Firewall Rules

Firewall Rules examine the control information in individual packets. The Rules either block or allow those packets based on rules that are defined on these pages. Firewall Rules are assigned directly to computers or to Policies which are in turn assigned to a computer or collection of computers.

Solaris Agents will only examine packets with an IP frame type, and Linux Agents will only examine packets with IP or ARP frame types. Packets with other frame types will be allowed through. Note that the Virtual Appliance does not have these restrictions and can examine all frame types, regardless of the operating system of the virtual machine it is protecting.

Firewall Rule icons:

From the main page you can:

Firewall Rules that are assigned to one or more computers or that are part of a Policy cannot be deleted.

Clicking New () or Properties () displays the Firewall Rules Properties window.

Firewall Rule Properties

General Information

Packet Source

The following options apply to the packet header's source information:

Packet Destination

The following options apply to the packet header's destination information:

Specific Flags

If you have selected TCP, ICMP, or TCP+UDP as your protocol in the General Information section above, you can direct your Firewall Rule to watch for specific flags.

Events

Select whether to enable or disable logging Events because of this Rule. If event logging is enabled, you can record the packet data with the Event.

Note that any form of allow Rule (Allow, Force Allow, Bypass) will not log any events because they would overwhelm the database.

Options

Alert

Select whether or not this Firewall Rule should trigger an Alert when it is triggered. If you only wish this rule to be active during specific periods, assign a schedule from the drop-down list.

Only Firewall Rules whose "Action" is set to "Deny" or "Log Only" can be configured to trigger an Alert. (This is because Alerts are triggered by counters which are incremented with data from log files.)

Schedule

Select whether the Firewall Rule should only be active during a scheduled time.

Firewall Rules that are active only at scheduled times are displayed in the Firewall Rules page with a small clock over their icon ().
With Agent-based protection, schedules use the same time zone as the endpoint operating system. With Agentless protection, schedules use the same time zone as the Deep Security Virtual Appliance.

Context

Rule Contexts are a powerful way of implementing different security policies depending on the computer's network environment. You will most often use Contexts to create Policies which apply different Firewall and Intrusion Prevention Rules to computers (usually mobile laptops) depending on whether that computer is in or away from the office.

Contexts are designed to be associated with Firewall and Intrusion Prevention Rules. If the conditions defined in the Context associated with a Rule are met, the Rule is applied.

To determine a computer's location, Contexts examine the nature of the computer's connection to its domain controller. For more information on Contexts, see Policies > Common Objects > Other > Contexts.

For an example of a Policy that implements Firewall Rules using Contexts, look at the properties of the "Windows Mobile Laptop" Policy.

Assigned To

This tab displays a list of Policies which include this Firewall Rule as well as any computers to which this Firewall Rule has been assigned directly. Firewall Rules can be assigned to Policies in the Policies page and to computers in the Computers page.