<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Tried to activate Firewall in ISR but blockes allowed servic in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/tried-to-activate-firewall-in-isr-but-blockes-allowed-services/m-p/1087447#M895032</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Configure an Access-list to open the port 3389 and apply the access-list on the interface where you have configured the zone based firewall which will prevent the port from being blocked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 21 Oct 2008 15:08:58 GMT</pubDate>
    <dc:creator>smahbub</dc:creator>
    <dc:date>2008-10-21T15:08:58Z</dc:date>
    <item>
      <title>Tried to activate Firewall in ISR but blockes allowed services</title>
      <link>https://community.cisco.com/t5/network-security/tried-to-activate-firewall-in-isr-but-blockes-allowed-services/m-p/1087446#M895031</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need your advice. tried to enable Firewall on the ISR using zone security but whenever i apply it on the interface (in/out)some of the ports like 3389 etc are blocked.  Need to know if there is anything i need to configure to accept port 3389.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-all xxx&lt;/P&gt;&lt;P&gt; match access-group xxx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any inspect-traffic&lt;/P&gt;&lt;P&gt; match protocol cuseeme&lt;/P&gt;&lt;P&gt; match protocol dns&lt;/P&gt;&lt;P&gt; match protocol ftp&lt;/P&gt;&lt;P&gt; match protocol h323&lt;/P&gt;&lt;P&gt; match protocol http&lt;/P&gt;&lt;P&gt; match protocol https&lt;/P&gt;&lt;P&gt; match protocol icmp&lt;/P&gt;&lt;P&gt; match protocol imap&lt;/P&gt;&lt;P&gt; match protocol pop3&lt;/P&gt;&lt;P&gt; match protocol netshow&lt;/P&gt;&lt;P&gt; match protocol shell&lt;/P&gt;&lt;P&gt; match protocol realmedia&lt;/P&gt;&lt;P&gt; match protocol rtsp&lt;/P&gt;&lt;P&gt; match protocol smtp extended&lt;/P&gt;&lt;P&gt; match protocol sql-net&lt;/P&gt;&lt;P&gt; match protocol streamworks&lt;/P&gt;&lt;P&gt; match protocol tftp&lt;/P&gt;&lt;P&gt; match protocol vdolive&lt;/P&gt;&lt;P&gt; match protocol tcp&lt;/P&gt;&lt;P&gt; match protocol udp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-all xxx&lt;/P&gt;&lt;P&gt; match access-group name xxx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-all xxx&lt;/P&gt;&lt;P&gt; match access-group xxx&lt;/P&gt;&lt;P&gt;class-map type inspect match-any out-self&lt;/P&gt;&lt;P&gt; match access-group xxx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any self-out&lt;/P&gt;&lt;P&gt; match protocol icmp&lt;/P&gt;&lt;P&gt; match protocol tcp&lt;/P&gt;&lt;P&gt; match protocol udp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect in-out&lt;/P&gt;&lt;P&gt; class type inspect xxx&lt;/P&gt;&lt;P&gt;  pass&lt;/P&gt;&lt;P&gt; class type inspect inspect-traffic&lt;/P&gt;&lt;P&gt;  inspect&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;policy-map type inspect xxx&lt;/P&gt;&lt;P&gt; class type inspect xxx&lt;/P&gt;&lt;P&gt;  pass&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;  drop&lt;/P&gt;&lt;P&gt;policy-map type inspect self-out&lt;/P&gt;&lt;P&gt; class type inspect self-out&lt;/P&gt;&lt;P&gt;  inspect&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;  pass&lt;/P&gt;&lt;P&gt;policy-map type inspect out-self&lt;/P&gt;&lt;P&gt; class type inspect xxx&lt;/P&gt;&lt;P&gt;  pass&lt;/P&gt;&lt;P&gt; class type inspect out-self&lt;/P&gt;&lt;P&gt;  inspect&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone security out-zone&lt;/P&gt;&lt;P&gt;zone security in-zone&lt;/P&gt;&lt;P&gt;zone-pair security self-out source self destination out-zone&lt;/P&gt;&lt;P&gt; service-policy type inspect self-out&lt;/P&gt;&lt;P&gt;zone-pair security out-self source out-zone destination self&lt;/P&gt;&lt;P&gt; service-policy type inspect out-self&lt;/P&gt;&lt;P&gt;zone-pair security in-out source in-zone destination out-zone&lt;/P&gt;&lt;P&gt; service-policy type inspect in-out&lt;/P&gt;&lt;P&gt;zone-pair security vpn-inside source out-zone destination in-zone&lt;/P&gt;&lt;P&gt; service-policy type inspect vpn-inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 13:57:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tried-to-activate-firewall-in-isr-but-blockes-allowed-services/m-p/1087446#M895031</guid>
      <dc:creator>roxasmc</dc:creator>
      <dc:date>2019-03-11T13:57:58Z</dc:date>
    </item>
    <item>
      <title>Re: Tried to activate Firewall in ISR but blockes allowed servic</title>
      <link>https://community.cisco.com/t5/network-security/tried-to-activate-firewall-in-isr-but-blockes-allowed-services/m-p/1087447#M895032</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Configure an Access-list to open the port 3389 and apply the access-list on the interface where you have configured the zone based firewall which will prevent the port from being blocked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Oct 2008 15:08:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tried-to-activate-firewall-in-isr-but-blockes-allowed-services/m-p/1087447#M895032</guid>
      <dc:creator>smahbub</dc:creator>
      <dc:date>2008-10-21T15:08:58Z</dc:date>
    </item>
  </channel>
</rss>

