Creating a Firewall Policy for Network Services

To create a firewall Firewall is a network security system used for preventing unauthorized access to or from a private network. policy, complete the following procedure:

  1. To configure a Branch Gateway group or a Branch Gateway, complete either one of these steps:
    • To select a gateway group:

      1. In the Classic Central app, set the filter to a group that contains at least one Branch Gateway.

        The dashboard context for a group is displayed.

      2. Under Manage, click Devices > Gateways.

        A list of gateways is displayed in the List view.

      3. Click Config.

        The configuration page is displayed for the selected group.

    • To select a gateway:

      1. In the Classic Central app, set the filter to Global or a group that contains at least one Branch Gateway.

      2. Under Manage, click Devices > Gateways.

        A list of gateways is displayed in the List view.

      3. Click a gateway under Device Name.

        The dashboard context for the gateway is displayed.

      4. Under Manage, click Device.

        The gateway device configuration page is displayed.

  2. If you are in the Basic Mode, click Advanced Mode to access the advanced configuration.
  3. Click Security > Policies.
  4. Click the icon in the Policies table to create a new policy.
  5. The Add policy pop-up window is displayed

  6. Select a policy type from the Policy type drop-down list. You can select Session, Ethertype, MAC, Route, Extended, or Standard.
  7. Enter the policy name in the Policy name field.
  8. Click Save.

The following animation shows you how to create a firewall policy.

Configuring Access Rules

To configure access rule, complete the following procedure:

  1. From the list of policies, select the policy that you created and click the icon in the Policy > <policy name> table.
  2. To add a rule to restrict packet flow or permit access to network or services, configure the following parameters:

Table 1: Firewall Policy Rule Parameters

Parameter

Description

IP version

Specifies the IP version that the policy applies to. Select IPv4.

Source (required)

  • Source of the traffic, which can be one of the following:
  • Any—Acts as a wildcard and applies to any source address.
  • User—Refers to the traffic from the wireless client.
  • Host—Refers to the traffic from a specific host. When this option is selected, specify the IP address of the host.
  • Network—Refers to the traffic that has a source IP from a subnet Subnet is the logical division of an IP network. of IP addresses. When this option is selected, specify the IP address and network mask of the subnet.
  • Alias—Refers to using an alias for a host or network.
  • Local IP—Refers to the local IP address.
  • User Role—Refers to the user role to be assigned.

Destination (required)

Destination of the traffic.

Service/app (required)

Type of traffic, which can be one of the following:

Action (required)

The action that Branch Gateway should take on a packet that matches the specified criteria.

To set the Action type as Remark-only, you must enter a value for the DSCP Differentiated Services Code Point. DSCP is a 6-bit packet header value used for traffic classification and priority assignment. parameter or select a value from the drop-down list for 802.p priority or Queue parameters.


DSCP (optional)

Option to re-tag the traffic with the specified DSCP tag in the IP header of the packet that matches this rule when it leaves the Branch Gateway.

Time Range

You can allow or deny access during specific time range. You can either create an absolute time range with a single fixed start and end date and time; or a periodic (recurring) time range that starts and ends at a specified time on a weekday, weekend, or selected day.

802.1p Priority (optional)

When this parameter is enabled, the value of 802.1p priority bits are marked in the frame of a packet matching this rule when it leaves the Branch Gateway. 0 represents the lowest priority (background traffic) and 7 represents the highest priority (network control).

Options

Select the required options:

  • Log—Logs a match to this rule. This is recommended when a rule indicates a security breach, such as a data packet on a policy that is meant only to be used for voice calls.
  • Mirror—Mirrors session packets to datapath or remote destination.
  • Denylist—Automatically denylists a client that is the source or destination of the traffic matching this rule. This option is recommended for rules that indicate a security breach where the denylisting option can be used to prevent access to clients that are attempting to breach the security.
  • Disable Scanning—Disable AP scanning other channels.

Queue (optional)

The queue in which a packet matching this rule should be placed.
Select High for higher-priority data, such as voice, and Low for lower-priority traffic.

Position

The position of the rule in the Policy <policy name> table, where 1 is first and default is last.

The following animation shows you how to add a rule to restrict packet flow or permit access to network or services.