All Products
Search
Document Center

Cloud Firewall:Configure the strict mode and loose mode of the access control engine

Last Updated:Aug 12, 2024

After you configure access control policies for the Internet firewall and NAT firewalls, Cloud Firewall matches traffic packets based on the following factors in sequence: 4-tuple, application type, and domain name when traffic passes through Cloud Firewall. If Cloud Firewall cannot identify the application type or domain name, Cloud Firewall automatically allows the unidentified traffic. This helps prevent negative impacts on your workloads. A 4-tuple refers to the source address, destination address, destination port, and transport layer protocol. If you do not want to allow the unidentified traffic, you can enable the strict mode for the Internet firewall and NAT firewalls.

Overview

After you configure an access control policy whose application type is not ANY or whose destination type is Domain Name for the Internet firewall or a NAT firewall, Cloud Firewall matches traffic packets based on the following factors in sequence: 4-tuple, application type, and domain name when traffic passes through Cloud Firewall.

  • If you configured a domain name-based access control policy whose application type is HTTP, HTTPS, SMTP, SMTPS, or SSL, Cloud Firewall matches traffic packets based on the following factors in sequence: 4-tuple, application type, and domain name.

  • If you configured an application-based access control policy or a domain name-based access control policy whose application type is not HTTP, HTTPS, SMTP, SMTPS, or SSL, Cloud Firewall matches traffic packets based on the following factors in sequence: 4-tuple and application type.

If a traffic packet does not carry a standard application or a domain name, Cloud Firewall may be unable to identify the application type or domain name of traffic. In this case, Cloud Firewall automatically allows the traffic.

After the strict mode is enabled, Cloud Firewall does not directly allow traffic whose application type or domain name is unidentified. Cloud Firewall continues to match the traffic against the access control policy that has a lower priority until an access control policy is hit. Then, Cloud Firewall performs the action specified in the access control policy. If no access control policy is hit after Cloud Firewall matches traffic against all access control policies, Cloud Firewall automatically allows the traffic.

image
Important

If normal traffic is blocked after the strict mode is enabled, we recommend that you add the required application information to the request packets or disable the strict mode.

Enable or disable the strict mode of the access control engine

You can configure the mode of the access control engine for the Internet firewall and NAT firewalls. By default, the access control engine is in loose mode. In this mode, the traffic whose application type or domain name is identified as Unknown is automatically allowed to prevent negative impacts on your workloads. You can change the mode to Strict Mode if required.

FAQ

How do I view the logs of unidentified traffic?

  1. Log on to the Cloud Firewall console.

  2. In the left-side navigation pane, choose Log Monitoring > Log Audit.

  3. On the Traffic Logs > Internet Border tab, select Access Control for Rule Source, select Application Unidentified or Domain Name Unidentified for All Pre-match Access Control Policy Statuses, and then click Search.

    image.png

  4. View the logs of traffic in strict mode. The logs include the following information: time, source IP addresses, destination IP addresses, and destination ports.

References