SonicOS 7.0 Rules and Policies for Policy mode
- SonicOS 7.0 Rules and Policies
- Settings
- Security Policy
- NAT Policy
- About NAT in SonicOS
- About NAT Load Balancing
- About NAT64
- About FQDN-based NAT
- About Source MAC Address Override
- Viewing NAT Policy Entries
- Adding or Editing NAT or NAT64 Rule Policies
- Deleting NAT Policies
- Creating NAT Rule Policies: Examples
- Creating a One-to-One NAT Policy for Inbound Traffic
- Creating a One-to-One NAT Policy for Outbound Traffic
- Inbound Port Address Translation via One-to-One NAT Policy
- Inbound Port Address Translation via WAN IP Address
- Creating a Many-to-One NAT Policy
- Creating a Many-to-Many NAT Policy
- Creating a NAT Load Balancing Policy for Two Web Servers
- Routing
- Decryption Policy
- DoS Policy
- DNS Policy
- Endpoint Policy
- Shadow
- SonicWall Support
Security Policy
To configure Security Policy rules, the service or service group that the policy applies to must first be defined. If it is not, you can define the service or service group and then create one or more rules for it.
The following procedure describes how to add, modify, reset to defaults, or delete Security Policy rules for firewalls running SonicOS. Paginated navigation and sorting by column header is supported on the Security Policy screen. In the Security Policy table, you can click the column header to use for sorting. An arrow is displayed to the right of the selected column header. You can click the arrow to reverse the sorting order of the entries in the table.
By hovering your mouse over icons on the Security Policy page, you can display information about criteria, such as an Source Port or Service.
IPv6 is supported for Security Policy. Search for IPv6 Security Policies in the Security Policy Search section. A list of results displays in a table.
From there you can click the Configure icon for the Security Policy you want to edit. The IPv6 configuration for Security Policy is almost identical to IPv4.
To configure a Security Policy
- Navigate to POLICY | Rules and Policies > Security Policy. The Security Policy page displays. The POLICY | Rules and Policies > Security Policy page enables you to select multiple configuration screens for your security policies.
-
From the bottom of the Security Policy table, click +Add (Top or Bottom). The Adding Rule dialog displays.
-
Or, under the Configure column, click the Edit icon for the source and destination zones or interfaces for which you are configuring a rule. The Editing Rule page for that zone/interface pair displays.
- In the top view, enter or edit the policy Name and any identifying Tags you would like to enter to help sort your policies.
- Enter a Description of the policy and its intent.
-
Select an Action, whether to Allow, Deny, or Discard access.
If a policy has a “No-Edit” policy action, the Action settings are not editable.
-
Specify the IP version in Type, IPv4 or IPv6.
-
Set your Security Policy's Priority.
Higher numbers indicate lower priority. The lowest priority rule is the final/default rule applied to matching traffic (traffic matching the defined attributes) when no higher priority rules apply. Lower priority rules should be more general than rules with higher priorities.
If a higher priority rule does not match all the attributes, then the next rule is evaluated to see if it applies, all the way down the list of rules. Rules with more specific matching attributes need to be set at a higher priority or else a more general rule could match before that specific rule is evaluated. - Specify when the rule is applied by selecting a schedule or Schedule Group from the Schedule drop-down menu. If the rule is always applied, select Always On. If the schedule does not exist, refer to Configuring Schedules.
- Click Enable to activate the policy schedule and enable logging.
- In the Source/Destination view, select the Source and Destination zones, and network address objects, and port/services for each from the drop-down menus.
- There are no default zones. Any is supported for both zone fields.
Under GEO Country, indicate a (From/To) Country from the drop-down menu.
To validate the rule you have set up, click Validate and verify your settings before proceeding. You can click through the tabs to see details on duplicate firewalls, and any firewalls shadowed by this rule.
Was This Article Helpful?
Help us to improve our support portal