Zone Based Firewall 101

แชร์
ฝัง
  • เผยแพร่เมื่อ 9 พ.ย. 2024

ความคิดเห็น • 74

  • @Snowbluegirl
    @Snowbluegirl 10 ปีที่แล้ว +16

    Amazing how in 10 min you made me understand what the others didn't in 2 days :) Thank you!

  • @dewayneewilliams
    @dewayneewilliams 12 ปีที่แล้ว

    I am speechless for how fast clearly and easy this is to understand the way you teach. I am in school doing zone based firewall in the way you teach it is so easy to comprehend. Thank you for taking the time to break down the steps.

  • @jayantinamdar2449
    @jayantinamdar2449 11 ปีที่แล้ว +1

    Keith u r the best trainer in networking!!!
    I Cant control on my laugh when you said inspect means just stamp !!!
    one day i will definitely meet u.
    Thanks Sir for all videos.

  • @EdwardDrachenbergJr
    @EdwardDrachenbergJr 11 ปีที่แล้ว

    very nice, quick and informative Keith. I understand it much better now than just reading my netacad materials.

  • @kaziakramulhaque1356
    @kaziakramulhaque1356 8 ปีที่แล้ว

    A great video. A very concise and to the point discussion without any jabbering. Heartfelt thanks :)

  • @red1x-d7i
    @red1x-d7i 14 ปีที่แล้ว

    Working on my CCNA: Security... this helps a million. Thanks Keith!

  • @KeithBarker
    @KeithBarker  12 ปีที่แล้ว

    You are very welcome. I appreciate you taking time to let me know.
    Best wishes,
    Keith Barker

  • @ratnet73
    @ratnet73 12 ปีที่แล้ว

    Thanks Keith...
    U have skills to put complex concept in very very simple manner.
    U r the man.

  • @joestarlite
    @joestarlite 11 ปีที่แล้ว

    This is a very good training video! Good job!
    One suggestion on zone based firewalls: I have many customers with multiple inside and outside interfaces and different policies for each one. I like to set up my zones with numbers such as inside1, inside2, outside1, outside2, dmz1, dmz2 etc.

  • @KeithBarker
    @KeithBarker  12 ปีที่แล้ว

    Thanks for the kind words! I appreciate it.
    Best wishes,
    Keith Barker

  • @cyberpsych1
    @cyberpsych1 8 ปีที่แล้ว

    Very nice, Keith. As I watched this, I realized I was watching the early beginnings of the PIX/ASA platforms. :-)

  • @MaruMavis
    @MaruMavis 9 ปีที่แล้ว +4

    Great video Keith , couldn't understand anything reading the CCNA security materials , You inspire many people to learn networking :) cheers :)

  • @somalistudent
    @somalistudent 12 ปีที่แล้ว

    Keith Barker - Thanks for doing it in a such a nice & clear way! Only you can do that

  • @IreshDissanayakaM
    @IreshDissanayakaM 4 ปีที่แล้ว

    10 years! Still relevant. Well spent 10 minutes.

    • @KeithBarker
      @KeithBarker  3 ปีที่แล้ว +1

      Thank you Iresh Dissanayaka!

  • @KeithBarker
    @KeithBarker  12 ปีที่แล้ว

    Hi Praveen-
    Great question. If we want to allow initial traffic from the outside (where a user on the outside initiates the connection/session) we would need an zone-pair from outside to inside to allow and inspect that traffic.
    Best wishes,
    Keith Barker

  • @KeithBarker
    @KeithBarker  11 ปีที่แล้ว

    There are 3 lists present, 10, 20 and 30. If you want to add an entry to access list 10, the method have would be appropriate. To recompile the ACL on the older PIX, I believe the command is: access-list compiled, (or it may automatically do it if the compiled feature is already enabled).

  • @dnoden
    @dnoden 7 หลายเดือนก่อน

    Thanks for the explanation and demo Keith!

    • @KeithBarker
      @KeithBarker  6 หลายเดือนก่อน +1

      Happy to do it, thanks for the feedback @dnoden.

  • @KeithBarker
    @KeithBarker  11 ปีที่แล้ว

    Similar end results between (CBAC and ZBF) for basic stuff, but ZBF adds more capabilities such as URL filtering, regular expressions and stuff like that.

  • @SpaceCadetNetwork
    @SpaceCadetNetwork 9 ปีที่แล้ว

    I love you Keith! Thanks for sharing such awesomeness.

  • @KeithBarker
    @KeithBarker  11 ปีที่แล้ว

    :)
    Glad you get it! Thanks for the feedback.
    Keith

  • @roderickhosey4043
    @roderickhosey4043 6 ปีที่แล้ว

    Absolutely PHENOMENAL explanation presentation ! Thank You!

  • @PaulGilbert-CCIE
    @PaulGilbert-CCIE 14 ปีที่แล้ว

    very good Keith.

  • @jaggs05
    @jaggs05 13 ปีที่แล้ว

    This cleared my fear of ZBF.
    Great Video..You Rock.

