<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ZBF - First attempt - No traffic flowing in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/zbf-first-attempt-no-traffic-flowing/m-p/3731934#M9302</link>
    <description>I'll get there...&lt;BR /&gt;Literally all I need to do is block any traffic from the internet which I thought I'd done but due to the SELF zone I was able to access all sorts of nastiness from the internet within my router.&lt;BR /&gt;&lt;BR /&gt;As far as management goes I just need ssh into the router from the client VLAN internally.&lt;BR /&gt;&lt;BR /&gt;When I created zone pair between SELF and INTERNET with a deny rule everything stopped between outside and inside too which is what confused me.  I don't really want somebody to do it for me as that's not really how I learn.  Just trying to understand why a deny ANY ANY IP between Internet and Self would cause Internet and Inside to fail.&lt;BR /&gt;&lt;BR /&gt;I'll re-write the config and post.  Maybe something glaringly obvious will jump out?</description>
    <pubDate>Wed, 24 Oct 2018 18:08:55 GMT</pubDate>
    <dc:creator>rhbmcse</dc:creator>
    <dc:date>2018-10-24T18:08:55Z</dc:date>
    <item>
      <title>ZBF - First attempt - No traffic flowing</title>
      <link>https://community.cisco.com/t5/network-security/zbf-first-attempt-no-traffic-flowing/m-p/3730617#M9292</link>
      <description>&lt;P&gt;Hi folks.&amp;nbsp; My first attempt at configuring a ZBF on a 1117-4p ISR (I'm ccent studying for CCNA).&lt;/P&gt;
&lt;P&gt;Prior to the ZBF commands being added to the running-config I was getting internet access (albeit with no security).&amp;nbsp; Following this I get nothing - I can't PING, no web access, no DNS lookups which are the 3 types of traffic I'm initially allowing.&lt;/P&gt;
&lt;P&gt;Not a massively complicated setup.&amp;nbsp; I have no training on this but as I understand it, being stateful rules then return rules should not be required (should they) ?&lt;/P&gt;
&lt;P&gt;In any case if anybody would be kind enough to look through my config and explain where I'm going wrong it would be massiv ely appreciated.&lt;/P&gt;
&lt;P&gt;Script below.&amp;nbsp; Cheers.&amp;nbsp; Rob.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;C1117ISR#sh run&lt;BR /&gt;Building configuration...&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Current configuration : 5615 bytes&lt;BR /&gt;!&lt;BR /&gt;! Last configuration change at 09:15:14 GMT Tue Oct 23 2018 by rhbmcse&lt;BR /&gt;!&lt;BR /&gt;version 16.6&lt;BR /&gt;service timestamps debug datetime msec&lt;BR /&gt;service timestamps log datetime msec&lt;BR /&gt;service password-encryption&lt;BR /&gt;platform qfp utilization monitor load 80&lt;BR /&gt;no platform punt-keepalive disable-kernel-core&lt;BR /&gt;!&lt;BR /&gt;hostname C1117ISR&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;enable secret 9 $9$jUR3aCOMA9OFgU$o3a79MhakpqV2vfDatrcHCxftZzba///XoF5BMiuU6Q&lt;BR /&gt;!&lt;BR /&gt;no aaa new-model&lt;BR /&gt;clock timezone GMT -1 0&lt;BR /&gt;!&lt;BR /&gt;ip name-server 8.8.8.8 8.8.4.4&lt;BR /&gt;ip domain name 21RTM.local&lt;BR /&gt;ip dhcp excluded-address 192.168.0.1 192.168.0.19&lt;BR /&gt;ip dhcp excluded-address 192.168.0.51 192.168.0.254&lt;BR /&gt;ip dhcp excluded-address 10.0.0.1&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool CLIENTS&lt;BR /&gt; network 192.168.0.0 255.255.255.0&lt;BR /&gt; default-router 192.168.0.1&lt;BR /&gt; dns-server 192.168.0.1&lt;BR /&gt; domain-name 21RTM.local&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool MANAGEMENT&lt;BR /&gt; network 10.0.0.0 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;subscriber templating&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;multilink bundle-name authenticated&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;BR /&gt;crypto pki trustpoint TP-self-signed-3510874038&lt;BR /&gt; enrollment selfsigned&lt;BR /&gt; subject-name cn=IOS-Self-Signed-Certificate-3510874038&lt;BR /&gt; revocation-check none&lt;BR /&gt; rsakeypair TP-self-signed-3510874038&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto pki certificate chain TP-self-signed-3510874038&lt;BR /&gt; certificate self-signed 01&lt;/P&gt;
&lt;P&gt;quit&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;license udi pid C1117-4P sn FGL2205927C&lt;BR /&gt;license boot level securityk9&lt;BR /&gt;!&lt;BR /&gt;diagnostic bootup level minimal&lt;BR /&gt;spanning-tree extend system-id&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;username xxxxxxx privilege 15 password 7 xxxxxxx&lt;BR /&gt;!&lt;BR /&gt;redundancy&lt;BR /&gt; mode none&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;controller VDSL 0/2/0&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;vlan internal allocation policy ascending&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;class-map type inspect match-any ALLOWED-PROTOCOLS&lt;BR /&gt; match protocol icmp&lt;BR /&gt; match protocol dns&lt;BR /&gt; match protocol http&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect INSIDE-TO-OUTSIDE-POLICY&lt;BR /&gt; class type inspect ALLOWED-PROTOCOLS&lt;BR /&gt; inspect&lt;BR /&gt;!&lt;BR /&gt;zone security INTERNET&lt;BR /&gt;zone security INSIDE&lt;BR /&gt;zone-pair security ZP-INSIDE-TO-OUTSIDE source INSIDE destination INTERNET&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0/0&lt;BR /&gt; no ip address&lt;BR /&gt; shutdown&lt;BR /&gt; no negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1/0&lt;BR /&gt; description CLIENT LAN&lt;BR /&gt; switchport access vlan 10&lt;BR /&gt; switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1/1&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1/2&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1/3&lt;BR /&gt; description MANAGEMENT INTERFACE&lt;BR /&gt; switchport access vlan 100&lt;BR /&gt; switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface ATM0/2/0&lt;BR /&gt; no ip address&lt;BR /&gt; shutdown&lt;BR /&gt; no atm ilmi-keepalive&lt;BR /&gt; no atm enable-ilmi-trap&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2/0&lt;BR /&gt; mac-address xxxxxxxxx&lt;BR /&gt; no ip address&lt;BR /&gt; no negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2/0.101&lt;BR /&gt; description SUBINT TO INTERNET&lt;BR /&gt; encapsulation dot1Q 101&lt;BR /&gt; ip dhcp client request classless-static-route&lt;BR /&gt; ip dhcp client client-id hex xxxxxxxx&lt;BR /&gt; ip dhcp client hostname xxxxxxxx@skydsl|xxxxxxxx&lt;BR /&gt; ip address dhcp&lt;BR /&gt; no ip redirects&lt;BR /&gt; no ip proxy-arp&lt;BR /&gt; ip nat outside&lt;BR /&gt; zone-member security INTERNET&lt;BR /&gt; ip virtual-reassembly&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Vlan10&lt;BR /&gt; ip address 192.168.0.1 255.255.252.0&lt;BR /&gt; ip nat inside&lt;BR /&gt; zone-member security INSIDE&lt;BR /&gt;!