<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ZFW and VTI in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/zfw-and-vti/m-p/1123809#M893909</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you post config from your router?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 14 Nov 2008 13:57:43 GMT</pubDate>
    <dc:creator>mocah</dc:creator>
    <dc:date>2008-11-14T13:57:43Z</dc:date>
    <item>
      <title>ZFW and VTI</title>
      <link>https://community.cisco.com/t5/network-security/zfw-and-vti/m-p/1123808#M893906</link>
      <description>&lt;P&gt;I've setup a VTI on two 2821 routers which both have ZFW deployed on them. Without ZFW on the VTI works between the two routers and all traffic passes freely. When I turn on ZFW (basic FW using the wizard) no traffic flows over the VTI. The VTI is up but I cannot ping across it and/or run OSPF. So, the questions I have are:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;â&amp;#128;¢ Do I need to create a zone pair (along with the appropriate class-map and policy-map) between the internal interface and the tunnel interface and vice versa?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;â&amp;#128;¢ Do I need to create a zone pair between the outside interface and some internal interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 14:09:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zfw-and-vti/m-p/1123808#M893906</guid>
      <dc:creator>bardellom</dc:creator>
      <dc:date>2019-03-11T14:09:14Z</dc:date>
    </item>
    <item>
      <title>Re: ZFW and VTI</title>
      <link>https://community.cisco.com/t5/network-security/zfw-and-vti/m-p/1123809#M893909</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you post config from your router?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Nov 2008 13:57:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zfw-and-vti/m-p/1123809#M893909</guid>
      <dc:creator>mocah</dc:creator>
      <dc:date>2008-11-14T13:57:43Z</dc:date>
    </item>
    <item>
      <title>Re: ZFW and VTI</title>
      <link>https://community.cisco.com/t5/network-security/zfw-and-vti/m-p/1123810#M893911</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If the internal interface and the tunnel interface are on the same zone, all the traffic is permitted between them.&lt;/P&gt;&lt;P&gt;Then you need to create a Zone-pair between the different interfaces of the router because if there are no zone-pair between them the traffic will fail.&lt;/P&gt;&lt;P&gt;I hope it helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 23 Nov 2008 21:49:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zfw-and-vti/m-p/1123810#M893911</guid>
      <dc:creator>torchris</dc:creator>
      <dc:date>2008-11-23T21:49:46Z</dc:date>
    </item>
    <item>
      <title>Re: ZFW and VTI</title>
      <link>https://community.cisco.com/t5/network-security/zfw-and-vti/m-p/1123811#M893913</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have same problem as  bardellom. Tunnel is up, ISAKMP is established but traffic can not reach the other end. Tunnels are in the same sec. zone as LAN.&lt;/P&gt;&lt;P&gt;Do I need to create Zone-pair between self zone and LAN security zone?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Jun 2009 13:12:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zfw-and-vti/m-p/1123811#M893913</guid>
      <dc:creator>mocah</dc:creator>
      <dc:date>2009-06-12T13:12:25Z</dc:date>
    </item>
    <item>
      <title>Re: ZFW and VTI</title>
      <link>https://community.cisco.com/t5/network-security/zfw-and-vti/m-p/1123812#M893914</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The thing is the following.&lt;/P&gt;&lt;P&gt;By default, the self zone is created once you create a zone.&lt;/P&gt;&lt;P&gt;In order to permit a L2L tunnel to be establish to the router, you will need something like this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list ext Tunnel&lt;/P&gt;&lt;P&gt; permit udp any any eq 500&lt;/P&gt;&lt;P&gt; permit udp any any eq 4500&lt;/P&gt;&lt;P&gt; permit esp any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-all VPN&lt;/P&gt;&lt;P&gt; match access-group name Tunnel&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect 2self&lt;/P&gt;&lt;P&gt; class VPN&lt;/P&gt;&lt;P&gt;  pass&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the self zone to the out-zone don't, do any zone-pairs, and everything will be implicitly permitted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the VTI lines, please do the same but for the SSH and telnet ports.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have any questions, please let me know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Chris - TAC Security Engineer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Jun 2009 13:52:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zfw-and-vti/m-p/1123812#M893914</guid>
      <dc:creator>torchris</dc:creator>
      <dc:date>2009-06-12T13:52:15Z</dc:date>
    </item>
    <item>
      <title>Re: ZFW and VTI</title>
