Advanced Zone-based Firewall Configuration

Date: Mar 7, 2011

Return to the article

The advanced configuration of zone based firewalls, while not hard, can be confusing to understand without proper perspective of what is possible. In this article, Sean Wilkins continues his series on firewalls, putting together a synopsis of some of the available options and shows how to configure them on supporting Cisco equipment.

The advanced configuration of zone based firewalls, while not hard, can be confusing to understand without proper perspective of what is possible. While my previous article, “Basic Zone-Based Firewall Configuration” reviewed the steps required for configuring a basic zone based firewall, it did not review all of the capabilities of the feature. The zone based firewall feature is not just restricted to matching and applying policy to traffic based on layer 3/4 criteria. It also has application inspection and control (AIC) capability that enables deeper packet inspection; this provides the capability to apply policy based on layer 5 through 7 criteria.

It is important to understand the basic configuration of the zone-based firewall as the more advanced capabilities like URL filtering and HTTP inspection are configured by being nested inside an existing layer 3/4 policy. For example, all HTTP traffic could be matched and then be configured to be inspected by the stateful packet engine; it is only after this is already configured that these additional capabilities can be used. Because of this overlap, a primer section has been included.

Primer

This article adds to the concepts and configuration covered in the “Basic Zone-Based Firewall Fundamentals” and “Basic Zone Based Firewall Configuration” articles. Some of these are covered in this section.

As was covered in the other two articles, a zone based firewall configuration requires knowledge of a zone and a zone-pair. A zone (or security zone) is created for each part of the network that has an access/traffic control policy, the common ones being a private zone for inside the organizational network and a public zone for the Internet. A zone-pair is used to link different zones together and to apply policies between the two linked zones; these zone-pairs are unidirectional.

A zone-based firewall configuration is implemented on Cisco equipment through the Cisco Common Classification Policy Language (C3PL) that closely resembles the Modular QoS CLI (MQC) structure. This configuration requires that the traffic subject to a policy be matched using a class-map which is in turn used inside a policy-map statement to link that traffic with a specific policy; this policy-map is then applied to a specific zone-pair using the service-policy command. The more advanced policy options are configured using C3PL as well, after an existing basic configuration has been completed.

IOS Zone Based Firewall Configuration

IOS Zone Based Firewall Configuration

There are a number of different protocols which are supported with AIC; these are shown in following list:

As the coverage of each specific one of these options would make this article into a book, this article will be limited to the HTTP inspection configuration options. However, know that capabilities similar to those shown are available for each of the protocols shown in the above list.

The HTTP inspection option provides the ability to match traffic based not only on the fact that it is using port 80 or 443 (or others using Port to Application (PAM) matching) but also based on much more specific criteria inside HTTP. These matching criteria include:

The steps to configure a layer 5-7 class-map are very similar to those used for the layer 3/4 class-map. The main difference is the addition of an extra keyword (in this case http). The example syntax of this for HTTP inspection is shown below:

router(config)#class-map type inspect http [match-any | match-all] class-map-name

The large portion of what makes the layer 5-7 class-maps different is the match options. As shown above, there are a number of different deeper HTTP packet options that can be used to match with. The following commands can be used to match; these are listed in order listed above.

router(config-cmap)#match req-resp protocol violation
router(config-cmap)#match req-resp body length {lt | gt} {bytes}
router(config-cmap)#match req-resp header content-type { violation | mismatch | unknown}
router(config-cmap)#match req-resp header transfer-encoding {chunked | compress |
 deflate | gzip | identity | all}
router(config-cmap)#match request {uri | arg} length gt bytes
router(config-cmap)#match request method {connect | copy | delete | edit |
 get | getattribute | getattributenames | getproperties | head | index | lock |
 mkdir | move | options | post | put | revadd | revlabel | revlog | revnum |
 save | setattribute | startrev | stoprev | trace | unedit | unlock}
router(config-cmap)#match request port-misuse {im | p2p | tunneling | any}
router(config-cmap)#match request {not} {uri | arg} regex parameter-map-name

As with the class-map shown above, the difference between layer 3/4 and layer 5-7 policy-maps is a single keyword (again http). The example syntax of this for HTTP inspection is shown below:

router(config)#policy-map type inspect http policy-map-name

The policy-map actions are also very similar; the following are the supported layer 5-7 policy actions:

The following commands would be used to match based on a configured class-map and assign a policy action:

router(config-pmap)#class type inspect http class-map-name
router(config-pmap-c)#allow
router(config-pmap-c)#log
router(config-pmap-c)#reset

The application of a layer 5-7 policy-map is where there is a major difference in implementation from a layer 3/4 policy. A layer 5-7 policy-map is not applied to a specific zone-pair but to an existing layer 3/4 policy-map. This is done by nesting inside a layer 3/4 policy-map. The example syntax for this is shown below:

router(config-pmap-c)#service-policy http policy-map-name

Because the concept of nesting different policies can be rather confusing, and in order to wrap the material presented here, the following example is presented. This example is based on a simple topology shown in Figure 1. This policy inspects all HTTP traffic going from the private to the public zones and resets the connection of any non-compliant HTTP traffic.

Figure 1 Advanced Zone Configuration Example

  1. Configure the 5-7 class-map:
  2. router(config)#class-map type inspect http AIC-sample-class
    router(config-cmap)match req-resp protocol violation
  3. Configure the 5-7 policy-map:
  4. router(config)#policy-map type inspect http AIC-sample-policy
    router(config-pmap)#class type inspect http AIC-sample-class
    router(config-pmap-c)#reset
  5. Configure the 3/4 class-map:
  6. router(config)#class-map type inspect sample-class
    router(config-cmap)#match protocol http
  7. Configure the 3/4 policy-map:
  8. router(config)#policy-map type inspect sample-policy
    router(config-pmap)#class type inspect sample-class
    router(config-pmap-c)#inspect
    router(config-pmap-c)#service-policy http AIC-sample-policy
  9. Configure the zones:
  10. router(config)# zone security Public
    router(config)# zone security Private
  11. Configure the zone-pairs:
  12. router(config)# zone-pair security private-pubic-pair source Private destination Public
    router(config-sec-zone-pair)# service-policy type inspect sample-policy
  13. Assign a zone onto the interface:
  14. router(config)#interface F0/0
    router(config-if)#zone-member security Private
    router(config)#interface F0/1
    router(config-if)#zone-member security Public
Summary

Summary

The additional capabilities of the zone-based firewall feature offer a large number of different options to match and control traffic going between and within zones.

800 East 96th Street, Indianapolis, Indiana 46240

sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |