How to Configure Access Rules
09/29/2023 4,408 People found this article helpful 481,397 Views
Description
The Access Rules in SonicOS are management tools that allows you to define incoming and outgoing access policies with user authentication and enabling remote management of the firewall. These policies can be configured to allow/deny the access between firewall defined and custom zones.
The rules are categorized for specific source zone to destination zone and are used for both IPV4/IPV6.
The Priorities of the rules are set based on zones to which the rule belongs .
More Info:
Resolution
Resolution for SonicOS 7.X
This release includes significant user interface changes and many new features that are different from the SonicOS 6.5 and earlier firmware. The below resolution is for customers using SonicOS 7.X firmware.
To configure rules for SonicOS Enhanced, the service or service group that the rule applies to must first be defined. If it is not, you can define the service or service group and then create one or more rules for it.
The following procedure describes how to add, modify, reset to defaults, or delete firewall rules for SonicWALL firewall appliances running SonicOS Enhanced.
The Policy | Rules and Policies | Access rules provides the interface to add, delete and modify policies.You can also select the desired zones for the traffic flow through Zone Matrix selector.
Creating the necessary Firewall Access Rules
- Click Policy in the top navigation menu.
- Click Rules and Policies | Access Rules.
- Select the View with zone matrix selector and select your LAN to Appropriate Zone Access Rule. (This will be the Zone the Private IP of the Server resides on.)
- Click the Add button at the bottom of the access rules page and create the required Access Rule by configuring the fields as shown below.
Select whether access to this service is allowed or denied.
Select the from and to zones/interfaces from the Source and Destination.
Specify the source and destination address through the drop down, which will list the custom and default address objects created.
- Specify the source and destination services/ports for the ingress and egress traffic, by default we can keep the source service as any and keep the destination port configured.
Specify if this rule applies to all users or to an individual user or group in the Users include and Exclude option.
Specify how long (in minutes) TCP connections might remain idle before the connection is terminated in the TCP Connectivity Inactivity Timeout field.
Specify how long (in seconds) UDP connections might remain idle before the connection is terminated in the UDP Connectivity Inactivity Timeout field.
- We can also configure security profiles on the access rules which includes enabling/disabling the Client DPI-SSL and Server DPI-SSL services, Botnet/cc and Geo-IP based on firewall rule connections.
- We can configure Egress and Ingress bandwidth on the firewall access rules for the specific source, destination and services.
- To track bandwidth usage for this service, select Enable Track Bandwidth Usage.
To enable logging for this rule, select Logging.
- Specify the percentage of the maximum connections this rule is to allow in the Number of connections allowed (% of maximum connections) field.
- Set a limit for the maximum number of connections allowed per source IP Address by selecting Enable connection limit for each Source IP Address and entering the value in the Threshold field. NOTE: Only available for Allow rules.
- Set a limit for the maximum number of connections allowed per destination IP Address by selecting the Enable connection limit for each Destination IP Address field and entering the value in the Threshold field. (Only available for Allow rules).
- We can enable fragmented packets on the access rule as well as allow management traffic over the access rule, Click Add when Finished.
The access rules can also show the diagram flow of the rule created as mentioned before:
Resolution for SonicOS 6.5
This release includes significant user interface changes and many new features that are different from the SonicOS 6.2 and earlier firmware. The below resolution is for customers using SonicOS 6.5 firmware.
To configure rules for SonicOS Enhanced, the service or service group that the rule applies to must first be defined. If it is not, you can define the service or service group and then create one or more rules for it.
The following procedure describes how to add, modify, reset to defaults, or delete firewall rules for SonicWALL firewall appliances running SonicOS Enhanced.
The Manage | Rules | Access rules provides the interface to add, delete and modify policies.In the Access Rules table, you can click the column header to use for sorting. An arrow is displayed to the right of the selected column header. You can click the arrow to reverse the sorting order of the entries in the table.
Creating the necessary Firewall Access Rules
- Click Manage in the top navigation menu.
- Click Rules| Access Rules.
- Select the View with zone matrix selector and select your LAN to Appropriate Zone Access Rule. (This will be the Zone the Private IP of the Server resides on.)
- Click the Add button at the top of the access rules page and create the required Access Rule by configuring the fields as shown below.
- To enable logging for this rule, select Logging.
- We can enable fragmented packets on the access rule as well as allow management traffic over the access rule, Click Add when Finished.
Specify how long (in minutes) TCP connections might remain idle before the connection is terminated in the TCP Connectivity Inactivity Timeout field.
Specify how long (in seconds) UDP connections might remain idle before the connection is terminated in the UDP Connectivity Inactivity Timeout field.
- We can also configure security profiles on the access rules which includes enabling/ disabling the Client DPI-SSL and Server DPI-SSL services, Botnet/cc and Geo-IP based on firewall rule connections.
- Specify the percentage of the maximum connections this rule is to allow in the Number of connections allowed (% of maximum connections) field.
- Set a limit for the maximum number of connections allowed per source IP Address by selecting Enable connection limit for each Source IP Address and entering the value in the Threshold field. NOTE: Only available for Allow rules.
- Set a limit for the maximum number of connections allowed per destination IP Address by selecting the Enable connection limit for each Destination IP Address field and entering the value in the Threshold field. (Only available for Allow rules).
- We can configure Egress and Ingress bandwidth on the firewall access rules for the specific source, destination and services.
Related Articles
Categories