End-of-Life (EoL)
Building Blocks in a Security Policy Rule
The following section describes each component in a security policy rule. When
you view the default security rule, or create a new rule, you can
configure the options described here.
Building Blocks in
a Security Rule | Configured In | Description |
---|---|---|
Rule number | N/A | Each rule is automatically numbered and
the order changes as rules are moved. When you filter rules to match
specific filter(s), each rule is listed with its number in the context
of the complete set of rules in the rulebase and its place in the
evaluation order. In Panorama, pre-rules and post-rules are independently
numbered. When rules are pushed from Panorama to a managed firewall,
the rule numbering incorporates hierarchy in pre-rules, firewall
rules, and post-rules within a rulebase and reflects the rule sequence
and its evaluation order. |
Name | General | Enter a name to identify the rule. The name
is case-sensitive and can have up to 31 characters, which can be
letters, numbers, spaces, hyphens, and underscores. The name must
be unique on a firewall and, on Panorama, unique within its device group
and any ancestor or descendant device groups. |
Tag | Add and specify the
tag for the policy.A policy tag is a keyword or phrase that
allows you to sort or filter policies. This is useful when you have defined
many policies and want to view those that are tagged with a particular
keyword. For example, you may want to tag certain rules with specific words
like Decrypt and No-decrypt, or use the name of a specific data
center for policies associated with that location. You can
also add tags to the default rules. | |
Type | Specifies whether the rule applies to traffic
within a zone, between zones, or both:
| |
Source Zone | Source | Click Add to choose
source zones (default is any). Zones must be of the same type (Layer
2, Layer 3, or virtual wire). To define new zones, refer to Network > Zones.Multiple
zones can be used to simplify management. For example, if you have
three different internal zones (Marketing, Sales, and Public Relations)
that are all directed to the untrusted destination zone, you can
create one rule that covers all cases. |
Source Address | Click Add to add
source addresses, address groups, or regions (default is any ).
Select from the drop-down, or click Address , Address
Group , or Regions at the bottom
of the drop-down, and specify the settings. | |
Source User | User | Click Add to choose
the source users or groups of users subject to the policy. The following
source user types are supported:
If the firewall collects user information
from a RADIUS, TACACS+, or SAML identity provider server and not
from the User-ID™ agent, the list of users does not display; you
must enter user information manually. |
Source HIP Profile | Click Add to choose
host information profiles (HIP) to enable you to collect information
about the security status of your end hosts, such as whether they
have the latest security patches and antivirus definitions installed.
Using host information profiles for policy enforcement enables granular
security that ensures that the remote hosts accessing your critical resources
are adequately maintained and in adherence with your security standards
before they are allowed access to your network resources. The following
source HIP profiles are supported:
| |
Destination Zone | Destination | Click Add to choose
destination zones (default is any). Zones must be of the same type
(Layer 2, Layer 3, or virtual wire). To define new zones, refer to Network > Zones.Multiple
zones can be used to simplify management. For example, if you have
three different internal zones (Marketing, Sales, and Public Relations)
that are all directed to the untrusted destination zone, you can
create one rule that covers all cases. On intrazone
rules, you cannot define a Destination Zone because these types
of rules only match traffic with a source and a destination within
the same zone. To specify the zones that match an intrazone rule
you only need to set the Source Zone. |
Destination Address | Click Add to add
destination addresses, address groups, or regions (default is any ).
Select from the drop-down, or click Address at
the bottom of the drop-down, and specify address settings. | |
Application | Application | Select specific applications for the security
rule. If an application has multiple functions, you can select the overall
application or individual functions. If you select the overall application,
all functions are included and the application definition is automatically
updated as future functions are added. If you are using application
groups, filters, or containers in the security rule, you can view
details of these objects by holding your mouse over the object in
the Application column, click the drop-down
arrow and select Value . This allows you to
view application members directly from the policy without having
to navigate to the Object tab. |
Service | Service/URL Category | Select services to limit to specific TCP
and/or UDP port numbers. Choose one of the following from the drop-down:
When you use this option,
the firewall still checks for all applications on all ports but,
with this configuration, applications are only allowed on their default
ports and protocols.
|
URL Category | Select URL categories for the security rule.
| |
Action | Actions | To specify the action for traffic that matches
the attributes defined in a rule, select from the following actions:
Device Setup Session To override the
default action defined on the predefined interzone and intrazone
rules: see Overriding or Reverting a Security Policy Rule |
Profile Setting | Actions | To specify the checking done by the default
security profiles, select individual Antivirus, Anti-Spyware, Vulnerability
Protection, URL Filtering, File Blocking, Data Filtering, WildFire
Analysis and GTP Protection profiles. To specify a profile
group rather than individual profiles, select Profile
Type Group and then select a profile group from the Group
Profile drop-down.To define new profiles or profile
groups, click New next to the appropriate
profile or group (refer to Objects > Security Profiles > GTP Protection).You
can also attach security profiles (or profile groups) to the default
rules. |
Options | Actions | The Options tab includes
the logging settings and a combination of other options listed below.To
generate entries in the local traffic log for traffic that matches
this rule, select the following options:
If
the session start or end entries are logged, drop and deny entries
are also logged.
The generation
of threat log entries is determined by the security profiles. To
define new log profiles, click New (refer
to Objects > Log Forwarding).You
can also modify the log settings on the default rules. Specify any
combination of the following options:
|
Description | General | Enter a description for the policy (up to
255 characters). |
Recommended For You
Recommended Videos
Recommended videos not found.