07-21-2011 03:06 AM - edited 03-11-2019 02:01 PM
Hi,
After applying ZBF in a 891, users can not connect to internal resources after a successful VPN establishment. For testing purposes I've created only two zone-pair without using the self-zone, only LAN-to-WAN and WAN-to-LAN. In the last one I've permitted everything in the corresponding class-map. From the point of view of the router, traffic of vpn clients comes in the WAN interface to LAN, right?
Below is the current configuration.
VPN clients get address from the 172.16.73.0/24 pool and internal resources are in the 172.16.72.0/24. Ping from 172.16.73.x to 172.16.7.2 fails.
class-map type inspect match-any CM_LAN_TO_WAN
match protocol icmp
match protocol tcp
match protocol udp
class-map type inspect match-any CM_WAN_TO_LAN
match access-group 102
access-list 102 permit ip 172.16.73.0 0.0.0.255 any
policy-map type inspect PM_LAN_TO_WAN
class type inspect CM_LAN_TO_WAN
inspect
class class-default
drop
policy-map type inspect PM_WAN_TO_LAN
class type inspect CM_WAN_TO_LAN
pass
class class-default
pass
zone-pair security ZP_LAN_TO_WAN source LAN destination WAN
service-policy type inspect PM_LAN_TO_WAN
zone-pair security ZP_WAN_TO_LAN source WAN destination LAN
service-policy type inspect PM_WAN_TO_LAN
interface Dialer1
ip address negotiated
ip mtu 1492
ip nat outside
ip virtual-reassembly
zone-member security WAN
encapsulation ppp
dialer pool 1
dialer-group 1
ppp authentication chap callin
ppp ipcp address accept
no cdp enable
crypto map mymap
interface Vlan72
ip address 172.16.72.1 255.255.255.0
no ip proxy-arp
ip nat inside
ip virtual-reassembly
zone-member security LAN
ip policy route-map PBR_WAN2
Thanks!
07-21-2011 10:18 AM
Hi Antonio,
Here is a document that discusses using ZBF with VPN on the same router:
See "Easy VPN with IPsec VTI" if you want to be able to put the decrypted traffic into it's own zone.
See "Zone-Based Policy Firewall with non-interface-based IPsec VPN" for traditional VPN wtih ZBF.
The trend is to move towards DVTI so you might want to move in that direction.
Let me know if you have any questions.
Thanks,
Loren
07-21-2011 10:26 AM
Hi Loren,
If I'm right, the technote you provided is only for site-to-site VPNs not for remote user access via Cisco VPN Client as I need. The router is an endpoint for mobile users.
Thanks.
Antonio.
07-21-2011 10:50 AM
Hi Antonio,
The example for Easy VPN VTI also applies to the VPN Client as it is a EasyVPN client.
Here is some additional information regarding DVTI (Dynamic Virtual Tunnel Interfaces):
15.1M&T - IPsec Virtual Tunnel Interface
Dynamic Virtual Tunnel Interface Easy VPN Server: Example
Let me know if you have any questions.
Thanks,
Loren
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide