<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Zone Based Firewall allowing unwanted traffic in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/zone-based-firewall-allowing-unwanted-traffic/m-p/2354737#M309505</link>
    <description>&lt;P&gt;I'm testing zone based firewall zbf&amp;nbsp; in preperation to deploy.&amp;nbsp; However I'm running into an issue that I need assistance with.&amp;nbsp; I've attached a copy of my test topology for reference.&amp;nbsp; But to explain I have this environment:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PCs - Servers - Registers - Vendors&lt;/P&gt;&lt;P&gt;I have eigrp configured on&amp;nbsp; to take traffic to HQ (R4) with a vti interface as backup in case the primary goes down.&lt;/P&gt;&lt;P&gt;I also have a public interface on R1 for internet traffic.&lt;/P&gt;&lt;P&gt;I have created sub-interfaces and placed these respective systems in their own vlan.&amp;nbsp; I'm doing routing on a stick for the routing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is what I need to accomplish:&lt;/P&gt;&lt;P&gt;The vendors cannot talk to anything except inbound and outbound internet traffic (public zone)&lt;/P&gt;&lt;P&gt;Servers and PC's can talk to each other&lt;/P&gt;&lt;P&gt;registers and server can talk to each other.&amp;nbsp; So pc and registeres cannot talk to each other.&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't want to restrict based on ACL.&amp;nbsp; So I'm allowing pretty much anything in my policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I ping between an unauthorized zone, for example vendor to store, It acts like it's not allowing it.&amp;nbsp; Which is what I want.&amp;nbsp; I get 4 request time outs.&amp;nbsp; However if I up arrow and try again I get replies.&amp;nbsp; Allowing traffic between two unauthorized zones.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Requesting assistance in getting this issue resolved.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks.&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 03:00:41 GMT</pubDate>
    <dc:creator>ty.masse</dc:creator>
    <dc:date>2019-03-12T03:00:41Z</dc:date>
    <item>
      <title>Zone Based Firewall allowing unwanted traffic</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-allowing-unwanted-traffic/m-p/2354737#M309505</link>
      <description>&lt;P&gt;I'm testing zone based firewall zbf&amp;nbsp; in preperation to deploy.&amp;nbsp; However I'm running into an issue that I need assistance with.&amp;nbsp; I've attached a copy of my test topology for reference.&amp;nbsp; But to explain I have this environment:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PCs - Servers - Registers - Vendors&lt;/P&gt;&lt;P&gt;I have eigrp configured on&amp;nbsp; to take traffic to HQ (R4) with a vti interface as backup in case the primary goes down.&lt;/P&gt;&lt;P&gt;I also have a public interface on R1 for internet traffic.&lt;/P&gt;&lt;P&gt;I have created sub-interfaces and placed these respective systems in their own vlan.&amp;nbsp; I'm doing routing on a stick for the routing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is what I need to accomplish:&lt;/P&gt;&lt;P&gt;The vendors cannot talk to anything except inbound and outbound internet traffic (public zone)&lt;/P&gt;&lt;P&gt;Servers and PC's can talk to each other&lt;/P&gt;&lt;P&gt;registers and server can talk to each other.&amp;nbsp; So pc and registeres cannot talk to each other.&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't want to restrict based on ACL.&amp;nbsp; So I'm allowing pretty much anything in my policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I ping between an unauthorized zone, for example vendor to store, It acts like it's not allowing it.&amp;nbsp; Which is what I want.&amp;nbsp; I get 4 request time outs.&amp;nbsp; However if I up arrow and try again I get replies.&amp;nbsp; Allowing traffic between two unauthorized zones.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Requesting assistance in getting this issue resolved.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:00:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-allowing-unwanted-traffic/m-p/2354737#M309505</guid>
      <dc:creator>ty.masse</dc:creator>
      <dc:date>2019-03-12T03:00:41Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall allowing unwanted traffic</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-allowing-unwanted-traffic/m-p/2354738#M309508</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;To the benefit of others.&amp;nbsp; &lt;/STRONG&gt;Here is what I found out on the zone based firewall issue I was having.&lt;/P&gt;&lt;P&gt;Everything was setup correctly.&amp;nbsp; However I found out during multiple tests that if you have common zones, all of them will be able to talk to each other.&lt;/P&gt;&lt;P&gt;In my test, I had:&amp;nbsp; pos zone - server zone&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; pc zone - server zone&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;I do not want pos zone - pc zone&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However since the server zone is common between pos and pc, all&amp;nbsp; 3 could talk to each other even if you don't have a zone pair for the two zones that you're trying to exclude,&amp;nbsp; even if your policy doesn't explicly allow the zone you're trying to exclude.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That's a big gotcha in zbuf (that's wat I call ZBF) configuration.&amp;nbsp; That issue is not&amp;nbsp; docummented anywhere that I could find.&lt;/P&gt;&lt;P&gt;If there are no common zones zbuf works as intended with no issues.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Fix:&lt;/STRONG&gt;&amp;nbsp; Fortunetly the fix to this issue is very simple.&amp;nbsp; This is what I did to fix it.&lt;/P&gt;&lt;P&gt;1. Create an ACL and deny source and destination of the 2 zones you don't want to talk to each other.&amp;nbsp; In my case I explicitely denied traffic from pos to pc and pc to pos.&amp;nbsp; I allowed everything else.&amp;nbsp; &lt;/P&gt;&lt;P&gt;2. Create class map and match that acl.&lt;/P&gt;&lt;P&gt;3. Done.&lt;/P&gt;&lt;P&gt;Now everyting works as intended, and pos and pc traffic vice versa are dropped.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this Helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Nov 2013 22:15:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-allowing-unwanted-traffic/m-p/2354738#M309508</guid>
      <dc:creator>ty.masse</dc:creator>
