Before you create a Security policy rule, make sure you understand that the set of IPv4 addresses is treated as a subset of the set of IPv6 addresses, as described in detail in Policy.
) Delete the default Security policy rule.By default, the firewall includes a security rule named rule1 that allows all traffic from Trust zone to Untrust zone. You can either delete the rule or modify the rule to reflect your zone naming conventions.
Add a rule. a new rule. tab, enter a descriptive for the rule. Define the matching criteria for the source fields in the packet. tab, select a Source Zone Source IP Address or leave the value set to If you decide to Source Address , ensure that all regions that contain private IP addresses are added to the Source Address to avoid connectivity loss between those private IP addresses. Specify a Source or leave the value set to Define the matching criteria for the destination fields in the packet. Destination tab, set the Destination Zone Destination IP Address or leave the value set to If you decide to Destination Address , ensure that all regions that contain private IP addresses are added to the Destination Address to avoid connectivity loss between those private IP addresses. As a best practice, use address objects as the Destination Addressto enable access to only specific servers or specific groups of servers especially for commonly exploited services, such as DNS and SMTP. By restricting users to specific destination server addresses, you can prevent data exfiltration and command-and-control traffic from establishing communication through techniques such as DNS tunneling.
Specify the application that the rule will allow or block.As a best practice, always use application-based security policy rules instead of port-based rules and always set the Service to application-default unless you are using a more restrictive list of ports than the standard ports for an application.
Applications Applicationyou want to safely enable. You can select multiple applications or you can use application groups or application filters.
Service/URL Category tab, keep the Service set to application-default to ensure that any applications that the rule allows are allowed only on their standard ports. ) Specify a URL category as match criteria for the rule. Service/URL Category tab, select the URL CategoryIf you select a URL category, only web traffic will match the rule and only if the traffic is destined for that specified category.
Define what action you want the firewall to take for traffic that matches the rule. tab, select an . See Security Policy Actions for a description of each action. Configure the log settings. By default, the rule is set to Log at Session End. You can disable this setting if you don’t want any logs generated when traffic matches this rule or you can select
Log at Session Start for more detailed logging. Log At Session Start consumes more resources than logging only at the session end. In most cases, you only Log At Session End . Enable both Log At Session Start Log At Session Endonly for troubleshooting, for long-lived tunnel sessions such as GRE tunnels (you can't see these sessions in the ACC unless you log at the start of the session), and to gain visibility into Operational Technology/Industrial Control Systems (OT/ICS) sessions, which are also long-lived sessions.
Log Forwarding As a best practice, do not select the check box to Disable Server Response Inspection(DSRI). Selecting this option prevents the firewall from inspecting packets from the server to the client. For the best security posture, the firewall must inspect both the client-to-server flows and the server-to-client flows to detect and prevent threats.
Attach security profiles to enable the firewall to scan all allowed traffic for threats.Make sure you create best practice security profiles that help protect your network from both known and unknown threats.
tab, select Profile Type drop-down and then select the individual security profiles to attach to the rule. Alternatively, select Profile Type drop-down and select a security Group Profile to save the policy rule to the running configuration on the firewall.To verify that you have set up your basic security policies effectively, test whether your security policy rules are being evaluated and determine which security policy rule applies to a traffic flow.
The output displays the best rule that matches the source and destination IP address specified in the CLI command.
For example, to verify the policy rule that will be applied for a server in the data center with the IP address 208.90.56.11 when it accesses the Microsoft update server: