Create zone pair specifying the source and the destination zone and apply the policy-map to the zone-pair. Here, in the first command, notice that in-outpair is the name for zone-pair in which inside zone will be the source and outside zone will be the destination.
Table of Contents
Which command should be followed to create the zone pair?
Create zone pair specifying the source and the destination zone and apply the policy-map to the zone-pair. Here, in the first command, notice that in-outpair is the name for zone-pair in which inside zone will be the source and outside zone will be the destination.

What is zone-based firewall Cisco?
Zone-Based Policy Firewall (ZBPF) (Zone Based Firewall) is the successor of Cisco IOS Legacy Firewall called (CBAC) Context-Based Access Control. Concept of ZBPF is zone, which groups different interfaces sharing the same security attributes or the same level of trust.
What are the five steps required to configure a zone-based firewall in Cisco IOS?
The below are the configuration tasks that you need to follow:
- Configure Zones.
- Assign Router Interfaces to zones.
- Create Zone Pairs.
- Configure Interzone Access Policy (Class Maps & Policy Maps)
- Apply Policy Maps to Zone Pairs.
What is a feature of a Cisco IOS Zone Based policy firewall?

Router management interfaces must be manually assigned to the self zone. A router interface can belong to only one zone at a time. Service policies are applied in interface configuration mode.
How does zone-based firewall work?
With a zone-based firewall solution, zones are created for each part of the network that required different access/traffic control policies. The most common configuration of these is to have private (inside), public (outside), and DMZ (“demilitarized” or neutral) zones.
How many zones does a firewall have?
Generally speaking, a standard firewall implementation involves separating trusted traffic and untrusted traffic. Proper firewall implementation creates two basic security zones, known as inside and outside. The inside or trusted zone is also referred to as the private zone.
What are the three zones of firewall?
Although, we can give any name by naming convention that makes sense, name the zones as inside, outside, and DMZ.
- inside: The most trusted (private) network.
- outside: The most untrusted (public) network.
- DMZ: (public zone) contains devices like servers.
What is self zone in zone-based firewall?
A zone is used to define interfaces that will share a security treatment. Cisco automatically designates a special zone for us called the Self Zone. This important zone is used for controlling traffic that is sourced from or directed to the router itself. The zones we create are placed into zone pairs.
What is a zone-based policy firewall?
A Zone-based firewall is an advanced method of the stateful firewall. In a stateful firewall, a stateful database is maintained in which source IP address, destination IP address, source port number, destination port number is recorded.
What are zone pairs?
A zone pair can be defined as a pairing of two zones in a direction. A firewall traffic policy is then applied to a zone pair. Firewall traffic policy is applied unidirectional between zones. Two zone pairs are required for traffic on both directions.
How many zones are there in firewall?
Proper firewall implementation creates two basic security zones, known as inside and outside. The inside or trusted zone is also referred to as the private zone. As the name implies, this zone contains assets and systems that should not be accessed by anyone outside of the organization.