IOS Zone Based Firewall Step-by-Step Basic Configuration



Similar documents
Internetwork Expert s CCNA Security Bootcamp. IOS Firewall Feature Set. Firewall Design Overview

Firewall Stateful Inspection of ICMP

Firewall Technologies. Access Lists Firewalls

Lab Configure Cisco IOS Firewall CBAC on a Cisco Router

Lab Configure Cisco IOS Firewall CBAC

Troubleshooting the Firewall Services Module

Firewall Stateful Inspection of ICMP

Classic IOS Firewall using CBACs Cisco and/or its affiliates. All rights reserved. 1

How To Block On A Network With A Group Control On A Router On A Linux Box On A Pc Or Ip Access Group On A Pnet 2 On A 2G Router On An Ip Access-Group On A Ip Ip-Control On A Net

FIREWALLS & CBAC. philip.heimer@hh.se

Lab 8: Confi guring QoS

Cisco Configuring Commonly Used IP ACLs

Configuring Server Load Balancing

Configuring NetFlow Secure Event Logging (NSEL)

Deploying Zone-Based Firewalls

Troubleshooting the Firewall Services Module

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series

CCNA Security 1.1 Instructional Resource

Cisco ASA and NetFlow Using ASA NetFlow with LiveAction Flow Software

Table of Contents. Configuring IP Access Lists

Lab Introduction to the Modular QoS Command-Line Interface

Adding an Extended Access List

Zone-Based Firewalls. IDS/IPS. November 11, 2014

Cisco Firewall Technology

Packet Filtering using the ADTRAN OS firewall has two fundamental parts:

Configuring NetFlow Secure Event Logging (NSEL)

Network Security 1. Module 8 Configure Filtering on a Router

Enabling Remote Access to the ACE

Configuring Class Maps and Policy Maps

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Lab Exercise Configure the PIX Firewall and a Cisco Router

shortcut Tap into learning NOW! Visit for a complete list of Short Cuts. Your Short Cut to Knowledge

Cisco Secure PIX Firewall with Two Routers Configuration Example

CCNA Access List Sim

Table of Contents. Cisco Using the Cisco IOS Firewall to Allow Java Applets From Known Sites while Denying Others

Virtual Fragmentation Reassembly

Securing Networks with PIX and ASA

Lab Configure and Test Advanced Protocol Handling on the Cisco PIX Security Appliance

Configuring the Firewall Management Interface

PIX/ASA 7.x with Syslog Configuration Example

Lab 7: Firewalls Stateful Firewalls and Edge Router Filtering

Configuring IP Load Sharing in AOS Quick Configuration Guide

Call Flows for Simple IP Users

This Technical Support Note shows the different options available in the Firewall menu of the ADTRAN OS Web GUI.

Lab 6.1 Configuring a Cisco IOS Firewall Using SDM

Cisco IOS Firewall Zone-Based Policy Firewall Release 12.4(6)T Technical Discussion February 2006

Security Configuration Guide: Zone-Based Policy Firewall, Cisco IOS Release 15M&T

- QoS Classification and Marking -

Central America Workshop - Guatemala City Guatemala 30 January - 1 February 07. IPv6 Security

Configure Policy-based Routing

Configuring Network Address Translation

Firewall Authentication Proxy for FTP and Telnet Sessions

IP Filter/Firewall Setup

Lab Developing ACLs to Implement Firewall Rule Sets

A Model Design of Network Security for Private and Public Data Transmission

Configuring Network Address Translation

Configuring Control Plane Policing

Chapter 4: Lab A: Configuring CBAC and Zone-Based Firewalls

Network Worm/DoS. System Engineer. Cisco Systems Korea

RSA Security Analytics

Security and Access Control Lists (ACLs)

8 steps to protect your Cisco router

ASA 8.3 and Later: Mail (SMTP) Server Access on Inside Network Configuration Example

Configure Cisco IOS Firewall to use stateful packet inspection for IPv6. Configure Cisco IOS Firewall to use packet filtering for IPv6.

