<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Default blocking with ZBF in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/default-blocking-with-zbf/m-p/3176086#M1066687</link>
    <description>&lt;P&gt;I am performing a POC config for a project I am working on. I have configured a ZBF and it works as intended with one exception, traffic in from the Internet is not inheritly blocked, I think, to the self zone. In the below config I am allowing ICMP out from LAN and allowing telnet out from the DMZ. Similarly I am allowing telnet in to simulate traffic being inspected/passed to a server in the DMZ.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What I was surprised to see what I could still ping the outside interface 1.1.1.1. I presumed, maybe incorrectly, ZBF would inheritly blocked traffic such as ping to the outside interface because it wasn't specified as an exception. How can I block ping to my outside interface 1.1.1.1 without creating an ACL to allow only icmp echo-reply? If I go the route of allowing just icmp echo-reply I will end up having to specifiy everything else I want to pass which defeats the simplicty of ZBF.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My config works as intended. The only thing I want to do is block, or filter icmp allowing only echo-reply, so that my outside interface isn't pingable. I want to do so in the simplest manner possible so I can only worry about adding inspect statements to my ZBF and allowing exceptions for inbound rules per ACL&amp;nbsp;&lt;SPAN&gt;FIREWALL-EXCEPTIONS-ACL.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any FIREWALL-EXCEPTIONS&lt;BR /&gt;match access-group name FIREWALL-EXCEPTIONS-ACL&lt;BR /&gt;class-map type inspect match-any DMZ-ALLOWED-PROTOCOLS&lt;BR /&gt;match protocol telnet&lt;BR /&gt;class-map type inspect match-any LAN-ALLOWED-PROTOCOLS&lt;BR /&gt;match protocol icmp&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect FIREWALL-EXCEPTIONS-POLICY&lt;BR /&gt;class type inspect FIREWALL-EXCEPTIONS&lt;BR /&gt;inspect&lt;BR /&gt;class class-default&lt;BR /&gt;drop&lt;BR /&gt;policy-map type inspect LAN-TO-INTERNET-POLICY&lt;BR /&gt;class type inspect LAN-ALLOWED-PROTOCOLS&lt;BR /&gt;inspect&lt;BR /&gt;class class-default&lt;BR /&gt;policy-map type inspect DMZ-TO-INTERNET-POLICY&lt;BR /&gt;class type inspect DMZ-ALLOWED-PROTOCOLS&lt;BR /&gt;inspect&lt;BR /&gt;class class-default&lt;BR /&gt;!&lt;BR /&gt;zone security INTERNET&lt;BR /&gt;zone security LAN&lt;BR /&gt;zone security DMZ&lt;BR /&gt;zone-pair security ZP-LAN-TO-INTERNET source LAN destination INTERNET&lt;BR /&gt;service-policy type inspect LAN-TO-INTERNET-POLICY&lt;BR /&gt;zone-pair security ZP-DMZ-TO-INTERNET source DMZ destination INTERNET&lt;BR /&gt;service-policy type inspect DMZ-TO-INTERNET-POLICY&lt;BR /&gt;zone-pair security ZP-INTERNET-TO-DMZ source INTERNET destination DMZ&lt;BR /&gt;service-policy type inspect FIREWALL-EXCEPTIONS-POLICY&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/0&lt;BR /&gt;ip address 1.1.1.1 255.255.255.248&lt;BR /&gt;ip nat outside&lt;BR /&gt;zone-member security INTERNET&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/1&lt;BR /&gt;ip address 10.1.0.1 255.255.255.0&lt;BR /&gt;ip nat inside&lt;BR /&gt;zone-member security DMZ&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0&lt;BR /&gt;ip address 10.1.10.1 255.255.255.0&lt;BR /&gt;zone-member security LAN&lt;BR /&gt;!&lt;BR /&gt;ip nat inside source list 1 interface FastEthernet0/0 overload&lt;BR /&gt;ip nat inside source static tcp 10.1.0.3 23 1.1.1.1 2323 extendable&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended FIREWALL-EXCEPTIONS-ACL&lt;BR /&gt;permit tcp any host 10.1.0.2 eq telnet&lt;BR /&gt;permit tcp any host 10.1.0.3 eq telnet&lt;BR /&gt;!&lt;BR /&gt;access-list 1 permit 10.1.10.0 0.0.0.255&lt;BR /&gt;access-list 1 permit 10.1.0.0 0.0.0.255&lt;BR /&gt;access-list 1 deny any&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 14:14:43 GMT</pubDate>
    <dc:creator>Joe Conklin</dc:creator>
    <dc:date>2020-02-21T14:14:43Z</dc:date>
    <item>
      <title>Default blocking with ZBF</title>
      <link>https://community.cisco.com/t5/network-security/default-blocking-with-zbf/m-p/3176086#M1066687</link>
