Zone Based Firewall 101

Поділитися
Вставка
  • Опубліковано 12 січ 2025

КОМЕНТАРІ • 74

  • @Snowbluegirl
    @Snowbluegirl 11 років тому +17

    Amazing how in 10 min you made me understand what the others didn't in 2 days :) Thank you!

  • @jayantinamdar2449
    @jayantinamdar2449 11 років тому +1

    Keith u r the best trainer in networking!!!
    I Cant control on my laugh when you said inspect means just stamp !!!
    one day i will definitely meet u.
    Thanks Sir for all videos.

  • @dewayneewilliams
    @dewayneewilliams 12 років тому

    I am speechless for how fast clearly and easy this is to understand the way you teach. I am in school doing zone based firewall in the way you teach it is so easy to comprehend. Thank you for taking the time to break down the steps.

  • @kaziakramulhaque1356
    @kaziakramulhaque1356 8 років тому

    A great video. A very concise and to the point discussion without any jabbering. Heartfelt thanks :)

  • @EdwardDrachenbergJr
    @EdwardDrachenbergJr 11 років тому

    very nice, quick and informative Keith. I understand it much better now than just reading my netacad materials.

  • @ratnet73
    @ratnet73 12 років тому

    Thanks Keith...
    U have skills to put complex concept in very very simple manner.
    U r the man.

  • @KeithBarker
    @KeithBarker  12 років тому

    You are very welcome. I appreciate you taking time to let me know.
    Best wishes,
    Keith Barker

  • @red1x-d7i
    @red1x-d7i 14 років тому

    Working on my CCNA: Security... this helps a million. Thanks Keith!

  • @MaruMavis
    @MaruMavis 10 років тому +4

    Great video Keith , couldn't understand anything reading the CCNA security materials , You inspire many people to learn networking :) cheers :)

  • @cyberpsych1
    @cyberpsych1 8 років тому

    Very nice, Keith. As I watched this, I realized I was watching the early beginnings of the PIX/ASA platforms. :-)

  • @KeithBarker
    @KeithBarker  11 років тому

    Similar end results between (CBAC and ZBF) for basic stuff, but ZBF adds more capabilities such as URL filtering, regular expressions and stuff like that.

  • @KeithBarker
    @KeithBarker  12 років тому

    Thanks for the kind words! I appreciate it.
    Best wishes,
    Keith Barker

  • @somalistudent
    @somalistudent 12 років тому

    Keith Barker - Thanks for doing it in a such a nice & clear way! Only you can do that

  • @joestarlite
    @joestarlite 11 років тому

    This is a very good training video! Good job!
    One suggestion on zone based firewalls: I have many customers with multiple inside and outside interfaces and different policies for each one. I like to set up my zones with numbers such as inside1, inside2, outside1, outside2, dmz1, dmz2 etc.

  • @KeithBarker
    @KeithBarker  11 років тому

    There are 3 lists present, 10, 20 and 30. If you want to add an entry to access list 10, the method have would be appropriate. To recompile the ACL on the older PIX, I believe the command is: access-list compiled, (or it may automatically do it if the compiled feature is already enabled).

  • @SpaceCadetNetwork
    @SpaceCadetNetwork 9 років тому

    I love you Keith! Thanks for sharing such awesomeness.

  • @IreshDissanayakaM
    @IreshDissanayakaM 4 роки тому

    10 years! Still relevant. Well spent 10 minutes.

    • @KeithBarker
      @KeithBarker  4 роки тому +1

      Thank you Iresh Dissanayaka!

  • @KeithBarker
    @KeithBarker  12 років тому

    Hi Praveen-
    Great question. If we want to allow initial traffic from the outside (where a user on the outside initiates the connection/session) we would need an zone-pair from outside to inside to allow and inspect that traffic.
    Best wishes,
    Keith Barker

  • @roderickhosey4043
    @roderickhosey4043 6 років тому

    Absolutely PHENOMENAL explanation presentation ! Thank You!

  • @jaggs05
    @jaggs05 13 років тому

    This cleared my fear of ZBF.
    Great Video..You Rock.

  • @dnoden
    @dnoden 9 місяців тому

    Thanks for the explanation and demo Keith!

    • @KeithBarker
      @KeithBarker  8 місяців тому +1

      Happy to do it, thanks for the feedback @dnoden.

  • @sdibias1
    @sdibias1 13 років тому

    keith, prior to watching this video i was fearing zbf, not anymore. thanks mate!

  • @pradeepka
    @pradeepka 14 років тому

    Good video..very useful and well presented

  • @PaulGilbert-CCIE
    @PaulGilbert-CCIE 14 років тому

    very good Keith.

