You can configure Firewall rules at the Profile and Edge levels to allow, drop, reject, or skip inbound and outbound traffic. If the stateful firewall feature is activated, the firewall rule will be validated to filter both inbound and outbound traffic. With a stateless firewall, you can only filter outbound traffic. The firewall rule matches parameters such as IP addresses, ports, VLAN IDs, Interfaces, MAC addresses, domain names, protocols, object groups, applications, DSCP tags, URL categories, URL reputation score, and Security Service groups. When a data packet matches the match conditions, the associated action or actions are taken. If a packet matches no parameters, then a default action is taken on the packet.
To configure a firewall rule at the Profile level, perform the following steps.
Procedure
- In the SD-WAN service of the Enterprise portal, go to Configure > Profiles. The Profiles page displays the existing Profiles.
- Select a Profile to configure a firewall rule, and click the Firewall tab.
From the Profiles page, you can navigate to the Firewall page directly by clicking the View link in the Firewall column of the Profile.
- Go to the Configure Firewall section and under the Firewall Rules area, click + NEW RULE. The New Rule page appears.
- In the Rule Name text box, enter a unique name for the Rule. To create a firewall rule from an existing rule, select the rule to be duplicated from the Duplicate Rule drop-down menu.
- In the Match section, configure the match conditions for the rule:
Field Description IP Version By default, the IPv4 and IPv6 address type is selected. You can configure the Source and Destination IP addresses according to the selected Address Type, as follows: - IPv4 – Allows to configure only IPv4 addresses as Source and Destination.
- IPv6 – Allows to configure only IPv6 addresses as Source and Destination.
- IPv4 and IPv6 – Allows to configure both IPv4 and IPv6 addresses in the matching criteria. If you choose this mode, you cannot configure the Source or Destination IP address.
Note: When you upgrade, the firewall rules from previous versions are moved to IPv4 mode.Source Allows to specify the source for packets. Select any of the following options:- Any - Allows all source addresses by default.
- Object Group - Allows you to select a combination of address group and service group. For more information, see Object Groups and Configure Firewall Rule with Object Group.
Note: In a Firewall policy, when using an Object Group to match the Source traffic, domain-based address group is not supported.
- Define - Allows you to define the source traffic to a specific VLAN, Interface, IPv4 or IPv6 Address, MAC Address, or Transport Port. Select one of the following options:
- VLAN - Matches traffic from the specified VLAN, selected from the drop-down menu.
Note: When using a VLAN to match source or destination traffic in a firewall policy, it takes into account both local and remote VLANs.
- Interface and IP Address - Matches traffic from the specified interface and IPv4 or IPv6 address, selected from the drop-down menu.
Note: If an interface cannot be selected, then the interface is either not activated or not assigned to this segment.Note: If you select IPv4 and IPv6 (Mixed mode) as the Address Type, then the traffic is matched based on only the specified interface.Along with the IP address, you can specify one of the following address types to match the source traffic:
- CIDR prefix - Choose this option if you want the network defined as a CIDR value (for example:
172.10.0.0 /16
). - Subnet mask - Choose this option if you want the network defined based on a Subnet mask (for example,
172.10.0.0 255.255.0.0
). - Wildcard mask - Choose this option if you want the ability to narrow the enforcement of a policy to a set of devices across different IP subnets that share a matching host IP address value. The Wildcard mask matches an IP, or a set of IP addresses based on the inverted Subnet mask. A '0' within the binary value of the mask means the value is fixed and a '1' within the binary value of the mask means the value is wild (can be 1 or 0). For example, a Wildcard mask of 0.0.0.255 (binary equivalent = 00000000.00000000.00000000.11111111) with an IP Address of 172.0.0, the first three octets are fixed values, and the last octet is a variable value. This option is available only for IPv4 addresses.
- CIDR prefix - Choose this option if you want the network defined as a CIDR value (for example:
- Mac Address - Matches traffic based on the specified MAC address.
- Transport Port - Matches traffic from the specified source port or port range.
- VLAN - Matches traffic from the specified VLAN, selected from the drop-down menu.
Destination Allows to specify the destination for packets. Select any of the following options: - Any - Allows all destination addresses by default.
- Object Group - Allows you to select a combination of address group and service group. For more information, see Object Groups and Configure Firewall Rule with Object Group.