&lt;BR /&gt;interface Vlan100&lt;BR /&gt; ip address 10.0.0.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ip nat inside source route-map OUTSIDE-POOL interface Ethernet0/2/0.101 overload&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;no ip http server&lt;BR /&gt;ip http authentication local&lt;BR /&gt;no ip http secure-server&lt;BR /&gt;ip dns server&lt;BR /&gt;ip ssh version 2&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended NAT-TO-OUTSIDE&lt;BR /&gt; permit ip 192.168.0.0 0.0.3.255 any&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;route-map OUTSIDE-POOL permit 10&lt;BR /&gt; match ip address NAT-TO-OUTSIDE&lt;BR /&gt; match interface Ethernet0/2/0.101&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;control-plane&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt; password 7 075912435E010C164E&lt;BR /&gt; login&lt;BR /&gt; transport input all&lt;BR /&gt; stopbits 1&lt;BR /&gt;line vty 0 4&lt;BR /&gt; login local&lt;BR /&gt; transport input ssh&lt;BR /&gt;!&lt;BR /&gt;wsma agent exec&lt;BR /&gt;!&lt;BR /&gt;wsma agent config&lt;BR /&gt;!&lt;BR /&gt;wsma agent filesys&lt;BR /&gt;!&lt;BR /&gt;wsma agent notify&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;end&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:23:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-first-attempt-no-traffic-flowing/m-p/3730617#M9292</guid>
      <dc:creator>rhbmcse</dc:creator>
      <dc:date>2020-02-21T16:23:08Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF - First attempt - No traffic flowing</title>
      <link>https://community.cisco.com/t5/network-security/zbf-first-attempt-no-traffic-flowing/m-p/3730648#M9294</link>
      <description>Seems I missed out the following line!&lt;BR /&gt;&lt;BR /&gt;service-policy type inspect INSIDE-TO-OUTSIDE-POLICY&lt;BR /&gt;&lt;BR /&gt;So - all appears to be working now as expected with one exception...When I perform an online port scan against my externally DHCP allocated IP, I have SSH showing as open on that interface.  Rather dangerous!  I expected the interface would be secured with the config I have listed.&lt;BR /&gt;Do I need to create a totally separate set of rules to secure the WAN interface from all incoming traffic ?&lt;BR /&gt;&lt;BR /&gt;Many thanks.&lt;BR /&gt;&lt;BR /&gt;Rob.</description>
      <pubDate>Tue, 23 Oct 2018 12:06:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-first-attempt-no-traffic-flowing/m-p/3730648#M9294</guid>
      <dc:creator>rhbmcse</dc:creator>
      <dc:date>2018-10-23T12:06:19Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF - First attempt - No traffic flowing</title>
      <link>https://community.cisco.com/t5/network-security/zbf-first-attempt-no-traffic-flowing/m-p/3730731#M9296</link>
      <description>Hi Rob,&lt;BR /&gt;&lt;BR /&gt;You would need to secure the "self" zone. The Self zone is the only exception to the default “deny all” policy, all traffic to any router interface is allowed until explicitly denied.&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;Rob</description>
      <pubDate>Tue, 23 Oct 2018 13:20:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-first-attempt-no-traffic-flowing/m-p/3730731#M9296</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-10-23T13:20:57Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF - First attempt - No traffic flowing</title>
      <link>https://community.cisco.com/t5/network-security/zbf-first-attempt-no-traffic-flowing/m-p/3730770#M9297</link>
      <description>Also a best practice to put an access-class on your vty lines&lt;BR /&gt;&lt;BR /&gt;line vty 0 4&lt;BR /&gt;access-class &lt;ACCESS-LIST&gt; in&lt;BR /&gt;&lt;/ACCESS-LIST&gt;</description>
      <pubDate>Tue, 23 Oct 2018 13:53:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-first-attempt-no-traffic-flowing/m-p/3730770#M9297</guid>
      <dc:creator>gbekmezi-DD</dc:creator>
      <dc:date>2018-10-23T13:53:25Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF - First attempt - No traffic flowing</title>
      <link>https://community.cisco.com/t5/network-security/zbf-first-attempt-no-traffic-flowing/m-p/3731894#M9298</link>
      <description>&lt;P&gt;Hi Rob - thanks for that - it pointed me off to research the SELF zone - of which I was not aware.&lt;/P&gt;
&lt;P&gt;I tried subsequently creating an IP ANY ANY deny ACL and applied it between the self and Internet zones as this is what I needed to achieve but I got no Packets going out of the router at all then weirdly.&amp;nbsp; Everything was blocked.&amp;nbsp; From what I've read you have to use the self zone - no getting around it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Given my existing config would I be correct in assuming that one must configure rules to allow ALL traffic TO and FROM the self zone.&amp;nbsp; Which takes care of INSIDE.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then configure a further rule from SELF to INTERNET matching the protocols I choose to allow.&amp;nbsp; This would then presumably place an implicit DENY rule on any inbound traffic from the Internet ? i.e. no match from the stateful inspection therefore DROP?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Finally - what about my existing Zones (inside-to-outside) - are these then deletable because the SELF rules have replaced them?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The way I see it (or imagine it) Simply:&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/P&gt;
&lt;P&gt;CLIENTS-----&amp;gt;INSIDE LAN I/F-----&amp;gt;SELF ZONE-----&amp;gt;OUTSIDE WAN I/F-----&amp;gt;Internet&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;(Allow all Traffic) -----&amp;gt;&lt;SPAN&gt;SELF ZONE-----&amp;gt;&lt;/SPAN&gt;(Allow Filtered Traffic OUT)-----&amp;gt;Internet&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; SELF ZONE&amp;lt;--/-x (Block all Filtered traffic IN)&amp;lt;-----Internet&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Which replaces my existing config of INSIDE/OUTSIDE - it effectively puts another zone smack bang in the middle of my existing config.&amp;nbsp; Correct ?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Many thanks for your help.&amp;nbsp; Invaluable for those of us learning new Cisco technologies.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Oct 2018 17:20:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-first-attempt-no-traffic-flowing/m-p/3731894#M9298</guid>
      <dc:creator>rhbmcse</dc:creator>
      <dc:date>2018-10-24T17:20:04Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF - First attempt - No traffic flowing</title>
      <link>https://community.cisco.com/t5/network-security/zbf-first-attempt-no-traffic-flowing/m-p/3731911#M9299</link>
      <description>Hi Rob,&lt;BR /&gt;The self zone is used for traffic TO/FROM the router itself (any interface on the router itself), not traffic going through the router. So you'd need zone pairs for to-self-zone and from-self-zone to permit/deny access to/from the router. You'd also need zone pairs from outside-to-inside and inside-to-outside and any other zone for traffic going through the router. Hope that makes sense?&lt;BR /&gt;&lt;BR /&gt;Upload your configuration if you need further assistance.&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;Rob</description>
      <pubDate>Wed, 24 Oct 2018 17:42:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-first-attempt-no-traffic-flowing/m-p/3731911#M9299</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-10-24T17:42:29Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF - First attempt - No traffic flowing</title>
      <link>https://community.cisco.com/t5/network-security/zbf-first-attempt-no-traffic-flowing/m-p/3731934#M9302</link>
      <description>I'll get there...&lt;BR /&gt;Literally all I need to do is block any traffic from the internet which I thought I'd done but due to the SELF zone I was able to access all sorts of nastiness from the internet within my router.&lt;BR /&gt;&lt;BR /&gt;As far as management goes I just need ssh into the router from the client VLAN internally.&lt;BR /&gt;&lt;BR /&gt;When I created zone pair between SELF and INTERNET with a deny rule everything stopped between outside and inside too which is what confused me.  I don't really want somebody to do it for me as that's not really how I learn.  Just trying to understand why a deny ANY ANY IP between Internet and Self would cause Internet and Inside to fail.&lt;BR /&gt;&lt;BR /&gt;I'll re-write the config and post.  Maybe something glaringly obvious will jump out?</description>
      <pubDate>Wed, 24 Oct 2018 18:08:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-first-attempt-no-traffic-flowing/m-p/3731934#M9302</guid>
      <dc:creator>rhbmcse</dc:creator>
      <dc:date>2018-10-24T18:08:55Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF - First attempt - No traffic flowing</title>
      <link>https://community.cisco.com/t5/network-security/zbf-first-attempt-no-traffic-flowing/m-p/3732029#M9305</link>
      <description>OK - I need further assistance!&lt;BR /&gt;As soon as I apply the ZBF Self config to the outside/self interface I lose all connectivity with the exception of the ssh connection which Im on to configure the router (all internet traffic dies it would seem).&lt;BR /&gt;I'd love to understand where I'm going wrong so here in all its glory is the current config (unfinished).&lt;BR /&gt;Thank you so much for your assistance.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;C1117ISR#sh run&lt;BR /&gt;Building configuration...&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Current configuration : 6626 bytes&lt;BR /&gt;!&lt;BR /&gt;! Last configuration change at 18:23:01 GMT Wed Oct 24 2018 by rhbmcse&lt;BR /&gt;!&lt;BR /&gt;version 16.6&lt;BR /&gt;service timestamps debug datetime msec&lt;BR /&gt;service timestamps log datetime msec&lt;BR /&gt;service password-encryption&lt;BR /&gt;platform qfp utilization monitor load 80&lt;BR /&gt;no platform punt-keepalive disable-kernel-core&lt;BR /&gt;!&lt;BR /&gt;hostname C1117ISR&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;enable secret 9 $9$jURxxxxxzba///XoF5BMiuU6Q&lt;BR /&gt;!&lt;BR /&gt;no aaa new-model&lt;BR /&gt;clock timezone GMT -1 0&lt;BR /&gt;!&lt;BR /&gt;ip name-server 8.8.8.8 8.8.4.4&lt;BR /&gt;no ip domain lookup&lt;BR /&gt;ip domain name 21RTM.local&lt;BR /&gt;ip dhcp excluded-address 192.168.0.1 192.168.0.19&lt;BR /&gt;ip dhcp excluded-address 192.168.0.51 192.168.0.254&lt;BR /&gt;ip dhcp excluded-address 10.0.0.1&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool CLIENTS&lt;BR /&gt; network 192.168.0.0 255.255.255.0&lt;BR /&gt; default-router 192.168.0.1&lt;BR /&gt; dns-server 192.168.0.1&lt;BR /&gt; domain-name 21RTM.local&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool MANAGEMENT&lt;BR /&gt; network 10.0.0.0 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;subscriber templating&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;multilink bundle-name authenticated&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto pki trustpoint TP-self-signed-3510874038&lt;BR /&gt; enrollment selfsigned&lt;BR /&gt; subject-name cn=IOS-Self-Signed-Certificate-3510874038&lt;BR /&gt; revocation-check none&lt;BR /&gt; rsakeypair TP-self-signed-3510874038&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto pki certificate chain TP-self-signed-3510874038&lt;BR /&gt; certificate self-signed 01&lt;BR /&gt;  30820330 30820218 A0030201 02020101 300D0609 2A864886 F70D0101 05050030&lt;BR /&gt;&lt;BR /&gt;        quit&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;license udi pid C1117-4P sn FGx&lt;BR /&gt;license boot level securityk9&lt;BR /&gt;!&lt;BR /&gt;diagnostic bootup level minimal&lt;BR /&gt;spanning-tree extend system-id&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;username x privilege 15 password 7 0xxB5D550A7A75&lt;BR /&gt;!&lt;BR /&gt;redundancy&lt;BR /&gt; mode none&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;controller VDSL 0/2/0&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;vlan internal allocation policy ascending&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;class-map type inspect match-any ALLOWED-PROTOCOLS&lt;BR /&gt; match protocol icmp&lt;BR /&gt; match protocol dns&lt;BR /&gt; match protocol http&lt;BR /&gt; match protocol https&lt;BR /&gt;class-map type inspect match-all CMAP-OUTSIDE-SELF&lt;BR /&gt; match access-group name NACL-BLOCK-INTERNET-TRAFFIC&lt;BR /&gt;class-map type inspect match-all INSIDE_SELF&lt;BR /&gt; match access-group name SELF_AND_INSIDE&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect INSIDE_SELF&lt;BR /&gt; class type inspect INSIDE_SELF&lt;BR /&gt;  inspect&lt;BR /&gt; class class-default&lt;BR /&gt;policy-map type inspect SELF_INSIDE&lt;BR /&gt; class type inspect INSIDE_SELF&lt;BR /&gt;  inspect&lt;BR /&gt; class class-default&lt;BR /&gt;policy-map type inspect PM-OUTSIDE-SELF&lt;BR /&gt; class type inspect CMAP-OUTSIDE-SELF&lt;BR /&gt;  drop&lt;BR /&gt; class class-default&lt;BR /&gt;policy-map type inspect INSIDE-TO-OUTSIDE-POLICY&lt;BR /&gt; class type inspect ALLOWED-PROTOCOLS&lt;BR /&gt;  inspect&lt;BR /&gt; class class-default&lt;BR /&gt;!&lt;BR /&gt;zone security INTERNET&lt;BR /&gt;zone security INSIDE&lt;BR /&gt;zone-pair security Inside_to_Self source INSIDE destination self&lt;BR /&gt; service-policy type inspect INSIDE_SELF&lt;BR /&gt;zone-pair security Self-to-Inside source self destination INSIDE&lt;BR /&gt; service-policy type inspect SELF_INSIDE&lt;BR /&gt;zone-pair security ZP-INSIDE-TO-OUTSIDE source INSIDE destination INTERNET&lt;BR /&gt; service-policy type inspect INSIDE-TO-OUTSIDE-POLICY&lt;BR /&gt;zone-pair security ZP-INTERNET-TO-SELF source INTERNET destination self&lt;BR /&gt; service-policy type inspect PM-OUTSIDE-SELF&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0/0&lt;BR /&gt; no ip address&lt;BR /&gt; shutdown&lt;BR /&gt; no negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1/0&lt;BR /&gt; description CLIENT LAN&lt;BR /&gt; switchport access vlan 10&lt;BR /&gt; switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1/1&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1/2&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1/3&lt;BR /&gt; description MANAGEMENT INTERFACE&lt;BR /&gt; switchport access vlan 100&lt;BR /&gt; switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface ATM0/2/0&lt;BR /&gt; no ip address&lt;BR /&gt; shutdown&lt;BR /&gt; no atm ilmi-keepalive&lt;BR /&gt; no atm enable-ilmi-trap&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2/0&lt;BR /&gt; mac-address c03e.0f9c.268e&lt;BR /&gt; no ip address&lt;BR /&gt; no negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2/0.101&lt;BR /&gt; description SUBINT TO INTERNET&lt;BR /&gt; encapsulation dot1Q 101&lt;BR /&gt; ip dhcp client request classless-static-route&lt;BR /&gt; ip dhcp client client-id hex 6330336530663963323638&lt;BR /&gt; ip dhcp client hostname cx@skydsl|addx&lt;BR /&gt; ip address dhcp&lt;BR /&gt; no ip redirects&lt;BR /&gt; no ip proxy-arp&lt;BR /&gt; ip nat outside&lt;BR /&gt; zone-member security INTERNET&lt;BR /&gt; ip virtual-reassembly&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Vlan10&lt;BR /&gt; ip address 192.168.0.1 255.255.252.0&lt;BR /&gt; ip nat inside&lt;BR /&gt; zone-member security INSIDE&lt;BR /&gt;!&lt;BR /&gt;interface Vlan100&lt;BR /&gt; ip address 10.0.0.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ip nat inside source route-map OUTSIDE-POOL interface Ethernet0/2/0.101 overload&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;no ip http server&lt;BR /&gt;ip http authentication local&lt;BR /&gt;no ip http secure-server&lt;BR /&gt;ip dns server&lt;BR /&gt;ip ssh version 2&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended NACL-BLOCK-INTERNET-TRAFFIC&lt;BR /&gt; deny   ip any any&lt;BR /&gt;ip access-list extended NAT-TO-OUTSIDE&lt;BR /&gt; permit ip 192.168.0.0 0.0.3.255 any&lt;BR /&gt;ip access-list extended SELF_AND_INSIDE&lt;BR /&gt; permit ip any any&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;route-map OUTSIDE-POOL permit 10&lt;BR /&gt; match ip address NAT-TO-OUTSIDE&lt;BR /&gt; match interface Ethernet0/2/0.101&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;control-plane&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt; transport input all&lt;BR /&gt; stopbits 1&lt;BR /&gt;line vty 0 4&lt;BR /&gt; login local&lt;BR /&gt;!&lt;BR /&gt;wsma agent exec&lt;BR /&gt;!&lt;BR /&gt;wsma agent config&lt;BR /&gt;!&lt;BR /&gt;wsma agent filesys&lt;BR /&gt;!&lt;BR /&gt;wsma agent notify&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;end&lt;BR /&gt;</description>
      <pubDate>Wed, 24 Oct 2018 20:01:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-first-attempt-no-traffic-flowing/m-p/3732029#M9305</guid>
      <dc:creator>rhbmcse</dc:creator>
      <dc:date>2018-10-24T20:01:00Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF - First attempt - No traffic flowing</title>
      <link>https://community.cisco.com/t5/network-security/zbf-first-attempt-no-traffic-flowing/m-p/3732085#M9308</link>
      <description>Ok, I labbed your configuration, I used your exact ZPFW configuration, I was able to communicate through the router from inside zone to internet zone. The only difference was a static ip address on the outside interface and no sub-interface.&lt;BR /&gt;&lt;BR /&gt;What is the output of "show policy-map type inspect zone-pair ZP-INSIDE-TO-OUTSIDE" - I assume there will be drops. Perhaps add "log" after the drop and observe the output of the logs.&lt;BR /&gt;</description>
      <pubDate>Wed, 24 Oct 2018 21:13:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-first-attempt-no-traffic-flowing/m-p/3732085#M9308</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-10-24T21:13:45Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF - First attempt - No traffic flowing</title>
      <link>https://community.cisco.com/t5/network-security/zbf-first-attempt-no-traffic-flowing/m-p/3732498#M9311</link>
      <description>Hey Rob, and Morning!&lt;BR /&gt;So I tried "show policy-map type inspect zone-pair ZP-INSIDE-TO-OUTSIDE" - NO DROPS&lt;BR /&gt;Following this I added the LOG statement to the end of the policy-map PM-OUTSIDE-SELF and I can see 30-40 packets dropped and these did not increase when I attempted a PING outbound to google's DNS servers&lt;BR /&gt;I also tried changing the associated external NACL from DENY any any to PERMIT any any and still - no traffic.&lt;BR /&gt;Interestingly as soon as the zone-pairing is made between INTERNET and SELF the interface cannot even obtain an IP from the ISP and this is not due it would seem to the Access-list as we have seen - even with PERMIT there is still zero traffic.&lt;BR /&gt;I also attempted adding the main WAN interface (eth 0/2/0) to the INTERNET zone which also did not resolve the issue.  Obviously the WAN connection runs on a sub-int on VLAN .101.  Just a thought but it didn't help.&lt;BR /&gt;All I can deduce so far is that whenever ANY zone pairing is made from INTERNET to SELF, all traffic ceases. INTERNET zone is already used by ZP-INSIDE-TO-OUTSIDE.  We don't need to create additional zones to separate INSIDE-INTERNET (used inside &amp;gt; outside for pass-through traffic) and INTERNET-SELF do we.  Just wondering whether the two zone-pairings are causing issues with one another ?</description>
      <pubDate>Thu, 25 Oct 2018 09:29:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-first-attempt-no-traffic-flowing/m-p/3732498#M9311</guid>
      <dc:creator>rhbmcse</dc:creator>
      <dc:date>2018-10-25T09:29:46Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF - First attempt - No traffic flowing</title>
      <link>https://community.cisco.com/t5/network-security/zbf-first-attempt-no-traffic-flowing/m-p/3732537#M9314</link>
      <description>Hi Rob,&lt;BR /&gt;Ok, create a class map to "pass" all traffic (for now, can amend later), reference in a policy-map and then create a zone pair from self to internet. Let's get dhcp working first and then see what's left.&lt;BR /&gt;&lt;BR /&gt;Rob</description>
      <pubDate>Thu, 25 Oct 2018 09:57:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-first-attempt-no-traffic-flowing/m-p/3732537#M9314</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-10-25T09:57:03Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF - First attempt - No traffic flowing</title>
      <link>https://community.cisco.com/t5/network-security/zbf-first-attempt-no-traffic-flowing/m-p/3732634#M9317</link>
      <description>OK - working on that now.&lt;BR /&gt;So &lt;BR /&gt;create a NACL permit IP any any&lt;BR /&gt;create a CM self-to-intenet referencing the NACL&lt;BR /&gt;create a PM self-to-internet - should this be PASS or INSPECT ?&lt;BR /&gt;&lt;BR /&gt;I'd imagine it would need to be inspect to allow the return traffic to the self zone rather than pass ?&lt;BR /&gt;&lt;BR /&gt;Then create the zone pair...SELF-TO-INTERNET&lt;BR /&gt;&lt;BR /&gt;What about the existing zone pair (currently removed) INTERNET-TO-SELF with the DENY rule ?&lt;BR /&gt;&lt;BR /&gt;Sorry for so many questions!&lt;BR /&gt;</description>
      <pubDate>Thu, 25 Oct 2018 11:10:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-first-attempt-no-traffic-flowing/m-p/3732634#M9317</guid>
      <dc:creator>rhbmcse</dc:creator>
      <dc:date>2018-10-25T11:10:24Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF - First attempt - No traffic flowing</title>
      <link>https://community.cisco.com/t5/network-security/zbf-first-attempt-no-traffic-flowing/m-p/3732637#M9319</link>
      <description>&lt;P&gt;You cannot use "inspect" in self zone rules, only pass....this means the traffic is only permitted in one direction, so you'd need to permit that return traffic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Reference &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/security_management/cisco_security_manager/security_manager/4-1/user/guide/CSMUserGuide_wrapper/fwzbf.html" target="_self"&gt;here&lt;/A&gt;, search for "self" under the important points section for the informed I just provided above.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Thu, 25 Oct 2018 11:17:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-first-attempt-no-traffic-flowing/m-p/3732637#M9319</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-10-25T11:17:35Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF - First attempt - No traffic flowing</title>
      <link>https://community.cisco.com/t5/network-security/zbf-first-attempt-no-traffic-flowing/m-p/3732643#M9322</link>
      <description>&lt;P&gt;OK - that's weird then because in my config I definitely have a PM-SELF-INSIDE (and conversely INSIDE-SELF) with an INSPECT statement rather than PASS and it seems to not throw an error ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do these need changing to PASS also ?&lt;/P&gt;</description>
      <pubDate>Thu, 25 Oct 2018 11:24:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-first-attempt-no-traffic-flowing/m-p/3732643#M9322</guid>
      <dc:creator>rhbmcse</dc:creator>
      <dc:date>2018-10-25T11:24:20Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF - First attempt - No traffic flowing</title>
      <link>https://community.cisco.com/t5/network-security/zbf-first-attempt-no-traffic-flowing/m-p/3732830#M9325</link>
      <description>Righto - an update.&lt;BR /&gt;I have amended the config so that both Self - Internet and Internet - self both share a PASS IP Any any situation which causes it to spring back in to life.&lt;BR /&gt;This still doesn't explain why I'm not able to just block "ip any any" from Internet to Self as by implementing bi-directional "pass" I've just blown the router wide open to the outside world again!&lt;BR /&gt;Latest config below and you will note that the two class-maps now both refer to the PERMIT-ALL NACL&lt;BR /&gt;&lt;BR /&gt;class-map type inspect match-any CMAP-SELF-TO-INTERNET&lt;BR /&gt; match access-group name NACL-PERMIT-ALL-TRAFFIC&lt;BR /&gt;&lt;BR /&gt;class-map type inspect match-all CMAP-OUTSIDE-SELF&lt;BR /&gt; match access-group name NACL-PERMIT-ALL-TRAFFIC&lt;BR /&gt;*******************************************************&lt;BR /&gt;Full config below - seriously stumped at this point.  Why would blocking IP ANY ANY from INTERNET to SELF also halt the traffic from Inside to Internet ?&lt;BR /&gt;&lt;BR /&gt;C1117ISR#sh run&lt;BR /&gt;Building configuration...&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Current configuration : 7257 bytes&lt;BR /&gt;!&lt;BR /&gt;! Last configuration change at 15:38:28 GMT Thu Oct 25 2018 by rhbmcse&lt;BR /&gt;! NVRAM config last updated at 15:22:06 GMT Thu Oct 25 2018 by rhbmcse&lt;BR /&gt;!&lt;BR /&gt;version 16.6&lt;BR /&gt;service timestamps debug datetime msec&lt;BR /&gt;service timestamps log datetime msec&lt;BR /&gt;service password-encryption&lt;BR /&gt;platform qfp utilization monitor load 80&lt;BR /&gt;no platform punt-keepalive disable-kernel-core&lt;BR /&gt;!&lt;BR /&gt;hostname C1117ISR&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;enable secret 9 $9$jUR3aCOMA9OFxakpqV2vfDatrcHCxftZzba///Xoxx&lt;BR /&gt;!&lt;BR /&gt;no aaa new-model&lt;BR /&gt;clock timezone GMT 1 0&lt;BR /&gt;!