Tunnel protocol/transport IPv6/IP&lt;BR /&gt;&amp;nbsp; Tunnel TTL 255&lt;BR /&gt;&amp;nbsp; Tunnel transport MTU 1480 bytes&lt;BR /&gt;&amp;nbsp; Tunnel transmit bandwidth 8000 (kbps)&lt;BR /&gt;&amp;nbsp; Tunnel receive bandwidth 8000 (kbps)&lt;BR /&gt;&amp;nbsp; Last input 00:34:39, output 00:05:36, output hang never&lt;BR /&gt;&amp;nbsp; Last clearing of "show interface" counters never&lt;BR /&gt;&amp;nbsp; Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0&lt;BR /&gt;&amp;nbsp; Queueing strategy: fifo&lt;BR /&gt;&amp;nbsp; Output queue: 0/0 (size/max)&lt;BR /&gt;&amp;nbsp; 5 minute input rate 0 bits/sec, 0 packets/sec&lt;BR /&gt;&amp;nbsp; 5 minute output rate 0 bits/sec, 0 packets/sec&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1132 packets input, 160980 bytes, 0 no buffer&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Received 0 broadcasts (0 IP multicasts)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 runts, 0 giants, 0 throttles&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1141 packets output, 95996 bytes, 0 underruns&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 output errors, 0 collisions, 0 interface resets&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 unknown protocol drops&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 output buffer failures, 0 output buffers swapped out&lt;BR /&gt;C1812#ping ipv6.google.com&lt;BR /&gt;Translating "ipv6.google.com"...domain server (192.168.10.10) [OK]&lt;BR /&gt;&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 2A00:1450:8004::69, timeout is 2 seconds:&lt;BR /&gt;.....&lt;BR /&gt;Success rate is 0 percent (0/5)&lt;BR /&gt;C1812#&lt;/OK&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Oct 2010 18:44:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-zone-based-firewall-and-ipv6/m-p/1509152#M803978</guid>
      <dc:creator>mocah</dc:creator>
      <dc:date>2010-10-05T18:44:49Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IOS Zone Based Firewall and IPv6</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-zone-based-firewall-and-ipv6/m-p/1509153#M803981</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Matt,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are correct if I move&amp;nbsp;&amp;nbsp; "class type inspect Protocol41-cmap" to top position in&amp;nbsp; policy-map type inspect Outside2Router-pmap, than icmp is working &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV class="jive-author"&gt;&lt;DIV class="jive-thread-username"&gt;&lt;A class="jiveTT-hover-user jive-username-link" href="https://community.cisco.com/people/mattkjohnson" id="jive-54796436,947,260,391,217,038"&gt;&lt;BR /&gt;&lt;/A&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="bold"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;PRE class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;policy-map type inspect Outside2Router-pmap&lt;/P&gt;&lt;PRE class="jive_text_macro jive_macro_quote"&gt; class type inspect Protocol41-cmap&lt;BR /&gt;&amp;nbsp; pass log&lt;/PRE&gt;
&lt;P&gt;&lt;BR /&gt; class type inspect SSHaccess-cmap&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class type inspect ICMP-cmap&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class type inspect IPSEC-cmap&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt;&lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;/P&gt;
&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was &lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-qformat:yes;
	mso-style-parent:"";
	mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
	mso-para-margin-top:0cm;
	mso-para-margin-right:0cm;
	mso-para-margin-bottom:10.0pt;
	mso-para-margin-left:0cm;
	line-height:115%;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:"Times New Roman";
	mso-fareast-theme-font:minor-fareast;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;SPAN style="font-size: 11pt; line-height: 115%; font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;always &lt;/SPAN&gt; thinking that router checks all class maps (from highest class type to lowest) in policy-map, until it finds&amp;nbsp; proper rule or reject packet if it can not find the matching rule.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Oct 2010 11:50:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-zone-based-firewall-and-ipv6/m-p/1509153#M803981</guid>
      <dc:creator>mocah</dc:creator>
      <dc:date>2010-10-06T11:50:00Z</dc:date>
    </item>
    <item>
      <title>Cisco IOS Zone Based Firewall and IPv6</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-zone-based-firewall-and-ipv6/m-p/1509154#M803984</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mocah,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've been trying to get my tunnel up with HE.net for quite some time, but without luck.&amp;nbsp; Have you made any progress in getting your ZBFW working with HE's TunnelBroker?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Aug 2011 02:54:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-zone-based-firewall-and-ipv6/m-p/1509154#M803984</guid>
      <dc:creator>CiscoNut2b</dc:creator>
      <dc:date>2011-08-16T02:54:26Z</dc:date>
    </item>
    <item>
      <title>Cisco IOS Zone Based Firewall and IPv6</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-zone-based-firewall-and-ipv6/m-p/1509155#M803989</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ran into the same issue playing with HE tunnelbroker; the fix for me was simple; apply the same security zone to the tunnel interface as you do to the outside physical WAN interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For mine applying 'zone-member security OUTSIDE' (which is what i have on my fa4 physical) solved the problem and makes sense as the traffic is inspected as it flows between that interface pair for v6 traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Nov 2013 02:01:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-zone-based-firewall-and-ipv6/m-p/1509155#M803989</guid>
      <dc:creator>barmason</dc:creator>
      <dc:date>2013-11-06T02:01:33Z</dc:date>
    </item>
  </channel>
</rss>

