Create Security Rules on Cloud NGFW for Azure
Table of Contents
Expand all | Collapse all
-
- About Rulestacks and Rules on Cloud NGFW for Azure
- Create a Rulestack on Cloud NGFW for Azure
- Cloud NGFW for Azure Security Rule Objects
- Create a Prefix List on Cloud NGFW for Azure
- Create an FQDN List for Cloud NGFW on Azure
- Add a Certificate to Cloud NGFW for Azure
- Create Security Rules on Cloud NGFW for Azure
- Cloud NGFW for Azure Security Services
- Enable DNS Security on Cloud NGFW for Azure
- Set Up Outbound Decryption on Cloud NGFW for Azure
- Set Up Inbound Decryption on Cloud NGFW for Azure
-
- Configure Logging for Cloud NGFW on Azure
- Cloud NGFW for Azure Traffic Log Fields
- Cloud NGFW for Azure Threat Log Fields
- Cloud NGFW for Azure Decryption Log Fields
- Enable Log Settings
- Disable Log Settings
- Enable Activity Logging on Cloud NGFW for Azure
- Multiple Logging Destinations on Cloud NGFW for Azure
- View the Logs
- View Audit Logs on a Firewall Resource
- View Audit Logs on Resource Groups
- What's New
- Cloud NGFW for Azure Known Issues
- Cloud NGFW for Azure Addressed Issues
Create Security Rules on Cloud NGFW for Azure
Create security rules on the Cloud NGFW for Azure.
Security rules protect network
assets from threats and disruptions and help to optimally allocate
network resources for enhancing productivity and efficiency in business
processes. On Cloud NGFW for Azure, individual security rules determine
whether to block or allow a session based on traffic attributes,
such as the source and destination IP address, source and destination
FQDNs, or the application.
All traffic passing through the
firewall is matched against a session and each session is matched
against a rule. When a session match occurs, the NGFW applies the
matching rule to bidirectional traffic in that session (client to
server and server to client). For traffic that doesn’t match any
defined rules, the default rules apply.
Security policy rules
are evaluated left to right and from top to bottom. A packet is
matched against the first rule that meets the defined criteria and,
after a match is triggered, subsequent rules are not evaluated.
Therefore, the more specific rules must precede more generic ones
in order to enforce the best match criteria.
After creating
a rulestack, you can now create rules and add them to your rulestack.
- Click theLocal Rulestacksicon from the homepage and select a previously-created rulestack on which you wish to add Rules.
- ClickRulesand then clickAdd.
- In the general section, enter a descriptiveNamefor your rule.
- (Optional) Enter aDescriptionof your rule.
- Set theRule Priority.The rule priority determines the order in which the rules are evaluated. Rules with a lower priority are evaluated first. Additionally, each rule within a rulestack.
- By default, the security rule isEnabled. UncheckEnabledto disable the rule. You can enable or disable a rule at any time.
- Set theSource.
- SelectAny,Match, orExclude.SelectingAnymeans the traffic is evaluated against the rule regardless of source.
- If you selectMatch, specify the IP Address (CIDR), Prefix List, Countries, Intelligent Feeds, or Dynamic Prefix List.
- Set theDestination.
- SelectAny,Match, orExclude.SelectingAnymeans the traffic is evaluated against the rule regardless of destination.
- If you selectMatch, specify the Prefix List, FQDN List, Countries.
- Set Granular Control.
- ChooseAnyorSelect.When choosingAny, traffic is evaluated regardless of the application. By specifying an application(s), traffic is evaluated against the rule if the traffic matches the specified application.
- If you chooseSelect, specify the applications.
- SetURL CategoryGranular Control.
- ChooseAnyorSelect.When choosingAny, traffic is evaluated regardless of the URL.
- If you chooseSelect, Choose one of thePredefined Categoriesfrom the drop-down.
- SetPort & ProtocolGranular Control.
- Chooseapplication-default,any, orSelect.When choosingany, traffic is evaluated regardless of the port and protocol. By specifying a port and protocol, traffic is evaluated against the rule if the traffic matches the specified port and protocol.
- If you chooseSelect, select the protocol from the drop-down and enter the port number. You can specify a single port number.
- SetActions.
- Set the Action the firewall takes when traffic matches the rule—Allow,Deny,Drop, orReset both client and server.
- EnableEgress Decryption.
- EnableLogging.
- ClickAdd.
- After creating rules for your rulestack, validate or deploy your configuration.