Sample Configuration Using the ip nat outside source static

Table of Contents. Cisco Blocking Peer to Peer File Sharing Programs with the PIX Firewall

The information in this document is based on these software and hardware versions:

Firewall Firewall August, 2003

How To Load Balance On A Libl Card On A S7503E With A Network Switch On A Server On A Network With A Pnet 2.5V2.5 (Vlan) On A Pbnet 2 (Vnet

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

IINS Implementing Cisco IOS Network Security Exam.

CSCE 465 Computer & Network Security

Lab Configure a PIX Firewall VPN

NATed Network Testing IxChariot

12. Firewalls Content

CISCO IOS FIREWALL DESIGN GUIDE

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Firewall Design Principles

- Introduction to PIX/ASA Firewalls -

Lab - Configure a Windows 7 Firewall

Lab Configure IOS Firewall IDS

Polycom. RealPresence Ready Firewall Traversal Tips

Traffic Mirroring Commands on the Cisco IOS XR Software

Securizarea Calculatoarelor și a Rețelelor 13. Implementarea tehnologiei firewall CBAC pentru protejarea rețelei

Transactions. Georgian Technical University. AUTOMATED CONTROL SYSTEMS - No 1(8), 2010

H3C Firewall and UTM Devices DNS and NAT Configuration Examples (Comware V5)

10 Configuring Packet Filtering and Routing Rules

DS3 Performance Scaling on ISRs

Web-Based Configuration Manual System Report. Table of Contents

PIX/ASA 7.x and above: Mail (SMTP) Server Access on the DMZ Configuration Example

co Characterizing and Tracing Packet Floods Using Cisco R

Implementing Secure Converged Wide Area Networks (ISCW)

PIX/ASA 7.x and above : Mail (SMTP) Server Access on Inside Network Configuration Example

Deploying ACLs to Manage Network Security

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

DATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE

Cisco Performance Agent Data Source Configuration in the Branch-Office Router

How To: Configure a Cisco ASA 5505 for Video Conferencing

Transcription:

IOS Zone Based Firewall Step-by-Step Basic Configuration Introduction The Cisco IOS Zone Based Firewall is one of the most advanced form of Stateful firewall used in the Cisco IOS devices. The zone based firewall (ZBFW) is the successor of Classic IOS firewall or CBAC (Context-Based Access Control). Cisco first implemented the routerbased stateful firewall in CBAC where it used ip inspect command to inspect the traffic in layer 4 and layer 7. Even though ASA devices are considered as the dedicated firewall devices, Cisco integrated the firewall functionality in the router which in fact will make the firewall a cost effective device. The zone based firewall came up with many more features that is not available in CBAC. The ZBFW mainly deals with the security zones, where we can assign the router interfaces to various security zones and control the traffic between the zones. Also the traffic will be dynamically inspected as it passes through the zones. In addition to all the features which is available in classic IOS firewall, Zone based firewall will support Application inspection and control for HTTP, POP3, Sun RPC, IM Applications and P2P File sharing. Zone Based Firewall Vs CBAC CBAC Interface Based Configuration Controls Inbound and Outbound access on an interface Uses inspect statements and stateful ACLs -Not supported- Support from IOS Release 11.2 Zone Based Firewall Zone Based Configuration Controls Bidirectional access between zones. Uses Class-Based Policy language Support Application Inspection and Control Support from IOS Release 12.4 (6) T This document will guide you to configure a basic Zone Based Policy Firewall in an IOS router. Here I am going to divide the entire configuration into logical sets and finally will combine them to the get the full configuration. 1

ZBFW Configuration Procedure The below are the configuration tasks that you need to follow: 1. Configure Zones 2. Assign Router Interfaces to zones 3. Create Zone Pairs 4. Configure Interzone Access Policy (Class Maps & Policy Maps) 5. Apply Policy Maps to Zone Pairs Configuration Scenario Figure 1. In this example we have three zones. Inside Zone - Private LAN DMZ Zone - DMZ hosts Outside Zone - Internet Here I am defining a rule set for our ZBFW: 1. From Inside to Outside -http, tcp, udp, icmp and pop3 is allowed 2. From Outside to Inside -icmp is allowed 2

3. From Inside to DMZ -http, tcp and icmp is allowed 4. From Outside to DMZ -http is allowed Default Rules of Zone Based Firewall 1. Interzone communication is Denied, traffic will be denied among the interfaces that are in the different zones unless we specify a firewall policy. 2. Intrazone communication is Allowed, traffic will flow implicitly among the interfaces that are in the same zone. 3. All traffic to Self zone is Allowed Self Zone is created automatically by the router while we create the other zones in a Zone Based Firewall. Task 1 : Configure Zones In this example (refer Figure 1) we have three zones. Inside,Outside, DMZ. To configure zones in a router, connect the router via putty or console, switch to the global configuration mode and type the command as below: Router(config)#zone security INDISE Router(config)#zone security OUTDISE 3

Router(config)#zone security DMZ Task 2 : Assign Router Interfaces to Zones We have to assign the router interface to a particular zone. Here I am going to assign Gigabyte Ethernet 0/0 to INSIDE zone, Ge0/1 to OUTSIDE zone and Ge0/2 to DMZ zone. To achieve this we have to go to the particular interface and attach that interface to the zone.type the command as below: Router(config)#interface gigabitethernet 0/0 Router(config-if)#zone-member security INSIDE Router(config)#interface gigabitethernet 0/1 Router(config-if)#zone-member security OUTSIDE 4

Router(config)#interface gigabitethernet 0/2 Router(config-if)#zone-member security DMZ Now if you try to ping a zone from another zone the traffic will be denied because of the default firewall policy. Task 3 : Create Zone Pairs Zone pairs are created to connect the zones. If you want to make two zones to communicate you have to create Zone pairs. DO NOT create zone pairs for non-communicating zones. In our scenario the traffic flows between : INSIDE to OUTSIDE OUTSIDE to INSIDE OUTSIDE to DMZ INSIDE to DMZ So we need to create four zone pairs. To create zone pairs the command is as follows. Router(config)#zone-pair security IN-TO-OUT source INSIDE destination OUTSIDE Router(config)#zone-pair security OUT-TO-IN source OUTSIDE destination INSIDE 5

Router(config)#zone-pair security OUT-TO-DMZ source OUTSIDE destination DMZ Router(config)#zone-pair security IN-TO-DMZ source INSIDE destination DMZ Task 4 : Configure Interzone Access Policy Interzone Access policy is the key part of a Zone based firewall where we classify the traffic and apply the firewall policies. Class map and Policy map configurations are carried out during this task. Class Maps : This will classify the traffic Policy Maps : This will decide the 'fate' of the traffic Class Map Configuration Class map sort the traffic based on the following criteria 1.) Access-group 2.) Protocol 3.) A subordinate class map. In our scenario I am sorting the traffic based on access group. So first we need to create an ACL and associate it with the class map. 6

a.) Class Map for INSIDE-TO-OUTSIDE Router(config)#ip access-list extended INSIDE-TO-OUTSIDE Router(config-ext-nacl)#permit tcp 172.17.0.0 0.0.255.255 any eq www Router(config-ext-nacl)#permit tcp 172.17.0.0 0.0.255.255 any eq echo Router(config-ext-nacl)#permit tcp 172.17.0.0 0.0.255.255 any eq pop3 Router(config)#class-map type inspect match-all INSIDE-TO-OUTSIDE-CLASS Router(config-cmap)#match access-group name INSIDE-TO-OUTSIDE b.) Class Map for OUTSIDE-TO-INSIDE Router(config)ip access-list extended OUTSIDE-TO-INSIDE Router(config-ext-nacl)#permit tcp any 172.17.0.0 0.0.255.255 eq echo Router(config)#class-map type inspect match-all OUTSIDE-TO-INSIDE-CLASS Router(config)#match access-group name OUTSIDE-TO-INSIDE c.) Class Map for OUTSIDE-TO-DMZ Router(config)#ip access-list extended OUTSIDE-TO-DMZ 7

