12-01-2016 01:24 PM - edited 03-08-2019 08:24 AM
I understand that an interface assigned to a zone can only send traffic to other zones it is paired with. So, how does traffic get routed to the Internet for example, if my gateway is an ASA (which does not support zones)?
Thanks in advance!
Solved! Go to Solution.
12-01-2016 01:48 PM
The zones are just local to the router itself. Once it leaves a zone, it travels like normal traffic. So if you have an inside zone and an outside zone, you'll permit zone traffic from inside to outside. Then the traffic will hit the ASA like any other traffic.
HTH
12-01-2016 06:47 PM
Short answer...it depends.
I'm assuming your setup is Inside nets -> 0/0 Router 0/1 -> ASA ->Internet based on your description. If that's the case:
You can configure an in-to-out zone pair and your service policy to inspect and/or pass the traffic. Those two words are the key...inspect and pass. An inside host's traffic hits 0/0, and one of two things happens based on that policy.
-If the service policy says that traffic gets inspected, it gets passed on to 0/1 and on to the ASA and (if the ASA's rules allow) to its destination. The returning traffic comes back through the ASA, hits 0/1, gets inspected, and is passed to 0/0 and ultimately your host.
-If the traffic is passed (but not inspected) it gets passed on to 0/1 and out to the ASA and (again if it's allowed based on the ASA's rules) on to the destination. The returning traffic traffic this time comes back through the ASA, hits 0/1, and is dropped. It wasn't inspected on its way out so there's no record of the source traffic and since there's no out-to-in pair there's no policy to process it.
To get traffic that's inspected out and back, you need one zone pair and one policy. To get traffic that's simply passed out and back, you two zone pairs and two policies.
Hope that makes sense. One of Cisco's explanations of it is here:
12-01-2016 01:48 PM
The zones are just local to the router itself. Once it leaves a zone, it travels like normal traffic. So if you have an inside zone and an outside zone, you'll permit zone traffic from inside to outside. Then the traffic will hit the ASA like any other traffic.
HTH
12-01-2016 02:05 PM
to be sure I understand, traffic originating on Router 1, port fe0/0 (inside zone) and destined for Internet will exit Router 1, port fe1/0 (outside zone) for example?
Doesn't outside zone need a zone pair interface to send to also?
12-01-2016 06:47 PM
Short answer...it depends.
I'm assuming your setup is Inside nets -> 0/0 Router 0/1 -> ASA ->Internet based on your description. If that's the case:
You can configure an in-to-out zone pair and your service policy to inspect and/or pass the traffic. Those two words are the key...inspect and pass. An inside host's traffic hits 0/0, and one of two things happens based on that policy.
-If the service policy says that traffic gets inspected, it gets passed on to 0/1 and on to the ASA and (if the ASA's rules allow) to its destination. The returning traffic comes back through the ASA, hits 0/1, gets inspected, and is passed to 0/0 and ultimately your host.
-If the traffic is passed (but not inspected) it gets passed on to 0/1 and out to the ASA and (again if it's allowed based on the ASA's rules) on to the destination. The returning traffic traffic this time comes back through the ASA, hits 0/1, and is dropped. It wasn't inspected on its way out so there's no record of the source traffic and since there's no out-to-in pair there's no policy to process it.
To get traffic that's inspected out and back, you need one zone pair and one policy. To get traffic that's simply passed out and back, you two zone pairs and two policies.
Hope that makes sense. One of Cisco's explanations of it is here:
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide