Options

CCIE R&S Security

TurgonTurgon Banned Posts: 6,308 ■■■■■■■■■□
One of the trickiest sections on the R&S study trail to get down, the questions seem so **** going by the practice labs. Let this be the thread to discuss R&S security topics.

Comments

  • Options
    ciscog33kciscog33k Member Posts: 82 ■■□□□□□□□□
    Am I the only one that hates zone-based firewalls?
  • Options
    TurgonTurgon Banned Posts: 6,308 ■■■■■■■■■□
    ciscog33k wrote: »
    Am I the only one that hates zone-based firewalls?

    Probably not. Never worked with them yet. Something I have to cover. 2 points on the test. Thanks for contributing! What is this stuff all about then? IOS feature?
  • Options
    kalebkspkalebksp Member Posts: 1,033 ■■■■■□□□□□
    ciscog33k wrote: »
    Am I the only one that hates zone-based firewalls?

    Other than the lack of IPv6 support I really like ZBF. I've only used it on my home router so take my opinion for what it's worth.
  • Options
    mikej412mikej412 Member Posts: 10,086 ■■■■■■■■■■
    Turgon wrote: »
    IOS feature?
    Yep -- came in 12.4(6)T but had some tweaks in 12.4(9)T and 12.4(11)T that make the last two versions the ones to run for the ZBF in the CCNA:Security. You need the IP Security or greater feature set.

    It's definitely worth the 20 minutes to Lab up.
    :mike: Cisco Certifications -- Collect the Entire Set!
  • Options
    kalebkspkalebksp Member Posts: 1,033 ■■■■■□□□□□
    For those unfamiliar with the Zone-Based Firewall it essentially groups your interfaces into different "zones" then you apply your policy unidirectionally between the zones rather than using CBAC on a per-interface basis. All members of a zone can freely pass traffic. By default members of different zones cannot pass traffic, except for the self zone (aka the router) which all zones can communicate with by default. If one interface is in a zone and another is not in a zone they cannot communicate at all. ZBF and CBAC are mutually exclusive on an interface. ZBF uses the MQC syntax, so if you're familiar with QoS configuration it's pretty easy.

    I find it much easier logically and in configuration to define how I want different zones to communicate rather than how each interface should be able to communicate with every other interface.
  • Options
    laidbackfreaklaidbackfreak Member Posts: 991
    kalebksp wrote: »
    For those unfamiliar with the Zone-Based Firewall it essentially groups your interfaces into different "zones" then you apply your policy unidirectionally between the zones rather than using CBAC on a per-interface basis. All members of a zone can freely pass traffic. By default members of different zones cannot pass traffic, except for the self zone (aka the router) which all zones can communicate with by default. If one interface is in a zone and another is not in a zone they cannot communicate at all. ZBF and CBAC are mutually exclusive on an interface. ZBF uses the MQC syntax, so if you're familiar with QoS configuration it's pretty easy.

    I find it much easier logically and in configuration to define how I want different zones to communicate rather than how each interface should be able to communicate with every other interface.

    Good write up fella icon_smile.gif pretty much how I feel about it too... MQC its the future lol
    if I say something that can be taken one of two ways and one of them offends, I usually mean the other one :-)
  • Options
    ciscog33kciscog33k Member Posts: 82 ■■□□□□□□□□
    Ok I guess I'm in the minority. I can't remember what I was trying to do with it, but it seemed like a pain in the butt at the time. Disclaimer though... I was much less competent with cisco gear back then (hadn't even started my ccnp). Now that I understand ios at a much higher level, maybe I should play with it a little.
  • Options
    DevilWAHDevilWAH Member Posts: 2,997 ■■■■■■■■□□
    ZBF is the only one I have much experience with.. And I think its great, nice and logical. OK I am only using it on a small production network, but considering the price, and being able to keep it all on one box (ok not great for security, but when the network is only 20 end stations + a few web servers, this is a big plus in my book)

    And the fact is has such a similar configuration method to QOS is another plus.

    The fact I can configure it from the CLI, and read back my configs, is also good :)
    • If you can't explain it simply, you don't understand it well enough. Albert Einstein
    • An arrow can only be shot by pulling it backward. So when life is dragging you back with difficulties. It means that its going to launch you into something great. So just focus and keep aiming.
Sign In or Register to comment.