Router(config-ext-nacl)#permit tcp any 192.168.1.0 0.0.0.255 eq www Router(config)#class-map type inspect match-all OUTSIDE-TO-DMZ-CLASS Router(config)#match access-group name OUTSIDE-TO-DMZ d.) Class Map for INSIDE-TO-DMZ Router(config)#ip access-list extended INSIDE-TO-DMZ Router(config-ext-nacl)#permit tcp 172.17.0.0 0.0.255.255 192.168.1.0 0.0.0.255 eq www Router(config-ext-nacl)#permit tcp 172.17.0.0 0.0.255.255 192.168.1.0 0.0.0.255 eq echo Router(config)#class-map type inspect match-all INSIDE-TO-DMZ-CLASS Router(config-cmap)#match access-group name INSIDE-TO-DMZ 8

Policy-Map Configuration Policy-Maps will apply the firewall policy to the class map that is configured previously. Three actions can be taken aganist the traffic with the policy-map configuration: Inspect : Dynamically inspect the traffic. Drop : Drop the traffic Pass : Simply forward the traffic. There will be a drop policy, by default, at the end of all policy maps. a.) Policy-map for INSIDE-TO-OUTSIDE Router(config)#policy-map type inspect INSIDE-TO-OUTSIDE-POLICY Router(config-pmap)#class type inspect INSIDE-TO-OUTSIDE-CLASS Router(config-pmap)#inspect Router(config-pmap)#class class-default Router(config-pmap)#drop log b.) Policy-map for OUTSIDE-TO-INSIDE Router(config)#policy-map type inspect OUTSIDE-TO-INSIDE-POLICY Router(config-pmap)#class type inspect OUTSIDE-TO-INSIDE-CLASS 9

Router(config-pmap)#pass Router(config-pmap)#class class-default Router(config-pmap)#drop log c.) Policy-map for OUTSIDE-TO-DMZ Router(config)#policy-map type inspect OUTSIDE-TO-DMZ-POLICY Router(config-pmap)#class type inspect OUTSIDE-TO-DMZ-CLASS Router(config-pmap)#inspect Router(config-pmap)#class class-default Router(config-pmap)#drop log d.) Policy-map for INSIDE-TO-DMZ Router(config)#policy-map type inspect INSIDE-TO-DMZ-POLICY Router(config-pmap)#class type inspect INDISE-TO-DMZ-CLASS Router(config-pmap)#pass Router(config-pmap)#class class-default Router(config-pmap)#drop log 10

Task 5 : Apply policy maps to zone pairs Now we have to attach the policy maps to the zone pairs that we have already created. The command is as follows: Router(config)#zone-pair security IN-TO-OUT source INSIDE destination OUTSIDE Router(config-sec-zone-pair)#service-policy type inspect INSIDE-TO-OUTSIDE- POLICY Router(config)#zone-pair security OUT-TO-IN source OUTSIDE destination INSIDE Router(config-sec-zone-pair)#service-policy type inspect OUTSIDE-TO-INSIDE- POLICY Router(config)#zone-pair security OUT-TO-DMZ source OUTSIDE destination DMZ Router(config-sec-zone-pair)#service-policy type inspect OUTSIDE-TO-DMZ-POLICY Router(config)#zone-pair security IN-TO-DMZ source INSIDE destination DMZ 11

Router(config-sec-zone-pair)#service-policy type inspect INSIDE-TO-DMZ-POLICY There we finish the basic configuration of a zone based firewall. Troubleshooting You can use the below commands to perform some basic troubleshooting and verification. a.) Show commands show class-map type inspect show policy-map type inspect show zone-pair security b.) Debug Commands debug policy-firewall detail 12

debug policy-firewall events debug policy-firewall protocol tcp debug policy-firewall protocol udp Advanced Zone Based Firewall Configuration Here you can find some examples of advanced Zone Based Firewall configuration. 1. IOS Content Filtering : http://yadhutony.blogspot.in/2013/02/cisco-ios-local-contentfiltering.html 2. P2P and IM Application control : http://yadhutony.blogspot.in/2012/11/how-to-blockp2p-traffic-on-cisco-router.html You can visit http://www.cisco.com/en/us/docs/ios-xml/ios/sec_data_zbf/ configuration/15-1s/sec-zone-pol-fw.html for more details. Thank you for viewing this document. 13