EMAIL SUPPORT

dclessons@dclessons.com

LOCATION

AF

Configuring Zone based Firewall

Configuring Zone based Firewall

Configuring Zone based Firewall

Below is the steps defined for CLI.

CLI Configuration Procedure:

Create lists of IP prefixes:

vEdge(config)# policy
vEdge(config-policy)# lists data-prefix-list list-name
vEdge(config-data-prefix-list)# ip-prefix prefix/length

Configure a source zone ,this is a group of VPNs from which data traffic flows.

vEdge(config)# policy zone source-zone-name
vEdge(config-zone)# vpn vpn-id

Configure a destination zone, this is a group of VPNs to which data traffic flows.

vEdge(config)# policy zone destination-zone-name
vEdge(config-zone)# vpn vpn-id

Create a zone-based firewall policy:

vEdge(config)# policy zone-based-policy policy-name
vEdge(config-policy-zone-based-policy)#

Create a series of match–action pair sequences:

vEdge(config-zone-based-policy)# sequence number
vEdge(config-sequence)#

Define match parameters for the data traffic:

vEdge(config-sequence-number)# match match-parameter

Define actions to take when a match occurs:

vEdge(config-sequence)# action drop
vEdge(config-sequence)# action inspect
vEdge(config-sequence)# action log
vEdge(config-sequence)# action pass

Define the default action, when data traffic does not match the conditions:

vEdge(config-policy-name)# default-action (drop | inspect | pass)

If you do not include VPN 0 in any of the zones that you configure in a zone-based firewall, by default, packets are able to reach destination zones that are accessible only over the public internet. You can also disallow this traffic.

vEdge(config)# policy zone-to-no-zone-internet (allow | deny)

Create a zone pair, and define the source and destination zones in that pair and the zone-based firewall policy to apply to the flows between those two zones:

vEdge(config)# policy zone-pair pair-name
vEdge(config-zone-pair)# source-zone source-zone-name
vEdge(config-zone-pair)# destination-zone destination-zone-name
vEdge(config-zone-pair)# zone-policy policy-name

Example 1 isolating two VPNs

Here let see the topology, which describes the following and also defines the flow between different VPNs.


Comment

    You are will be the first.

LEAVE A COMMENT

Please login here to comment.