The Access Rules in SonicOS are management tools that allow you to define incoming and outgoing access policies with user authentication and enabling remote management of the firewall. These policies can be configured to allow/deny access between firewall defined and custom zones.
The rules are categorized for specific source zone to destination zone and are used for both IPV4/IPV6. The Priorities of the rules are set based on the zones to which the rule belongs.
NOTE:During the initial release,NSSP13700 is only available in globalmode. In a later release,SonicOSXwith Policy mode will be available for selection.
To configure rules for SonicOS Enhanced, the service or service group that the rule applies to must first be defined. If it is not, you can define the service or service group and then create one or more rules for it.
The following procedure describes how to add, modify, reset to defaults, or delete firewall rules for SonicWALL firewall appliances running SonicOS Enhanced.
The Policy | Rules and Policies | Access rules provides the interface to add, delete and modify policies.You can also select the desired zones for the traffic flow through Zone Matrix selector.
Creating the necessary Firewall Access Rules
ClickPolicyin the top navigation menu.
ClickRules and Policies | Access Rules.
Select the View withzone matrix selectorand select yourLAN to Appropriate Zone Access Rule. (This will be the Zone the IP of the Server.)
Click theAddbutton at the bottom of the access rules page and create the required Access Rule by configuring the fields as shown below.
Select whetherAction to this service is to Allow, Deny or Discard.
Select thefrom and to zones/interfacesfrom the Source and Destination.
Specify thesource and destination addressthrough the drop down, which will list the custom and default address objects.
Specify thesource and destination services/portsfor the ingress and egress traffic, by default we can keep the source service/port as Any and keep the destination port configured based on requirement.
Specify if this rule applies to all users or to an individual user or group in the Users include and Exclude option.
Specify how long (in minutes) TCP connections might remain idle before the connection is terminated in theTCP Connectivity Inactivity Timeoutfield.
Specify how long (in seconds) UDP connections might remain idle before the connection is terminated in theUDP Connectivity Inactivity Timeoutfield.
Individual security profiles on the access rules can be configured which includes enabling/disabling the Client DPI-SSL and Server DPI-SSL services, Botnet/cc and Geo-IP based on firewall rule connections.
We can configure QOS by specifying the DSCP Marking and 802.1p Marking. We can configure Egress and Ingress bandwidth on the firewall access rules for the specific source, destination and services. To track bandwidth usage for this service, selectEnable Track Bandwidth Usage.
To enable logging for this rule, selectLogging.
Specify the percentage of the maximum connections this rule is to allow in the Number of connections allowed (% of maximum connections) field.
Set a limit for themaximum number of connections allowedper source IP Address by selecting Enable connection limit for each Source IP Address and entering the value in the Threshold field.CAUTION:Only available for Allow rules.
Set a limit for the maximum number of connections allowed per destination IP Address by selecting the Enable connection limit for each Destination IP Address field and entering the value in the Threshold field. (Only available for Allow rules).
We canenable fragmented packetson the access rule as well as Allow management traffic,Enable Packet Monitor and Create Reflexive rules over the access rule, Click Add when Finished.
The access rules can also show the diagram flow of the rule created as mentioned below: