cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1074
Views
0
Helpful
3
Replies

Zone based firewall / IPsec VPN

Alcides Miguel
Level 1
Level 1

Hello,

I've remote vpn running on a 2801, now i decide to use ZBF to have some firewall feature on cisco router but, after deploy ZBF on my 2801 box i can connect but no traffic cross my internal lan.

Topology:

draft_net.jpg

ZBF config.:

class-map type inspect match-any CHAP-1

match protocol tcp

match protocol icmp

match protocol udp

!

!

policy-map type inspect PMAP-1

class type inspect CHAP-1

  inspect

  police rate 8000 burst 1000

class class-default

!

zone security inside

zone security outside

zone-pair security inside-to-outside source inside destination outside

service-policy type inspect PMAP-1

*****************************************************************

interface FastEthernet0/0.32

description **** INSIDE INTERFACE ****

encapsulation dot1Q 32

ip address XX.XX.XX.XX XXX.XXX.XXX.XXX

ip access-group NON-MANAGEMENT-INSIDE_ETH in

ip nat inside

ip virtual-reassembly

zone-member security inside

no ip route-cache

interface FastEthernet0/1.10

description **** OUTSIDE INTERFACE ****

encapsulation dot1Q 110

ip address XX.XX.XXX.XX XXX.XXX.XXX.XXX

ip access-group ACL-INFRASTRUCTURE-IN in

no ip redirects

no ip unreachables

no ip proxy-arp

ip flow ingress

ip nat outside

ip virtual-reassembly

zone-member security outside

no cdp enable

*************************************************************

ROUTES

ip route 0.0.0.0 0.0.0.0 64.30.XXX.XX

ip route 1X.1X.0.0 25X.25X.XXX.0 FastEthernet0/0.32

ip route 1X.1X.2X.0 25X.25X.XXX.0 FastEthernet0/0.32

ip route 1X.1X.1X.0 25X.25X.XXX.0 FastEthernet0/0.32

********************************************************

VPN ACL

ip access-list extended IT-VPN-ACL

permit ip 1X.1X.X0.0 0.0.X.255 17X.1X.2XX.0 0.0.0.255

permit ip 1Y.1Y.Y0.0 0.0.X.255 17X.1X.2XX.0 0.0.0.255

permit ip 1Z.1Z.Z.0 0.0.X.255 172.16.255.0 0.0.0.255

PLEASE HELP!!!

1 Accepted Solution

Accepted Solutions

Jennifer Halim
Cisco Employee
Cisco Employee

Once you assign an interface into a zone, you would need to configure policy map for traffic in all direction where you initiate the traffic from.

Currently you have the following:

zone-pair security inside-to-outside source inside destination outside

     service-policy type inspect PMAP-1

This will only allow traffic to be initiated from source: inside to destination: outside

For VPN traffic after it's being decrypted, the traffic would be initiated from source: outside to destination: inside. Hence, you would need to configure zone-pair for source: outside to destination: inside which allow the VPN traffic.

View solution in original post

3 Replies 3

Jennifer Halim
Cisco Employee
Cisco Employee

Once you assign an interface into a zone, you would need to configure policy map for traffic in all direction where you initiate the traffic from.

Currently you have the following:

zone-pair security inside-to-outside source inside destination outside

     service-policy type inspect PMAP-1

This will only allow traffic to be initiated from source: inside to destination: outside

For VPN traffic after it's being decrypted, the traffic would be initiated from source: outside to destination: inside. Hence, you would need to configure zone-pair for source: outside to destination: inside which allow the VPN traffic.

HI Jennifer, Thanks for your response

i made the changes below but the same issue

and what u meen by permit VPN traffic is the match access-group in class-map?

class-map type inspect match-any safe-vpn-cmap

match protocol icmp

match protocol tcp

match protocol udp

match access-group name IT-VPN-ACL

!

!

policy-map type inspect safe-vpn-pmap

class type inspect safe-vpn-cmap

  inspect

class class-default

!

zone security inside

zone security outside

zone-pair security safe-internalLAN-vpn source outside destination inside

service-policy type inspect safe-vpn-pmap

zone-pair security safe-vpn-internalLAN source inside destination outside

service-policy type inspect safe-vpn-pmap

!

best regards

after applying the virtual template to ouside security zone all start working

thanks!

Review Cisco Networking for a $25 gift card