<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ZBF - Clarification in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/zbf-clarification/m-p/2705638#M193505</link>
    <description>&lt;P&gt;HI all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am just seeking a bit of clarification with regards to Zonebased Firewalls (Cisco 1921)&lt;/P&gt;&lt;P&gt;I have a ZBF with a number of internal Zones, non of these will need to talk between each other, I have an uplink to an upstream provider router that provides WAN services back to our data centre for remote sites. Am I correct in thinking that I need to configure the interface between the ZBF and the provider router into its own zone?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Clients will be accessing services back in our data centre but they will need to traverse this WAN&amp;nbsp;zone.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hope this makes sense, I think I am on the right track, any help would be much appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Edge Site&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; HQ&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Internal Zones|----(ZBF)---(PROVIDER ROUTER&lt;/STRONG&gt;&lt;EM&gt;&lt;STRONG&gt;)-------&lt;/STRONG&gt;WAN&lt;/EM&gt;--------(&lt;STRONG&gt;PROVIDER ROUTER)-------(LAN WITH FILE SERVER&lt;/STRONG&gt;)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 06:18:53 GMT</pubDate>
    <dc:creator>craig.cartlidge1</dc:creator>
    <dc:date>2019-03-12T06:18:53Z</dc:date>
    <item>
      <title>ZBF - Clarification</title>
      <link>https://community.cisco.com/t5/network-security/zbf-clarification/m-p/2705638#M193505</link>
      <description>&lt;P&gt;HI all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am just seeking a bit of clarification with regards to Zonebased Firewalls (Cisco 1921)&lt;/P&gt;&lt;P&gt;I have a ZBF with a number of internal Zones, non of these will need to talk between each other, I have an uplink to an upstream provider router that provides WAN services back to our data centre for remote sites. Am I correct in thinking that I need to configure the interface between the ZBF and the provider router into its own zone?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Clients will be accessing services back in our data centre but they will need to traverse this WAN&amp;nbsp;zone.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hope this makes sense, I think I am on the right track, any help would be much appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Edge Site&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; HQ&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Internal Zones|----(ZBF)---(PROVIDER ROUTER&lt;/STRONG&gt;&lt;EM&gt;&lt;STRONG&gt;)-------&lt;/STRONG&gt;WAN&lt;/EM&gt;--------(&lt;STRONG&gt;PROVIDER ROUTER)-------(LAN WITH FILE SERVER&lt;/STRONG&gt;)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:18:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-clarification/m-p/2705638#M193505</guid>
      <dc:creator>craig.cartlidge1</dc:creator>
      <dc:date>2019-03-12T06:18:53Z</dc:date>
    </item>
    <item>
      <title>Hi Craig.when you configure</title>
      <link>https://community.cisco.com/t5/network-security/zbf-clarification/m-p/2705639#M193506</link>
      <description>&lt;P&gt;Hi Craig.&lt;/P&gt;&lt;P&gt;when you configure ZBF there are few rules:&lt;/P&gt;&lt;P&gt;security zone = interface/ interfaces.&lt;/P&gt;&lt;P&gt;Data between two created security zones is droped by default&amp;nbsp;&lt;/P&gt;&lt;P&gt;So you should add interfaces in zones, create zone-pairs (which have direction) and assign a policy to this zone-pair, in policy you shiuld select (using class-maps) traffic that you want to traverse your device and inspect it.&lt;/P&gt;&lt;P&gt;Config example for your scenario:&lt;/P&gt;&lt;P&gt;zone security IN&lt;BR /&gt;zone security OUT&lt;/P&gt;&lt;P&gt;interface Gi1 (inside interface)&lt;BR /&gt;&amp;nbsp; &amp;nbsp;zone-member security IN&lt;BR /&gt;int Gi2&lt;BR /&gt;&amp;nbsp; &amp;nbsp;zone-member security OUT&lt;/P&gt;&lt;P&gt;class-map type inspect match-any/all IN-to-OUT_CM (this traffic we want to permit)&lt;BR /&gt;&amp;nbsp; use whatever match criteria you want (addresses, protocols, ports, DSCP, etc)&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect IN-to-OUT_PM&lt;BR /&gt;&amp;nbsp;class type inspect IN-to-OUT_CM&lt;BR /&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;(inspect means&amp;nbsp;that an answers for your sessions will be allowed to come back)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;zone-pair security IN-OUT source IN destination OUT&lt;BR /&gt;&amp;nbsp;service-policy type inspect IN-to-OUT_PM&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can use many classes in a single policy-map, main point is you must use identical type (inspect, according ZBF)&lt;/P&gt;&lt;P&gt;if you have several internal zones you should write many zecurity-pairs, and if you &amp;nbsp;lazy enought- use same policy in every zone-pair, or use individual policy for each zone-pair.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;&lt;P&gt;Alex&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jul 2015 13:19:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-clarification/m-p/2705639#M193506</guid>
      <dc:creator>CSCO12029650</dc:creator>
      <dc:date>2015-07-22T13:19:51Z</dc:date>
    </item>
  </channel>
</rss>

