I've IOS firewall configured on one of my 2921 cisco router, (my current internet traffic is destination to a wan proxy) and i've using the inspect command to enable DPI and to track the sessions, and the configuration details are as follows,
Router(config)# class-map type inspect match-any All_ProtocolsRouter(config-cmap)# match protocol tcpRouter(config-cmap)# match protocol udpRouter(config-cmap)# match protocol icmp
and I'm using zone pairs as trusted and internet,
policy-map type inspect Trusted
policy-map type inspect Trusted_to_Internet
class type inspect All_Protocols
how my problem is the IOS firewall blocks certain return traffic particularly when certain websites accept the request on one IP address and send the reply via another IP address due to the IOS firewall's basic behaviour, and what I want to know is, is it possible to allow the return traffic coming from the wan proxy ip via on the IOS firewall, or is there any other alternatives avialble to achieve the same? Please advise.
Looks like the traffic pattern we are seeing here does not seems the appropiate to a FW due to the fact that traffic that is not being expected is being received..
For that the only way to make it happen across the Firewall is basically bypass the security policy using a PASS action on both zone-pairs (From trusted to internet and Internet to trusted) but only matching the specitic traffic so the rest of the traffic can still be secured!
BenefitsDocumentationPrerequisiteImage Download LinksLimitationsSupported PlatformsLicense RequirementsTopologyStep-By-Step ConfigurationConfigure Virtual ServiceActivate the virtual service and configure guest IPsConfiguring UTD (Service Plane)Configurin...
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...