Skip to main content

Zone-Based Firewall

Zone-Based Firewall defines the matching conditions and actions to configure a firewall policy.

Note: When using "protocol_names" in match_criterias, also populate the "protocols" and "destination_ports" with corresponding values. The full list of "protocol_names" amd their corresponding "protocols" and "destination_ports" can be accessed at https://<vmanage-ip>/app/json/application_protocol.json. when chosing the "protocol_names" as either "tcp" or "udp", "destination_ports" is not mandatory.

Diagram

Classes

definitions (sdwan.security_policies)

NameTypeConstraintMandatoryDefault Value
zone_based_firewallList[zone_based_firewall]No

zone_based_firewall (sdwan.security_policies.definitions)

NameTypeConstraintMandatoryDefault Value
nameStringRegex: ^[A-Za-z0-9\-_]{1,32}$No
descriptionStringYes
default_action_typeChoicepass, dropYes
rulesList[rules]No
zone_pairsList[zone_pairs]Yes

rules (sdwan.security_policies.definitions.zone_based_firewall)

NameTypeConstraintMandatoryDefault Value
idIntegermin: 1, max: 65534Yes
nameStringYes
base_actionChoicepass, drop, inspectYes
match_criteriasClass[match_criterias]No
actionsClass[actions]No

zone_pairs (sdwan.security_policies.definitions.zone_based_firewall)

NameTypeConstraintMandatoryDefault Value
source_zoneChoiceself_zoneYes
destination_zoneChoiceself_zoneYes

match_criterias (sdwan.security_policies.definitions.zone_based_firewall.rules)

NameTypeConstraintMandatoryDefault Value
source_data_prefix_listsListString[Regex: ^[A-Za-z0-9\-_]{1,32}$]No
source_ip_prefixIPNo
source_ip_prefix_variableStringNo
source_fqdn_listsListString[Regex: ^[A-Za-z0-9\-_]{1,32}$]No
source_fqdnStringRegex: ^(?=.{1,120}$)((\*|[a-zA-Z0-9-]{1,63})\.)+([a-zA-Z0-9-]{2,63})$No
source_geo_locationsListString[max: 3]No
source_portsListInteger[min: 0, max: 65535]No
source_port_rangesList[source_port_ranges]No
destination_data_prefix_listsListString[Regex: ^[A-Za-z0-9\-_]{1,32}$]No
destination_ip_prefixIPNo
destination_ip_prefix_variableStringNo
destination_fqdn_listsListString[Regex: ^[A-Za-z0-9\-_]{1,32}$]No
destination_fqdnStringRegex: ^(?=.{1,120}$)((\*|[a-zA-Z0-9-]{1,63})\.)+([a-zA-Z0-9-]{2,63})$No
destination_geo_locationsListString[max: 3]No
destination_portsListInteger[min: 0, max: 65535]No
destination_port_rangesList[destination_port_ranges]No
protocol_namesListStringNo
protocolsListInteger[min: 0, max: 255]No
local_application_listStringRegex: ^[A-Za-z0-9\-_]{1,32}$No

actions (sdwan.security_policies.definitions.zone_based_firewall.rules)

NameTypeConstraintMandatoryDefault Value
logBooleantrue, falseNo

source_port_ranges (sdwan.security_policies.definitions.zone_based_firewall.rules.match_criterias)

NameTypeConstraintMandatoryDefault Value
fromIntegermin: 0, max: 65535Yes
toIntegermin: 0, max: 65535Yes

destination_port_ranges (sdwan.security_policies.definitions.zone_based_firewall.rules.match_criterias)

NameTypeConstraintMandatoryDefault Value
fromIntegermin: 0, max: 65535Yes
toIntegermin: 0, max: 65535Yes

Examples

Example-1: Securing Guest Network with Internet-Only Access

A retail chain wants to provide a secure guest Wi-Fi network that allows internet access while preventing access to the internal corporate network. This ensures that guests can browse the internet freely without reaching sensitive company resources. By implementing strict security controls, the retail chain can enhance cybersecurity while offering a seamless browsing experience for customers.