      <link>https://community.cisco.com/t5/network-security/zfw-and-vti/m-p/1123813#M893915</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello torchris,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First I would like to thank you &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have following config on both routers:&lt;/P&gt;&lt;P&gt;ip access-list extended VPN  &lt;/P&gt;&lt;P&gt;  permit esp any any  &lt;/P&gt;&lt;P&gt;  permit udp any any eq isakmp  &lt;/P&gt;&lt;P&gt;  permit ahp any any  &lt;/P&gt;&lt;P&gt;  permit udp any any eq non500-isakmp  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-all ipsec-cmap  &lt;/P&gt;&lt;P&gt;match access-group name VPN &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect Internet2Self-pmap  &lt;/P&gt;&lt;P&gt;  class type inspect ipsec-cmap  &lt;/P&gt;&lt;P&gt;   inspect   &lt;/P&gt;&lt;P&gt;  class type inspect ssh-cmap  &lt;/P&gt;&lt;P&gt;   inspect   &lt;/P&gt;&lt;P&gt;  class type inspect icmp-cmap  &lt;/P&gt;&lt;P&gt;   inspect   &lt;/P&gt;&lt;P&gt;  class class-default  &lt;/P&gt;&lt;P&gt;   drop&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone-pair security Internet2Self source Internet destination self  &lt;/P&gt;&lt;P&gt; service-policy type inspect Internet2Self-pmap  &lt;/P&gt;&lt;P&gt;zone-pair security Self2Internet source self destination Internet  &lt;/P&gt;&lt;P&gt; service-policy type inspect Internet2Self-pmap  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISAKMP and IPsec tunel are established, only firewall is blocking traffic. This is message from log file:&lt;/P&gt;&lt;P&gt;# %FW-6-DROP_PKT: Dropping Unknown-l4 session xxx.xxx.xxx.84:0 xxx.xxx.xxx.33:0 on zone-pair Internet2Self class class-default due to   &lt;/P&gt;&lt;P&gt;#  DROP action found in policy-map with ip ident 0  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And when I am trying to ping from one tunnel interface to another:    &lt;/P&gt;&lt;P&gt;# %FW-6-DROP_PKT: Dropping icmp session 192.168.5.21:0 192.168.1.1:0  due to  policy match failure with ip ident 0  &lt;/P&gt;&lt;P&gt;#    &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Jun 2009 17:06:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zfw-and-vti/m-p/1123813#M893915</guid>
      <dc:creator>mocah</dc:creator>
      <dc:date>2009-06-12T17:06:30Z</dc:date>
    </item>
    <item>
      <title>Re: ZFW and VTI</title>
      <link>https://community.cisco.com/t5/network-security/zfw-and-vti/m-p/1123814#M893916</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the reply.&lt;/P&gt;&lt;P&gt;The problem that you are having is the action on the policy.&lt;/P&gt;&lt;P&gt;Instead of inspect, it should be pass.&lt;/P&gt;&lt;P&gt;The reason for this is that the firewall uses the payload of the packet to inspect the traffic. The thing is that in ESP, the payload is encrypted.&lt;/P&gt;&lt;P&gt;Also, I checked that the ICMP traffic is being dropped.&lt;/P&gt;&lt;P&gt;You can do the following to permit ICMP:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-all ICMP2Self&lt;/P&gt;&lt;P&gt;match protocol icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect 2self&lt;/P&gt;&lt;P&gt; class ICMP2Self&lt;/P&gt;&lt;P&gt;  pass&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That should solve it for the ICMP and ESP traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Jun 2009 17:36:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zfw-and-vti/m-p/1123814#M893916</guid>
      <dc:creator>torchris</dc:creator>
      <dc:date>2009-06-12T17:36:43Z</dc:date>
    </item>
    <item>
      <title>Re: ZFW and VTI</title>
      <link>https://community.cisco.com/t5/network-security/zfw-and-vti/m-p/1123815#M893917</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you it is working &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One more question.You mentioned:&lt;/P&gt;&lt;P&gt;class-map type inspect match-all ICMP2Self&lt;/P&gt;&lt;P&gt;match protocol icmp &lt;/P&gt;&lt;P&gt; Is icmp traffic also encrypted if I send it from LAN on router 1 to LAN on router 2?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind regards, Marko&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Jun 2009 18:43:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zfw-and-vti/m-p/1123815#M893917</guid>
      <dc:creator>mocah</dc:creator>
      <dc:date>2009-06-12T18:43:49Z</dc:date>
    </item>
    <item>
      <title>Re: ZFW and VTI</title>
      <link>https://community.cisco.com/t5/network-security/zfw-and-vti/m-p/1123816#M893918</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, the thing is the following.&lt;/P&gt;&lt;P&gt;If the traffic is from AN on router 1 to LAN on router 2 the flow will be different and the self zone will not participate.&lt;/P&gt;&lt;P&gt;If you try to ping the LAN interface of the router, the packet will get to the router and it will be decrypted, then send to the LAN interface and then through the VPN tunnel.&lt;/P&gt;&lt;P&gt;That means that when the packet gets to the LAN interface it is decrypted.&lt;/P&gt;&lt;P&gt;I hope it helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Jun 2009 19:14:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zfw-and-vti/m-p/1123816#M893918</guid>
      <dc:creator>torchris</dc:creator>
      <dc:date>2009-06-12T19:14:36Z</dc:date>
    </item>
  </channel>
</rss>