      <description>&lt;P&gt;I am performing a POC config for a project I am working on. I have configured a ZBF and it works as intended with one exception, traffic in from the Internet is not inheritly blocked, I think, to the self zone. In the below config I am allowing ICMP out from LAN and allowing telnet out from the DMZ. Similarly I am allowing telnet in to simulate traffic being inspected/passed to a server in the DMZ.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What I was surprised to see what I could still ping the outside interface 1.1.1.1. I presumed, maybe incorrectly, ZBF would inheritly blocked traffic such as ping to the outside interface because it wasn't specified as an exception. How can I block ping to my outside interface 1.1.1.1 without creating an ACL to allow only icmp echo-reply? If I go the route of allowing just icmp echo-reply I will end up having to specifiy everything else I want to pass which defeats the simplicty of ZBF.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My config works as intended. The only thing I want to do is block, or filter icmp allowing only echo-reply, so that my outside interface isn't pingable. I want to do so in the simplest manner possible so I can only worry about adding inspect statements to my ZBF and allowing exceptions for inbound rules per ACL&amp;nbsp;&lt;SPAN&gt;FIREWALL-EXCEPTIONS-ACL.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any FIREWALL-EXCEPTIONS&lt;BR /&gt;match access-group name FIREWALL-EXCEPTIONS-ACL&lt;BR /&gt;class-map type inspect match-any DMZ-ALLOWED-PROTOCOLS&lt;BR /&gt;match protocol telnet&lt;BR /&gt;class-map type inspect match-any LAN-ALLOWED-PROTOCOLS&lt;BR /&gt;match protocol icmp&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect FIREWALL-EXCEPTIONS-POLICY&lt;BR /&gt;class type inspect FIREWALL-EXCEPTIONS&lt;BR /&gt;inspect&lt;BR /&gt;class class-default&lt;BR /&gt;drop&lt;BR /&gt;policy-map type inspect LAN-TO-INTERNET-POLICY&lt;BR /&gt;class type inspect LAN-ALLOWED-PROTOCOLS&lt;BR /&gt;inspect&lt;BR /&gt;class class-default&lt;BR /&gt;policy-map type inspect DMZ-TO-INTERNET-POLICY&lt;BR /&gt;class type inspect DMZ-ALLOWED-PROTOCOLS&lt;BR /&gt;inspect&lt;BR /&gt;class class-default&lt;BR /&gt;!&lt;BR /&gt;zone security INTERNET&lt;BR /&gt;zone security LAN&lt;BR /&gt;zone security DMZ&lt;BR /&gt;zone-pair security ZP-LAN-TO-INTERNET source LAN destination INTERNET&lt;BR /&gt;service-policy type inspect LAN-TO-INTERNET-POLICY&lt;BR /&gt;zone-pair security ZP-DMZ-TO-INTERNET source DMZ destination INTERNET&lt;BR /&gt;service-policy type inspect DMZ-TO-INTERNET-POLICY&lt;BR /&gt;zone-pair security ZP-INTERNET-TO-DMZ source INTERNET destination DMZ&lt;BR /&gt;service-policy type inspect FIREWALL-EXCEPTIONS-POLICY&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/0&lt;BR /&gt;ip address 1.1.1.1 255.255.255.248&lt;BR /&gt;ip nat outside&lt;BR /&gt;zone-member security INTERNET&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/1&lt;BR /&gt;ip address 10.1.0.1 255.255.255.0&lt;BR /&gt;ip nat inside&lt;BR /&gt;zone-member security DMZ&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0&lt;BR /&gt;ip address 10.1.10.1 255.255.255.0&lt;BR /&gt;zone-member security LAN&lt;BR /&gt;!&lt;BR /&gt;ip nat inside source list 1 interface FastEthernet0/0 overload&lt;BR /&gt;ip nat inside source static tcp 10.1.0.3 23 1.1.1.1 2323 extendable&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended FIREWALL-EXCEPTIONS-ACL&lt;BR /&gt;permit tcp any host 10.1.0.2 eq telnet&lt;BR /&gt;permit tcp any host 10.1.0.3 eq telnet&lt;BR /&gt;!&lt;BR /&gt;access-list 1 permit 10.1.10.0 0.0.0.255&lt;BR /&gt;access-list 1 permit 10.1.0.0 0.0.0.255&lt;BR /&gt;access-list 1 deny any&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 14:14:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/default-blocking-with-zbf/m-p/3176086#M1066687</guid>
      <dc:creator>Joe Conklin</dc:creator>
      <dc:date>2020-02-21T14:14:43Z</dc:date>
    </item>
    <item>
      <title>Re: Default blocking with ZBF</title>
      <link>https://community.cisco.com/t5/network-security/default-blocking-with-zbf/m-p/3176100#M1066688</link>
      <description>&lt;P&gt;You will be able to reach self zone because "&lt;SPAN&gt;Traffic to and from the Self zone is unrestricted until you configure explicit rules to the contrary&lt;/SPAN&gt;".&lt;/P&gt;
