Zone-Based Policy Firewall

Normally when you think about a router you think about just routing packets and not firewall policies. After all routers route and firewalls block or allow traffic based on policies.  However, routers can also work as stateful firewalls; to accomplish this you can leverage a feature called Zone-Based Policy Firewall (ZBPF) which is available on current versions of IOS and IOS-XE (Check release notes for exact features and caveats). With ZBPF your router can inspect traffic leaving one zone and going to another and allowing the return traffic back in. You can also choose to deny traffic or simply permit it without inspection. Keep in mind though that permitting the traffic instead of inspecting it does not allow the router to add that traffic to its state table and therefore return traffic will need to be explicitly permitted. So how do we configure ZBPF?

First, we have to define the zones that we want to create. For my example I’ll be using two zones, one called INSIDE and the other called OUTSIDE.

Once the zones are created we need to define a zone-pair. Zone-pairs dictate what the source zone and destination zones will be. In our example, there will be two zone-pairs one for traffic coming from INSIDE and going to OUTSIDE, and one for traffic coming from OUTSIDE and going INSIDE.  We’ll also revisit these later when it comes time to apply the service policy.

Now we need to define what type of traffic we want to either permit, drop, or inspect. For this task we’ll use ACLs to define the traffic, class-maps to match off of the ACL and to match on a specific protocol, and lastly, a policy-map to apply an action to take.  For this example, I’ll match telnet traffic from the IP address  10.2.1.1 to 10.0.1.2 as well as all HTTP traffic. Lastly, I’ll create a policy that denies all traffic inbound from the OUTSIDE zone. A couple of things to note here is the keyword match-any on the class-map. This allows the router to match either traffic that matches the ACL, or HTTP traffic. If we used the keyword match-all, then both would have to match for the action in the policy map to take effect.

Once we have the ACLs, class-maps, and policy-maps created we need to apply these to the zone-pairs that we created earlier.

The last thing to do is to assign the interfaces to different zones. I leave this step until last as once an interface has a zone applied it will not pass any traffic that is not explicitly permitted by service policy.

One thing I need to mention here is that there is a default zone created called the self-zone. This zone is used to control traffic to the router itself, such as SSH traffic, EIGRP traffic etc. The policies we applied above will only affect traffic that is transiting through the router. If you don’t do anything with the self-zone then its default behavior is to allow all traffic.

Lastly, I’ll list out the rules for ZBPF that need to be taken into account when setting this up:

  1. A zone must be configured before assigning it to an interface.
  2. An interface can only belong to one security zone.
  3. Traffic to and from an interface assigned to a zone is implicitly blocked unless the interface the destination interface is in the same zone as the source interface or traffic to an interface on the router.
  4. Traffic between interfaces belonging to the same zone is implicitly allowed.
  5. For traffic to be allowed from one interface to another, the traffic must match an “inspect” or a “permit” action in a policy.
  6. Traffic to the self-zone is implicitly allowed until it has been explicitly denied.
  7. Traffic cannot flow between an interface that is a member of a zone and an interface that is not a member of a zone.
  8. Interfaces that do not belong to a zone continue to act as classical router ports.
  9. If an interface that is not a member of a zone needs to send traffic to an interface in a zone, a dummy policy should be created that allows all traffic from the one interface to the other.
  10. For traffic to be able to flow between all of the interfaces on a router, each interface should be a part of a zone with the appropriate policies applied.

By using ZBPF features on a router a small business, or branch office can gain the advantages of a stateful firewall without incurring the costs of one.

Advertisement

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s