  • @SteveTibbettss
    @SteveTibbettss 13 років тому

    Hi Keith!
    Great videos, I think I've watched most of what you posted. I just wanted to add that you might want to mention that without making a zone pair regarding the OUTSIDE to self that the router (R2 in this case) can still be reached by the evil internet invaders!

  • @KeithBarker
    @KeithBarker  11 років тому

    :)
    Glad you get it! Thanks for the feedback.
    Keith

  • @ucheegbuniwe6780
    @ucheegbuniwe6780 5 років тому

    Thank you very much............ u did excellent well that i had to comment

  • @slupo14
    @slupo14 10 років тому

    Thank you so much Keith! Perfect explanation!

  • @MJ16Othman
    @MJ16Othman 11 років тому

    Thanx a million times Keith your'e the best !!!!!

  • @praveenkumar9004
    @praveenkumar9004 12 років тому

    Hi keith,
    Just a small query do we need to create zone pair(outside-inside),if we want to inspect traffic from outside to inside in the above video example?

  • @KeithBarker
    @KeithBarker  11 років тому

    Great idea. Thanks!
    Keith

  • @shekelboi
    @shekelboi 2 роки тому

    Really good explanation, thank you

  • @jpl1861
    @jpl1861 12 років тому

    thanks keith. i have tried it as well and it worked. :)

  • @markanthony7874
    @markanthony7874 11 років тому

    Great Video! Keith, just want to have a little query here. Do zone-based firewall concept is the same with or can be achieved using CBAC and IP Inspect rule? What makes ZFW different from the other(cbac and ip inspect)?

  • @seballo04
    @seballo04 8 років тому

    one question, what Cisco IOS did you used in the cisco 2801 in the order to permit the ZBF command?

  • @jpl1861
    @jpl1861 12 років тому

    Hi Keith,
    Video is really great as I refused to learn zone-based FW but I need to now as I'm starting my R&S again. Anyway, just a quick question, what if I'm doing NAT/PAT and there are servers inside the inside network that was translated to a public IP, should that be assigned in the ACL (used in class-map) or would a regular inbound ACL on the outside interface do the trick? Sorry for asking as I'm still preparing my lab gears. Thanks again. :)

  • @TheEmperorXavier
    @TheEmperorXavier 8 років тому

    great video.. well explained

  • @KeithBarker
    @KeithBarker  12 років тому

    The class map should refer to the pre-nat address.
    Keith

  • @cyberpsych1
    @cyberpsych1 8 років тому

    One more question, is this config supposed to go on "all routers" or just R2?

  • @beat2009
    @beat2009 8 років тому

    Thank you very much. This is very useful.

  • @kdsingh751
    @kdsingh751 3 роки тому

    very well explained!

  • @MarwanUrabi
    @MarwanUrabi 11 років тому

    thanks for your videos , when I config it on Router 1751 with DSL connection , the internet still working , but very very slow and some site not responding

  • @RABWA333
    @RABWA333 10 років тому

    Hi keith !
    May be i have one last question in this video jejejeje
    i went throgh your videos that explains the ACL , CBAC , ZONE BASED FIREWALL
    the configuration and the implementation now is very clear.
    what was the limitation in ACL which makes Cisco introduce CBAC?
    Then ZBF came to overcome the limitation in CBAC
    what is the limitation in CBAC?
    Actually i tried alot to find out the reason before posting my question .even i went through the Cisco documentation and i found only one line about that and was not clear.
    thanks again for your great support
    cheers

    • @beatzbyDAVE
      @beatzbyDAVE 9 років тому +1

      Well.. It is simply the policy map. Bcuz unlike CBAC where you have to create your inspect statement explicitly for every zone, ZBF uses class map and leverages policy map to reduce the hard work of recreating too many class maps by simply applying the class maps to the policy map. Service policy only finishes the job and that makes ZBF somewhat more modular than CBAC. So it is a kinda implicitly deny everything that is not explicitly permitted in a simpler fashion. Best of luck in your study

  • @mojisboy
    @mojisboy 3 роки тому

    love you

  • @luxorodotorg
    @luxorodotorg 13 років тому

    Dear Keith6783 what kind of IOS image do i need to implement a class map type inspect. Look at this:
    R7#show ver | include Version
    Cisco IOS Software, 2600 Software (C2691-ENTSERVICESK9-M), Version 12.4(13b), RELEASE SOFTWARE (fc3)
    ROM: 2600 Software (C2691-ENTSERVICESK9-M), Version 12.4(13b), RELEASE SOFTWARE (fc3)
    R7#
    R7(config)#class-map ?
    WORD class-map name
    match-all Logical-AND all matching statements under this classmap
    match-any Logical-OR all matching
    No type !!

