PrepAway - Latest Free Exam Questions & Answers

which three types of traffic are permitted by the router when some of the router interfaces are assigned to a

With Cisco IOS zone-based policy firewall, by default, which three types of traffic are permitted by
the router when some of the router interfaces are assigned to a zone? (Choose three.)

PrepAway - Latest Free Exam Questions & Answers

A.
traffic flowing between a zone member interface and any interface that is not a zone member

B.
traffic flowing to and from the router interfaces (the self zone)

C.
traffic flowing among the interfaces that are members of the same zone

D.
traffic flowing among the interfaces that are not assigned to any zone

E.
traffic flowing between a zone member interface and another interface that belongs in a
different zone

F.
traffic flowing to the zone member interface that is returned traffic

Explanation:
http://www.cisco.com/en/US/products/sw/secursw/ps1018/products_tech_note09186a00808bc994
.shtml
Rules For Applying Zone-Based Policy Firewall
Router network interfaces’ membership in zones is subject to several rules that govern interface
behavior, as is the traffic moving between zone member interfaces:
A zone must be configured before interfaces can be assigned to the zone.
An interface can be assigned to only one security zone.
All traffic to and from a given interface is implicitly blocked when the interface is assigned to a
zone, except traffic to and from other interfaces in the same zone, and traffic to any interface on
the router.
Traffic is implicitly allowed to flow by default among interfaces that are members of the same zone.
In order to permit traffic to and from a zone member interface, a policy allowing or inspecting traffic
must be configured between that zone and any other zone.
The self zone is the only exception to the default deny all policy. All traffic to any router interface is
allowed until traffic is explicitly denied.
Traffic cannot flow between a zone member interface and any interface that is not a zone member.

Pass, inspect, and drop actions can only be applied between two zones.
Interfaces that have not been assigned to a zone function as classical router ports and might still
use classical stateful inspection/CBAC configuration.
If it is required that an interface on the box not be part of the zoning/firewall policy. It might still be
necessary to put that interface in a zone and configure a pass all policy (sort of a dummy policy)
between that zone and any other zone to which traffic flow is desired.
From the preceding it follows that, if traffic is to flow among all the interfaces in a router, all the
interfaces must be part of the zoning model (each interface must be a member of one zone or
another).
The only exception to the preceding deny by default approach is the traffic to and from the router,
which will be permitted by default. An explicit policy can be configured to restrict such traffic.


Leave a Reply