- Define - Allows you to define the destination traffic to a specific VLAN, Interface, IPv4 or IPv6 Address, Domain Name, Protocol, or Port. Select one of the following options:
- VLAN - Matches traffic from the specified VLAN, selected from the drop-down menu.
Note: When using a VLAN to match source or destination traffic in a firewall policy, it takes into account both local and remote VLANs.
- Interface - Matches traffic from the specified interface, selected from the drop-down menu.
Note: If an interface cannot be selected, then the interface is either not activated or not assigned to this segment.
- IP Address - Matches traffic for the specified IPv4 or IPv6 address and Domain name.
Note: If you select IPv4 and IPv6 (Mixed mode) as the Address Type, then you cannot specify the IP address as the destination.
Along with the IP address, you can specify one of the following address types to match the source traffic: CIDR prefix, Subnet mask, or Wildcard mask.
Use the Domain Name field to match the entire domain name or a portion of the domain name. For example, \"salesforce\" will match traffic to \"mixe\".
- Transport - Matches traffic from the specified source port or port range.
Protocol - Matches traffic for the specified protocol, selected from the drop-down menu. The supported protocols are GRE, ICMP, TCP, and UDP.Note: ICMP is not supported in Mixed mode (IPv4 and IPv6).
- VLAN - Matches traffic from the specified VLAN, selected from the drop-down menu.
Application Select any of the following options: - Any - Applies the firewall rule to any application by default.
- Define - Allows to select an application and Differentiated Services Code Point (DSCP) flag to apply a specific firewall rule.
Note: When creating firewall rules matching an application, the firewall depends on the DPI (Deep Packet Inspection) Engine to identify the application to which a particular flow belongs. The DPI will not be able to determine the application based on the first packet. The DPI Engine usually needs the first 5-10 packets in the flow to identify the application, but the firewall needs to classify and forward the flow from the very first packet. This may cause the first flow to match a more generalized rule in the firewall list. Once the application has been correctly identified, any future flows matching the same tuples will be reclassified automatically and hit the correct rule.For more information on specific use cases matching FTPv6 Firewall/Business policy rule, see Edge Firewall Support for FTPv6.
- In the Firewall Action section, configure the actions to be performed when the traffic matches the defined criteria.
Field Description Firewall Select any of the following actions the firewall should perform on packets when the conditions of the rule are met: - Allow - Allows the data packets by default.
- Drop - Drops the data packets silently without sending any notification to the source.
- Reject - Drops the packets and notifies the source by sending an explicit reset message.
- Skip - Skips the rule during lookups and processes the next rule. However, this rule will be used at the time of deploying SD-WAN.
Note: You will be able to configure the Reject and Skip actions only if the Stateful Firewall feature is activated for Profiles and Edges.
Log Select this checkbox if you want a log entry to be created when this rule is triggered. - While creating or updating a Firewall rule, you can add comments about the rule in the New Comment field in the Comment section. A maximum of 50 characters is allowed and you can add any number of comments for the same rule.
- In the Security Services section, configure the security service for the rule by selecting a Security Service Group from the drop-down menu. A summary of all the security services configured within the Security Service Group will be displayed. You can click the View button against each of the security services to view the configuration details.
From the Firewall page, you can create a new Security Service Group, by clicking the + Create New link on the right side of the Security Services section.
Note: Security services can be activated in the rule only if the Firewall action is Allow. If the Firewall action is anything other than Allow, Security services will be deactivated. - After configuring all the required settings, click Create.
A firewall rule is created for the selected Profile, and it appears under the Firewall Rules area of the Profile Firewall page.Note: The rules created at the Profile level cannot be updated at the Edge level. To override the rule, user needs to create the same rule at the Edge level with new parameters to override the Profile level rule.In the Firewall Rules area of the Profile Firewall page, you can perform the following actions:
- DELETE - To delete existing Firewall rules, select the checkboxes prior to the rules and click DELETE.
- CLONE - To duplicate a Firewall rule, select the rule and click CLONE.
- COMMENT HISTORY - To view all comments added while creating or updating a rule, select the rule and click COMMENT HISTORY.
- Search for Rule - Allows to search the rule by Rule name, IP address, Port/Port range, and Address group and Service group names.