&lt;BR /&gt;ip name-server 8.8.8.8 8.8.4.4&lt;BR /&gt;no ip domain lookup&lt;BR /&gt;ip domain name 21RTM.local&lt;BR /&gt;ip dhcp excluded-address 192.168.0.1 192.168.0.19&lt;BR /&gt;ip dhcp excluded-address 192.168.0.51 192.168.0.254&lt;BR /&gt;ip dhcp excluded-address 10.0.0.1&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool CLIENTS&lt;BR /&gt; network 192.168.0.0 255.255.255.0&lt;BR /&gt; default-router 192.168.0.1&lt;BR /&gt; dns-server 192.168.0.1&lt;BR /&gt; domain-name 21RTM.local&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool MANAGEMENT&lt;BR /&gt; network 10.0.0.0 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;subscriber templating&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;multilink bundle-name authenticated&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto pki trustpoint TP-self-signed-3510874038&lt;BR /&gt; enrollment selfsigned&lt;BR /&gt; subject-name cn=IOS-Self-Signed-Certificate-3510874038&lt;BR /&gt; revocation-check none&lt;BR /&gt; rsakeypair TP-self-signed-3510874038&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto pki certificate chain TP-self-signed-3510874038&lt;BR /&gt; certificate self-signed 01&lt;BR /&gt;  30820330 30820218 A0030201 02020101 300D0609 2A864886 F70D0101 05050030&lt;BR /&gt;  31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274&lt;BR /&gt;  69666963 6174652D 33&lt;BR /&gt;  6F305E61 B99D9BF5 D243DAE9 37848E38 992E006F 92B35E7B B8AC9995 1EDEC0C0&lt;BR /&gt;  B25CE082 26AAFB31 E6F6B6B6 98E2BF42 94DD4F00 B2C3665E 1DC9C4C8 6E35C5B7&lt;BR /&gt;  7984AFAF 1460956D 0A6516E8 2301EE0B 13252DB1 2DE096E8 A75FA9AA 1A344AA4&lt;BR /&gt;  DBCC162F 1BA0BA74 CE0032E4 C892DE80 C08EA475&lt;BR /&gt;        quit&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;license udi pid C1117-4P sn FGL2205927C&lt;BR /&gt;license boot level securityk9&lt;BR /&gt;!&lt;BR /&gt;diagnostic bootup level minimal&lt;BR /&gt;spanning-tree extend system-id&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;username rhbmcse privilege 15 password 7 06240B2x32B5D550A7A75&lt;BR /&gt;!&lt;BR /&gt;redundancy&lt;BR /&gt; mode none&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;controller VDSL 0/2/0&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;vlan internal allocation policy ascending&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;class-map type inspect match-any CMAP-SELF-TO-INTERNET&lt;BR /&gt; match access-group name NACL-PERMIT-ALL-TRAFFIC&lt;BR /&gt;class-map type inspect match-any ALLOWED-PROTOCOLS&lt;BR /&gt; match protocol icmp&lt;BR /&gt; match protocol dns&lt;BR /&gt; match protocol http&lt;BR /&gt; match protocol https&lt;BR /&gt;class-map type inspect match-all CMAP-OUTSIDE-SELF&lt;BR /&gt; match access-group name NACL-PERMIT-ALL-TRAFFIC&lt;BR /&gt;class-map type inspect match-all INSIDE_SELF&lt;BR /&gt; match access-group name SELF_AND_INSIDE&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect PM-SELF-TO-INTERNET&lt;BR /&gt; class type inspect CMAP-SELF-TO-INTERNET&lt;BR /&gt;  pass&lt;BR /&gt; class class-default&lt;BR /&gt;policy-map type inspect INSIDE_SELF&lt;BR /&gt; class type inspect INSIDE_SELF&lt;BR /&gt;  pass&lt;BR /&gt; class class-default&lt;BR /&gt;policy-map type inspect SELF_INSIDE&lt;BR /&gt; class type inspect INSIDE_SELF&lt;BR /&gt;  pass&lt;BR /&gt; class class-default&lt;BR /&gt;policy-map type inspect PM-OUTSIDE-SELF&lt;BR /&gt; class type inspect CMAP-OUTSIDE-SELF&lt;BR /&gt;  pass&lt;BR /&gt; class class-default&lt;BR /&gt;policy-map type inspect INSIDE-TO-OUTSIDE-POLICY&lt;BR /&gt; class type inspect ALLOWED-PROTOCOLS&lt;BR /&gt;  inspect&lt;BR /&gt; class class-default&lt;BR /&gt;!&lt;BR /&gt;zone security INTERNET&lt;BR /&gt;zone security INSIDE&lt;BR /&gt;zone-pair security Inside_to_Self source INSIDE destination self&lt;BR /&gt; service-policy type inspect INSIDE_SELF&lt;BR /&gt;zone-pair security Self-to-Inside source self destination INSIDE&lt;BR /&gt; service-policy type inspect SELF_INSIDE&lt;BR /&gt;zone-pair security ZP-INSIDE-TO-OUTSIDE source INSIDE destination INTERNET&lt;BR /&gt; service-policy type inspect INSIDE-TO-OUTSIDE-POLICY&lt;BR /&gt;zone-pair security ZP-INTERNET-TO-SELF source INTERNET destination self&lt;BR /&gt; service-policy type inspect PM-OUTSIDE-SELF&lt;BR /&gt;zone-pair security ZP-SELF-TO-INTERNET source self destination INTERNET&lt;BR /&gt; service-policy type inspect PM-SELF-TO-INTERNET&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0/0&lt;BR /&gt; no ip address&lt;BR /&gt; shutdown&lt;BR /&gt; no negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1/0&lt;BR /&gt; description CLIENT LAN&lt;BR /&gt; switchport access vlan 10&lt;BR /&gt; switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1/1&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1/2&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1/3&lt;BR /&gt; description MANAGEMENT INTERFACE&lt;BR /&gt; switchport access vlan 100&lt;BR /&gt; switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface ATM0/2/0&lt;BR /&gt; no ip address&lt;BR /&gt; shutdown&lt;BR /&gt; no atm ilmi-keepalive&lt;BR /&gt; no atm enable-ilmi-trap&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2/0&lt;BR /&gt; mac-address c03e.0f9c.268e&lt;BR /&gt; no ip address&lt;BR /&gt; no negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2/0.101&lt;BR /&gt; description SUBINT TO INTERNET&lt;BR /&gt; encapsulation dot1Q 101&lt;BR /&gt; ip dhcp client request classless-static-route&lt;BR /&gt; ip dhcp client client-id hex 6330336530663963323638&lt;BR /&gt; ip dhcp client hostname c0x68c@skydsl|addx&lt;BR /&gt; ip address dhcp&lt;BR /&gt; no ip redirects&lt;BR /&gt; no ip proxy-arp&lt;BR /&gt; ip nat outside&lt;BR /&gt; zone-member security INTERNET&lt;BR /&gt; ip virtual-reassembly&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Vlan10&lt;BR /&gt; ip address 192.168.0.1 255.255.252.0&lt;BR /&gt; ip nat inside&lt;BR /&gt; zone-member security INSIDE&lt;BR /&gt;!&lt;BR /&gt;interface Vlan100&lt;BR /&gt; ip address 10.0.0.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ip nat inside source route-map OUTSIDE-POOL interface Ethernet0/2/0.101 overload&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;no ip http server&lt;BR /&gt;ip http authentication local&lt;BR /&gt;no ip http secure-server&lt;BR /&gt;ip dns server&lt;BR /&gt;ip ssh version 2&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended NACL-BLOCK-INTERNET-TRAFFIC&lt;BR /&gt; deny   ip any any&lt;BR /&gt;ip access-list extended NACL-PERMIT-ALL-TRAFFIC&lt;BR /&gt; permit ip any any&lt;BR /&gt;ip access-list extended NAT-TO-OUTSIDE&lt;BR /&gt; permit ip 192.168.0.0 0.0.3.255 any&lt;BR /&gt;ip access-list extended SELF_AND_INSIDE&lt;BR /&gt; permit ip any any&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;route-map OUTSIDE-POOL permit 10&lt;BR /&gt; match ip address NAT-TO-OUTSIDE&lt;BR /&gt; match interface Ethernet0/2/0.101&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;control-plane&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt; password 7 091A7D06090D020152&lt;BR /&gt; login&lt;BR /&gt; transport input all&lt;BR /&gt; stopbits 1&lt;BR /&gt;line vty 0 4&lt;BR /&gt; login local&lt;BR /&gt;!&lt;BR /&gt;ntp master&lt;BR /&gt;ntp server 0.uk.pool.ntp.org&lt;BR /&gt;ntp server 1.uk.pool.ntp.org&lt;BR /&gt;ntp server 3.uk.pool.ntp.org&lt;BR /&gt;ntp server 2.uk.pool.ntp.org&lt;BR /&gt;wsma agent exec&lt;BR /&gt;!&lt;BR /&gt;wsma agent config&lt;BR /&gt;!&lt;BR /&gt;wsma agent filesys&lt;BR /&gt;!&lt;BR /&gt;wsma agent notify&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;end</description>
