<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ZBF -  New user looking for feedback in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/zbf-new-user-looking-for-feedback/m-p/2093638#M392507</link>
    <description>&lt;P&gt;Hi Community,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It has been a long time since i've worked CLI with Cisco and have just started a small business with a partner and dug out an old 871w to use at the office.&lt;/P&gt;&lt;P&gt;After some time I got it working where Bridged Wireless and Wired are separated into VLAN 1 (Private) and VLAN 2 (Public). We will be adding a VLAN 3 for Voice network later on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So after reading a ton of stuff on ZBF's; my head a spinning, I thought I would tackle it. I am at a design stage only and have mapped out a diagram for the network and started with what sounded as the most complicated section - the self zone.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am basically looking for some general feedback to see if I'm on the correct path overal and maybe offer correction if needed or suggest better methods. Some constructive critisims if you will.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's a learning exercise for me; as I mentioned it's been a long time since I touched CLI with device like this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have attached a speadsheet with diagram and self zone config; look forward to responses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 00:49:37 GMT</pubDate>
    <dc:creator>cluck_hurst76</dc:creator>
    <dc:date>2019-03-12T00:49:37Z</dc:date>
    <item>
      <title>ZBF -  New user looking for feedback</title>
      <link>https://community.cisco.com/t5/network-security/zbf-new-user-looking-for-feedback/m-p/2093638#M392507</link>
      <description>&lt;P&gt;Hi Community,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It has been a long time since i've worked CLI with Cisco and have just started a small business with a partner and dug out an old 871w to use at the office.&lt;/P&gt;&lt;P&gt;After some time I got it working where Bridged Wireless and Wired are separated into VLAN 1 (Private) and VLAN 2 (Public). We will be adding a VLAN 3 for Voice network later on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So after reading a ton of stuff on ZBF's; my head a spinning, I thought I would tackle it. I am at a design stage only and have mapped out a diagram for the network and started with what sounded as the most complicated section - the self zone.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am basically looking for some general feedback to see if I'm on the correct path overal and maybe offer correction if needed or suggest better methods. Some constructive critisims if you will.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's a learning exercise for me; as I mentioned it's been a long time since I touched CLI with device like this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have attached a speadsheet with diagram and self zone config; look forward to responses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:49:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-new-user-looking-for-feedback/m-p/2093638#M392507</guid>
      <dc:creator>cluck_hurst76</dc:creator>
      <dc:date>2019-03-12T00:49:37Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF -  New user looking for feedback</title>
      <link>https://community.cisco.com/t5/network-security/zbf-new-user-looking-for-feedback/m-p/2093639#M392508</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have always thought of the self group as the easy one. Self is the router interfaces itself and if I remember correctly the self zone can go anywhere.&lt;BR /&gt;&lt;BR /&gt;If you can be a little more in depth about what you want and what traffic will need to go where I can help setup your class and policy maps along with the ACLs.&lt;BR /&gt;&lt;BR /&gt;You really just have to think of each area on your network as a zone and define what kind of zone it is with a name. Then you create a policy for traffic in each direction between the zones. The tricky part is when you start needing specific traffic to move across the zones when your action is drop. This is where the ACLs are important. Anyways, get back to me and we can get it all figured out.&lt;BR /&gt;&lt;BR /&gt;Elton&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Jan 2013 04:22:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-new-user-looking-for-feedback/m-p/2093639#M392508</guid>
      <dc:creator>Elton Babcock</dc:creator>
      <dc:date>2013-01-21T04:22:29Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF -  New user looking for feedback</title>
