Creating and Managing Policies
page to add, modify, and manage security policies:
To add a new policy rule, do one of the following:
To modify a rule, click the rule.
If the rule is pushed from Panorama, the rule is read-only on the firewall and cannot be edited locally.
Revertactions pertain only to the default rules that are displayed at the bottom of the Security rulebase. These predefined rules—allow all intrazone traffic and deny all interzone traffic—instruct the firewall on how to handle traffic that does not match any other rule in the rulebase. Because they are part of the predefined configuration, you must
Overridethem in order to edit select policy settings. If you are using Panorama, you can also
Overridethe default rules and then push them to firewalls in a Device Group or Shared context. You can also
Revertthe default rules, which restores the predefined settings or the settings pushed from Panorama. For details, see Overriding or Reverting a Security Policy Rule.
Rules are evaluated from the top down and as they are enumerated on the
Policiespage. To change the order in which the rules are evaluated against network traffic, select a rule and click
Move Top, or
Move Bottom. For details, see Move or Clone a Policy Rule.
Select a rule and
Deletethe existing rule.
To disable a rule, select the rule and
Disableit; to enable a rule that is disabled, select the rule and
Monitor Rule Usage
To identify rules that have not been used since the last time the firewall was restarted,
Highlight Unused Rules. You can then decide whether to disable a rule or delete it. Rules not currently in use are displayed with a dotted yellow background. When policy rule hit count is enabled, the Hit Count data is used to determine if a rule is unused.
Each firewall maintains a traffic flag for the rules that have a match. Because the flag is reset when a dataplane reset occurs on a reboot or a restart, monitor this list periodically to determine whether the rule has had a match since the last check before you delete or disable it.
Reset rule Hit count
Hit Countis used to track the total traffic hits for the policy rule. The total traffic hit count persists through reboot, upgrade and data plane restart. To reset the hit count for a specific rule, expand the drop-down and
Alternatively, you can
Reset Rule Hit Counterusing the bottom menu. To clear the hit count statistics, you can select
All Rulesor you can select specific rules and reset hit count statistics only for the
First Hitto identify when the security policy was first hit. The date is formated as date hh:mm:ss year. This cannot be reset.
Last Hitto identify when the security policy was last used. The date is formated as date hh:mm:ss year. This cannot be reset.
To show or hide the columns that display in the
Policiespages, select this option next to the column name to toggle the display of each column.
To apply a filter to the list, select from the
Filter Rulesdrop-down. To add a value to define a filter, click the drop-down for the item and choose
The default rules are not part of rulebase filtering and always show up in the list of filtered rules.
To view the network sessions that were logged as matches against the policy, click the drop-down for the rule name and choose
To display the current value, click the drop-down for an entry and choose
Value. You can also edit, filter, or remove certain items directly from the column menu. For example, to view addresses included in an address group, hold your mouse over the object in the
Addresscolumn, click the drop-down and select
Value. This allows you to quickly view the members and the corresponding IP addresses for the address group without having to navigate to the
To find objects used within a policy based on their name or IP address, use the filter option. After you apply the filter, you will see only the items that match the filter. The filter also works with embedded objects. For example, when you filter on 10.1.4.8, only the policy that contains that address is displayed:
Preview rules (
Preview Rulesto view a list of the rules before you push the rules to the managed firewalls. Within each rulebase, the hierarchy of rules is visually demarcated for each device group (and managed firewall) to make it easier to scan through a large numbers of rules.
Export Configuration Table
Administrative roles with a minimum of read-only access can export the policy rulebase as
PDF/CSV. You can apply filters to create more specific table configuration outputs for things such as audits. Only visible columns in the web interface will be exported. See Configuration Table Export.