  • @RABWA333
    @RABWA333 10 років тому

    Hi Keith , other question regarding the topic
    ACL are processed in TOP DOWN process , so the order is very important
    Q1: is it the same in ZBF, (i am a bit confused about it )?
    Q2: Does the ZBF eliminate the problem of Rule Shadowing

    • @keithbarker4353
      @keithbarker4353 10 років тому +1

      Hello Marwan-
      The first match is how the traffic will be classified. For example if TCP and FTP are both part of a ZBF configuration, and TCP is first in the matches (via class maps) the FTP traffic would be classified as just TCP and handled that way without the advanced inspection available for FTP. So for that reason, order does matter. Here is some additional documentation. www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_data_zbf/configuration/15-mt/sec-data-zbf-15-mt-book/sec-zone-pol-fw.html
      Cheers,
      Keith

    • @RABWA333
      @RABWA333 10 років тому

      Keith Barker
      thank you very much in deep Keith for your Answer, its clear now
      Cheers

  • @achrafelkhandouli
    @achrafelkhandouli 5 років тому

    was very helpful, thank u!

    • @KeithBarker
      @KeithBarker  5 років тому

      Thank you Achraf ! Glad you are here.

  • @kepenge
    @kepenge 14 років тому

    Keith! can please help me, i've one issue using ZBF... i've running a remote vpn on my 2801 after configure ZBF my vpn client can connect but no traffic at all.
    can you please help me?

  • @RABWA333
    @RABWA333 10 років тому

    He Keith
    thanks alot for sharing, its really a great video
    Q:
    1- what is the difference between CBAC and Zone based firewall?
    2- in which year Zone based firewall was released ?
    3- does the zone based firewall is only a specific feature for cisco ?

    • @KeithBarker
      @KeithBarker  10 років тому +2

      Hello Marwan-
      CBAC is the older implementation of stateful firewall on the IOS router. ZBF is the newer method.
      You can use the Feature Navigator at Cisco.com/go/fn to identify when features where first introduced.
      Zone Based Firewall is a specific feature for Cisco IOS routers, but the concept and technology of zones and stateful filtering have been around for decades, and are implemented by most vendors who provide stateful firewall services in their products including Unified Threat Management (UTM) devices.
      Cheers,
      Keith

    • @RABWA333
      @RABWA333 10 років тому

      Keith Barker
      thanks alot for your fast replay , so kind from you
      ok, now its very clear
      regards

  • @vakhtangkhavtasi954
    @vakhtangkhavtasi954 7 років тому

    and what about nat ?

  • @Breslinmusic
    @Breslinmusic 12 років тому

    Great Help, Thank you.

  • @AlexeyRivkin
    @AlexeyRivkin 13 років тому

    The same could be accomplished without ACLs, by using class-default.

  • @kepenge
    @kepenge 14 років тому

    @Keith6783
    hello Keith
    thanks for your response... can u please look my config and tell me where i'm missing?
    class-map type inspect match-any CHAP-1
    match protocol tcp
    match protocol icmp
    match protocol udp
    !
    !
    policy-map type inspect PMAP-1
    class type inspect CHAP-1
    inspect
    police rate 8000 burst 1000
    class class-default
    !
    zone security inside
    zone security outside
    zone-pair security inside-to-outside source inside destination outside
    service-policy type inspect PMAP-1
    !

  • @predragvasiljevic3777
    @predragvasiljevic3777 5 років тому +1

    R1#ping 3.3.3.3 repeat 100
    Type escape sequence to abort.
    Sending 100, 100-byte ICMP Echos to 3.3.3.3, timeout is 2 seconds:
    ...................................!!!!!.!!!!.!!!!.!!!!.!!!!.!!!!!.!!!
    !!.!!!!.!!!!.!!!!!.!!!!!.!!!!.
    Success rate is 53 percent (53/100), round-trip min/avg/max = 12/26/68 ms
    first drops, I forget to put my loopback in eigrp, thanks Keith
    @2dislikes,
    really? dislikes?really?

  • @acloudsecninja
    @acloudsecninja 10 років тому

    awesome!

  • @luxorodotorg
    @luxorodotorg 13 років тому

    i've got it. thank you.

  • @redouanesarra7008
    @redouanesarra7008 7 років тому

    Same comment as Patricia Dias

  • @esamalaslmy
    @esamalaslmy 10 років тому

    Thanx!