      <link>https://community.cisco.com/t5/network-security/zbf-new-user-looking-for-feedback/m-p/2093640#M392509</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Elton,&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Thanks for the response.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I attached a spreadsheet to the post, but I see you read via the mobile phone J&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will copy and paste the work I’ve done below.&amp;nbsp; Essentially looking at&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Zone A: Private Network (Wired/Wireless Bridge)&lt;/P&gt;&lt;P&gt;Zone B: Public Network (Wired/Wireless Bridge)&lt;/P&gt;&lt;P&gt;Zone C: Self&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Zone &lt;span class="lia-unicode-emoji" title=":anguished_face:"&gt;😧&lt;/span&gt; Outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Zone E: DMZ (nothing there yet, future use)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Zone F: Voice Network&amp;nbsp; (IP based phones)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Zone G: VPN (future use)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As my post said, thought I would work on the self first; as I said, like to learn and understand what I’m doing as I go.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Chris&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;English:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;- deny telnet connectivity from all zones&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;- deny http connectivity from all zones&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;-&amp;nbsp; allow SSH only from private networks&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;-&amp;nbsp; all https only from private networks&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;-&amp;nbsp; allow icmp echo, reply, trace and unreachables from all networks *except *outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;-&amp;nbsp; allow tftp from private network, limited hosts&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;-&amp;nbsp; allow smtp from private network, limited hosts&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;- allow domain lookups&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;*ACLS*&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;ip access-list extended PRIVATE_NETWORK_TO_SELF_ACL&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;permit icmp 192.168.1.0 0.0.0.15 any eq echo-reply&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;permit&amp;nbsp; icmp 192.168.1.0 0.0.0.15 any eq echo&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;permit icmp 192.168.1.0 0.0.0.15 any net-unreachable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;permit tcp 192.168.1.0 0.0.0.15 any eq ssh&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;permit tcp 192.168.1.0 0.0.0.15 any eq 443&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;permit tcp 192.168.1.0 0.0.0.15 any eq domain&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;permit udp 192.168.1.0 0.0.0.15 any eq domain&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;permit udp 192.168.1.0 0.0.0.15 any eq snmp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;permit udp 192.168.1.0 0.0.0.15 any eq tftp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;ip access-list extended PUBLIC_NETWORK_TO_SELF_ACL&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;permit icmp 10.10.10.0 0.0.0.255 any eq echo&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;permit icmp 10.10.10.0 0.0.0.255 any eq echo-reply&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended VOICE_NETWORK_TO_SELF_ACL&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp; permit 192.168.2.0 0.0.0.255 any eq echo-reply&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended SELF_TO_VOICE_NETWORK_ACL&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp; permit icmp any any echo-reply&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp; permit icmp any any echo&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp; permit icmp any any unreachable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended SELF_TO_PRIVATE_NETWORK_ACL&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; permit icmp any any echo&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; permit tcp any any eq ssh&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; permit tcp any any eq www&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; permit tcp any any eq 443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended OUTSIDE_TO_SELF_ACL&lt;/P&gt;&lt;P&gt;&amp;nbsp; deny ip any any&amp;nbsp; &lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended SELF_TO_OUTSIDE_ACL&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;&amp;nbsp; permit icmp any any echo&lt;/P&gt;&lt;P&gt;&amp;nbsp; permit icmp any any traceroute&lt;/P&gt;&lt;P&gt;&amp;nbsp; permit icmp any any unreachable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt;ip access-list extended SELF_TO_PUBLIC_NETWORK&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; permit