Network Security
Create an Internet Access Rule (Strata Cloud Manager)
Table of Contents
Expand All
|
Collapse All
Network Security Docs
-
- Security Policy
-
- Security Profile Groups
- Security Profile: AI Security
- Security Profile: WildFire® Analysis
- Security Profile: Antivirus
- Security Profile: Vulnerability Protection
- Security Profile: Anti-Spyware
- Security Profile: DNS Security
- Security Profile: DoS Protection Profile
- Security Profile: File Blocking
- Security Profile: URL Filtering
- Security Profile: Data Filtering
- Security Profile: Zone Protection
-
- Policy Object: Address Groups
- Policy Object: Regions
- Policy Object: Traffic Objects
- Policy Object: Applications
- Policy Object: Application Groups
- Policy Object: Application Filter
- Policy Object: Services
- Policy Object: Auto-Tag Actions
- Policy Object: Devices
-
- Uses for External Dynamic Lists in Policy
- Formatting Guidelines for an External Dynamic List
- Built-in External Dynamic Lists
- Configure Your Environment to Access an External Dynamic List
- Configure your Environment to Access an External Dynamic List from the EDL Hosting Service
- Retrieve an External Dynamic List from the Web Server
- View External Dynamic List Entries
- Enforce Policy on an External Dynamic List
- Find External Dynamic Lists That Failed Authentication
- Disable Authentication for an External Dynamic List
- Policy Object: HIP Objects
- Policy Object: Schedules
- Policy Object: Quarantine Device Lists
- Policy Object: Dynamic User Groups
- Policy Object: Custom Objects
- Policy Object: Log Forwarding
- Policy Object: Authentication
- Policy Object: Decryption Profile
- Policy Object: Packet Broker Profile
-
-
-
- The Quantum Computing Threat
- How RFC 8784 Resists Quantum Computing Threats
- How RFC 9242 and RFC 9370 Resist Quantum Computing Threats
- Support for Post-Quantum Features
- Post-Quantum Migration Planning and Preparation
- Best Practices for Resisting Post-Quantum Attacks
- Learn More About Post-Quantum Security
-
-
-
- Investigate Reasons for Decryption Failure
- Identify Weak Protocols and Cipher Suites
- Troubleshoot Version Errors
- Troubleshoot Unsupported Cipher Suites
- Identify Untrusted CA Certificates
- Repair Incomplete Certificate Chains
- Troubleshoot Pinned Certificates
- Troubleshoot Expired Certificates
- Troubleshoot Revoked Certificates
Create an Internet Access Rule (Strata Cloud Manager)
Learn how to create an Internet Access rule in Strata Cloud Manager
Where Can I Use This? | What Do I Need? |
---|---|
|
|
- To create an Internet Access rule in Strata Cloud Manager:
- Go to ManageConfigurationNGFW and Prisma AccessSecurity ServicesSecurity PolicyAdd RuleInternet Access Rule.
- Configure these components:
- Name your policy. You can use up to 63 characters.
- Add an optional Description. You can use up to 1,024 characters.
- Set Schedules to manage policy rules that need enforcement at regular intervals.
- Add Tags to your rules for easy filtering. This helps when you have defined many rules and wish to review tags with specific keywords.
- Configure Log at Sessions. This is enabled by default. You can disable this setting if you don’t want to generate logs when traffic matches this rule.
- Choose to Allow or Block web application and URLs.
- Define match criteria.
- Specify Source Users including users, user groups, or IP addresses as source.
- Use Advanced Source and Destination settings to
manage source or destination IP addresses, service ports, or device
posture.
- In Source selection, define traffic enforcement based on source. Set the Source Address or leave as Any.
- Select Address, Address Groups, or
Regions.If you decide to Negate a region as source address, add all regions with private IP addresses to avoid connectivity loss.
- Add Device Posture profile to use device state information for policy enforcement.
- Define destination address or leave as
Any.If you decide to Negate a region as destination address, add all regions with private IP addresses to avoid connectivity loss.
- Specify application Services to allow or block. Add the application you want to safely enable. You can select multiple applications or use the application groups or application filters.
- Use the Web Application section to configure controls for web applications and URLs.
- Select Applications to restrict access to
specific features within allowed applications. Add sanctioned
applications to explicitly allow or block for enterprise use.Use Advanced Application Settings to capture additional functional controls for web applications.You can restrict access to specific features within allowed applications. For example, you might want to allow Gmail, but block chat or calls within Gmail. File controls enable the selection of actions for incoming files through allowed applications. These actions vary on a per-application basis. Custom profiles allow preconfiguration of file control rules. Internet Access rules then incorporate these custom profiles. This approach grants fine-grained control over application features and file handling in the network.
- Tenant control manages access across different SaaS application tenants.
It allows for differentiated policy rules within the same application.
You can tailor the functional controls specifically to SaaS application
tenants allowing for granular control. The default setting applies to
all tenants unless specified otherwise. This provides control over
application usage on a per tenant basis.In the Applications section, select the application to restrict specific functions for particular tenants.
- Specify URL Category as a match criteria for your rule. When you select a URL Category or Tenant Restriction, you can specify TCP and UDP port numbers, URL categories, or tenant restrictions in security rules. Selecting a URL category ensures that the rule matches only web traffic destined for that specified category.Use Advanced URL Category Settings to capture controls for URLs such as decryption, credential leak detection, and user notification applications. You can also override data inspection profiles as needed.
- Select Applications to restrict access to
specific features within allowed applications. Add sanctioned
applications to explicitly allow or block for enterprise use.
- Use the Security Inspection options to bulk edit Applications and URL Categories.
- Select the File Control Profile to change for all web applications.
- Select the DLP Profile for all web applications.
- Use the Advanced Security Inspection setting to disable specific security inspection for the policy.
- Save policy rule, then Push Config to your devices.