diff options
author | srividya0208 <a.srividya@vyos.io> | 2020-12-27 07:01:29 -0500 |
---|---|---|
committer | srividya0208 <a.srividya@vyos.io> | 2020-12-27 07:09:19 -0500 |
commit | 8d62b06b04283e1688584592b7ecc8144f8e341c (patch) | |
tree | 4afe198aed2d7b3ffa8bb1aad19f75403c59ef79 | |
parent | 8adf48d9b102cf9bd49b6d4516debaab1320d38a (diff) | |
download | vyos-documentation-8d62b06b04283e1688584592b7ecc8144f8e341c.tar.gz vyos-documentation-8d62b06b04283e1688584592b7ecc8144f8e341c.zip |
zone-policy: page information is added
zone-policy page was blank, added the definition and the configuration
example.
-rw-r--r-- | docs/configuration/zonepolicy/index.rst | 65 |
1 files changed, 64 insertions, 1 deletions
diff --git a/docs/configuration/zonepolicy/index.rst b/docs/configuration/zonepolicy/index.rst index 31784dc3..8fe18778 100644 --- a/docs/configuration/zonepolicy/index.rst +++ b/docs/configuration/zonepolicy/index.rst @@ -1,3 +1,4 @@ + ########### Zone Policy ########### @@ -5,4 +6,66 @@ Zone Policy .. toctree:: :maxdepth: 1 - :includehidden:
\ No newline at end of file + :includehidden: + +In zone-based policy, interfaces are assigned to zones, and inspection policy is applied to traffic moving between the zones and acted on according to firewall rules. +A Zone is a group of interfaces that have similar functions or features. It establishes the security borders of a network. +A zone defines a boundary where traffic is subjected to policy restrictions as it crosses to another region of a network. + +Key Points: + +* A zone must be configured before an interface is assigned to it and an interface can be assigned to only a single zone. +* All traffic to and from an interface within a zone is permitted. +* All traffic between zones is affected by existing policies +* Traffic cannot flow between zone member interface and any interface that is not a zone member. +* You need 2 separate firewalls to define traffic: one for each direction. + +Example: LAN Network is given SSH access to VyOS box. + +Firewall rules: + +.. code-block:: none + + set firewall name lan-local default-action 'drop' + set firewall name lan-local rule 1 action 'accept' + set firewall name lan-local rule 1 state established 'enable' + set firewall name lan-local rule 1 state related 'enable' + set firewall name lan-local rule 2 action 'drop' + set firewall name lan-local rule 2 state invalid 'enable' + set firewall name lan-local rule 2 log enable + set firewall name lan-local rule 100 action 'accept' + set firewall name lan-local rule 100 destination port '22' + set firewall name lan-local rule 100 log 'enable' + set firewall name lan-local rule 100 protocol 'tcp' + set firewall name local-lan default-action 'drop' + set firewall name local-lan rule 1 action 'accept' + set firewall name local-lan rule 1 state established 'enable' + set firewall name local-lan rule 1 state related 'enable' + set firewall name local-lan rule 2 action 'drop' + set firewall name local-lan rule 2 state invalid 'enable' + set firewall name local-lan rule 2 log enable + set firewall name local-lan rule 100 action 'accept' + set firewall name local-lan rule 100 destination address '192.168.0.0/24' + set firewall name local-lan rule 100 log 'enable' + set firewall name local-lan rule 100 protocol 'tcp' + +Zone-policy Config: + +.. code-block:: none + + set zone-policy zone lan default-action 'drop' + set zone-policy zone lan description 'Local Area Network' + set zone-policy zone lan interface 'eth2' + set zone-policy zone lan from local firewall name 'lan-local' + set zone-policy zone local default-action 'drop' + set zone-policy zone local description 'system-defined zone' + set zone-policy zone local from lan firewall name 'local-lan' + set zone-policy zone local local-zone + +A detailed zone-based policy example is written in the Configuration-Blueprints_ section. + +.. stop_vyoslinter + +.. _Configuration-Blueprints: https://docs.vyos.io/en/latest/configexamples/zone-policy.html + +.. start_vyoslinter |