<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Zone-based firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/zone-based-firewall/m-p/1753118#M529780</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"On firewall IP is allowed and services(TCP or UDP) are blocked by default "&lt;/P&gt;&lt;P&gt;Can you elaborate this sentence a little bit? As far as I know in ASAs, the default it that is will block all of them. You have to configure to let them go through.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Han&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 27 Sep 2011 17:17:11 GMT</pubDate>
    <dc:creator>hanwucisco</dc:creator>
    <dc:date>2011-09-27T17:17:11Z</dc:date>
    <item>
      <title>Zone-based firewall</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall/m-p/1753116#M529778</link>
      <description>&lt;P&gt;I set up a very simple scenario,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;R1------R2-----R3, where R1 is private, R3 is the Internet. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.Before applying any zone, the routing is fine. I used OSPF Area 0 for all the interfaces on all 3 routers.&lt;/P&gt;&lt;P&gt;2. I created zones, with a policy that allow ICMP. &lt;/P&gt;&lt;P&gt;3. I pinged from R1 to R3. it worked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am kinda confused, since I didnt do anything regarding OSPF. &lt;/P&gt;&lt;P&gt;Why is that, how can OSPF traffic pass through the firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here is the configuration on R2,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;R2#sh run&lt;/P&gt;&lt;P&gt;Building configuration...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Current configuration : 1833 bytes&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname R2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot-start-marker&lt;/P&gt;&lt;P&gt;boot-end-marker&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip source-route&lt;/P&gt;&lt;P&gt;ip cef&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;no ip domain lookup&lt;/P&gt;&lt;P&gt;no ipv6 cef&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map type inspect match-any CM&lt;/P&gt;&lt;P&gt; match protocol icmp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect PM&lt;/P&gt;&lt;P&gt; class type inspect CM&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp; drop&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;zone security ZONE_PRIVATE&lt;/P&gt;&lt;P&gt;zone security ZONE_INTERNET&lt;/P&gt;&lt;P&gt;zone-pair security ZONEP_PRIV_INT source ZONE_PRIVATE destination ZONE_INTERNET&lt;/P&gt;&lt;P&gt; service-policy type inspect PM&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/0&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; duplex half&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Serial1/0&lt;/P&gt;&lt;P&gt; ip address 10.10.10.2 255.255.255.0&lt;/P&gt;&lt;P&gt; zone-member security ZONE_PRIVATE&lt;/P&gt;&lt;P&gt; serial restart-delay 0&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Serial1/1&lt;/P&gt;&lt;P&gt; ip address 10.20.20.2 255.255.255.0&lt;/P&gt;&lt;P&gt; zone-member security ZONE_INTERNET&lt;/P&gt;&lt;P&gt; serial restart-delay 0&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;router ospf 1&lt;/P&gt;&lt;P&gt; log-adjacency-changes&lt;/P&gt;&lt;P&gt; network 0.0.0.0 255.255.255.255 area 0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip forward-protocol nd&lt;/P&gt;&lt;P&gt;no ip http server&lt;/P&gt;&lt;P&gt;no ip http secure-server&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;control-plane&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt; exec-timeout 0 0&lt;/P&gt;&lt;P&gt; logging synchronous&lt;/P&gt;&lt;P&gt; stopbits 1&lt;/P&gt;&lt;P&gt;line aux 0&lt;/P&gt;&lt;P&gt; stopbits 1&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; login&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:30:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall/m-p/1753116#M529778</guid>
      <dc:creator>hanwucisco</dc:creator>
      <dc:date>2019-03-11T21:30:58Z</dc:date>
    </item>
    <item>
      <title>Zone-based firewall</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall/m-p/1753117#M529779</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Han,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OSPF does not use a TCP/IP transport protocol (UDP, TCP), but is encapsulated directly in IP datagrams with protocol number 89.&lt;/P&gt;&lt;P&gt;On firewall IP is allowed and services(TCP or UDP) are blocked by default so OSPF packets flow across it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PLease rate if helps.&lt;/P&gt;&lt;P&gt;Ameya&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Sep 2011 16:30:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall/m-p/1753117#M529779</guid>
      <dc:creator>ameya_oke</dc:creator>
      <dc:date>2011-09-27T16:30:40Z</dc:date>
    </item>
    <item>
      <title>Re: Zone-based firewall</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall/m-p/1753118#M529780</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"On firewall IP is allowed and services(TCP or UDP) are blocked by default "&lt;/P&gt;&lt;P&gt;Can you elaborate this sentence a little bit? As far as I know in ASAs, the default it that is will block all of them. You have to configure to let them go through.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Han&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Sep 2011 17:17:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall/m-p/1753118#M529780</guid>
      <dc:creator>hanwucisco</dc:creator>
      <dc:date>2011-09-27T17:17:11Z</dc:date>
    </item>
    <item>
      <title>Zone-based firewall</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall/m-p/1753119#M529781</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Han,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OSPF traffic is from router to router&amp;nbsp; and in ZBF traffic destined to or coming from the router is using the self zone and by default all is permitted to self or from self.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Sep 2011 07:22:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall/m-p/1753119#M529781</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2011-09-28T07:22:30Z</dc:date>
    </item>
  </channel>
</rss>

