EMAIL SUPPORT
dclessons@dclessons.comLOCATION
AFConfiguring Zone based Firewall
Configuring Zone based Firewall
Below is the steps defined for CLI.
CLI Configuration Procedure:
Create lists of IP prefixes:
vEdge(config)# policy
vEdge(config-policy)# lists data-prefix-list list-name
vEdge(config-data-prefix-list)# ip-prefix prefix/length
Configure a source zone ,this is a group of VPNs from which data traffic flows.
vEdge(config)# policy zone source-zone-name
vEdge(config-zone)# vpn vpn-id
Configure a destination zone, this is a group of VPNs to which data traffic flows.
vEdge(config)# policy zone destination-zone-name
vEdge(config-zone)# vpn vpn-id
Create a zone-based firewall policy:
vEdge(config)# policy zone-based-policy policy-name
vEdge(config-policy-zone-based-policy)#
Create a series of match–action pair sequences:
vEdge(config-zone-based-policy)# sequence number
vEdge(config-sequence)#
Define match parameters for the data traffic:
vEdge(config-sequence-number)# match match-parameter
Define actions to take when a match occurs:
vEdge(config-sequence)# action drop
vEdge(config-sequence)# action inspect
vEdge(config-sequence)# action log
vEdge(config-sequence)# action pass
Define the default action, when data traffic does not match the conditions:
vEdge(config-policy-name)# default-action (drop | inspect | pass)
If you do not include VPN 0 in any of the zones that you configure in a zone-based firewall, by default, packets are able to reach destination zones that are accessible only over the public internet. You can also disallow this traffic.
vEdge(config)# policy zone-to-no-zone-internet (allow | deny)
Create a zone pair, and define the source and destination zones in that pair and the zone-based firewall policy to apply to the flows between those two zones:
vEdge(config)# policy zone-pair pair-name
vEdge(config-zone-pair)# source-zone source-zone-name
vEdge(config-zone-pair)# destination-zone destination-zone-name
vEdge(config-zone-pair)# zone-policy policy-name
Example 1 isolating two VPNs
Here let see the topology, which describes the following and also defines the flow between different VPNs.
LEAVE A COMMENT
Please login here to comment.