To achieve this, an SD-WAN security policy using Zone-Based Firewall (ZBFW) rules is implemented. This policy leverages network segmentation to isolate guest users from the corporate environment while maintaining secure internet access. The key components of this approach include zones (Guest_WiFi, Corporate_LAN, and Internet), security policies to regulate traffic flow, ZBFW rules to define allowed and blocked connections, and zone pairs to establish relationships between different network segments.

In this setup, the Guest_WiFi zone (VPN ID 200) is configured to block access to the Corporate_LAN (VPN ID 300) while allowing unrestricted access to the Internet (VPN ID 400). To enforce this, a firewall rule explicitly denies traffic from 10.0.200.0/24 (Guest_WiFi) to 10.0.100.0/24 (Corporate_LAN), ensuring that corporate assets remain protected. Simultaneously, another rule permits traffic from 10.0.200.0/24 to 0.0.0.0/0, enabling guest users to access the internet without restrictions.

The zone pairs further enforce these policies by controlling communication between different network segments. Traffic from Guest_WiFi to Corporate_LAN is explicitly blocked, ensuring that guests cannot access internal systems. Meanwhile, traffic from Guest_WiFi to the Internet is allowed, providing seamless internet connectivity for guests. This structured approach ensures a secure and scalable guest network while protecting corporate resources from unauthorized access.

sdwan:
security_policies:
definitions:
zone_based_firewall:
- name: Guest_WiFi_ZBFW
description: ZBFW policy to allow internet access and block corporate access
default_action_type: drop
rules:
- id: 1
name: Block_Corporate_Access
base_action: drop
match_criterias:
source_ip_prefix: 10.0.200.0/24
destination_ip_prefix: 10.0.100.0/24
- id: 2
name: Allow_Internet_Access
base_action: pass
match_criterias:
source_ip_prefix: 10.0.200.0/24
destination_ip_prefix: 0.0.0.0/0
zone_pairs:
- source_zone: Guest_WiFi
destination_zone: Corporate_LAN
- source_zone: Guest_WiFi
destination_zone: Internet

The security policy YAML mentioned above will only be effective if the following zone pairs YAML is created.

sdwan:
policy_objects:
zones:
- name: Guest_WiFi
vpn_ids:
- 200
- name: Corporate_LAN
vpn_ids:
- 300
- name: Internet
vpn_ids:
- 400

Example-2: Enhancing Network Security by Restricting Remote Access Protocols

A network administrator wants to enhance security by blocking SSH (port 22) and Telnet (port 23) traffic between two network zones, vpn110 and vpn120. SSH and Telnet are commonly used for remote access, but unauthorized access through these protocols can pose security risks. To prevent potential threats, an SD-WAN Zone-Based Firewall (ZBFW) policy is implemented to explicitly drop any SSH or Telnet traffic between these zones while maintaining control over network communication.

The provided YAML defines an SD-WAN security policy using Zone-Based Firewall (ZBFW) rules to block SSH and Telnet traffic between two network zones, vpn110 and vpn120. The security policy, named ssh_ZBFW_1, is designed to enhance network security by explicitly denying access to these remote access protocols. The default action type is set to drop, meaning any traffic not explicitly allowed by the rules will be blocked. A specific firewall rule, Block_SSH_Telnet_1, is created with ID 1 to block SSH (port 22) and Telnet (port 23) traffic using TCP (protocol ID 6). The rule ensures that any attempt to establish an SSH or Telnet session between these zones is denied. Additionally, a zone pair is defined, specifying that traffic originating from vpn110 and destined for vpn120 will be subject to this policy. This configuration helps prevent unauthorized remote access attempts, reducing the risk of security breaches and ensuring better control over network communication.

sdwan:
security_policies:
definitions:
zone_based_firewall:
- name: ssh_ZBFW_1
description: ZBFW policy to block SSH and Telnet
default_action_type: drop
rules:
- id: 1
name: Block_SSH_Telnet_1
base_action: drop
match_criterias:
protocols:
- 6 # TCP
destination_ports:
- 22 # SSH
- 23 # Telnet
zone_pairs:
- source_zone: vpn110
destination_zone: vpn120

The security policy YAML mentioned above will only be effective if the following zone pairs YAML is created.

sdwan:
policy_objects:
zones:
- name: vpn110
vpn_ids:
- 110
- name: vpn120
vpn_ids:
- 120