<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Turn from reflexive ACLs to Zone-based-Firewall with many VLANs in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/turn-from-reflexive-acls-to-zone-based-firewall-with-many-vlans/m-p/1854347#M492062</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank You for Your answer, but that makes it even more complicated... &lt;/P&gt;&lt;P&gt;Let me explain why I am hesitating doing this. For example, I have: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; interface Gi1/0.101&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; desc VLAN 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip address 1.1.1.1/24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip access-group in-vlan1-filter in&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip access-group out-vlan1-filter out&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; int Gi1/0.102&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; desc VLAN2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip address 2.2.2.1/24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip access-group in-vlan2-filter in&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip access-group out-vlan2-filter out&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; int Gi1/0.103&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; desc VLAN3&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip address 3.3.3.1/24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip access-group in-vlan3-filter in&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip access-group out-vlan3-filter out&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;=&amp;gt; until now, I had the above named ACLs on each vlan-subinterface, for example:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip access-list extended out-vlan2-filter&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit tcp host 1.1.1.5 host 2.2.2.15 eq 22&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit udp any&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; host 2.2.2.50 eq 4500&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit tcp host 3.3.3.9 host 2.2.2.22 eq 80&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; etc...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;=&amp;gt; which makes 6 different ACLs in the above case. With ZFW, I need a zone-pair "in-out" and "out-in" for each vlan and additional two zone-pairs for the inter-vlan-communicatio, which makes, in this case, 6 additional zone-pairs (zone-pair "vlan1-vlan2"/"vlan1-vlan3"/"vlan2-vlan1"/"vlan2-vlan3"/"vlan3-vlan1"/"vlan3-vlan2"). So, if I have 9 different VLANs (if my calculation is right), I have 45 different zone-pairs just for inter-vlan-communication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just want to ask if there is a easier way&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 01 Dec 2011 05:59:26 GMT</pubDate>
    <dc:creator>Stefan Giera</dc:creator>
    <dc:date>2011-12-01T05:59:26Z</dc:date>
    <item>
      <title>Turn from reflexive ACLs to Zone-based-Firewall with many VLANs</title>
      <link>https://community.cisco.com/t5/network-security/turn-from-reflexive-acls-to-zone-based-firewall-with-many-vlans/m-p/1854345#M492056</link>
      <description>&lt;P&gt;Hi there, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am new with ZFW and I would appreciate any hints for my network design &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to do the following: &lt;/P&gt;&lt;P&gt;at the moment, I have a router with about 9 VLANs containing workstation-VLAN, printer-VLAN, notebook-VLAN, testlab-VLAN etc etc...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On each of the VLAN-Subinterfaces on my router I have got an own in-ACL and OUT-ACL (extended) with reflect- and evaluate-statements. &lt;/P&gt;&lt;P&gt;In addition I have two uplink-Interfaces (because of redundancy). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically the VLANs should be separated from each other, but the ACLs also contain single permits for services/ports/protocols from one VLAN into another VLAN. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think, the only solution to implement this in ZFW is, to design 9 different zones for the VLANs and 1 zone for the "outside"-Interfaces. &lt;/P&gt;&lt;P&gt;Then I have to create two class-maps resp. policy-maps for each vlan and also two zone-pair statements (in-out and out-in) for each vlan. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or is it easier to bundle certain services, create a CMAP out of that and apply a certain ACL contain IP-Adresses from all VLANs doing the same service?&lt;/P&gt;&lt;P&gt;e.g. &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;class-map type inspect match-all cmap_smtp-allow&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;match access-group name smtp_allow&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;match protocol smtp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;asr_1001#sh access-lists smtp_allow&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;Extended IP access list smtp_allow&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10 permit tcp any&amp;nbsp; host 74.125.39.16&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ! smtp.googlemail.com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do You have any suggestions what does make more sense here?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, &lt;/P&gt;&lt;P&gt;Stefan&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:57:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/turn-from-reflexive-acls-to-zone-based-firewall-with-many-vlans/m-p/1854345#M492056</guid>
      <dc:creator>Stefan Giera</dc:creator>
      <dc:date>2019-03-11T21:57:31Z</dc:date>
    </item>
    <item>
      <title>Turn from reflexive ACLs to Zone-based-Firewall with many VLANs</title>
      <link>https://community.cisco.com/t5/network-security/turn-from-reflexive-acls-to-zone-based-firewall-with-many-vlans/m-p/1854346#M492058</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Stefan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do not see why the ZBFW feature cannot be implemented here, in fact as you know ZBFW is really flexible so it will adapt to all your company needs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just to let you know if you create 9 different zones, you will need to create a zone pair policy for each different vlan pair that need to comunicate between them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate helpful posts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Nov 2011 21:26:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/turn-from-reflexive-acls-to-zone-based-firewall-with-many-vlans/m-p/1854346#M492058</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-11-30T21:26:58Z</dc:date>
    </item>
    <item>
      <title>Turn from reflexive ACLs to Zone-based-Firewall with many VLANs</title>
