<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Zone-based Firewall &amp; Easy VPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/zone-based-firewall-easy-vpn/m-p/832509#M956207</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Create a crypto ACL for vlan2 to make all traffic go through the vpn tunnel. You can disable inter vlan routing to stop the traffic from vlan and vlan2 to flow between. Following link may help you&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/routers/access/800/850/software/configuration/guide/vpnezvpn.html" target="_blank"&gt;http://www.cisco.com/en/US/docs/routers/access/800/850/software/configuration/guide/vpnezvpn.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 01 Feb 2008 20:37:46 GMT</pubDate>
    <dc:creator>tstanik</dc:creator>
    <dc:date>2008-02-01T20:37:46Z</dc:date>
    <item>
      <title>Zone-based Firewall &amp; Easy VPN</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-easy-vpn/m-p/832508#M956206</link>
      <description>&lt;P&gt;I'm a little confused about the zoning requirements with easy vpn.  Considering the following setup on an 871 router:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface vlan 1&lt;/P&gt;&lt;P&gt;  desc Direct Internet Access&lt;/P&gt;&lt;P&gt;  ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;  ip nat inside&lt;/P&gt;&lt;P&gt;interface vlan 2&lt;/P&gt;&lt;P&gt;  desc Corporate Resources Access&lt;/P&gt;&lt;P&gt;  ip address 10.1.1.1 255.255.255.224&lt;/P&gt;&lt;P&gt;  crypto ipsec client ezvpn Corp inside&lt;/P&gt;&lt;P&gt;interface Fa4&lt;/P&gt;&lt;P&gt;  desc Public&lt;/P&gt;&lt;P&gt;  ip address x.x.x.x x.x.x.x&lt;/P&gt;&lt;P&gt;  ip nat outside&lt;/P&gt;&lt;P&gt;  crypto ipsec client ezvpn Corp outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How would this be zoned so that all traffic from vlan2 only goes across the ipsec tunnel, all traffic from vlan1 goes to the internet, traffic cannot flow between vlan1 &amp;amp; vlan2, &amp;amp; no inbound traffic from the internet except return traffic for vlan1 and DNS (proxied by the router).  I've seen some solutions with the classic firewall configurations, but not with the zone-based.  Thanks for any insight.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 11:54:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-easy-vpn/m-p/832508#M956206</guid>
      <dc:creator>jrahm</dc:creator>
      <dc:date>2019-03-11T11:54:41Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-based Firewall &amp; Easy VPN</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-easy-vpn/m-p/832509#M956207</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Create a crypto ACL for vlan2 to make all traffic go through the vpn tunnel. You can disable inter vlan routing to stop the traffic from vlan and vlan2 to flow between. Following link may help you&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/routers/access/800/850/software/configuration/guide/vpnezvpn.html" target="_blank"&gt;http://www.cisco.com/en/US/docs/routers/access/800/850/software/configuration/guide/vpnezvpn.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Feb 2008 20:37:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-easy-vpn/m-p/832509#M956207</guid>
      <dc:creator>tstanik</dc:creator>
      <dc:date>2008-02-01T20:37:46Z</dc:date>
    </item>
  </channel>
</rss>

