<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic POLICY BASED ROUTING Q? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/policy-based-routing-q/m-p/1788186#M922351</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; In the Policy based Routing , i would like to know , what packets are denied by the access list " Deny ip any any " statement ? ; pls help me&amp;nbsp; and when i implement this the access list is blocking some lan to lan packets why ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended SECONDARY_TRAFFIC&lt;BR /&gt; permit tcp any host 172.255.55.89 eq 3333&lt;BR /&gt; permit udp any host 172.255.55.89 eq 3333&lt;BR /&gt; deny&amp;nbsp;&amp;nbsp; ip any any log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route-map LINK_2 permit 10&lt;BR /&gt; match ip address SECONDARY_TRAFFIC&lt;BR /&gt; set interface Tunnel901&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt; description&amp;nbsp; LAN INTERFACE&lt;BR /&gt; ip address 172.7.1.10 255.255.255.0&lt;BR /&gt; ip policy route-map LINK_2&lt;BR /&gt; duplex auto&lt;BR /&gt; speed auto&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 12 Sep 2011 12:50:32 GMT</pubDate>
    <dc:creator>dpugalendi.d</dc:creator>
    <dc:date>2011-09-12T12:50:32Z</dc:date>
    <item>
      <title>POLICY BASED ROUTING Q?</title>
      <link>https://community.cisco.com/t5/network-security/policy-based-routing-q/m-p/1788185#M922350</link>
      <description>&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;TABLE border="0" cellpadding="0" cellspacing="0" style="WIDTH: 474px; BORDER-COLLAPSE: collapse"&gt;&lt;TBODY&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;lt;TR style="HEIGHT: 15.6pt" &lt;U&gt;mce&lt;/U&gt;style="height: 15.6pt;"&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;TD style="PADDING-BOTTOM: 0cm; PADDING-LEFT: 5.4pt; WIDTH: 284.1pt; PADDING-RIGHT: 5.4pt; HEIGHT: 15.6pt; PADDING-TOP: 0cm" vAlign=bottom width=474 noWrap &lt;U&gt;mce&lt;/U&gt;style="padding-bottom: 0cm; padding-left: 5.4pt; width: 284.1pt; padding-right: 5.4pt; height: 15.6pt; padding-top: 0cm;"&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip access-list extended SECONDARY_TRAFFIC&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;lt;TR style="HEIGHT: 15.6pt" &lt;U&gt;mce&lt;/U&gt;style="height: 15.6pt;"&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;TD style="PADDING-BOTTOM: 0cm; PADDING-LEFT: 5.4pt; WIDTH: 284.1pt; PADDING-RIGHT: 5.4pt; HEIGHT: 15.6pt; PADDING-TOP: 0cm" vAlign=bottom width=474 noWrap &lt;U&gt;mce&lt;/U&gt;style="padding-bottom: 0cm; padding-left: 5.4pt; width: 284.1pt; padding-right: 5.4pt; height: 15.6pt; padding-top: 0cm;"&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;permit tcp any host 172.255.5.89 eq 3128&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;lt;TR style="HEIGHT: 15.6pt" &lt;U&gt;mce&lt;/U&gt;style="height: 15.6pt;"&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;TD style="PADDING-BOTTOM: 0cm; PADDING-LEFT: 5.4pt; WIDTH: 284.1pt; PADDING-RIGHT: 5.4pt; HEIGHT: 15.6pt; PADDING-TOP: 0cm" vAlign=bottom width=474 noWrap &lt;U&gt;mce&lt;/U&gt;style="padding-bottom: 0cm; padding-left: 5.4pt; width: 284.1pt; padding-right: 5.4pt; height: 15.6pt; padding-top: 0cm;"&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;permit udp any host 172.255.5.89 eq 3128&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;lt;TR style="HEIGHT: 14.4pt" &lt;U&gt;mce&lt;/U&gt;style="height: 14.4pt;"&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;TD style="PADDING-BOTTOM: 0cm; PADDING-LEFT: 5.4pt; WIDTH: 284.1pt; PADDING-RIGHT: 5.4pt; HEIGHT: 14.4pt; PADDING-TOP: 0cm" vAlign=bottom width=474 noWrap &lt;U&gt;mce&lt;/U&gt;style="padding-bottom: 0cm; padding-left: 5.4pt; width: 284.1pt; padding-right: 5.4pt; height: 14.4pt; padding-top: 0cm;"&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip any any log&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;lt;TR style="HEIGHT: 14.4pt" &lt;U&gt;mce&lt;/U&gt;style="height: 14.4pt;"&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;TD style="PADDING-BOTTOM: 0cm; PADDING-LEFT: 5.4pt; WIDTH: 284.1pt; PADDING-RIGHT: 5.4pt; HEIGHT: 14.4pt; PADDING-TOP: 0cm" vAlign=bottom width=474 noWrap &lt;U&gt;mce&lt;/U&gt;style="padding-bottom: 0cm; padding-left: 5.4pt; width: 284.1pt; padding-right: 5.4pt; height: 14.4pt; padding-top: 