  • @SteveTibbettss
    @SteveTibbettss 13 ปีที่แล้ว

    Hi Keith!
    Great videos, I think I've watched most of what you posted. I just wanted to add that you might want to mention that without making a zone pair regarding the OUTSIDE to self that the router (R2 in this case) can still be reached by the evil internet invaders!

  • @sdibias1
    @sdibias1 13 ปีที่แล้ว

    keith, prior to watching this video i was fearing zbf, not anymore. thanks mate!

  • @pradeepka
    @pradeepka 14 ปีที่แล้ว

    Good video..very useful and well presented

  • @ucheegbuniwe6780
    @ucheegbuniwe6780 5 ปีที่แล้ว

    Thank you very much............ u did excellent well that i had to comment

  • @slupo14
    @slupo14 10 ปีที่แล้ว

    Thank you so much Keith! Perfect explanation!

  • @MJ16Othman
    @MJ16Othman 11 ปีที่แล้ว

    Thanx a million times Keith your'e the best !!!!!

  • @RABWA333
    @RABWA333 10 ปีที่แล้ว

    Hi keith !
    May be i have one last question in this video jejejeje
    i went throgh your videos that explains the ACL , CBAC , ZONE BASED FIREWALL
    the configuration and the implementation now is very clear.
    what was the limitation in ACL which makes Cisco introduce CBAC?
    Then ZBF came to overcome the limitation in CBAC
    what is the limitation in CBAC?
    Actually i tried alot to find out the reason before posting my question .even i went through the Cisco documentation and i found only one line about that and was not clear.
    thanks again for your great support
    cheers

    • @beatzbyDAVE
      @beatzbyDAVE 9 ปีที่แล้ว +1

      Well.. It is simply the policy map. Bcuz unlike CBAC where you have to create your inspect statement explicitly for every zone, ZBF uses class map and leverages policy map to reduce the hard work of recreating too many class maps by simply applying the class maps to the policy map. Service policy only finishes the job and that makes ZBF somewhat more modular than CBAC. So it is a kinda implicitly deny everything that is not explicitly permitted in a simpler fashion. Best of luck in your study

  • @KeithBarker
    @KeithBarker  11 ปีที่แล้ว

    Great idea. Thanks!
    Keith

  • @jpl4131
    @jpl4131 12 ปีที่แล้ว

    thanks keith. i have tried it as well and it worked. :)

  • @shekelboi
    @shekelboi 2 ปีที่แล้ว

    Really good explanation, thank you

  • @kdsingh751
    @kdsingh751 3 ปีที่แล้ว

    very well explained!

    • @KeithBarker
      @KeithBarker  3 ปีที่แล้ว +1

      Glad it was helpful!

  • @jpl4131
    @jpl4131 12 ปีที่แล้ว

    Hi Keith,
    Video is really great as I refused to learn zone-based FW but I need to now as I'm starting my R&S again. Anyway, just a quick question, what if I'm doing NAT/PAT and there are servers inside the inside network that was translated to a public IP, should that be assigned in the ACL (used in class-map) or would a regular inbound ACL on the outside interface do the trick? Sorry for asking as I'm still preparing my lab gears. Thanks again. :)

  • @TheEmperorXavier
    @TheEmperorXavier 8 ปีที่แล้ว

    great video.. well explained

  • @markanthony7874
    @markanthony7874 11 ปีที่แล้ว

    Great Video! Keith, just want to have a little query here. Do zone-based firewall concept is the same with or can be achieved using CBAC and IP Inspect rule? What makes ZFW different from the other(cbac and ip inspect)?

  • @seballo04
    @seballo04 8 ปีที่แล้ว

    one question, what Cisco IOS did you used in the cisco 2801 in the order to permit the ZBF command?

  • @praveenkumar9004
    @praveenkumar9004 12 ปีที่แล้ว

    Hi keith,
    Just a small query do we need to create zone pair(outside-inside),if we want to inspect traffic from outside to inside in the above video example?

  • @beat2009
    @beat2009 8 ปีที่แล้ว

    Thank you very much. This is very useful.

  • @KeithBarker
    @KeithBarker  12 ปีที่แล้ว

    The class map should refer to the pre-nat address.
    Keith

  • @achrafelkhandouli
    @achrafelkhandouli 4 ปีที่แล้ว

    was very helpful, thank u!

    • @KeithBarker
      @KeithBarker  4 ปีที่แล้ว

      Thank you Achraf ! Glad you are here.

  • @Breslinmusic
    @Breslinmusic 12 ปีที่แล้ว

    Great Help, Thank you.

  • @mojisboy
    @mojisboy 3 ปีที่แล้ว

    love you

  • @RABWA333
    @RABWA333 10 ปีที่แล้ว

    He Keith
    thanks alot for sharing, its really a great video
    Q:
    1- what is the difference between CBAC and Zone based firewall?
    2- in which year Zone based firewall was released ?
    3- does the zone based firewall is only a specific feature for cisco ?