icmp any any eq echo&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any MANAGEMENT_PROTOCOLS_CMAP&lt;/P&gt;&lt;P&gt;&amp;nbsp; description Protocols used in Management of the router&lt;/P&gt;&lt;P&gt;&amp;nbsp; match protocol tcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; match protocol udp&lt;/P&gt;&lt;P&gt;&amp;nbsp; match protocol icmp&lt;/P&gt;&lt;P&gt;&amp;nbsp; match protocol h323&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;! Traffic originated from Zone A (Private) to Self &lt;/P&gt;&lt;P&gt;class-map type inspect match-all PRIVATE_NETWORK_TO_SELF_CMAP&lt;/P&gt;&lt;P&gt;&amp;nbsp; match access-group name PRIVATE_NETWORK_TO_SELF_ACL&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; match class-map MANAGEMENT_PROTOCOLS_CMAP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&amp;nbsp; Traffic originated from the Self&amp;nbsp; to Zone A (Prviate)&lt;/P&gt;&lt;P&gt;class-map type inspect match-all SELF_TO_PRIVATE NETWORK_CMAP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; match access-group name SELF_TO_PRIVATE_NETWORK_ACL&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; match class-map MANAGEMENT_PROTOCOLS_CMAP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;! Traffic originating Outside (Zone D) to Self&lt;/P&gt;&lt;P&gt;class-map type inspect match-any OUTSIDE_TO_SELF_CMAP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; match access-group name OUTSIDE_TO_SELF_ACL&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; match class-map MANAGEMENT_PROTOCOLS_CMAP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!Traffic originating Self to Outside (Zone D)&lt;/P&gt;&lt;P&gt; class-map type inspect match-any SELF_TO_OUTSIDE_CMAP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; match access-group name SELF_TO_OUTSIDE_ACL&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; match protocol icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;! Traffic originating Self to Zone B (Public)&lt;/P&gt;&lt;P&gt;class-map type inspect match-all SELF_TO_PUBLIC_NETWORK_CMAP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; match access-group name SELF_TO_PUBLIC_NETWORK&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; match protocol icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;! Traffic originating Zone B (Public) to Self&lt;/P&gt;&lt;P&gt;class-map type inspect match-all PUBLIC_NETWORK_TO_SELF_CMAP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; match access-group name PUBLIC_NETWORK_TO_SELF_ACL&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; match protocol icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;! Traffic originating Zone F (Voice) to Self&lt;/P&gt;&lt;P&gt;class-map type inspect match-all&amp;nbsp; VOICE_NETWORK_TO_SELF_CMAP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; match access-group name&amp;nbsp; VOICE_NETWORK_TO_SELF_ACL&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; match protocol icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;! Traffic originating Self to Zone F (Voice)&lt;/P&gt;&lt;P&gt;class-map type inspect match-all SELF_TO_VOICE_NETWORK_CMAP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; match access-group name SELF_TO_VOICE_NETWORK_ACL&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; match protocol icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;! Policy from Outside (Zone D) to Self&lt;/P&gt;&lt;P&gt;policy-map type inspect OUTSIDE_TO_SELF_PMAP&lt;/P&gt;&lt;P&gt;&amp;nbsp; class type inspect OUTSIDE_TO_SELF_CMAP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; drop log&lt;/P&gt;&lt;P&gt;! Policy from Self to Outside (Zone D)&lt;/P&gt;&lt;P&gt;policy-map type inspect&amp;nbsp; SELF_TO_OUTSIDE_PMAP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; class type inspect&amp;nbsp; SELF_TO_OUTSIDE_CMAP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; drop log&lt;/P&gt;&lt;P&gt;! Policy from Private Network (Zone A) to Self&lt;/P&gt;&lt;P&gt;policy-map type inspect&amp;nbsp; PRIVATE_NETWORK_TO_SELF_PMAP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; class type inspect PRIVATE_NETWORK_TO_SELF_CMAP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; pass&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; drop log&lt;/P&gt;&lt;P&gt;! Policy from Self to Private Network (Zone A)&lt;/P&gt;&lt;P&gt;policy-map type inspect&amp;nbsp; SELF_TO_PRIVATE_NETWORK_PMAP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; class type inspect&amp;nbsp; SELF_TO_PRIVATE NETWORK_CMAP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; pass&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; drop log&lt;/P&gt;&lt;P&gt;! Policy from&amp;nbsp; Public Network (Zone B) to Self&lt;/P&gt;&lt;P&gt;policy-map type inspect&amp;nbsp; PUBLIC_NETWORK_TO_SELF_PMAP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; class type inspect&amp;nbsp; PUBLIC_NETWORK_TO_SELF_CMAP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; drop