0cm;"&amp;gt;&amp;lt;/TD&amp;gt;&amp;lt;/TR&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;TR style="HEIGHT: 16.45pt" &lt;U&gt;mce&lt;/U&gt;style="height: 16.45pt;"&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;TD style="PADDING-BOTTOM: 0cm; PADDING-LEFT: 5.4pt; WIDTH: 284.1pt; PADDING-RIGHT: 5.4pt; HEIGHT: 16.45pt; PADDING-TOP: 0cm" vAlign=bottom width=474 noWrap &lt;U&gt;mce&lt;/U&gt;style="padding-bottom: 0cm; padding-left: 5.4pt; width: 284.1pt; padding-right: 5.4pt; height: 16.45pt; padding-top: 0cm;"&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route-map LINK_2 permit 10&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;lt;TR style="HEIGHT: 21pt" &lt;U&gt;mce&lt;/U&gt;style="height: 21pt;"&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;TD style="PADDING-BOTTOM: 0cm; PADDING-LEFT: 5.4pt; WIDTH: 284.1pt; PADDING-RIGHT: 5.4pt; HEIGHT: 21pt; PADDING-TOP: 0cm" vAlign=bottom width=474 noWrap &lt;U&gt;mce&lt;/U&gt;style="padding-bottom: 0cm; padding-left: 5.4pt; width: 284.1pt; padding-right: 5.4pt; height: 21pt; padding-top: 0cm;"&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;match ip address SECONDARY_TRAFFIC&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;lt;TR style="HEIGHT: 15.6pt" &lt;U&gt;mce&lt;/U&gt;style="height: 15.6pt;"&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;TD style="PADDING-BOTTOM: 0cm; PADDING-LEFT: 5.4pt; WIDTH: 284.1pt; PADDING-RIGHT: 5.4pt; HEIGHT: 15.6pt; PADDING-TOP: 0cm" vAlign=bottom width=474 noWrap &lt;U&gt;mce&lt;/U&gt;style="padding-bottom: 0cm; padding-left: 5.4pt; width: 284.1pt; padding-right: 5.4pt; height: 15.6pt; padding-top: 0cm;"&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;set interface Tunnel901&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;lt;TR style="HEIGHT: 16.2pt" &lt;U&gt;mce&lt;/U&gt;style="height: 16.2pt;"&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;TD style="PADDING-BOTTOM: 0cm; PADDING-LEFT: 5.4pt; WIDTH: 284.1pt; PADDING-RIGHT: 5.4pt; HEIGHT: 16.2pt; PADDING-TOP: 0cm" vAlign=bottom width=474 noWrap &lt;U&gt;mce&lt;/U&gt;style="padding-bottom: 0cm; padding-left: 5.4pt; width: 284.1pt; padding-right: 5.4pt; height: 16.2pt; padding-top: 0cm;"&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;lt;TR style="HEIGHT: 16.2pt" &lt;U&gt;mce&lt;/U&gt;style="height: 16.2pt;"&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;TD style="PADDING-BOTTOM: 0cm; PADDING-LEFT: 5.4pt; WIDTH: 284.1pt; PADDING-RIGHT: 5.4pt; HEIGHT: 16.2pt; PADDING-TOP: 0cm" vAlign=bottom width=474 noWrap &lt;U&gt;mce&lt;/U&gt;style="padding-bottom: 0cm; padding-left: 5.4pt; width: 284.1pt; padding-right: 5.4pt; height: 16.2pt; padding-top: 0cm;"&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;lt;TR style="HEIGHT: 16.2pt" &lt;U&gt;mce&lt;/U&gt;style="height: 16.2pt;"&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;TD style="PADDING-BOTTOM: 0cm; PADDING-LEFT: 5.4pt; WIDTH: 284.1pt; PADDING-RIGHT: 5.4pt; HEIGHT: 16.2pt; PADDING-TOP: 0cm" vAlign=bottom width=474 noWrap &lt;U&gt;mce&lt;/U&gt;style="padding-bottom: 0cm; padding-left: 5.4pt; width: 284.1pt; padding-right: 5.4pt; height: 16.2pt; padding-top: 0cm;"&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;description&amp;nbsp;&amp;nbsp; LAN INTERFACE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;lt;TR style="HEIGHT: 14.4pt" &lt;U&gt;mce&lt;/U&gt;style="height: 14.4pt;"&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;TD style="PADDING-BOTTOM: 0cm; PADDING-LEFT: 5.4pt; WIDTH: 284.1pt; PADDING-RIGHT: 5.4pt; HEIGHT: 14.4pt; PADDING-TOP: 0cm" vAlign=bottom width=474 noWrap &lt;U&gt;mce&lt;/U&gt;style="padding-bottom: 0cm; padding-left: 5.4pt; width: 284.1pt; padding-right: 5.4pt; height: 14.4pt; padding-top: 0cm;"&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip address 172.17.77.10 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;lt;TR style="HEIGHT: 16.2pt" &lt;U&gt;mce&lt;/U&gt;style="height: 16.2pt;"&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;TD style="PADDING-BOTTOM: 0cm; PADDING-LEFT: 5.4pt; WIDTH: 284.1pt; PADDING-RIGHT: 5.4pt; HEIGHT: 16.2pt; PADDING-TOP: 0cm" vAlign=bottom width=474 noWrap &lt;U&gt;mce&lt;/U&gt;style="padding-bottom: 0cm; padding-left: 5.4pt; width: 284.1pt; padding-right: 5.4pt; height: 16.2pt; padding-top: 0cm;"&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;ip