Friday, August 9, 2013

CCNA Security - Rules for applying Zone-based policy firewall

1. A zone must be configured before interfaces can be assigned to the zone.
2. An interface can be assigned to only one security zone.
3. All traffic to and from a given interface is implicitly blocked when the interface is assigned to a zone, except traffic to and from interfaces in the same zone, and traffic to any interface on the router.
4. Traffic is implicitly allowed to flow by default among interfaces that are members of the same zone.
5. In order to permit traffic to and from a zone member interface, a policy allowing or inspecting traffic must be configured between that zone and any other zone.
6. The self zone is the only exception to the default deny all policy. All policy to any router interface is allowed until traffic is explicitly denied.
7. Traffic cannot flow between a zone member interface and any interface that is not a zone member. Pass, inspect, and drop actions can only be applied between two zones.
8. Interfaces that have not been assigned to a zone function as classical router ports and might still use classical stateful inspection/CBAC configuration.
9. If it is required that an interface on the box not be part of the zoning/firewall policy. It might still be necessary to put that interface in a zone and configure a pass all policy (sort of a dummy policy) between that zone and any other zone to which traffic flow is desired.
10. From the preceding it follows that, if traffic is to flow among all the interfaces in a router, all the interfaces must be part of the zoning model (each interface must be a member of one zone or another).
11. The only exception to the preceding deny by default approach is the traffic to and from the router, which will be permitted by default. An explicit policy can be configured to restrict such traffic.


(Reference: Cisco.com)

No comments:

Post a Comment