    • @KeithBarker
      @KeithBarker  10 ปีที่แล้ว +2

      Hello Marwan-
      CBAC is the older implementation of stateful firewall on the IOS router. ZBF is the newer method.
      You can use the Feature Navigator at Cisco.com/go/fn to identify when features where first introduced.
      Zone Based Firewall is a specific feature for Cisco IOS routers, but the concept and technology of zones and stateful filtering have been around for decades, and are implemented by most vendors who provide stateful firewall services in their products including Unified Threat Management (UTM) devices.
      Cheers,
      Keith

    • @RABWA333
      @RABWA333 10 ปีที่แล้ว

      Keith Barker
      thanks alot for your fast replay , so kind from you
      ok, now its very clear
      regards

  • @RABWA333
    @RABWA333 10 ปีที่แล้ว

    Hi Keith , other question regarding the topic
    ACL are processed in TOP DOWN process , so the order is very important
    Q1: is it the same in ZBF, (i am a bit confused about it )?
    Q2: Does the ZBF eliminate the problem of Rule Shadowing

    • @keithbarker4353
      @keithbarker4353 10 ปีที่แล้ว +1

      Hello Marwan-
      The first match is how the traffic will be classified. For example if TCP and FTP are both part of a ZBF configuration, and TCP is first in the matches (via class maps) the FTP traffic would be classified as just TCP and handled that way without the advanced inspection available for FTP. So for that reason, order does matter. Here is some additional documentation. www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_data_zbf/configuration/15-mt/sec-data-zbf-15-mt-book/sec-zone-pol-fw.html
      Cheers,
      Keith

    • @RABWA333
      @RABWA333 10 ปีที่แล้ว

      Keith Barker
      thank you very much in deep Keith for your Answer, its clear now
      Cheers

  • @luxorodotorg
    @luxorodotorg 13 ปีที่แล้ว

    i've got it. thank you.

  • @esamalaslmy
    @esamalaslmy 9 ปีที่แล้ว

    Thanx!

  • @acloudsecninja
    @acloudsecninja 10 ปีที่แล้ว

    awesome!

  • @MarwanUrabi
    @MarwanUrabi 11 ปีที่แล้ว

    thanks for your videos , when I config it on Router 1751 with DSL connection , the internet still working , but very very slow and some site not responding

  • @cyberpsych1
    @cyberpsych1 8 ปีที่แล้ว

    One more question, is this config supposed to go on "all routers" or just R2?

  • @redouanesarra7008
    @redouanesarra7008 7 ปีที่แล้ว

    Same comment as Patricia Dias

  • @kepenge
    @kepenge 14 ปีที่แล้ว

    Keith! can please help me, i've one issue using ZBF... i've running a remote vpn on my 2801 after configure ZBF my vpn client can connect but no traffic at all.
    can you please help me?

  • @predragvasiljevic3777
    @predragvasiljevic3777 5 ปีที่แล้ว +1

    R1#ping 3.3.3.3 repeat 100
    Type escape sequence to abort.
    Sending 100, 100-byte ICMP Echos to 3.3.3.3, timeout is 2 seconds:
    ...................................!!!!!.!!!!.!!!!.!!!!.!!!!.!!!!!.!!!
    !!.!!!!.!!!!.!!!!!.!!!!!.!!!!.
    Success rate is 53 percent (53/100), round-trip min/avg/max = 12/26/68 ms
    first drops, I forget to put my loopback in eigrp, thanks Keith
    @2dislikes,
    really? dislikes?really?

    • @KeithBarker
      @KeithBarker  5 ปีที่แล้ว +1

      Thank you for the comments! Glad you are here.

    • @predragvasiljevic3777
      @predragvasiljevic3777 5 ปีที่แล้ว

      @@KeithBarker no, thank you good sir :))))

  • @vakhtangkhavtasi954
    @vakhtangkhavtasi954 6 ปีที่แล้ว

    and what about nat ?

  • @luxorodotorg
    @luxorodotorg 13 ปีที่แล้ว

    Dear Keith6783 what kind of IOS image do i need to implement a class map type inspect. Look at this:
    R7#show ver | include Version
    Cisco IOS Software, 2600 Software (C2691-ENTSERVICESK9-M), Version 12.4(13b), RELEASE SOFTWARE (fc3)
    ROM: 2600 Software (C2691-ENTSERVICESK9-M), Version 12.4(13b), RELEASE SOFTWARE (fc3)
    R7#
    R7(config)#class-map ?
    WORD class-map name
    match-all Logical-AND all matching statements under this classmap
    match-any Logical-OR all matching
    No type !!

  • @AlexeyRivkin
    @AlexeyRivkin 13 ปีที่แล้ว

    The same could be accomplished without ACLs, by using class-default.

  • @kepenge
    @kepenge 14 ปีที่แล้ว

    @Keith6783
    hello Keith
    thanks for your response... can u please look my config and tell me where i'm missing?
    class-map type inspect match-any CHAP-1
    match protocol tcp
    match protocol icmp
    match protocol udp
    !
    !
    policy-map type inspect PMAP-1
    class type inspect CHAP-1
    inspect
    police rate 8000 burst 1000
    class class-default
    !
    zone security inside
    zone security outside
    zone-pair security inside-to-outside source inside destination outside
    service-policy type inspect PMAP-1
    !