<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Can a layer 4 policy block IM traffic in IOS firewall? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/can-a-layer-4-policy-block-im-traffic-in-ios-firewall/m-p/1096042#M878430</link>
    <description>&lt;P&gt;Hi experts,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My customer wants to allow messaging just for certain users IP and block it for anybody else.  His configuration is something like the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map match-all msn&lt;/P&gt;&lt;P&gt; match protocol imap&lt;/P&gt;&lt;P&gt; match access-group name Permited_MSN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended Permited_MSN&lt;/P&gt;&lt;P&gt; deny ip host 192.168.1.x&lt;/P&gt;&lt;P&gt; permit ip any any&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map msnmap&lt;/P&gt;&lt;P&gt; class msn&lt;/P&gt;&lt;P&gt;   drop&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface BVI1&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt; ip pim dense-mode&lt;/P&gt;&lt;P&gt; ip nat inside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt; service-policy input msnmap&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Doing a show policy-map, we never see matched packets being dropped. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco1811W#show policy-map interface bvi 1&lt;/P&gt;&lt;P&gt; BVI1&lt;/P&gt;&lt;P&gt;  Service-policy input: msnmap&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;    Class-map: msn (match-all)&lt;/P&gt;&lt;P&gt;      0 packets, 0 bytes&lt;/P&gt;&lt;P&gt;      5 minute offered rate 0 bps, drop rate 0 bps&lt;/P&gt;&lt;P&gt;      Match: protocol imap&lt;/P&gt;&lt;P&gt;      Match: access-group name Permited_MSN&lt;/P&gt;&lt;P&gt;      drop&lt;/P&gt;&lt;P&gt;    Class-map: class-default (match-any)&lt;/P&gt;&lt;P&gt;      1722583 packets, 929916071 bytes&lt;/P&gt;&lt;P&gt;      5 minute offered rate 612000 bps, drop rate 0 bps&lt;/P&gt;&lt;P&gt;      Match: any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Should this configuration work? Can the router block MSN like traffic with a layer 4 policy or it is necessary to use zone-based with application policy? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any comment on this is highly appreciated. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 14:29:40 GMT</pubDate>
    <dc:creator>jopontes</dc:creator>
    <dc:date>2019-03-11T14:29:40Z</dc:date>
    <item>
      <title>Can a layer 4 policy block IM traffic in IOS firewall?</title>
      <link>https://community.cisco.com/t5/network-security/can-a-layer-4-policy-block-im-traffic-in-ios-firewall/m-p/1096042#M878430</link>
      <description>&lt;P&gt;Hi experts,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My customer wants to allow messaging just for certain users IP and block it for anybody else.  His configuration is something like the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map match-all msn&lt;/P&gt;&lt;P&gt; match protocol imap&lt;/P&gt;&lt;P&gt; match access-group name Permited_MSN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended Permited_MSN&lt;/P&gt;&lt;P&gt; deny ip host 192.168.1.x&lt;/P&gt;&lt;P&gt; permit ip any any&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map msnmap&lt;/P&gt;&lt;P&gt; class msn&lt;/P&gt;&lt;P&gt;   drop&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface BVI1&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt; ip pim dense-mode&lt;/P&gt;&lt;P&gt; ip nat inside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt; service-policy input msnmap&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Doing a show policy-map, we never see matched packets being dropped. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco1811W#show policy-map interface bvi 1&lt;/P&gt;&lt;P&gt; BVI1&lt;/P&gt;&lt;P&gt;  Service-policy input: msnmap&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;    Class-map: msn (match-all)&lt;/P&gt;&lt;P&gt;      0 packets, 0 bytes&lt;/P&gt;&lt;P&gt;      5 minute offered rate 0 bps, drop rate 0 bps&lt;/P&gt;&lt;P&gt;      Match: protocol imap&lt;/P&gt;&lt;P&gt;      Match: access-group name Permited_MSN&lt;/P&gt;&lt;P&gt;      drop&lt;/P&gt;&lt;P&gt;    Class-map: class-default (match-any)&lt;/P&gt;&lt;P&gt;      1722583 packets, 929916071 bytes&lt;/P&gt;&lt;P&gt;      5 minute offered rate 612000 bps, drop rate 0 bps&lt;/P&gt;&lt;P&gt;      Match: any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Should this configuration work? Can the router block MSN like traffic with a layer 4 policy or it is necessary to use zone-based with application policy? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any comment on this is highly appreciated. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 14:29:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-a-layer-4-policy-block-im-traffic-in-ios-firewall/m-p/1096042#M878430</guid>
      <dc:creator>jopontes</dc:creator>
      <dc:date>2019-03-11T14:29:40Z</dc:date>
    </item>
    <item>
      <title>Re: Can a layer 4 policy block IM traffic in IOS firewall?</title>
      <link>https://community.cisco.com/t5/network-security/can-a-layer-4-policy-block-im-traffic-in-ios-firewall/m-p/1096043#M878431</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The class map "MSN" will not work, The config is trying to match imap AND the access-list.  IMAP has nothing to do with MSN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Confirmation it is not working is in the policy-map lines:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"0 packets, 0 bytes"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To be honest using QoS (which is the policy map) is not the way to block this type of traffic.  MSN has specific ports - depending on the version.  The latest versions of MSN or Live Messenger will use HTTP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Dec 2008 17:05:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-a-layer-4-policy-block-im-traffic-in-ios-firewall/m-p/1096043#M878431</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2008-12-26T17:05:01Z</dc:date>
    </item>
    <item>
      <title>Re: Can a layer 4 policy block IM traffic in IOS firewall?</title>
      <link>https://community.cisco.com/t5/network-security/can-a-layer-4-policy-block-im-traffic-in-ios-firewall/m-p/1096044#M878432</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you Andrew!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I figured that this configuration had nothing to do with what the customer wants. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am now configuring using the zone-based policies. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configuring an Instant Messenger (IM) Policy &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/ps6441/products_feature_guide09186a008060f6dd.html#wp1566338" target="_blank"&gt;http://www.cisco.com/en/US/products/ps6441/products_feature_guide09186a008060f6dd.html#wp1566338&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, this seems to have only match-any clause, which does not give the option to tie an acl to take an action only on certain IP traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any other way to accomplish it? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Dec 2008 17:47:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-a-layer-4-policy-block-im-traffic-in-ios-firewall/m-p/1096044#M878432</guid>
      <dc:creator>jopontes</dc:creator>
      <dc:date>2008-12-26T17:47:11Z</dc:date>
    </item>
    <item>
      <title>Re: Can a layer 4 policy block IM traffic in IOS firewall?</title>
      <link>https://community.cisco.com/t5/network-security/can-a-layer-4-policy-block-im-traffic-in-ios-firewall/m-p/1096045#M878433</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mmmmm reading the link - I would kinda agree on that, however I have not had much experiance with the zone based firewall config.  I do not have access to a router that supports this feature so cannot really see if multiple matches are available.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry - perhaps another netpro has.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Dec 2008 18:17:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-a-layer-4-policy-block-im-traffic-in-ios-firewall/m-p/1096045#M878433</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2008-12-26T18:17:15Z</dc:date>
    </item>
  </channel>
</rss>

