Step 1 |
enable
|
Enables privileged EXEC mode.
|
Step 2 |
configure
terminal
Device# configure terminal
|
Enters global configuration mode.
|
Step 3 |
zone
security
{zone-name |
default }
Device(config)# zone security zone1
|
Creates a security zone to which interfaces can be assigned and enters security zone configuration mode.
|
Step 4 |
exit
Device(config-sec-zone)# exit
|
Exits security zone configuration mode and returns to global configuration mode.
|
Step 5 |
zone
security
{zone-name |
default }
Device(config)# zone security zone2
|
Creates a security zone to which interfaces can be assigned and enters security zone configuration mode.
|
Step 6 |
exit
Device(config-sec-zone)# exit
|
Exits security zone configuration mode and returns to global configuration mode.
|
Step 7 |
zone-pair
security
zone-pair-name
[source {source-zone-name |
self |
default }
destination [destination-zone-name |
self |
default ]]
Device(config)# zone-pair security in-out source zone1 destination zone2
|
Creates a zone pair and returns to security zone-pair configuration mode.
Note
|
To apply a policy, you must configure a zone pair.
|
|
Step 8 |
service-policy
type
inspect
policy-map-name
Device(config-sec-zone-pair)# service-policy type inspect sip-policy
|
Attaches a firewall policy map to the destination zone pair.
Note
|
If a policy is not configured between a pair of zones, traffic is dropped by default.
|
|
Step 9 |
exit
Device(config-sec-zone-pair)# exit
|
Exits security zone-pair configuration mode and returns to global configuration mode.
|
Step 10 |
interface
type
number
Device(config)# interface gigabitethernet 0/0/0
|
Configures an interface and enters interface configuration mode.
|
Step 11 |
zone-member
security
zone-name
Device(config-if)# zone-member security zone1
|
Assigns an interface to a specified security zone.
Note
|
When you make an interface a member of a security zone, all traffic in and out of that interface (except traffic bound for
the device or initiated by the device) is dropped by default. To let traffic through the interface, you must make the zone
part of a zone pair to which you apply a policy. If the policy permits traffic, traffic can flow through that interface.
|
|
Step 12 |
exit
|
Exits interface configuration mode and returns to global configuration mode.
|
Step 13 |
interface
type
number
Device(config)# interface gigabitethernet 0/1/1
|
Configures an interface and enters interface configuration mode.
|
Step 14 |
zone-member
security
zone-name
Device(config-if)# zone-member security zone2
|
Assigns an interface to a specified security zone.
|
Step 15 |
end
|
Exits interface configuration mode and returns to privileged EXEC mode.
|