policy route-map LINK_2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;lt;TR style="HEIGHT: 16.2pt" &lt;U&gt;mce&lt;/U&gt;style="height: 16.2pt;"&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;TD style="PADDING-BOTTOM: 0cm; PADDING-LEFT: 5.4pt; WIDTH: 284.1pt; PADDING-RIGHT: 5.4pt; HEIGHT: 16.2pt; PADDING-TOP: 0cm" vAlign=bottom width=474 noWrap &lt;U&gt;mce&lt;/U&gt;style="padding-bottom: 0cm; padding-left: 5.4pt; width: 284.1pt; padding-right: 5.4pt; height: 16.2pt; padding-top: 0cm;"&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;duplex auto&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;lt;TR style="HEIGHT: 14.4pt" &lt;U&gt;mce&lt;/U&gt;style="height: 14.4pt;"&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;TD style="PADDING-BOTTOM: 0cm; PADDING-LEFT: 5.4pt; WIDTH: 284.1pt; PADDING-RIGHT: 5.4pt; HEIGHT: 14.4pt; PADDING-TOP: 0cm" vAlign=bottom width=474 noWrap &lt;U&gt;mce&lt;/U&gt;style="padding-bottom: 0cm; padding-left: 5.4pt; width: 284.1pt; padding-right: 5.4pt; height: 14.4pt; padding-top: 0cm;"&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;speed auto&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;lt;BR &lt;U&gt;moz&lt;/U&gt;dirty type="_moz"&amp;gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the Policy based Routing , i would like to know , what packets are denied by the access list " Deny ip any any " statement ? ; pls help me&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 12:27:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-based-routing-q/m-p/1788185#M922350</guid>
      <dc:creator>dpugalendi.d</dc:creator>
      <dc:date>2020-02-21T12:27:20Z</dc:date>
    </item>
    <item>
      <title>POLICY BASED ROUTING Q?</title>
      <link>https://community.cisco.com/t5/network-security/policy-based-routing-q/m-p/1788186#M922351</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; In the Policy based Routing , i would like to know , what packets are denied by the access list " Deny ip any any " statement ? ; pls help me&amp;nbsp; and when i implement this the access list is blocking some lan to lan packets why ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended SECONDARY_TRAFFIC&lt;BR /&gt; permit tcp any host 172.255.55.89 eq 3333&lt;BR /&gt; permit udp any host 172.255.55.89 eq 3333&lt;BR /&gt; deny&amp;nbsp;&amp;nbsp; ip any any log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route-map LINK_2 permit 10&lt;BR /&gt; match ip address SECONDARY_TRAFFIC&lt;BR /&gt; set interface Tunnel901&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt; description&amp;nbsp; LAN INTERFACE&lt;BR /&gt; ip address 172.7.1.10 255.255.255.0&lt;BR /&gt; ip policy route-map LINK_2&lt;BR /&gt; duplex auto&lt;BR /&gt; speed auto&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Sep 2011 12:50:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-based-routing-q/m-p/1788186#M922351</guid>
      <dc:creator>dpugalendi.d</dc:creator>
      <dc:date>2011-09-12T12:50:32Z</dc:date>
    </item>
    <item>
      <title>POLICY BASED ROUTING Q?</title>
      <link>https://community.cisco.com/t5/network-security/policy-based-routing-q/m-p/1788187#M922352</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; The access list is pretty straight forward. It permits traffic to host 172.255.55.89 for port 3333 (both TCP and UDP) and it denies all other traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Perhaps that sounds alarming - that only traffic that is port 3333 to host 172.255.55.89 is permitted and all other is denied. But bear in mind that the access list is not filtering traffic on the interface (as we tend to expect of access lists). In this case the access list is selecting traffic for Policy Based Routing. So it is saying that only port 3333 to host 172.255.55.89 will be subject to PBR. All other traffic should be forwarded normally.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not clear why implementing this access list is blocking some lan to lan traffic. Perhaps you can supply some additional information that would help us to identify the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Sep 2011 18:03:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-based-routing-q/m-p/1788187#M922352</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2011-09-13T18:03:22Z</dc:date>
    </item>
  </channel>
</rss>

