<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Possible IOS Firewall inspection problem in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/possible-ios-firewall-inspection-problem/m-p/1361603#M857403</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am not sure why you would have inspection applied IN and OUT on all interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip inspect name FW tcp&lt;BR /&gt;ip inspect name FW udp&lt;BR /&gt;ip inspect name FW icmp&lt;BR /&gt;ip inspect name FW ftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Usually it is either applied IN on the inside interface or OUT on the outside interface. Is there a way you can try to remove inspection on the inside interface F0/0/0 and see if that helps?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also reduce the inspections and leave it at the minimum above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 13 Jan 2010 00:32:25 GMT</pubDate>
    <dc:creator>Kureli Sankar</dc:creator>
    <dc:date>2010-01-13T00:32:25Z</dc:date>
    <item>
      <title>Possible IOS Firewall inspection problem</title>
      <link>https://community.cisco.com/t5/network-security/possible-ios-firewall-inspection-problem/m-p/1361602#M857401</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have two Routers running HSRP on the inside interfaces (LAN interfaces) tracking the outside interfaces (ISP interfaces). I have both routers handling both connections (two ISPs)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, basically the configuration is as follows (for the primary router, the secondary router is the same):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;######################################################################&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip inspect name FW tcp&lt;BR /&gt;ip inspect name FW udp&lt;BR /&gt;ip inspect name FW icmp&lt;BR /&gt;ip inspect name FW http&lt;BR /&gt;ip inspect name FW https&lt;BR /&gt;ip inspect name FW dns&lt;BR /&gt;ip inspect name FW esmtp&lt;BR /&gt;ip inspect name FW pop3&lt;BR /&gt;ip inspect name FW imap&lt;BR /&gt;ip inspect name FW bootpc&lt;BR /&gt;ip inspect name FW bootps&lt;BR /&gt;ip inspect name FW ms-sql&lt;BR /&gt;ip inspect name FW ftp&lt;BR /&gt;ip inspect name FW ipsec-msft&lt;BR /&gt;ip inspect name FW isakmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;&amp;nbsp; description PRIMARY_ISP&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip address 201.195.231.154 255.255.255.240&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip nat outside&lt;BR /&gt;&amp;nbsp; ip inspect FW in&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip inspect FW out&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip access-group METRO_IN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt; description SECONDARY_ISP&lt;BR /&gt; ip address 201.195.91.54 255.255.255.240&lt;BR /&gt; ip nat outside&lt;BR /&gt; ip inspect FW in&lt;/P&gt;&lt;P&gt; ip inspect FW out&lt;/P&gt;&lt;P&gt; ip access-group ACL_GSHDSL_IN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface FastEthernet0/0/0&lt;BR /&gt; ip address 192.168.100.6 255.255.255.0&lt;BR /&gt; ip nat inside&lt;/P&gt;&lt;P&gt; ip inspect FW in&lt;/P&gt;&lt;P&gt; ip inspect FW out&lt;BR /&gt; standby 1 ip 192.168.100.5&lt;BR /&gt; standby 1 priority 115&lt;BR /&gt; standby 1 preempt&lt;BR /&gt; standby 1 track GigabitEthernet0/1 5&lt;BR /&gt; standby 1 track GigabitEthernet0/0 5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat inside source static 192.168.2.175 201.195.91.50&lt;BR /&gt;ip nat inside source static 192.168.2.177 201.195.91.51&lt;BR /&gt;ip nat inside source static 192.168.2.178 201.195.91.52&lt;BR /&gt;ip nat inside source static 192.168.2.179 201.195.91.53&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat inside source static 192.168.2.75 201.195.231.150&lt;BR /&gt;ip nat inside source static 192.168.2.77 201.195.231.151&lt;BR /&gt;ip nat inside source static 192.168.2.78 201.195.231.152&lt;BR /&gt;ip nat inside source static 192.168.2.79 201.195.231.153&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat inside source route-map METRO interface GigabitEthernet0/1 overload&lt;BR /&gt;ip nat inside source route-map SHDSL interface GigabitEthernet0/0 overload&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route-map METRO permit 10&lt;BR /&gt; match ip address ACL_METRO&lt;BR /&gt; match interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route-map SHDSL permit 10&lt;BR /&gt; match ip address ACL_SHDSL&lt;BR /&gt; match interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended ACL_METRO&lt;BR /&gt; permit ip 192.168.1.0 0.0.0.255 any&lt;BR /&gt; permit ip 192.168.2.0 0.0.0.255 any&lt;BR /&gt; permit ip 192.168.3.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;ip access-list extended ACL_SHDSL&lt;BR /&gt; permit ip 192.168.1.0 0.0.0.255 any&lt;BR /&gt; permit ip 192.168.2.0 0.0.0.255 any&lt;BR /&gt; permit ip 192.168.3.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip sla 1&lt;BR /&gt; icmp-echo 201.195.231.145&lt;BR /&gt; threshold 2000&lt;BR /&gt; frequency 5&lt;BR /&gt;ip sla schedule 1 life forever start-time now&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;ip sla 3&lt;BR /&gt; icmp-echo 201.195.91.49&lt;BR /&gt; threshold 2000&lt;BR /&gt; frequency 5&lt;BR /&gt;ip sla schedule 3 life forever start-time now&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;track 100 ip sla 1 reachability&lt;BR /&gt;track 300 ip sla 3 reachability&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 201.195.231.145 10 track 100&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 201.195.91.49 20 track 300&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;######################################################################&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, connection to the Internet is fine (no problems)....&lt;/P&gt;&lt;P&gt;Everybody, gets out to the Internet using the primary METRO ISP.&lt;/P&gt;&lt;P&gt;The problem is with clients from the Internet accesing our internal servers.