      <pubDate>Thu, 25 Oct 2018 14:53:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-first-attempt-no-traffic-flowing/m-p/3732830#M9325</guid>
      <dc:creator>rhbmcse</dc:creator>
      <dc:date>2018-10-25T14:53:24Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF - First attempt - No traffic flowing</title>
      <link>https://community.cisco.com/t5/network-security/zbf-first-attempt-no-traffic-flowing/m-p/3732845#M9327</link>
      <description>Well I don't think you necessarily need "permit ip any any" from internet to self, but you do need to receive an IP address on the wan interface. If you permit udp/67 from internet to self and udp/68 from self to internet, that should still allow you to receive the dhcp address. After that configure a deny action and make sure you log traffic, so if anything is blocked we can determine what exactly is blocked.&lt;BR /&gt;&lt;BR /&gt;I notice you've got ntp servers defined, you need to permit that to/from the self zone to/from internet zone.&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Thu, 25 Oct 2018 15:09:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-first-attempt-no-traffic-flowing/m-p/3732845#M9327</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-10-25T15:09:55Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF - First attempt - No traffic flowing</title>
      <link>https://community.cisco.com/t5/network-security/zbf-first-attempt-no-traffic-flowing/m-p/3732871#M9330</link>
      <description>HI Rob!&lt;BR /&gt;Thanks again...&lt;BR /&gt;That sounds like a plan.&lt;BR /&gt;Re: the time servers - that's only just gone into the config (it's very much a work in progress) so I was aware that there would still be more work to be done.  Slowly beginning to understand the self zone with your great assistance.&lt;BR /&gt;I wish I could repay the favour.  It kind of makes sense once you being to understand it!&lt;BR /&gt;Thanks again.&lt;BR /&gt;"I'll be back"...&lt;BR /&gt;Rob.</description>
      <pubDate>Thu, 25 Oct 2018 15:40:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-first-attempt-no-traffic-flowing/m-p/3732871#M9330</guid>
      <dc:creator>rhbmcse</dc:creator>
      <dc:date>2018-10-25T15:40:39Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF - First attempt - No traffic flowing</title>
      <link>https://community.cisco.com/t5/network-security/zbf-first-attempt-no-traffic-flowing/m-p/3732914#M9333</link>
      <description>Sighs.&lt;BR /&gt;OK so I configured as suggested - allowing bootp / dhcp traffic on ports 67/68.&lt;BR /&gt;Performed a shut on the relevant interfaces and then no shut them.&lt;BR /&gt;The interface gets an IP from DHCP - hallelujah!  But we're back to the old no traffic flowing again.&lt;BR /&gt;It does seem as though something else is required to be configured in the self zone.&lt;BR /&gt;I added a log command to the pass statements on the  policy maps.&lt;BR /&gt;How do I then view these logs with meaningful information as to what has been dropped so that I may be able to figure out what exactly the self zone is missing.  Certainly with the pass IP any any it all worked!&lt;BR /&gt;I guess I need to figure out now what's preventing return traffic?&lt;BR /&gt;Any suggestions ?  &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;</description>
      <pubDate>Thu, 25 Oct 2018 16:32:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-first-attempt-no-traffic-flowing/m-p/3732914#M9333</guid>
      <dc:creator>rhbmcse</dc:creator>
      <dc:date>2018-10-25T16:32:50Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF - First attempt - No traffic flowing</title>
      <link>https://community.cisco.com/t5/network-security/zbf-first-attempt-no-traffic-flowing/m-p/3732950#M9335</link>
      <description>&lt;P&gt;If you modify the following:-&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;policy-map type inspect INSIDE-TO-OUTSIDE-POLICY&lt;BR /&gt;class type inspect ALLOWED-PROTOCOLS&lt;BR /&gt;inspect&lt;BR /&gt;class class-default&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;drop log&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;then any drops outbound should be logged, then type "show logging" to view the logs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you provide the output of "show policy-map type inspect zone-pair ZP-INSIDE-TO-OUTSIDE" and upload here&lt;/P&gt;</description>
      <pubDate>Thu, 25 Oct 2018 17:31:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-first-attempt-no-traffic-flowing/m-p/3732950#M9335</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-10-25T17:31:09Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF - First attempt - No traffic flowing</title>
      <link>https://community.cisco.com/t5/network-security/zbf-first-attempt-no-traffic-flowing/m-p/3733624#M9336</link>
      <description>Morning Rob!&lt;BR /&gt;Still ongoing I'm afraid.&lt;BR /&gt;The logs dont appear to hold any information on the INSIDE-TO-OUTSIDE rules as below.&lt;BR /&gt;The very second that I disable the zone pairing for the self zone everything springs into life.&lt;BR /&gt;It's almost as if everything is going through the SELF zone ?&lt;BR /&gt;Details are below anyway - your help is greatly appreciated.&lt;BR /&gt;&lt;BR /&gt;C1117ISR#ping 8.8.8.8&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 8.8.8.8, timeout is 2 seconds:&lt;BR /&gt;.....&lt;BR /&gt;Success rate is 0 percent (0/5)&lt;BR /&gt;C1117ISR#sh logging&lt;BR /&gt;Syslog logging: enabled (0 messages dropped, 7 messages rate-limited, 0 flushes, 0 overruns, xml disabled, filtering disabled)&lt;BR /&gt;&lt;BR /&gt;No Active Message Discriminator.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;No Inactive Message Discriminator.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;    Console logging: level debugging, 54 messages logged, xml disabled,&lt;BR /&gt;                     filtering disabled&lt;BR /&gt;    Monitor logging: level debugging, 0 messages logged, xml disabled,&lt;BR /&gt;                     filtering disabled&lt;BR /&gt;    Buffer logging:  level debugging, 59 messages logged, xml disabled,&lt;BR /&gt;                    filtering disabled&lt;BR /&gt;    Exception Logging: size (4096 bytes)&lt;BR /&gt;    Count and timestamp logging messages: disabled&lt;BR /&gt;    Persistent logging: disabled&lt;BR /&gt;&lt;BR /&gt;No active filter modules.