<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Zone-Based Firewall on a site to site VPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/zone-based-firewall-on-a-site-to-site-vpn/m-p/1467979#M820750</link>
    <description>&lt;P&gt;We have a site to site VPN between an 800 series router and a VPN concentrator.&amp;nbsp; I want to implement the Zone-based firewall on on the router. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the 800 series router, once I apply the Zone on the outside interface which is the "Dialer 1"&amp;nbsp; VPN connection is terminated.&amp;nbsp; Based on the configuration below, what am I missing? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended county-out&lt;BR /&gt; permit ip any 192.168.60.0 0.0.0.255&lt;/P&gt;&lt;P&gt;ip access-list extended county-in&lt;BR /&gt; permit ip 192.168.60.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;ip access-list extended ICMPReply&amp;nbsp;&amp;nbsp; &lt;BR /&gt; permit icmp any any host-unreachable&amp;nbsp;&amp;nbsp; &lt;BR /&gt; permit icmp any any port-unreachable&amp;nbsp;&amp;nbsp; &lt;BR /&gt; permit icmp any any ttl-exceeded&amp;nbsp;&amp;nbsp; &lt;BR /&gt; permit icmp any any packet-too-big &lt;/P&gt;&lt;P&gt;ip access-list extended esp-traffic&lt;BR /&gt; permit esp any any&lt;/P&gt;&lt;P&gt;class-map type inspect match-any IPSec&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp; match protocol isakmp&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp; match protocol ipsec-msft&lt;BR /&gt;&amp;nbsp; match access-group name esp-traffic &lt;/P&gt;&lt;P&gt;class-map type inspect match-all ICMPReply&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp; match access-group name ICMPReply&amp;nbsp; &lt;BR /&gt; &lt;BR /&gt;&amp;nbsp; &lt;BR /&gt;class-map type inspect match-any in-out&lt;BR /&gt; match access-group name county-in &lt;BR /&gt; match protocol icmp&lt;BR /&gt; match protocol dns&lt;BR /&gt; match protocol http&lt;BR /&gt; match protocol https&lt;BR /&gt; match protocol ftp&lt;/P&gt;&lt;P&gt;class-map type inspect match-any out-in&lt;BR /&gt; match access-group name county-out&lt;/P&gt;&lt;P&gt;policy-map type inspect OutToSelf&lt;BR /&gt;description Permitted traffic from Internet to Router&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt; class type inspect ICMPReply&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; pass&amp;nbsp;&amp;nbsp; &lt;BR /&gt; class type inspect IPSec&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; pass&amp;nbsp;&amp;nbsp; &lt;BR /&gt; class class-default&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; drop log&amp;nbsp;&amp;nbsp; &lt;BR /&gt;policy-map type inspect access-county&lt;BR /&gt; class type inspect in-out&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;policy-map type inspect county-out&lt;BR /&gt; class type inspect out-in&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;zone security in-zone&lt;BR /&gt;zone security out-zone&lt;/P&gt;&lt;P&gt;zone-pair security OutToSelf source out-zone destination self&amp;nbsp;&amp;nbsp; &lt;BR /&gt; service-policy type inspect OutToSelf&amp;nbsp; &lt;/P&gt;&lt;P&gt;zone-pair security in-out source in-zone destination out-zone&lt;BR /&gt; service-policy type inspect access-county&lt;/P&gt;&lt;P&gt;zone-pair security county-in source out-zone destination in-zone&lt;BR /&gt; service-policy type inspect county-out&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 17:45:19 GMT</pubDate>
    <dc:creator>mpanganiban</dc:creator>
    <dc:date>2019-03-11T17:45:19Z</dc:date>
    <item>
      <title>Zone-Based Firewall on a site to site VPN</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-on-a-site-to-site-vpn/m-p/1467979#M820750</link>
      <description>&lt;P&gt;We have a site to site VPN between an 800 series router and a VPN concentrator.&amp;nbsp; I want to implement the Zone-based firewall on on the router. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the 800 series router, once I apply the Zone on the outside interface which is the "Dialer 1"&amp;nbsp; VPN connection is terminated.&amp;nbsp; Based on the configuration below, what am I missing? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended county-out&lt;BR /&gt; permit ip any 192.168.60.0 0.0.0.255&lt;/P&gt;&lt;P&gt;ip access-list extended county-in&lt;BR /&gt; permit ip 192.168.60.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;ip access-list extended ICMPReply&amp;nbsp;&amp;nbsp; &lt;BR /&gt; permit icmp any any host-unreachable&amp;nbsp;&amp;nbsp; &lt;BR /&gt; permit icmp any any port-unreachable&amp;nbsp;&amp;nbsp; &lt;BR /&gt; permit icmp any any ttl-exceeded&amp;nbsp;&amp;nbsp; &lt;BR /&gt; permit icmp any any packet-too-big &lt;/P&gt;&lt;P&gt;ip access-list extended esp-traffic&lt;BR /&gt; permit esp any any&lt;/P&gt;&lt;P&gt;class-map type inspect match-any IPSec&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp; match protocol isakmp&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp; match protocol ipsec-msft&lt;BR /&gt;&amp;nbsp; match access-group name esp-traffic &lt;/P&gt;&lt;P&gt;class-map type inspect match-all ICMPReply&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp; match