Skip to main content

Application Firewall Configuration Guide

In this section, a simple configuration guide will be provided to demonstrate how to successfully set up Application Firewall on the SASE platform.

Configuring Application Firewall

1) Go to the FWaaS menu on the side panel, and select Application Firewall

image.png

2) Click on [Create] to open the create policy menu

image.png

3) Select the Source & Destination

This is what will trigger the rule to take affect. Choosing IP will make all IP's connected to the connector agent trigger this firewall policy. Likewise, picking a user or user group will apply the policy to those users. Destination follows the same principle, but instead applies for where traffic from the connected user is going to.

image.png

4) Set the target service

There are 4 main categories for service: Application protocol, Application, TCP, and UDP.

4a) App Protocol

image.png

Selecting Application Protocol will use DPI to check each packet's protocol and check if it matches the one chosen. More than one app protocol can be selection in creation of a rule.

4b) Application

image.png

Application will take action against the specific software you choose, rather than the protocol. They are sorted into categories so either the entire category or the individual applications can be chosen.

4c) TCP

image.png

For TCP, there are many common ports that can be configured. Here are some examples:

80HTTPWeb traffic(insecure)
443HTTPSWeb traffic(secure)
21FTPFile transfer protocol
22SSHSecure remote access
23TelnetRemote access
25SMTPOutgoing email
110POP3Incoming email
143IMAPIncoming email
3389RDPRemote desktop protocol
3306MySQLDatabase access

4b) UDP

image.png

For UDP, there are many common ports that can be configured. Here are some examples:

53DNSDomain name resolution
123NTPNetwork time sync
161SNMPNetwork monitoring
500IKEVPN(IPsec key exchange)
67/68DHCPIP address management
69TFTPTrivial file transfer

5) Set the action

  • Block - Block all traffic that matches the parameters set.
  • Allow - Explicitly allows traffic that triggers the rule
  • Logging - Creates a log in the log menu

6) Click Complete

The rule is now configured and ready to use.