log&lt;/P&gt;&lt;P&gt;! Policy from&amp;nbsp; Self to Public Network (Zone B) &lt;/P&gt;&lt;P&gt;policy-map type inspect&amp;nbsp; SELF_TO_PUBLIC_NETWORK_PMAP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; class type inspect&amp;nbsp; SELF_TO_PUBLIC_NETWORK_CMAP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; drop log&lt;/P&gt;&lt;P&gt;! Policy from&amp;nbsp; Voice Network (Zone F) to Self&lt;/P&gt;&lt;P&gt;policy-map type inspect&amp;nbsp; VOICE_NETWORK_TO_SELF_PMAP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; class type inspect VOICE_NETWORK_TO_SELF_CMAP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; drop log&lt;/P&gt;&lt;P&gt;! Policy from Self to Voice Network (Zone F)&lt;/P&gt;&lt;P&gt;policy-map type inspect&amp;nbsp; SELF_TO_VOICE_NETWORK_PMAP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; class type inspect&amp;nbsp; SELF_TO_VOICE_NETWORK_CMAP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; drop log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;... continued later for VPN and DMZ zones, allowing VPN protocols in self zone if I recall readings&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;'Private Network and Self&lt;/P&gt;&lt;P&gt;zone-pair security PRIVATE_NETWORK_TO_SELF_ZP source PRIVATE_NETWORK destination self&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; service-policy type inspect PRIVATE_NETWORK_TO_SELF_PMAP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone-pair security&amp;nbsp; SELF_TO_PRIVATE_NETWORK_ZP source self destination PRIVATE_NETWORK&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; service-policy type inspect SELF_TO_PRIVATE_NETWORK_PMAP&lt;/P&gt;&lt;P&gt;-------------------------------------------------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;zone-pair security PUBLIC_NETWORK_TO_SELF _ZP source PUBLIC_NETWORK&amp;nbsp; destination self&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; service-policy type inspect PUBLIC_NETWORK_TO_SELF_PMAP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone-pair security SELF_TO_PUBLIC_NETWORK _ZP source self destination PUBLIC_NETWORK&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; service-policy type inspect SELF_TO_PUBLIC_NETWORK_PMAP&lt;/P&gt;&lt;P&gt;-----------------------------------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;zone-pair security VOICE_NETWORK_TO_SELF _ZP source VOICE_NETWORK&amp;nbsp; destination self&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; service-policy type inspect VOICE_NETWORK_TO_SELF_PMAP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone-pair security SELF_TO_VOICE_NETWORK _ZP source self&amp;nbsp; destination VOICE_NETWORK&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; service-policy type inspect&amp;nbsp; SELF_TO_VOICE_NETWORK_PMAP&lt;/P&gt;&lt;P&gt;--------------------------------------------&lt;/P&gt;&lt;P&gt;zone-pair security OUTSIDE_TO_SELF _ZP source OUTSIDE&amp;nbsp; destination self&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; service-policy type inspect OUTSIDE_TO_SELF_PMAP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone-pair security SELF_TO_OUTSIDE_ZP source&amp;nbsp; self destination OUTSIDE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; service-policy type inspect SELF_TO_OUTSIDE_CMAP&lt;/P&gt;&lt;P&gt;------------------------------------------------------------&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jan 2013 15:32:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-new-user-looking-for-feedback/m-p/2093640#M392509</guid>
      <dc:creator>cluck_hurst76</dc:creator>
      <dc:date>2013-01-22T15:32:36Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF -  New user looking for feedback</title>
      <link>https://community.cisco.com/t5/network-security/zbf-new-user-looking-for-feedback/m-p/2093641#M392513</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; It really does look like your on the right track. Just some things to be mindful of. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Being that the self zone is essentially traffic originating from the router and coming into the router itself, you probably don't need a subnet defined in the ACL. A host address would probably work fine. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Everything appears to look good and it should work. My suggestion is just get things up and running and then implement the FW policies one at a time to help with troubleshooting problems. Trying to do it all at once could be a nightmare. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Elton&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jan 2013 16:42:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-new-user-looking-for-feedback/m-p/2093641#M392513</guid>
      <dc:creator>Elton Babcock</dc:creator>
      <dc:date>2013-01-22T16:42:08Z</dc:date>
    </item>
  </channel>
</rss>