      <link>https://community.cisco.com/t5/network-security/turn-from-reflexive-acls-to-zone-based-firewall-with-many-vlans/m-p/1854347#M492062</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank You for Your answer, but that makes it even more complicated... &lt;/P&gt;&lt;P&gt;Let me explain why I am hesitating doing this. For example, I have: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; interface Gi1/0.101&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; desc VLAN 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip address 1.1.1.1/24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip access-group in-vlan1-filter in&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip access-group out-vlan1-filter out&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; int Gi1/0.102&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; desc VLAN2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip address 2.2.2.1/24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip access-group in-vlan2-filter in&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip access-group out-vlan2-filter out&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; int Gi1/0.103&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; desc VLAN3&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip address 3.3.3.1/24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip access-group in-vlan3-filter in&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip access-group out-vlan3-filter out&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;=&amp;gt; until now, I had the above named ACLs on each vlan-subinterface, for example:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip access-list extended out-vlan2-filter&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit tcp host 1.1.1.5 host 2.2.2.15 eq 22&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit udp any&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; host 2.2.2.50 eq 4500&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit tcp host 3.3.3.9 host 2.2.2.22 eq 80&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; etc...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;=&amp;gt; which makes 6 different ACLs in the above case. With ZFW, I need a zone-pair "in-out" and "out-in" for each vlan and additional two zone-pairs for the inter-vlan-communicatio, which makes, in this case, 6 additional zone-pairs (zone-pair "vlan1-vlan2"/"vlan1-vlan3"/"vlan2-vlan1"/"vlan2-vlan3"/"vlan3-vlan1"/"vlan3-vlan2"). So, if I have 9 different VLANs (if my calculation is right), I have 45 different zone-pairs just for inter-vlan-communication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just want to ask if there is a easier way&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Dec 2011 05:59:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/turn-from-reflexive-acls-to-zone-based-firewall-with-many-vlans/m-p/1854347#M492062</guid>
      <dc:creator>Stefan Giera</dc:creator>
      <dc:date>2011-12-01T05:59:26Z</dc:date>
    </item>
    <item>
      <title>Turn from reflexive ACLs to Zone-based-Firewall with many VLANs</title>
      <link>https://community.cisco.com/t5/network-security/turn-from-reflexive-acls-to-zone-based-firewall-with-many-vlans/m-p/1854348#M492064</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Stefan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is correct if you have 9 different zones you will need a zone-pair for each vlan communication between different zones, the configuration will be longer but ZBFW it is going to be more flexible and you will have more granularity whit your network enviroment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Other thing you can do is to place some of the vlans on the same zone so they have communication, Vlans on the same zone can comunicate with each other by default.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So in this case you will definetly need to think about if you are looking something easy to perform or something secure and really flexible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope you have a wonderful day.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Dec 2011 17:28:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/turn-from-reflexive-acls-to-zone-based-firewall-with-many-vlans/m-p/1854348#M492064</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-12-01T17:28:19Z</dc:date>
    </item>
    <item>
      <title>Turn from reflexive ACLs to Zone-based-Firewall with many VLANs</title>
      <link>https://community.cisco.com/t5/network-security/turn-from-reflexive-acls-to-zone-based-firewall-with-many-vlans/m-p/1854349#M492068</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Julio, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for Your answer, apparently I get it *step by step* &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One last question: what happens if there are only zone-pairs "vlan-in"/"vlan-out" for each vlan and the class-maps in there define the matches out of one "global" ACL for this specific VLAN? From the example above: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; interface Gi0/0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; desc UPLINK&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; zone-member security zone_outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; interface&amp;nbsp; VLAN 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip address 1.1.1.1/24&lt;/P&gt;&lt;P style="min-height: 8pt; height: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; zone-member security zone_vlan1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; int&amp;nbsp; VLAN2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip address 2.2.2.1/24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; zone-member security zone_vlan2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; int VLAN3&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip address 3.3.3.1/24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; zone-member security zone_vlan3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; class-map type inspect match-any cmap-out_vlan2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; match access-group name out-vlan2-filter&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; policy-map type inspect pmap-out_vlan2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; class type inspect cmap-out_vlan2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; zone-pair sec zp-out_vlan2 source&amp;nbsp; zone_outside dest zone_vlan2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip access-list extended out-vlan2-filter&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit tcp host 1.1.1.5 host 2.2.2.15 eq 22&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ! comes from zone_vlan1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit udp any&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; host 2.2.2.50 eq 4500 ! comes from zone_outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit tcp host 3.3.3.9 host 2.2.2.22 eq 80&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ! comes from zone_vlan3&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; etc...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;=&amp;gt; so for the other vlans, there are zone pairs "zp-in_vlan1" etc, which allow them to go outside. &lt;/P&gt;&lt;P&gt;Will these requests, for example from vlan1 in direction of vlan2, also arrive, through the way "zone_vlan1 --&amp;gt; zone_outside --&amp;gt; zone_outside --&amp;gt; zone vlan2" ??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or do I have to create the "inter-vlan-zone-pairs" necessary? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind regards, &lt;/P&gt;&lt;P&gt;Stefan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Dec 2011 18:02:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/turn-from-reflexive-acls-to-zone-based-firewall-with-many-vlans/m-p/1854349#M492068</guid>
      <dc:creator>Stefan Giera</dc:creator>
      <dc:date>2011-12-01T18:02:00Z</dc:date>
    </item>
    <item>
      <title>Turn from reflexive ACLs to Zone-based-Firewall with many VLANs</title>
      <link>https://community.cisco.com/t5/network-security/turn-from-reflexive-acls-to-zone-based-firewall-with-many-vlans/m-p/1854350#M492070</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Stefan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My pleasure, you will need the Zone-pairs 100%, without them you are not going to have communication between those vlans, that is the whole purpose of ZBFW.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate helpful posts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Dec 2011 18:18:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/turn-from-reflexive-acls-to-zone-based-firewall-with-many-vlans/m-p/1854350#M492070</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-12-01T18:18:58Z</dc:date>
    </item>
  </channel>
</rss>

