Creating Firewall Policy Intents
Use this page to configure a firewall intent that controls transit traffic within a context (source zone to destination zone). The traffic is classified by matching its source and destination zones, the source and destination addresses, and the application that the traffic carries in its protocol headers with the policy database.
You can also enable protection against multiple threat types including spam and malware, and control access to unapproved websites and content by enabling the UTM option and selecting an appropriate UTM profile.
To configure a firewall policy intent:
- Select Configuration > Firewall > Firewall Policy.
- Click the add icon (+).
The Firewall Policy page appears.
- Complete the configuration according to the guidelines
provided in Table 1.
Note When you create a site specific firewall policy intent, the intent will be deployed on the respective site. However, when you create an address based firewall policy intent, the intent will be deployed to all the sites associated with a tenant.
- Click Save to save the changes. If you want to discard your changes, click Cancel instead.
If you click Save, a new firewall policy intent with the provided configuration is created.
Table 1 provides guidelines on using the fields on the Create Firewall Policy page.
Table 1: Fields on the Create Firewall Policy Page
Field | Description |
|---|---|
| General Information | |
Name | Enter a unique string of alphanumeric characters, colons, periods, dashes, and underscores. No spaces are allowed and the maximum length is 255 characters. If you do not enter a name, the intent is saved with a default name assigned by CSO. |
Description | Enter a description for the policy intent; maximum length is 1024 characters. Comments entered in this field are sent to the device. |
| Identify the traffic that the intent applies to | |
Source | Click on the add icon (+) to select the source endpoints on which the firewall policy intent applies, from the displayed list of addresses, departments, sites, site groups, users, or the Internet. You can also select a source endpoint using the methods described in Selecting Firewall Source. |
Destination | Click on the add icon (+) to select the destination endpoints on which the firewall policy intent applies, from the displayed list of addresses, departments, sites, site groups, or the Internet. You can also select a destination endpoint using the methods described in Selecting Firewall Destination. |
Select Action | Click the add icon (+) to choose whether you want to permit, deny, or reject traffic between the source and destination.
|
| Options | |
Scheduling | Policy schedules enable you to define when a policy is active, and thus are an implicit match criterion. You can define the day of the week and the time of the day when the policy is active. For instance, you can define a security policy that opens or closes access based on business hours. Select a pre-saved schedule and the schedule options are populated with the selected schedule’s data. To add a schedule to a firewall policy:
You can also create new schedules and then associate the schedule to your firewall policy. To create a new schedule and then add it to a firewall policy:
|
Logging | Enable logging by selecting the Logging option. You can see the logged firewall events in the Firewall Events page by using Monitor > Security Events > Firewall Events. For more information on the Firewall Events page, see About the Firewall Events Page. |
UTM | Enable the UTM option for protection against multiple threat types including spam and malware, and control access to unapproved websites and content. Click Select UTM profile to select a UTM profile from the list of UTM profiles displayed.
|
| Create source and destination endpoints | |
End Points | To add an end point to the source or destination:
To create new source and destination endpoints:
|