access-group name ICMPReply&amp;nbsp; &lt;BR /&gt; &lt;BR /&gt;&amp;nbsp; &lt;BR /&gt;class-map type inspect match-any in-out&lt;BR /&gt; match access-group name county-in &lt;BR /&gt; match protocol icmp&lt;BR /&gt; match protocol dns&lt;BR /&gt; match protocol http&lt;BR /&gt; match protocol https&lt;BR /&gt; match protocol ftp&lt;/P&gt;&lt;P&gt;class-map type inspect match-any out-in&lt;BR /&gt; match access-group name county-out&lt;/P&gt;&lt;P&gt;policy-map type inspect OutToSelf&lt;BR /&gt;description Permitted traffic from Internet to Router&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt; class type inspect ICMPReply&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; pass&amp;nbsp;&amp;nbsp; &lt;BR /&gt; class type inspect IPSec&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; pass&amp;nbsp;&amp;nbsp; &lt;BR /&gt; class class-default&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; drop log&amp;nbsp;&amp;nbsp; &lt;BR /&gt;policy-map type inspect access-county&lt;BR /&gt; class type inspect in-out&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;policy-map type inspect county-out&lt;BR /&gt; class type inspect out-in&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;zone security in-zone&lt;BR /&gt;zone security out-zone&lt;/P&gt;&lt;P&gt;zone-pair security OutToSelf source out-zone destination self&amp;nbsp;&amp;nbsp; &lt;BR /&gt; service-policy type inspect OutToSelf&amp;nbsp; &lt;/P&gt;&lt;P&gt;zone-pair security in-out source in-zone destination out-zone&lt;BR /&gt; service-policy type inspect access-county&lt;/P&gt;&lt;P&gt;zone-pair security county-in source out-zone destination in-zone&lt;BR /&gt; service-policy type inspect county-out&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:45:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-on-a-site-to-site-vpn/m-p/1467979#M820750</guid>
      <dc:creator>mpanganiban</dc:creator>
      <dc:date>2019-03-11T17:45:19Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-Based Firewall on a site to site VPN</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-on-a-site-to-site-vpn/m-p/1467980#M820783</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would try to configure a zone from the self to the out zone. permit all IP... If not just get the ... IP INSPECT LOG DROP-PKT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this will tell us why the traffic is being dropped. If you attach a diagram of the topology that will help us to understand why is't not working. Are you using NAT for any of&amp;nbsp; the endpoints.?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 May 2010 19:21:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-on-a-site-to-site-vpn/m-p/1467980#M820783</guid>
      <dc:creator>Diego Armando Cambronero Arias</dc:creator>
      <dc:date>2010-05-13T19:21:23Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-Based Firewall on a site to site VPN</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-on-a-site-to-site-vpn/m-p/1467981#M820820</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the reply!&amp;nbsp; It does work when I modify the self outzone with IP any any.&amp;nbsp; However, I want to be more specific if possible.&amp;nbsp; I am using NAT on each endpoint as well.&amp;nbsp; Unfortunately I am not onsite, I have the configuration unsaved and I am having the router reload automatically to go back to it's original configuration.&amp;nbsp; I will try the "ip inspect log drop-pkt"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll try to illustrate a quick topology:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.60.x/24------871 router&lt;STRONG&gt;&amp;lt;-------&lt;SPAN style="font-size: 12pt;"&gt;Internet&lt;/SPAN&gt;-------&amp;gt;&lt;/STRONG&gt;VPN Concentator------172.16.16.0/20&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 May 2010 20:01:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-on-a-site-to-site-vpn/m-p/1467981#M820820</guid>
      <dc:creator>mpanganiban</dc:creator>
      <dc:date>2010-05-13T20:01:58Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-Based Firewall on a site to site VPN</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-on-a-site-to-site-vpn/m-p/1467982#M820851</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok But you are not NATing the endpoint. they are using the public IPs&amp;nbsp; right?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 May 2010 20:15:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-on-a-site-to-site-vpn/m-p/1467982#M820851</guid>
      <dc:creator>Diego Armando Cambronero Arias</dc:creator>
      <dc:date>2010-05-13T20:15:48Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-Based Firewall on a site to site VPN</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-on-a-site-to-site-vpn/m-p/1467983#M820907</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, they are using public IP's&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 May 2010 20:31:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-on-a-site-to-site-vpn/m-p/1467983#M820907</guid>
      <dc:creator>mpanganiban</dc:creator>
      <dc:date>2010-05-13T20:31:55Z</dc:date>
    </item>
  </channel>
</rss>

