Zone Based Firewall
Basics
A Zone Based Firewall uses the same inspection engine as CBAC, but works with security zones, not with individual interfaces. A zone groups multiple interfaces together. By default, traffic is allowed between interfaces in the same zone, but is not allowed between interfaces in different zones. You can define zone pairs which are zones that can send traffic to each other. A special zone is automatically created for traffic destined to or generated by the router itself. This special zone called “self” allows traffic to/from it to the other interfaces. Zone Based Policy Firewall uses a syntax similar to MQC used in QoS
Configuration
Define the Policy
A parameter map is used to define the parameters of the inspection engine or of the urlfilter engine
Create the zones
Add interface to a zone
Create Zone Pairs and attach policy
Be aware that when you add an interface to a zone, by default, it will drop all traffic that is destined to other zones, unless there is a policy that permits it. One simple mistake is that the policy is only applied on one zone-pair (from interface A to interface B), but no policy is applied on the return direction (from interface B to interface A) This may not be harmful when you use Inspection, because inspected traffic will automatically be allowed on the return path, but if you use just pass, return traffic will be dropped if no service-policy that explicitly allows it is placed on the return path.
Last updated