&lt;BR /&gt;&lt;BR /&gt;    Trap logging: level informational, 61 message lines logged&lt;BR /&gt;        Logging Source-Interface:       VRF Name:&lt;BR /&gt;&lt;BR /&gt;Log Buffer (4096 bytes):&lt;BR /&gt; Throughput license found, throughput set to 50000 kbps&lt;BR /&gt;*Oct 26 11:47:09.233: %SYS-2-PRIVCFG_DECRYPT: Successfully apply the private config file&lt;BR /&gt;*Oct 26 11:47:09.280: %SYS-6-CLOCKUPDATE: System clock has been updated from 11:47:09 UTC Fri Oct 26 2018 to 12:47:09 GMT Fri Oct 26 2018, configured from console by vty0.&lt;BR /&gt;*Oct 26 11:47:09.922: %SYS-5-CONFIG_I: Configured from memory by console&lt;BR /&gt;*Oct 26 11:47:09.998: %IOSXE_OIR-6-REMSPA: SPA removed from subslot 0/0, interfaces disabled&lt;BR /&gt;*Oct 26 11:47:09.998: %IOSXE_OIR-6-REMSPA: SPA removed from subslot 0/1, interfaces disabled&lt;BR /&gt;*Oct 26 11:47:09.998: %IOSXE_OIR-6-REMSPA: SPA removed from subslot 0/2, interfaces disabled&lt;BR /&gt;*Oct 26 11:47:10.013: %SPA_OIR-6-OFFLINECARD: SPA (C1117-1x1GE) offline in subslot 0/0&lt;BR /&gt;*Oct 26 11:47:10.028: %SPA_OIR-6-OFFLINECARD: SPA (C1117-ES-4) offline in subslot 0/1&lt;BR /&gt;*Oct 26 11:47:10.045: %SPA_OIR-6-OFFLINECARD: SPA (C1117-VADSL-A) offline in subslot 0/2&lt;BR /&gt;*Oct 26 11:47:10.054: %IOSXE_OIR-6-INSCARD: Card (fp) inserted in slot F0&lt;BR /&gt;*Oct 26 11:47:10.054: %IOSXE_OIR-6-ONLINECARD: Card (fp) online in slot F0&lt;BR /&gt;*Oct 26 11:47:10.092: %IOSXE_OIR-6-INSCARD: Card (cc) inserted in slot 0&lt;BR /&gt;*Oct 26 11:47:10.093: %IOSXE_OIR-6-ONLINECARD: Card (cc) online in slot 0&lt;BR /&gt;*Oct 26 11:47:10.118: %FW-6-INIT: Firewall inspection startup completed; beginning operation.&lt;BR /&gt;*Oct 26 11:47:10.313: %IOSXE_OIR-6-INSSPA: SPA inserted in subslot 0/0&lt;BR /&gt;*Oct 26 11:47:10.316: %IOSXE_OIR-6-INSSPA: SPA inserted in subslot 0/1&lt;BR /&gt;*Oct 26 11:47:10.316: %IOSXE_OIR-6-INSSPA: SPA inserted in subslot 0/2&lt;BR /&gt;*Oct 26 11:47:10.629: %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan10, changed state to down&lt;BR /&gt;*Oct 26 11:47:10.631: %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan100, changed state to down&lt;BR /&gt;*Oct 26 11:47:12.217: %SYS-5-RESTART: System restarted --&lt;BR /&gt;Cisco IOS Software [Everest], ISR Software (ARMV8EB_LINUX_IOSD-UNIVERSALK9_IAS-M), Version 16.6.2, RELEASE SOFTWARE (fc2)&lt;BR /&gt;Technical Support: &lt;A href="http://www.cisco.com/techsupport" target="_blank"&gt;http://www.cisco.com/techsupport&lt;/A&gt;&lt;BR /&gt;Copyright (c) 1986-2017 by Cisco Systems, Inc.&lt;BR /&gt;Compiled Wed 01-Nov-17 03:00 by mcpre&lt;BR /&gt;*Oct 26 11:47:12.246: %SSH-5-ENABLED: SSH 2.0 has been enabled&lt;BR /&gt;*Oct 26 11:47:12.318: %CRYPTO-6-ISAKMP_ON_OFF: ISAKMP is OFF&lt;BR /&gt;*Oct 26 11:47:12.319: %CRYPTO-6-GDOI_ON_OFF: GDOI is OFF&lt;BR /&gt;Oct 26 11:47:14.906: %SYS-6-BOOTTIME: Time taken to reboot after reload =  310 seconds&lt;BR /&gt;Oct 26 11:47:20.724: %CRYPTO-6-ISAKMP_ON_OFF: ISAKMP is OFF&lt;BR /&gt;Oct 26 11:47:20.724: %CRYPTO-6-GDOI_ON_OFF: GDOI is OFF&lt;BR /&gt;Oct 26 11:47:25.628: %SPA_OIR-6-ONLINECARD: SPA (C1117-1x1GE) online in subslot 0/0&lt;BR /&gt;Oct 26 11:47:26.053: %SPA_OIR-6-ONLINECARD: SPA (C1117-ES-4) online in subslot 0/1&lt;BR /&gt;Oct 26 11:47:28.031: %LINK-3-UPDOWN: Interface GigabitEthernet0/1/0, changed state to down&lt;BR /&gt;Oct 26 11:47:28.049: %LINK-3-UPDOWN: Interface GigabitEthernet0/1/3, changed state to down&lt;BR /&gt;Oct 26 11:47:36.034: %LINK-3-UPDOWN: Interface GigabitEthernet0/1/0, changed state to up&lt;BR /&gt;Oct 26 11:47:36.038: %LINK-3-UPDOWN: Interface GigabitEthernet0/1/3, changed state to up&lt;BR /&gt;Oct 26 11:47:37.034: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/1/0, changed state to up&lt;BR /&gt;Oct 26 11:47:37.039: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/1/3, changed state to up&lt;BR /&gt;Oct 26 11:47:37.048: %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan10, changed state to up&lt;BR /&gt;Oct 26 11:47:37.053: %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan100, changed state to up&lt;BR /&gt;Oct 26 11:48:29.625: %SPA_OIR-6-ONLINECARD: SPA (C1117-VADSL-A) online in subslot 0/2&lt;BR /&gt;Oct 26 11:48:31.620: %LINK-3-UPDOWN: Interface Ethernet0/2/0, changed state to down&lt;BR /&gt;Oct 26 11:49:06.616: %VDSL_DAEMON-3-VDSL_LINE_UPDOWN: Controller VDSL 0/2/0, line 0, changed state to up&lt;BR /&gt;Oct 26 11:49:06.616: %CONTROLLER-5-UPDOWN: Controller VDSL 0/2/0, changed state to up&lt;BR /&gt;Oct 26 11:49:08.615: %LINK-3-UPDOWN: Interface Ethernet0/2/0, changed state to up&lt;BR /&gt;Oct 26 11:49:09.613: %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet0/2/0, changed state to up&lt;BR /&gt;Oct 26 11:49:44.418: %DHCP-6-ADDRESS_ASSIGN: Interface Ethernet0/2/0.101 assigned DHCP address 188.222.79.191, mask 255.255.252.0, hostname c03e0f9c268c@skydsl|addf773e&lt;BR /&gt;&lt;BR /&gt;C1117ISR#sh policy-map type inspect zone-pair ZP-INSIDE-TO-OUTSIDE&lt;BR /&gt;  Zone-pair: ZP-INSIDE-TO-OUTSIDE&lt;BR /&gt;  Service-policy inspect : PM-INSIDE-TO-OUTSIDE-POLICY&lt;BR /&gt;&lt;BR /&gt;    Class-map: CMAP-ALLOWED-OUTBOUND-PROTOCOLS (match-any)&lt;BR /&gt;      Match: protocol icmp&lt;BR /&gt;      Match: protocol dns&lt;BR /&gt;      Match: protocol http&lt;BR /&gt;      Match: protocol https&lt;BR /&gt;      Inspect&lt;BR /&gt;        Packet inspection statistics [process switch:fast switch]&lt;BR /&gt;        dns packets: [0:4]&lt;BR /&gt;&lt;BR /&gt;        Session creations since subsystem startup or last reset 2&lt;BR /&gt;        Current session counts (estab/half-open/terminating) [0:0:0]&lt;BR /&gt;        Maxever session counts (estab/half-open/terminating) [1:0:0]&lt;BR /&gt;        Last session created 00:01:12&lt;BR /&gt;        Last statistic reset never&lt;BR /&gt;        Last session creation rate 2&lt;BR /&gt;        Last half-open session total 0&lt;BR /&gt;&lt;BR /&gt;    Class-map: class-default (match-any)&lt;BR /&gt;      Match: any&lt;BR /&gt;      Drop&lt;BR /&gt;        0 packets, 0 bytes&lt;BR /&gt;</description>
      <pubDate>Fri, 26 Oct 2018 11:59:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-first-attempt-no-traffic-flowing/m-p/3733624#M9336</guid>
      <dc:creator>rhbmcse</dc:creator>
      <dc:date>2018-10-26T11:59:24Z</dc:date>
    </item>
  </channel>
</rss>

