Prerequisites for Nested Class Map Support for Zone-Based Policy Firewall
Before configuring nested class maps, you should be familiar with the modular Quality of Service (QoS) CLI (MQC).
The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
The Nested Class Map Support for Zone-Based Policy Firewall feature provides the Cisco IOS XE firewall the functionality to configure multiple traffic classes (which are also called nested class maps or hierarchical class maps) as a single traffic class. When packets meet more than one match criterion, you can configure multiple class maps that can be associated with a single traffic policy. The Cisco IOS XE firewall supports up to three levels of class map hierarchy.
Before configuring nested class maps, you should be familiar with the modular Quality of Service (QoS) CLI (MQC).
In Cisco IOS XE Release 3.5S and later releases, you can configure multiple traffic classes (which are also called nested class maps or hierarchical class maps) as a single traffic class. When packets meet more than one match criterion, you can configure multiple class maps that can be associated with a single traffic policy. The nesting of class maps can be achieved by configuring the match class-map command. The only method of combining the match-any and match-all characteristics within a single traffic class is by using the class-map command.
Use the match-all keyword when all match criteria in the traffic class must be met to place a packet in the specified traffic class.
Use the match-any keyword when only one of the match criterion in the traffic class must be met to place a packet in the specified traffic class.
If you do not specify the match-all keyword or the match-any keyword, the traffic class behaves in a manner that is consistent with the match-all keyword.
Individual class maps in a hierarchy include multiple match class-map command references.
Individual class maps in a hierarchy include match rules other than the match class-map command.
Command or Action | Purpose | |
---|---|---|
Step 1 |
enable Example:
|
|
Step 2 |
configure terminal Example:
|
Enters global configuration mode. |
Step 3 |
class-map match-any class-map-name Example:
|
Creates a Layer 3 or Layer 4 class map and enters class map configuration mode. |
Step 4 |
match protocol protocol-name Example:
|
Configures the match criteria for a class map on the basis of a specified protocol. |
Step 5 |
exit Example:
|
Exits class map configuration mode and enters global configuration mode. |
Step 6 |
class-map match-any class-map-name Example:
|
Creates a Layer 3 or Layer 4 class map and enters class map configuration mode. |
Step 7 |
match protocol protocol-name Example:
|
Configures the match criteria for a class map on the basis of a specified protocol. |
Step 8 |
exit Example:
|
Exits class map configuration mode and enters global configuration mode. |
Step 9 |
class-map match-any class-map-name Example:
|
Creates a Layer 3 or Layer 4 class map and enters class map configuration mode. |
Step 10 |
match class-map class-map-name Example:
|
Configures a traffic class as a classification policy. |
Step 11 |
match class-map class-map-name Example:
|
Configures a traffic class as a classification policy. |
Step 12 |
end Example:
|
Exits class map configuration mode and enters privileged EXEC mode. |
Command or Action | Purpose | |
---|---|---|
Step 1 |
enable Example:
|
|
Step 2 |
configure terminal Example:
|
Enters global configuration mode. |
Step 3 |
policy-map type inspect policy-map-name Example:
|
Creates a Layer 3 or Layer 4 inspect type policy map and enters policy map configuration mode. |
Step 4 |
class-type inspect class-map-name Example:
|
Specifies the traffic (class) on which an action is to be performed and enters policy-map class configuration mode. |
Step 5 |
inspect Example:
|
Enables Cisco IOS XE stateful packet inspection. |
Step 6 |
end Example:
|
Exits policy-map class configuration mode and enters privileged EXEC mode. |
Command or Action | Purpose | |||
---|---|---|---|---|
Step 1 |
enable Example:
|
|
||
Step 2 |
configure terminal Example:
|
Enters global configuration mode. |
||
Step 3 |
zone security zone-name Example:
|
Creates a security zone to which interfaces can be assigned and enters security zone configuration mode. |
||
Step 4 |
exit Example:
|
Exits security zone configuration mode and enters global configuration mode. |
||
Step 5 |
zone security zone-name Example:
|
Creates a security zone to which interfaces can be assigned and enters security zone configuration mode. |
||
Step 6 |
exit Example:
|
Exits security zone configuration mode and enters global configuration mode. |
||
Step 7 |
zone-pair security zone-pair-name [source zone-name destination [zone-name]] Example:
|
Creates a zone pair and enters security zone pair configuration mode.
|
||
Step 8 |
service-policy type inspect policy-map-name Example:
|
|
||
Step 9 |
exit Example:
|
Exits security zone pair configuration mode and enters global configuration mode. |
||
Step 10 |
interface type number Example:
|
Configures an interface and enters interface configuration mode. |
||
Step 11 |
zone-member security zone-name Example:
|
|
||
Step 12 |
end Example:
|
Exits interface configuration mode and enters privileged EXEC mode. |
Router# configure terminal
Router(config)# class-map match-any child1
Router(config-cmap)# match protocol tcp
Router(config-cmap)# exit
Router(config)# class-map match-any child2
Router(config-cmap)# match protocol udp
Router(config-cmap)# exit
Router(config)# class-map match-any parent
Router(config-cmap)# match class-map child1
Router(config-cmap)# match class-map child2
Router(config-cmap)# end
Router# configure terminal
Router(config)# policy-map type inspect pmap
Router(config-pmap)# class-type inspect parent
Router(config-pmap-c)# inspect
Router(config-pmap-c)# end
Router# configure terminal
Router(config)# zone security source-zone
Router(config-sec-zone)# exit
Router(config)# zone security destination-zone
Router(config-sec-zone)# exit
Router(config)# zone-pair security secure-zone source source-zone destination destination-zone
Router(config-sec-zone-pair)# service-policy type inspect pmap
Router(config-sec-zone-pair)# exit
Router(config)# interface gigabitethernet 0/0/1
Router(config-if)# zone-member security source-zone
Router(config-if)# end
Related Topic |
Document Title |
---|---|
Cisco IOS commands |
|
Security commands |
|
Zone-based policy firewall |
Zone-Based Policy Firewall |
Description |
Link |
---|---|
The Cisco Support and Documentation website provides online resources to download documentation, software, and tools. Use these resources to install and configure the software and to troubleshoot and resolve technical issues with Cisco products and technologies. Access to most tools on the Cisco Support and Documentation website requires a Cisco.com user ID and password. |
The following table provides release information about the feature or features described in this module. This table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Feature Name |
Releases |
Feature Information |
---|---|---|
Nested Class Map Support for Zone-Based Policy Firewall |
Cisco IOS XE Release 3.5S |
The Nested Class Map Support for Zone-Based Policy Firewall feature provides the Cisco IOS XE firewall the functionality to configure multiple traffic classes (which are also called nested class maps or hierarchical class maps) as a single traffic class. When packets meet more than one match criterion, you can configure multiple class maps that can be associated with a single traffic policy. |