&lt;/P&gt;&lt;P&gt;For example, clients try to reach the servers and they either get a very slow response or no response at all.&lt;/P&gt;&lt;P&gt;If I remove the access-list from the ISP interfaces, and the inspection rules, then everything works fine.&lt;/P&gt;&lt;P&gt;If I add again the access-list it works fine.&lt;/P&gt;&lt;P&gt;When I add the inspection rules, is when the problem starts.&lt;/P&gt;&lt;P&gt;My question is:&amp;nbsp; Would it be possible that since the clients connect from the outside via either ISP, the inspection sessions on the router are causing these problems?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any suggestions are appreciated!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:56:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/possible-ios-firewall-inspection-problem/m-p/1361602#M857401</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2019-03-11T16:56:55Z</dc:date>
    </item>
    <item>
      <title>Re: Possible IOS Firewall inspection problem</title>
      <link>https://community.cisco.com/t5/network-security/possible-ios-firewall-inspection-problem/m-p/1361603#M857403</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am not sure why you would have inspection applied IN and OUT on all interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip inspect name FW tcp&lt;BR /&gt;ip inspect name FW udp&lt;BR /&gt;ip inspect name FW icmp&lt;BR /&gt;ip inspect name FW ftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Usually it is either applied IN on the inside interface or OUT on the outside interface. Is there a way you can try to remove inspection on the inside interface F0/0/0 and see if that helps?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also reduce the inspections and leave it at the minimum above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jan 2010 00:32:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/possible-ios-firewall-inspection-problem/m-p/1361603#M857403</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-01-13T00:32:25Z</dc:date>
    </item>
    <item>
      <title>Re: Possible IOS Firewall inspection problem</title>
      <link>https://community.cisco.com/t5/network-security/possible-ios-firewall-inspection-problem/m-p/1361604#M857405</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm not sure why the inspection works only if I applied both inbound and outbound on the same interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually, I don't intend to inspect the incoming traffic from the Internet, only the outbound traffic.... but if I only apply the inspection in one direction, it won't work (not sure if it's a bug or something).......&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That's a good point that I need to figure out.... besides that... do you think that having the inspection for the two ISP connections could be causing the problem for the incoming traffic?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jan 2010 04:50:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/possible-ios-firewall-inspection-problem/m-p/1361604#M857405</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-01-13T04:50:45Z</dc:date>
    </item>
    <item>
      <title>Re: Possible IOS Firewall inspection problem</title>
      <link>https://community.cisco.com/t5/network-security/possible-ios-firewall-inspection-problem/m-p/1361605#M857407</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think I've found the problem (not 100% sure yet)....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Traffic to the Internet is working fine throught the HSRP active router (either the primary or secondary).&lt;/P&gt;&lt;P&gt;But, incoming traffic from the Internet to the servers was the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, I started to see a lot of duplicate IP addresses messages on both routers (there are no duplicate addresses).....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is happening is that, traffic coming from the Internet could enter either router to reach the servers.... For instance, I have the following static NAT on both routers:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Router(config)# ip nat inside source static 192.168.2.175 201.195.91.50&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, when clients from the Internet try to reach that server, they can reach it via both routers..... I'm not running BGP with my ISPs or controlling how the traffic enters the network (solely based on DNS). Since both routers have the same static NAT (even though one is the active HSRP one), traffic could enter via both routers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And there's my problem. As soon as I removed the static NAT statements from the secondary router, everything works perfectly on the primary one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My question then is.....&amp;nbsp;&amp;nbsp; how do I get to have two routers receiving two ISPs (having one as active HSRP) but controlling how the incoming traffic is handled?&amp;nbsp; Or perhaps not controlling the incoming traffic? But how do I make this work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jan 2010 19:20:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/possible-ios-firewall-inspection-problem/m-p/1361605#M857407</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-01-13T19:20:39Z</dc:date>
    </item>
    <item>
      <title>Re: Possible IOS Firewall inspection problem</title>
      <link>https://community.cisco.com/t5/network-security/possible-ios-firewall-inspection-problem/m-p/1361606#M857409</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Something called SNAT would work???&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Stateful NAT???&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jan 2010 20:24:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/possible-ios-firewall-inspection-problem/m-p/1361606#M857409</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-01-13T20:24:43Z</dc:date>
    </item>
  </channel>
</rss>

