<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hello; in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/protocol-acl-in-zone-based-policy-firewall/m-p/2789494#M173626</link>
    <description>&lt;P&gt;Hello;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Excellent question. So, all 3 are correct, what you need to be very careful is exactly what you mentioned, protocols that open dynamic ports (I.E passive FTP) &amp;nbsp;where the control channel may not be inspected using the protocol, hence treating it like a normal TCP connection and the secondary connection, if not allowed explicitly, would be dropped.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Rather than doing this:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;class-map type inspect match-any ALLOWED-PROTOCOLS&lt;BR /&gt;match protocol ftp&lt;BR /&gt;match protocol tcp&lt;BR /&gt;match protocol udp&lt;BR /&gt;match protocol icmp&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I would probably create different class maps for specific protocols and pile them just like you did, more specific first.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Many people configure ZBFW but they normally just leave it like wide open, it is very important to be sure you are locking your device down and not just inspecting traffic.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Cheers.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Mike.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 04 Jan 2016 20:09:29 GMT</pubDate>
    <dc:creator>Maykol Rojas</dc:creator>
    <dc:date>2016-01-04T20:09:29Z</dc:date>
    <item>
      <title>Protocol ACL in Zone Based Policy Firewall</title>
      <link>https://community.cisco.com/t5/network-security/protocol-acl-in-zone-based-policy-firewall/m-p/2789493#M173625</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I am working on developing configurations for IOS Zone Based Firewall and have this question.&lt;/P&gt;
&lt;P&gt;When creating a class-map to inspect traffic traversing from my trusted INSIDE zone to the OUTSIDE zone, and I want to inspect all protocols, I would create a class-map such as:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;class-map type inspect match-any ALLOWED-PROTOCOLS&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; match protocol tcp&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; match protocol udp&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; match protocol icmp&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;but I have read that this could create problems with certain protocols under tcp (such as ftp), and that ordering matters, so the more specific protocols need to be put before tcp like so:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;class-map type inspect match-any ALLOWED-PROTOCOLS&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;match protocol ftp&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;match protocol tcp&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; match protocol udp&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; match protocol icmp&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Another option I have seen mentioned is to use a permit any any ACL instead like this:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;ip access-list extended ALLOW-ALL-PROTOCOLS&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;permit ip any any&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;class-map type inspect match-any ALLOWED-PROTOCOLS-CMAP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;match access-group name ALLOW-ALL-PROTOCOLS&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;policy-map type inspect IN-TO-OUT-POLICY &amp;nbsp;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;class type inspect ALLOWED-PROTOCOLS-CMAP&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp; inspect&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;class class-default&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp; drop log&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;This generates a warning when configuring the policy map that no protocols are defined, and so all protocols will be inspected.&lt;/P&gt;
&lt;P&gt;This seems to work fine in the lab, but I am wondering if there is something incorrect about doing it this way that I am missing, and that will come back to bite me later when this starts rolling out to production installations. It seems like a way to avoid any ordering issues if I am trusting all protocols anyway, but I have only seen one example of someone doing it this way instead of matching specific protocols.&lt;/P&gt;
&lt;P&gt;Any opinions and input would be appreciated.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:05:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/protocol-acl-in-zone-based-policy-firewall/m-p/2789493#M173625</guid>
      <dc:creator>m.griffith</dc:creator>
      <dc:date>2019-03-12T07:05:57Z</dc:date>
    </item>
    <item>
      <title>Hello;</title>
      <link>https://community.cisco.com/t5/network-security/protocol-acl-in-zone-based-policy-firewall/m-p/2789494#M173626</link>
      <description>&lt;P&gt;Hello;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Excellent question. So, all 3 are correct, what you need to be very careful is exactly what you mentioned, protocols that open dynamic ports (I.E passive FTP) &amp;nbsp;where the control channel may not be inspected using the protocol, hence treating it like a normal TCP connection and the secondary connection, if not allowed explicitly, would be dropped.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Rather than doing this:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;class-map type inspect match-any ALLOWED-PROTOCOLS&lt;BR /&gt;match protocol ftp&lt;BR /&gt;match protocol tcp&lt;BR /&gt;match protocol udp&lt;BR /&gt;match protocol icmp&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I would probably create different class maps for specific protocols and pile them just like you did, more specific first.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Many people configure ZBFW but they normally just leave it like wide open, it is very important to be sure you are locking your device down and not just inspecting traffic.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Cheers.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Mike.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jan 2016 20:09:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/protocol-acl-in-zone-based-policy-firewall/m-p/2789494#M173626</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2016-01-04T20:09:29Z</dc:date>
    </item>
    <item>
      <title>Thanks for your response. I</title>
      <link>https://community.cisco.com/t5/network-security/protocol-acl-in-zone-based-policy-firewall/m-p/2789495#M173627</link>
      <description>&lt;P&gt;Thanks for your response. I am locking down my router with C3PL and the self zone. Just did not include that here to avoid confusion from my main question, which as you pointed out, is protocols which may create a secondary connection.&lt;/P&gt;
&lt;P&gt;The crux of the questions is, do you know if you just inspect all protocols without defining them specifically with individual match protocol statements (using a permit any any ACL instead), is the ZBF smart enough to order them correctly on its own and compensate for any situations, such as passive ftp secondary channels? It would make the configuration less error-prone if it did work, but if not, it could have the exact opposite result.&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Mark&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jan 2016 00:51:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/protocol-acl-in-zone-based-policy-firewall/m-p/2789495#M173627</guid>
      <dc:creator>m.griffith</dc:creator>
      <dc:date>2016-01-05T00:51:51Z</dc:date>
    </item>
  </channel>
</rss>

