Zone based FW and VRF/MPLS

From: Torleif Solli <rgi_at_stord.as>
Date: Tue, 16 Oct 2012 12:00:06 +0200

Hi!

 

Doing a lab with Zone based FW.

It's from INE Vol2 lab4.

 

BB1 is connected to R6 in a VRF (VPN_A)

 

R6 is a PE and is doing MPLS over a tunnel interface to R4 wich is a PE to
and is connected to BB3.

R6 is configured as a zone based FW and serial0/0/0 is ine zone OUTESIDE and
this interface connects to BB1.

I tried to put the MPLS tunnel interface in zone INSIDE.. and tried ping and
telnet from BB3 to BB1.. and it works. why?

I tried with match protocol and match access-list to match the traffic that
ZBF should inspect.. both works..

Is ZBF actually looking into the MPLS tagged packets ?

 

 

Here is my config on R6

 

 

class-map type inspect match-all ICMP

match access-group name ICMP

class-map type inspect match-any UDP-TCP

match access-group name UDP-TCP

class-map type inspect match-any HTTPS

match access-group name HTTP

class-map type inspect match-any DNS

match access-group name DNS

class-map type inspect match-any HTTPS-SERVER

match access-group name HTTPS-SERVER

class-map type inspect match-any DNS-ICMP

match class-map DNS

match class-map ICMP

class-map type inspect match-all HTTP-HTTPS

match class-map HTTPS-SERVER

match class-map HTTPS

!

policy-map type inspect OUTSIDE-IN

class type inspect HTTP-HTTPS

  inspect

class type inspect DNS-ICMP

  inspect

  police rate 128000 burst 1000

class class-default

  drop log

policy-map type inspect INSIDE-OUT

class type inspect UDP-TCP

  inspect

class type inspect ICMP

  inspect

class class-default

  drop log

!

zone security INSIDE

zone security OUTSIDE

zone-pair security INSIDE-OUT source INSIDE destination OUTSIDE

service-policy type inspect INSIDE-OUT

zone-pair security OUTSIDE-IN source OUTSIDE destination INSIDE

service-policy type inspect OUTSIDE-IN

!

!

interface Tunnel46

ip address 141.1.46.6 255.255.255.0

zone-member security INSIDE

!

interface Serial0/0/0:0

ip vrf forwarding VPN_A

ip address 54.1.1.6 255.255.255.0

zone-member security OUTSIDE

 

 

verification:

 

doing a telnet from BB3 to BB1 (inside to outside)

 

Rack1R6#show policy-map type inspect zone-pair sessions

 

policy exists on zp INSIDE-OUT

Zone-pair: INSIDE-OUT

 

  Service-policy inspect : INSIDE-OUT

 

    Class-map: UDP-TCP (match-any)

      Match: access-group name UDP-TCP

       2 packets, 48 bytes

        30 second rate 0 bps

 

   Inspect

 

      Number of Established Sessions = 1

      Established Sessions

        Session 66CBE0A0 (204.12.1.254:36384)=>(54.1.1.254:23) telnet:tcp
SIS_OPEN

          Created 00:00:06, Last heard 00:00:06

          Bytes sent (initiator:responder) [30:1206]

 

 

 

 

And http from BB1 to HTTP server 204.12.1.100 port 80

 

 

policy exists on zp OUTSIDE-IN

Zone-pair: OUTSIDE-IN

 

  Service-policy inspect : OUTSIDE-IN

 

    Class-map: HTTP-HTTPS (match-all)

      Match: class-map match-any HTTPS-SERVER

        Match: access-group name HTTPS-SERVER

          0 packets, 0 bytes

          30 second rate 0 bps

      Match: class-map match-any HTTPS

        Match: access-group name HTTP

          0 packets, 0 bytes

          30 second rate 0 bps

 

   Inspect

 

      Number of Established Sessions = 1

      Established Sessions

        Session 66CBE2A0 (54.1.1.254:25090)=>(204.12.1.100:80) http:tcp
SIS_OPEN

          Created 00:00:06, Last heard 00:00:06

          Bytes sent (initiator:responder) [0:0]

 

 

-Torleif

Blogs and organic groups at http://www.ccie.net
Received on Tue Oct 16 2012 - 12:00:06 ART

This archive was generated by hypermail 2.2.0 : Thu Nov 01 2012 - 10:53:33 ART