<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IOS Zone Based Firewall Blocking Internet Ingress in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ios-zone-based-firewall-blocking-internet-ingress/m-p/2089466#M394171</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First I would create the zones it self&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone security OUTSIDE&lt;/P&gt;&lt;P&gt;zone security INSIDE&lt;/P&gt;&lt;P&gt;zone security EDMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;1)&lt;/STRONG&gt; I guess you mean from the Internet to the router it self?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any HTTP_CMAP&lt;/P&gt;&lt;P&gt; match protocol http&lt;/P&gt;&lt;P&gt; match protocol https&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect OUTSIDE-SELF_PMAP&lt;/P&gt;&lt;P&gt; class type inspect HTTP_CMAP&lt;/P&gt;&lt;P&gt;&amp;nbsp; pass &lt;EM&gt;! traffic to the self zone can't be statefully inspected.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt; class class-default &lt;EM&gt;! This is a default class that is already there and this affects all traffic that is not matched by a previus class-map&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; drop&lt;EM&gt; ! It is a default permit in the default class-map when it is applied to the self zone so it has to be changed.&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone-pair security OUTSIDE-SELF source OUTSIDE destination self&lt;/P&gt;&lt;P&gt; service-policy type inspect OUTSIDE-SELF_PMAP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;2)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For security reasons I always create an ACL where I permitt all my LANs IP-ranges.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list standard LAN-IP-ADDRESSES&lt;/P&gt;&lt;P&gt; permit 192.168.0.0 0.0.0.255&lt;/P&gt;&lt;P&gt; permit 192.168.1.0 0.0.0.255&lt;/P&gt;&lt;P&gt; etc....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect LAN-IP-ADDRESSES_CMAP&lt;/P&gt;&lt;P&gt; match access-group name LAN-IP-ADDRESSES&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect INSIDE-OUTSIDE_PMAP&lt;/P&gt;&lt;P&gt; class type inspect LAN-IP-ADDRESSES_CMAP&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect &lt;EM&gt;! Now traffic is inspected statfully when it is going between zones.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone-pair security INSIDE-OUTSIDE source INSIDE destination OUTSIDE&lt;/P&gt;&lt;P&gt; service-policy type inspect INSIDE-OUTSIDE_PMAP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;3)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Just put them in the same zone, this is done last, because if you put things in zones before you make the policys everything will be blocked until you have made them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;4)&lt;/STRONG&gt; 4 and 5 sounds exactly the same to me?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now it depends on if you want to permit specific traffic to the EDMZ/DMZ(?) or if you want to den specific traffic? Sounds like you want to deny specific traffic, but that is not the best way so because then you have no control so I will demonstate the other way around.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any SPECIFIC-TRAFFIC_CMAP &lt;EM&gt;! Make sure to do a match-any if you want more than two protocol to be matched.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt; match protocol SPECIFIC-PROTOCOL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect OUTSIDE-EDMZ_PMAP&lt;/P&gt;&lt;P&gt; class type inspect SPECIFIC-TRAFFIC_CMAP&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone-pair security OUTSIDE-EDMZ source OUTSIDE destination EDMZ&lt;/P&gt;&lt;P&gt; service-policy type inspect OUTSIDE-EDMZ_PMAP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Last thing to do:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; Is to add the zones to the interfaces:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface gi0/0&lt;/P&gt;&lt;P&gt;zone-member OUTSIDE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface something-inside&lt;/P&gt;&lt;P&gt;zone-member INSIDE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface something-inside2&lt;/P&gt;&lt;P&gt;zone-member INSIDE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;inteface edmz&lt;/P&gt;&lt;P&gt;zone-member EDMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just wrote this from my head so a everything maybe isn't correctly spelled all the way.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 13 Dec 2012 09:46:52 GMT</pubDate>
    <dc:creator>Henrik Grankvist</dc:creator>
    <dc:date>2012-12-13T09:46:52Z</dc:date>
    <item>
      <title>IOS Zone Based Firewall Blocking Internet Ingress</title>
      <link>https://community.cisco.com/t5/network-security/ios-zone-based-firewall-blocking-internet-ingress/m-p/2089465#M394169</link>
      <description>&lt;P&gt;I'm very new to the concept of a firewalls. I'm attempting to block specific traffic from the internet into my router and allow only certain traffic out. Each representing the traffic flow. Example of the zone's and zone pairs would be. I'm confused about the SELF zone and if it even comes into play here with the WAN zone.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;---ZONES---&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="1" cellpadding="3" cellspacing="0" class="jiveBorder" height="93" style="border: 1px solid #000000; width: 753px;"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TH align="center" style="background-color: #6690bc;" valign="middle"&gt;&lt;SPAN style="color: #ffffff;"&gt;&lt;STRONG&gt;ZONE&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TH&gt;&lt;TH align="center" style="background-color: #6690bc;" valign="middle"&gt;&lt;SPAN style="color: #ffffff;"&gt;&lt;STRONG&gt;Description&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TH&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;ZONE-WAN&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;Internet access comes into interface Gi0/0.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;ZONE LAN&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;VLANS 1-6 host users who need unfiltered access out to the internet and unfiltered between each other.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;ZONE EDMZ&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;VLAN 7 needs specific traffic restricted in from the WAN and other specific traffic filtered out to the WAN. &lt;/P&gt;&lt;P&gt;Some traffic from the LAN to the EDMZ needs to be filtered but any traffic from the EDMZ should get to the LAN.