<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Zone-Based Policy Firewall (Packet tracer) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/zone-based-policy-firewall-packet-tracer/m-p/3931770#M24298</link>
    <description>&lt;P&gt;I'm testing out a zone-based policy in Packet Tracer for a project but I want to verify that my commands are correct... Here is my topology.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ZoneBasedTopology.PNG" style="width: 709px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/45771i814C83D96D35BA1D/image-size/large?v=v2&amp;amp;px=999" role="button" title="ZoneBasedTopology.PNG" alt="ZoneBasedTopology.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;What I'm trying to accomplish:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The R1 router should add a new network, which will be a DMZ.&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;Policy is as follows:&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;You should allow web traffic (HTTP and HTTPS&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;ONLY) to get to the Server in the DMZ of R1.&lt;BR /&gt;&lt;BR /&gt;You will add a server to G0/0 of&lt;SPAN&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;R1.&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;Assign following addresses:&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;R1 G0/0 – 192.168.2.1 / 24&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;Server 192.168.2.3/24 with appropriate gateway&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Add a new static route on R2 to get to the new network 192.168.2.0/24 &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The zone-based firewall policy will be done on R1.&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Implement the commands on R1.&lt;SPAN&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;Success would be for PC-C to be able to successfully browse to the 192.168.2.3 server but PC-C should NOT be able to ping 192.168.2.3&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Once you have THAT working, a new policy needs to be added.&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;You should allow pings to the DMZ server as well. Success would mean that PC-C would be able to browse AND ping 192.168.2.3.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Just looking for the appropriate commands to implement. Thanks everyone.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 28 Sep 2019 02:22:50 GMT</pubDate>
    <dc:creator>isaiahhavocc</dc:creator>
    <dc:date>2019-09-28T02:22:50Z</dc:date>
    <item>
      <title>Zone-Based Policy Firewall (Packet tracer)</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-policy-firewall-packet-tracer/m-p/3931770#M24298</link>
      <description>&lt;P&gt;I'm testing out a zone-based policy in Packet Tracer for a project but I want to verify that my commands are correct... Here is my topology.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ZoneBasedTopology.PNG" style="width: 709px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/45771i814C83D96D35BA1D/image-size/large?v=v2&amp;amp;px=999" role="button" title="ZoneBasedTopology.PNG" alt="ZoneBasedTopology.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;What I'm trying to accomplish:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The R1 router should add a new network, which will be a DMZ.&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;Policy is as follows:&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;You should allow web traffic (HTTP and HTTPS&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;ONLY) to get to the Server in the DMZ of R1.&lt;BR /&gt;&lt;BR /&gt;You will add a server to G0/0 of&lt;SPAN&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;R1.&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;Assign following addresses:&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;R1 G0/0 – 192.168.2.1 / 24&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;Server 192.168.2.3/24 with appropriate gateway&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Add a new static route on R2 to get to the new network 192.168.2.0/24 &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The zone-based firewall policy will be done on R1.&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Implement the commands on R1.&lt;SPAN&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;Success would be for PC-C to be able to successfully browse to the 192.168.2.3 server but PC-C should NOT be able to ping 192.168.2.3&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Once you have THAT working, a new policy needs to be added.&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;You should allow pings to the DMZ server as well. Success would mean that PC-C would be able to browse AND ping 192.168.2.3.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Just looking for the appropriate commands to implement. Thanks everyone.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 28 Sep 2019 02:22:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-policy-firewall-packet-tracer/m-p/3931770#M24298</guid>
      <dc:creator>isaiahhavocc</dc:creator>
      <dc:date>2019-09-28T02:22:50Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-Based Policy Firewall (Packet tracer)</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-policy-firewall-packet-tracer/m-p/3932076#M24299</link>
      <description>&lt;P&gt;This is a duplicate question to the one further up in the list that I have already answered, but I will post the config here also.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;ip access-list extended web-to-dmzServer-acl&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&amp;nbsp;permit tcp any host 192.168.2.3 80&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&amp;nbsp;permit tcp any host&amp;nbsp;192.168.2.3 443&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;class-map type inspect match-any web-to-dmzServer-cmap&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&amp;nbsp;match access-group web-to-dmzServer-acl&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;policy-map type inspect web-to-dmzServer-pmap&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&amp;nbsp;class type inspect&amp;nbsp;web-to-dmzServer-cmap&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&amp;nbsp; inspect&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;zone security dmz&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&amp;nbsp;description DMZ services&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;zone security web&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&amp;nbsp;description Internet&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;zone-pair security web-to-dmz-pair source web destination dmz&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;interface Gig0/0/0&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&amp;nbsp;description Internet&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&amp;nbsp;zone-member security web&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;interface Gig0/0/1&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&amp;nbsp;description DMZ&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&amp;nbsp;zone-member security dmz&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Verification:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;show policy-map type inspect zone web&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;show policy-map type inspect zone dmz&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;show policy-map type inspect zone-pair&amp;nbsp;web-to-dmz-pair&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 29 Sep 2019 12:40:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-policy-firewall-packet-tracer/m-p/3932076#M24299</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2019-09-29T12:40:25Z</dc:date>
    </item>
  </channel>
</rss>