      <dc:date>2013-11-11T22:15:19Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall allowing unwanted traffic</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-allowing-unwanted-traffic/m-p/2354739#M309511</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Ty,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just trying to help here &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is the whole purpose of ZBFW. By default traffic within the same zones will be allowed &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But what you will love is how on 15.0(1)M intra-support filtering is available for you to go.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if you want to restrict traffic from host A to host B on zone AB create the right policy and assigned&amp;nbsp; to &lt;/P&gt;&lt;P&gt;zone-pair AB-to-AB source AB destination AB &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That's it!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rate all of the helpful posts!!! &lt;BR /&gt; &lt;BR /&gt;Regards, &lt;BR /&gt; &lt;BR /&gt;Jcarvaja &lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Follow me on &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Nov 2013 22:56:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-allowing-unwanted-traffic/m-p/2354739#M309511</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-11-11T22:56:06Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall allowing unwanted traffic</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-allowing-unwanted-traffic/m-p/2354740#M309513</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks for your reply.&amp;nbsp;&amp;nbsp;&amp;nbsp; I understand that traffic withing the same zone can see each other.&amp;nbsp; However my issue was different.&amp;nbsp;&amp;nbsp; I had three distinct zones.&amp;nbsp; ABC with zone pairs AB and AC.&amp;nbsp; I didn't want BC traffic.&amp;nbsp;&amp;nbsp;&amp;nbsp; The new feature in 15.0 that you described is pretty cool.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Nov 2013 01:23:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-allowing-unwanted-traffic/m-p/2354740#M309513</guid>
      <dc:creator>ty.masse</dc:creator>
      <dc:date>2013-11-12T01:23:36Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall allowing unwanted traffic</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-allowing-unwanted-traffic/m-p/2354741#M309517</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Not sure I follow this:&lt;/P&gt;&lt;P&gt; I had three distinct zones.&amp;nbsp; ABC with zone pairs AB and AC.&amp;nbsp; I didn't want BC traffic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Be more specific please&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rate all of the helpful posts!!! &lt;BR /&gt; &lt;BR /&gt;Regards, &lt;BR /&gt; &lt;BR /&gt;Jcarvaja &lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Follow me on &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Nov 2013 01:36:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-allowing-unwanted-traffic/m-p/2354741#M309517</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-11-12T01:36:36Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall allowing unwanted traffic</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-allowing-unwanted-traffic/m-p/2354742#M309521</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Three zones: &lt;/P&gt;&lt;P&gt;zone sec a&lt;/P&gt;&lt;P&gt;zone sec b&lt;/P&gt;&lt;P&gt;zone sec c&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;int e1&lt;/P&gt;&lt;P&gt;zone-mem sec a&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;int e2 &lt;/P&gt;&lt;P&gt;zone-mem sec b&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;int e3&lt;/P&gt;&lt;P&gt;zone-mem sec c&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone-pair policy source a destination b&lt;/P&gt;&lt;P&gt;zone-pair policy source a destination c&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If my policy is icmp, I can ping between all three.&amp;nbsp; However as I mentioned.&amp;nbsp; I have found a work around.&amp;nbsp; In fact that's the only way it will work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that make sense.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Nov 2013 02:10:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-allowing-unwanted-traffic/m-p/2354742#M309521</guid>
      <dc:creator>ty.masse</dc:creator>
      <dc:date>2013-11-12T02:10:55Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall allowing unwanted traffic</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-allowing-unwanted-traffic/m-p/2354743#M309528</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So are u saying that fraffic from C to B is allowed with this configuration?? What the heck????&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can U post it? So I can confirm it?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rate all of the helpful posts!!! &lt;BR /&gt; &lt;BR /&gt;Regards, &lt;BR /&gt; &lt;BR /&gt;Jcarvaja &lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Follow me on &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Nov 2013 02:14:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-allowing-unwanted-traffic/m-p/2354743#M309528</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-11-12T02:14:19Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall allowing unwanted traffic</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-allowing-unwanted-traffic/m-p/2354744#M309531</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Yes.&amp;nbsp; I've attached the configs in my original post.&amp;nbsp; Now keep in mind those interfaces are subinterfaces to route between the three vlans.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Nov 2013 02:37:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-allowing-unwanted-traffic/m-p/2354744#M309531</guid>
      <dc:creator>ty.masse</dc:creator>
      <dc:date>2013-11-12T02:37:18Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall allowing unwanted traffic</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-allowing-unwanted-traffic/m-p/2354745#M309536</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looks like &lt;A href="https://tools.cisco.com/bugsearch/bug/CSCsz36217"&gt;https://tools.cisco.com/bugsearch/bug/CSCsz36217&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you try with other traffic than TCP/UDP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rate all of the helpful posts!!! &lt;BR /&gt; &lt;BR /&gt;Regards, &lt;BR /&gt; &lt;BR /&gt;Jcarvaja &lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Follow me on &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Nov 2013 02:53:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-allowing-unwanted-traffic/m-p/2354745#M309536</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-11-12T02:53:28Z</dc:date>
    </item>
  </channel>
</rss>