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;---ZONE PAIRS---&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ZONE-PAIR SELF-&amp;gt;WAN&lt;/P&gt;&lt;P&gt;ZONE-PAIR WAN-&amp;gt;SELF&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ZONE-PAIR LAN-&amp;gt;WAN&lt;/P&gt;&lt;P&gt;ZONE-PAIR WAN-&amp;gt;LAN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ZONE-PAIR WAN-&amp;gt;EDMZ&lt;/P&gt;&lt;P&gt;ZONE-PAIR EDMZ-&amp;gt;WAN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ZONE-PAIR LAN-&amp;gt;EDMZ&lt;/P&gt;&lt;P&gt;ZONE-PAIR EDMZ-LAN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using the Zone's and Pairs above (or if any of them can be eliminated) how would I:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) allow only http and https traffic in to the router from the WAN (WAN/ISP connection on interface Gi0/0). All other traffic should be dropped.&lt;/P&gt;&lt;P&gt;2) allow all traffic out to the WAN in a stateful fashion from the LAN on all VLANS (1,2,3,4,5,6). So my users have access to everything on the internet.&lt;/P&gt;&lt;P&gt;3) allow all traffic between all VLANS (1,2,3,4,5,6). Nothing is filtered.&lt;/P&gt;&lt;P&gt;4) restrict specific traffic into the EDMZ from the WAN.&lt;/P&gt;&lt;P&gt;5) restrict specific traffic from the WAN to the EDM&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:36:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-zone-based-firewall-blocking-internet-ingress/m-p/2089465#M394169</guid>
      <dc:creator>Rob Cluett</dc:creator>
      <dc:date>2019-03-12T00:36:41Z</dc:date>
    </item>
    <item>
      <title>IOS Zone Based Firewall Blocking Internet Ingress</title>
      <link>https://community.cisco.com/t5/network-security/ios-zone-based-firewall-blocking-internet-ingress/m-p/2089466#M394171</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First I would create the zones it self&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone security OUTSIDE&lt;/P&gt;&lt;P&gt;zone security INSIDE&lt;/P&gt;&lt;P&gt;zone security EDMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;1)&lt;/STRONG&gt; I guess you mean from the Internet to the router it self?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any HTTP_CMAP&lt;/P&gt;&lt;P&gt; match protocol http&lt;/P&gt;&lt;P&gt; match protocol https&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect OUTSIDE-SELF_PMAP&lt;/P&gt;&lt;P&gt; class type inspect HTTP_CMAP&lt;/P&gt;&lt;P&gt;&amp;nbsp; pass &lt;EM&gt;! traffic to the self zone can't be statefully inspected.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt; class class-default &lt;EM&gt;! This is a default class that is already there and this affects all traffic that is not matched by a previus class-map&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; drop&lt;EM&gt; ! It is a default permit in the default class-map when it is applied to the self zone so it has to be changed.&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone-pair security OUTSIDE-SELF source OUTSIDE destination self&lt;/P&gt;&lt;P&gt; service-policy type inspect OUTSIDE-SELF_PMAP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;2)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For security reasons I always create an ACL where I permitt all my LANs IP-ranges.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list standard LAN-IP-ADDRESSES&lt;/P&gt;&lt;P&gt; permit 192.168.0.0 0.0.0.255&lt;/P&gt;&lt;P&gt; permit 192.168.1.0 0.0.0.255&lt;/P&gt;&lt;P&gt; etc....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect LAN-IP-ADDRESSES_CMAP&lt;/P&gt;&lt;P&gt; match access-group name LAN-IP-ADDRESSES&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect INSIDE-OUTSIDE_PMAP&lt;/P&gt;&lt;P&gt; class type inspect LAN-IP-ADDRESSES_CMAP&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect &lt;EM&gt;! Now traffic is inspected statfully when it is going between zones.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone-pair security INSIDE-OUTSIDE source INSIDE destination OUTSIDE&lt;/P&gt;&lt;P&gt; service-policy type inspect INSIDE-OUTSIDE_PMAP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;3)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Just put them in the same zone, this is done last, because if you put things in zones before you make the policys everything will be blocked until you have made them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;4)&lt;/STRONG&gt; 4 and 5 sounds exactly the same to me?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now it depends on if you want to permit specific traffic to the EDMZ/DMZ(?) or if you want to den specific traffic? Sounds like you want to deny specific traffic, but that is not the best way so because then you have no control so I will demonstate the other way around.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any SPECIFIC-TRAFFIC_CMAP &lt;EM&gt;! Make sure to do a match-any if you want more than two protocol to be matched.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt; match protocol SPECIFIC-PROTOCOL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect OUTSIDE-EDMZ_PMAP&lt;/P&gt;&lt;P&gt; class type inspect SPECIFIC-TRAFFIC_CMAP&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone-pair security OUTSIDE-EDMZ source OUTSIDE destination EDMZ&lt;/P&gt;&lt;P&gt; service-policy type inspect OUTSIDE-EDMZ_PMAP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Last thing to do:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; Is to add the zones to the interfaces:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface gi0/0&lt;/P&gt;&lt;P&gt;zone-member OUTSIDE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface something-inside&lt;/P&gt;&lt;P&gt;zone-member INSIDE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface something-inside2&lt;/P&gt;&lt;P&gt;zone-member INSIDE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;inteface edmz&lt;/P&gt;&lt;P&gt;zone-member EDMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just wrote this from my head so a everything maybe isn't correctly spelled all the way.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Dec 2012 09:46:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-zone-based-firewall-blocking-internet-ingress/m-p/2089466#M394171</guid>
      <dc:creator>Henrik Grankvist</dc:creator>
      <dc:date>2012-12-13T09:46:52Z</dc:date>
    </item>
  </channel>
</rss>

