04-17-2024 07:09 AM - edited 04-24-2024 11:59 PM
Zone-Based FireWall (ZBFW)
Introduction
Rules for applying ZBFW
ZBFW Terminology
ZBFW Actions
ZBFW Configuration
Introduction:
The Cisco IOS Zone-Based Firewall is a stateful firewall used in Cisco IOS devices. ZBFW is the successor of the legacy IOS firewall or the ContextBased Access Control (CBAC) feature. Zone Based Firewall is the most advanced method of a stateful firewall that is available on Cisco IOS routers.
Zone-Based Policy Firewall (also known as ZBAF) changes the firewall configuration from the older interface-based model to a more flexible, more easily understood zone-based model. The idea behind ZBW is that we don’t assign access-lists to interfaces but we will create different zones. Interfaces will be assigned to the different zones & security policies will be assigned between zones.
Cisco ASA and FTD devices are considered dedicated firewall devices. However, Cisco integrated the firewall functionality into the router, which infact will make the firewall a cost-effective device. The Zone-Based FireWall (ZBAF) includes features that are not available in CBAC/IOS firewall. Zone-Based Firewalls (ZBAF) can also be implemented in an SD-WAN solution.
Rules For Applying Zone-Based Firewall:
Zone-Based Firewall Terminology
Zone-Based Firewall actions
Zone-Based FireWall Configuration
Step 1: Create the Zones
BORDER(config)# zone security Inside
BORDER(config-sec-zone)# description Inside network
BORDER(config)# zone security Outside
BORDER(config-sec-zone)# description Outside network
Step 2: Define Traffic Classes
BORDER(config)# class-map type inspect match-all ICMP
BORDER(config-cmap)# match protocol icmp
BORDER(config-cmap)# exit
Step 3: Define Firewall Policies
BORDER(config)# policy-map type inspect POLICY1
BORDER(config-pmap)# class type inspect ICMP
BORDER(config-pmap-c)# inspect
Step 4: Assign Policy Maps to Zone Pairs
BORDER(config)# zone-pair security IN-TO-OUT source Inside destination Outside
BORDER(config-sec-zone-pair)# description Internet Access
BORDER(config-sec-zone-pair)# service-policy type inspect POLICY1
Step5: Assign Router interfaces to the zones
BORDER(config)# interface F0/0
BORDER(config-if)# zone-member security Inside
BORDER(config-if)#exit
BORDER(config-if)# interface fa1/0
BORDER(config-if)# zone-member security Outside
BORDER(config-if)#exit
Verification:-
BORDER# show policy-map type inspect zone-pair sessions
To allow Telnet Traffic
BORDER(config)# class-map type inspect match-all TELNET
BORDER(config-cmap)# match protocol telnet
BORDER(config-cmap)#exit
BORDER(config)# policy-map type inspect POLICY1
BORDER(config-pmap)# class type inspect TELNET
BORDER(config-pmap-c)# inspect
BORDER(config-pmap-c)# end
Verification
Thank You Verymuch...!!
----------------------------------------------- The End --------------------------------------------
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: