notgoing2fail wrote: » ok, I've answered my own question after labbing this up. It appears you do need to issue the IP NAT inside/outside directly to the interfaces instead of to zones. This really helps conceptually clear things up for me...
ilcram19-2 wrote: » the thing is you need to create a to selfzone for the router otherwise all traffic is going to be allowed from the outside like ping, isakmp telnet, ssh, and any other nat or pat translation that you have
notgoing2fail wrote: » I got an invalid parameter-map when trying to configure the policy. Could you show me how your paramet-map is configured? RTR-1811W(config-pmap-c)#inspect ZFW %Invalid parameter-map name RTR-1811W(config-pmap-c)#%Parameter-map ZFW not found or does not match inspect type
notgoing2fail wrote: » Fantastic! Thank you so much, I will try out the self zones in a minute as well as read the link. I do have a quick question for you regarding NAT and ACL's. In my class-map, as you can see above, I do not have "match access-group 101" applied. The 101 ACL permits my private hosts to "any". Yet my inside hosts were able to traverse the zones and get to the internet. Why is that? I thought that all traffic traversing the zones would need to have rules in the class-map no?
ilcram19-2 wrote: » did you created the zone and applied to the interfaces? zone security internet description "Unsecure Zone (Internet)" zone security inside description "trusted" interface FastEthernet4 zone-member security internet interface Vlan1 zone-member security inside here are the rules........
notgoing2fail wrote: » Some con's, the ACL doesn't provide the deep inspection that you could get from using ZFW....
ilcram19-2 wrote: » i use that mainly for audit trail and to have a syslog entry so i can see where packets are coming and going to
ilcram19-2 wrote: » yea i've done on physical interfaces, VTI, GRE interface, vlans, subinterface etc
notgoing2fail wrote: » Hmmm...what is the difference between VTI and GRE interface?
ilcram19-2 wrote: » VTI my concept of vti is the follwing: an encrypted point to point link here is the cisco VIRTUAL TUNNEL INTERFACES Cisco® IPSec VTIs are a new tool that customers can use to configure IPSec-based VPNs between site-to-site devices. IPSec VTI tunnels provide a designated pathway across a shared WAN and encapsulate traffic with new packet headers, which helps to ensure delivery to specific destinations. The network is private because traffic can enter a tunnel only at an endpoint. In addition, IPSec provides true confidentiality (as does encryption) and can carry encrypted traffic.Configuring a Virtual Tunnel Interface with IP Security [IPSec Negotiation/IKE Protocols] - Cisco Systems and a GRE interface you actually specified gre encapsulation on the tunnel interface and add a crypto map generic routing encapsulation. Tunneling protocol developed by Cisco that can encapsulate a wide variety of protocol packet types inside IP tunnels, creating a virtual point-to-point link to Cisco routers at remote points over an IP internetwork hope that helps
ilcram19-2 wrote: » yea the ipsec profile aplied to the interface provide the protection. thats why i use routers instead of ASA more flexible and i dont use site to site ipsec i use more of VTI's,gre over ipsec, DMVPN, i dont have any limitations allows me to get to any point of my network by using 1 tunnel instead of having ipsec tunnels to each point and only limiting to ip traffic.