<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ZBF Setup Question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/zbf-setup-question/m-p/1647928#M564852</link>
    <description>&lt;P&gt;I know how zbf general works with class-maps that match traffic somehow, policy-maps that have groups of class maps and zone-pair that show what policy map to apply to traffic depending on it's direction.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have some simple setups going and working fine. At the moment i have customer who has an absolutely massive list of very explicit firewall rules. I have attempted to convert them to ZBF and they appear to be not working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a sample of the ACL that I want inspected:&lt;/P&gt;&lt;P&gt;ip access-list extended inside_access_in&lt;BR /&gt; permit ip object-group Servers any&lt;BR /&gt; permit ip object-group DM_INLINE_NETWORK_3 any&lt;BR /&gt; permit ip any object-group DM_INLINE_NETWORK_4&lt;BR /&gt; deny&amp;nbsp;&amp;nbsp; ip any object-group RFC1918&lt;BR /&gt; remark Internet Access&lt;BR /&gt; permit tcp object-group WWWAccess any eq www 443&lt;BR /&gt; remark Secure http access only&lt;BR /&gt; permit tcp object-group SecureWWW any eq 443&lt;BR /&gt; remark FTP Access&lt;BR /&gt; permit object-group FTP object-group FTPAccess any&lt;BR /&gt; remark FTP access for all users to these FTP sites&lt;BR /&gt; permit object-group FTP any object-group FTPSites&lt;BR /&gt; deny&amp;nbsp;&amp;nbsp; tcp object-group BlockSMTP any eq smtp&lt;BR /&gt; remark Netbios&lt;BR /&gt; deny&amp;nbsp;&amp;nbsp; udp any object-group DM_INLINE_NETWORK_1&lt;BR /&gt; deny&amp;nbsp;&amp;nbsp; tcp host 10.254.248.194 any eq 771&lt;/P&gt;&lt;P&gt;....&lt;/P&gt;&lt;P&gt;permit udp any any eq snmp snmptrap&lt;/P&gt;&lt;P&gt;deny ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone suggest the correct class map syntax and policy-map syntax that will acheive the correct affect?&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 19:58:46 GMT</pubDate>
    <dc:creator>mloraditch</dc:creator>
    <dc:date>2019-03-11T19:58:46Z</dc:date>
    <item>
      <title>ZBF Setup Question</title>
      <link>https://community.cisco.com/t5/network-security/zbf-setup-question/m-p/1647928#M564852</link>
      <description>&lt;P&gt;I know how zbf general works with class-maps that match traffic somehow, policy-maps that have groups of class maps and zone-pair that show what policy map to apply to traffic depending on it's direction.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have some simple setups going and working fine. At the moment i have customer who has an absolutely massive list of very explicit firewall rules. I have attempted to convert them to ZBF and they appear to be not working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a sample of the ACL that I want inspected:&lt;/P&gt;&lt;P&gt;ip access-list extended inside_access_in&lt;BR /&gt; permit ip object-group Servers any&lt;BR /&gt; permit ip object-group DM_INLINE_NETWORK_3 any&lt;BR /&gt; permit ip any object-group DM_INLINE_NETWORK_4&lt;BR /&gt; deny&amp;nbsp;&amp;nbsp; ip any object-group RFC1918&lt;BR /&gt; remark Internet Access&lt;BR /&gt; permit tcp object-group WWWAccess any eq www 443&lt;BR /&gt; remark Secure http access only&lt;BR /&gt; permit tcp object-group SecureWWW any eq 443&lt;BR /&gt; remark FTP Access&lt;BR /&gt; permit object-group FTP object-group FTPAccess any&lt;BR /&gt; remark FTP access for all users to these FTP sites&lt;BR /&gt; permit object-group FTP any object-group FTPSites&lt;BR /&gt; deny&amp;nbsp;&amp;nbsp; tcp object-group BlockSMTP any eq smtp&lt;BR /&gt; remark Netbios&lt;BR /&gt; deny&amp;nbsp;&amp;nbsp; udp any object-group DM_INLINE_NETWORK_1&lt;BR /&gt; deny&amp;nbsp;&amp;nbsp; tcp host 10.254.248.194 any eq 771&lt;/P&gt;&lt;P&gt;....&lt;/P&gt;&lt;P&gt;permit udp any any eq snmp snmptrap&lt;/P&gt;&lt;P&gt;deny ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone suggest the correct class map syntax and policy-map syntax that will acheive the correct affect?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:58:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-setup-question/m-p/1647928#M564852</guid>
      <dc:creator>mloraditch</dc:creator>
      <dc:date>2019-03-11T19:58:46Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF Setup Question</title>
      <link>https://community.cisco.com/t5/network-security/zbf-setup-question/m-p/1647929#M564853</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;AFAIK&amp;nbsp; zbf isn't using object-grouping so first you need to tell us the contents of these groups.&lt;/P&gt;&lt;P&gt;then&amp;nbsp; in which zones are the different subnets and on which interface is this ACL put in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Mar 2011 09:45:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-setup-question/m-p/1647929#M564853</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2011-03-01T09:45:48Z</dc:date>
    </item>
    <item>
      <title>Re: ZBF Setup Question</title>
      <link>https://community.cisco.com/t5/network-security/zbf-setup-question/m-p/1647930#M564854</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;The ACL is built with source being private side (inside) and destination being public (outside)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;As to the contents of the object group for examples sake just say the sources are 10.0.0.0/8 ips and the destinations are some random public ips.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Mar 2011 12:54:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-setup-question/m-p/1647930#M564854</guid>
      <dc:creator>mloraditch</dc:creator>
      <dc:date>2011-03-01T12:54:37Z</dc:date>
    </item>
  </channel>
</rss>