&lt;P&gt;Source&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/security_management/cisco_security_manager/security_manager/4-1/user/guide/CSMUserGuide_wrapper/fwzbf.html#pgfId-340286" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/security_management/cisco_security_manager/security_manager/4-1/user/guide/CSMUserGuide_wrapper/fwzbf.html#pgfId-340286&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;There is a how-to doc with more details on setting up self zone rules posted here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportforums.cisco.com/t5/security-documents/zbfw-self-zone-integration/ta-p/3154572" target="_blank"&gt;https://supportforums.cisco.com/t5/security-documents/zbfw-self-zone-integration/ta-p/3154572&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 26 Aug 2017 04:25:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/default-blocking-with-zbf/m-p/3176100#M1066688</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-08-26T04:25:27Z</dc:date>
    </item>
    <item>
      <title>Re: Default blocking with ZBF</title>
      <link>https://community.cisco.com/t5/network-security/default-blocking-with-zbf/m-p/3176106#M1066689</link>
      <description>&lt;P&gt;I appended the below to my configuration I posted in my original post. This seems to work and block traffic the self zone. Is there anything about the below you might change? Since I'm defining traffic for self to inspect I do need to add other inspect rules but per the class-default if its not inspected it dropped so I think the below is rather secure. Any disagreement?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object-group network ROUTER-INTERFACES&lt;BR /&gt;host 1.1.1.1&lt;BR /&gt;host 10.1.10.1&lt;BR /&gt;host 10.1.0.1&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect INTERNET-TO-SELF-POLICY&lt;BR /&gt;class class-default&lt;BR /&gt;drop log&lt;BR /&gt;!&lt;BR /&gt;zone-pair security ZP-INTERNET-TO-SELF source INTERNET destination self&lt;BR /&gt;service-policy type inspect INTERNET-TO-SELF-POLICY&lt;/P&gt;</description>
      <pubDate>Sat, 26 Aug 2017 14:58:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/default-blocking-with-zbf/m-p/3176106#M1066689</guid>
      <dc:creator>Joe Conklin</dc:creator>
      <dc:date>2017-08-26T14:58:35Z</dc:date>
    </item>
    <item>
      <title>Re: Default blocking with ZBF</title>
      <link>https://community.cisco.com/t5/network-security/default-blocking-with-zbf/m-p/3176172#M1066690</link>
      <description>&lt;P&gt;Your frustration with the limitations and complexity of IOS ZBFW are understandable. That's one reason why we don't see many of them in real world implementations. Most customers elect instead to put in a proper firewall, be it from Cisco or a third party vendor.&lt;/P&gt;</description>
      <pubDate>Sat, 26 Aug 2017 16:28:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/default-blocking-with-zbf/m-p/3176172#M1066690</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-08-26T16:28:38Z</dc:date>
    </item>
    <item>
      <title>Re: Default blocking with ZBF</title>
      <link>https://community.cisco.com/t5/network-security/default-blocking-with-zbf/m-p/3176203#M1066692</link>
      <description>&lt;P&gt;No frustration, just lacked the right configuration. Yes, a Palo Alto or ASA would make this far easier but&amp;nbsp;that's neither here nor there. I simply needed to confirm the exact steps to limit traffic to the self zone effentiently but now I do without the&amp;nbsp;gratuitous use of ACLs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The below policy-map and zone-pair will do exactly what I wanted which is block all traffic from the Internet by default unless otherwise allowed in as per the exceptions, &lt;STRONG&gt;policy-map type inspect FIREWALL-EXCEPTIONS-POLICY&lt;/STRONG&gt;, in the original config in my first post.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;policy-map type inspect INTERNET-TO-SELF-POLICY
 class class-default
  drop log
!
zone-pair security ZP-INTERNET-TO-SELF source INTERNET destination self
 service-policy type inspect INTERNET-TO-SELF-POLICY&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 26 Aug 2017 21:31:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/default-blocking-with-zbf/m-p/3176203#M1066692</guid>
      <dc:creator>Joe Conklin</dc:creator>
      <dc:date>2017-08-26T21:31:24Z</dc:date>
    </item>
  </channel>
</rss>

