Skip to content

Zone-Based Firewall

The zone-based firewall model evaluates traffic between security zones using class maps and policy maps. It is designed for policy reasoning and labs, not for deep inspection of application payloads.

AreaLevelNotes
Security zonesSupportedInterfaces can be assigned to zones.
Zone pairsSupportedSource/destination zone policy attachment.
Class mapsSupportedMatch ACLs and protocol categories where implemented.
Policy mapsSupportedinspect, pass, and drop style actions.
Stateful inspectionBehaviour modelReturn traffic can be allowed through connection state.
Application inspectionPartialProtocol names are matched; payload parsing is limited.
StandardCoverageNotes
Cisco IOS ZBFWBehaviour modelZone, zone-pair, class-map, policy-map semantics.
FeatureStatusNotes
zone securitySupportedCreates a zone.
zone-member securitySupportedAssigns interface to zone.
zone-pair securitySupportedBinds source/destination zones.
class-map type inspectSupportedClassifies traffic.
policy-map type inspectSupportedApplies actions.
inspectSupportedAllows matching traffic and return flow.
pass / dropSupportedStateless allow/drop decisions.
Self zonePartialSupported where parser/runtime paths cover it.
CommandIOS-styleJunos-styleVyOS-styleNotes
zone security INSIDESupportedn/an/aZone definition.
zone-member security INSIDESupportedn/an/aInterface membership.
class-map type inspect match-any WEBSupportedn/an/aClassification.
policy-map type inspect INSIDE-OUTSupportedn/an/aPolicy actions.
service-policy type inspect INSIDE-OUTSupportedn/an/aZone-pair attachment.
show policy-map type inspect zone-pairSupportedn/an/aRuntime view.

Zone policy is evaluated after routing identifies the egress side. When no zone-pair policy permits the flow, the conservative result is deny.

Canonical example
configure terminal
zone security INSIDE
zone security OUTSIDE
class-map type inspect match-any WEB
match protocol http
match protocol https
policy-map type inspect INSIDE-OUT
class type inspect WEB
inspect
zone-pair security IN-OUT source INSIDE destination OUTSIDE
service-policy type inspect INSIDE-OUT
interface GigabitEthernet0/1
zone-member security INSIDE
end

Vendor styles

IOS-style
zone security INSIDE
zone security OUTSIDE
class-map type inspect match-any WEB
match protocol http
policy-map type inspect INSIDE-OUT
class type inspect WEB
inspect
zone-pair security IN-OUT source INSIDE destination OUTSIDE
service-policy type inspect INSIDE-OUT
Junos-style
set security zones security-zone trust interfaces ge-0/0/1.0
set security zones security-zone untrust interfaces ge-0/0/0.0
set security policies from-zone trust to-zone untrust policy WEB match application junos-http
set security policies from-zone trust to-zone untrust policy WEB then permit
VyOS-style
set firewall zone INSIDE interface eth1
set firewall zone OUTSIDE interface eth0
set firewall ipv4 name INSIDE-OUT default-action drop
set firewall ipv4 name INSIDE-OUT rule 10 action accept

Deep packet inspection, ALG helpers, full self-zone behaviour, NAT/firewall vendor ordering quirks, and detailed session timeout tuning are simplified.