Network Security
Migrating Web Security Policy Rules to Internet Access Rules
Table of Contents
Expand All
|
Collapse All
Network Security Docs
-
- Security Policy
-
- Security Profile Groups
- Security Profile: AI Security
- Security Profile: WildFire® Analysis
- Security Profile: Antivirus
- Security Profile: Vulnerability Protection
- Security Profile: Anti-Spyware
- Security Profile: DNS Security
- Security Profile: DoS Protection Profile
- Security Profile: File Blocking
- Security Profile: URL Filtering
- Security Profile: Data Filtering
- Security Profile: Zone Protection
-
- Policy Object: Address Groups
- Policy Object: Regions
- Policy Object: Traffic Objects
- Policy Object: Applications
- Policy Object: Application Groups
- Policy Object: Application Filter
- Policy Object: Services
- Policy Object: Auto-Tag Actions
- Policy Object: Devices
-
- Uses for External Dynamic Lists in Policy
- Formatting Guidelines for an External Dynamic List
- Built-in External Dynamic Lists
- Configure Your Environment to Access an External Dynamic List
- Configure your Environment to Access an External Dynamic List from the EDL Hosting Service
- Retrieve an External Dynamic List from the Web Server
- View External Dynamic List Entries
- Enforce Policy on an External Dynamic List
- Find External Dynamic Lists That Failed Authentication
- Disable Authentication for an External Dynamic List
- Policy Object: HIP Objects
- Policy Object: Schedules
- Policy Object: Quarantine Device Lists
- Policy Object: Dynamic User Groups
- Policy Object: Custom Objects
- Policy Object: Log Forwarding
- Policy Object: Authentication
- Policy Object: Decryption Profile
- Policy Object: Packet Broker Profile
-
-
-
- The Quantum Computing Threat
- How RFC 8784 Resists Quantum Computing Threats
- How RFC 9242 and RFC 9370 Resist Quantum Computing Threats
- Support for Post-Quantum Features
- Post-Quantum Migration Planning and Preparation
- Best Practices for Resisting Post-Quantum Attacks
- Learn More About Post-Quantum Security
-
-
-
- Investigate Reasons for Decryption Failure
- Identify Weak Protocols and Cipher Suites
- Troubleshoot Version Errors
- Troubleshoot Unsupported Cipher Suites
- Identify Untrusted CA Certificates
- Repair Incomplete Certificate Chains
- Troubleshoot Pinned Certificates
- Troubleshoot Expired Certificates
- Troubleshoot Revoked Certificates
Migrating Web Security Policy Rules to Internet Access Rules
This section outlines the changes to Web Security policy rules in the latest Strata Cloud
Manager February 2025 Release and provides various troubleshooting scenarios.
Where Can I Use This? | What Do I Need? |
---|---|
|
|
The Strata Cloud Manager February 2025 release changes how we handle Web Security in
your environment. We addressed the rigidity of current Web Access policy rules based
on user feedback. Users reported challenges with rule ordering and cross-referencing
of objects and profiles, which caused operational inefficiencies from unusable
rulebases or object duplication.
We moved to a single rulebase to enhance flexibility and user control. This
change streamlines policy management and improves operational efficiency.
The Internet Access rule replaces the existing Web Access policy rules with
improved capabilities. The Internet access rule is a new policy type within the
security rulebase in Strata Cloud Manager that optimizes the management of internet
access use cases.
Troubleshooting Scenarios for Environments Without Web Security Enabled at Any Node
Case | Issue | How to Mitigate |
---|---|---|
Unintended Country Block Policy Rules (for Prisma
Access only)
|
If you have any Country Block configuration in the
Source or Destination region block under Security Services >
Web Security > Security Settings > Threat Management, it
will generate a source-region and destination-region block
policies respectively.
|
|
Web Security Default Snippet
Reattachment
|
During the upgrade, the Web Security default
snippet (Internet-Security-Default) is automatically
reattached to Global, even if previously removed or
detached. This reattachment may fail if the snippet is
attached to child nodes. The snippet is required and not
having it will cause reference errors, as other snippets may
reference profiles and objects within this default
snippet.
|
|
Web Security and Internet Access Changes
| After the upgrade, review the Internet Security settings to ensure correct behavior. |
Expected Upgrade Behavior:
|
Troubleshooting Scenarios for Partial Web Security Enablement on Nodes
Case | Issue | How to Mitigate |
---|---|---|
Resolving Unintended Policy Inheritance in Child
Scopes
|
When policies are created on a parent folder, but
one or more child folders/scopes do not have Web Security
enabled, all parent policies will be inherited by all child
scopes and get enforced, once pushed.
|
|
Internet Access Default post-rule in Global is
enabled
| When the Internet Access default post-rule in Global is enabled, it impacts traffic on all child nodes, as it gets enforced as a Global post-rule. If you want different treatment for different child nodes, then mitigation is required. |
|
Troubleshooting Scenarios For Hybrid (Prisma Access + NGFW tenant)
Case | Issue | How to Mitigate |
---|---|---|
Security Zone Mismatch in Internet Access Policies | The security zones used by Internet Access policy rules are defaulted to Inbound Zone = any and Outbound zone = internet, push time validations / commits fail if these zones do not exist on the NGFW. |
|
Snippet Attachment Issues with Device Scope and Web
Security Settings.
|
When device scope is disabled but Web Security is
enabled for specific Next-Generation Firewalls (NGFWs), you
may encounter issues with attaching snippets directly to
nodes. In particular, the Internet Access best practice
snippet, which contains default policies for Internet and
Gen AI access, cannot be attached and policies will get
removed during the push process for affected devices.
|
|
Troubleshooting Scenarios: Web Security is Enabled and Snippet with Web Security Policy Rules is attached
Case | Issue | How to Mitigate |
---|---|---|
Web Access Policy Placement After
Upgrade
|
Following an upgrade, web access policies are
relocated to the security rulebase of the snippet. These
snippets are attached in order within the security rulebase
of folders. Consequently, web access policies are positioned
just above the security policies of that particular snippet.
This differs from the pre-upgrade behavior, where they were
placed at the top of the rulebase, above all security rules.
This change in ordering can potentially impact your security
posture and policy enforcement.
|
|
Troubleshooting Scenario: Rule Name Collision Between Web Access Policy Rules and Security Rules
Case | Issue | How to Mitigate |
---|---|---|
Rule Name Conflicts During Web Access and
Security Policy Migration
|
When migrating to a single rulebase, identical rule
names in Web Access policies can cause name conflicts. This
situation arises because the unified rulebase requires
unique identifiers for each rule. The conflict can lead to
unexpected behavior, policy application errors, or potential
security gaps if not addressed properly.
|
|