Configuring Distributed Cloud Firewall

This section describes the Distributed Cloud Firewall functional area of Aviatrix CoPilot.

Creating SmartGroups for Distributed Cloud Firewall

A Distributed Cloud Firewall SmartGroup contains one or more filters to identify cloud endpoints that map to an app domain. A filter specifies resource matching criteria. Matching criteria could be a cloud tag; a resource attribute (such as account name or region); or a list of IP prefixes. All conditions within the filter must be satisfied to be matched. A tag or resource attribute-based filter must be associated with a resource type (VPC/VNet, subnet, or VM).

To create a SmartGroup, see Creating SmartGroups.

Creating Policies

After creating SmartGroups, you create policies that consist of rules, to define the access control to apply on the traffic between those SmartGroups.

If your SmartGroups contain Spoke Gateways, ensure that those Spoke Gateways have Egress enabled.

For example, in the workload isolation use case, all traffic (i.e., ports and protocols) between the ShoppingCart application and the Product Logging app must be blocked (Denied). You can decide which policies to enforce, and if you want to log the actions related to a rule. These rules are enforced (if enabled) on your Spoke gateways, and are executed against the Spoke gateways in the order that they are shown in the rule list.

microseg policies

A SmartGroup traffic flow can belong to more than one rule. If this occurs, the priority of the rule determines the action that is taken first.

To create a new Distributed Cloud Firewall policy:

  1. In CoPilot, navigate to Security > Distributed Cloud Firewall.

  2. Click +Rule. The Create New Rule dialog displays.

    400

    Make sure you are aware of the prerequisites and limitations for Intrusion Detection before creating a policy with Intrusion Detection enabled.

  1. Enter a name for the rule.

  2. Select the Source SmartGroups that originate traffic.

  3. Select the Destination SmartGroups that terminate traffic.

    If you are using Distributed Cloud Firewall rules for egress purposes, you must select Public Internet as the Destination SmartGroup. Also, SNAT must be enabled on the Spoke gateways that enforce the egress policy.
  1. (optional) Select the WebGroups for filtering egress traffic. You must have already created the WebGroups.

    The Destination SmartGroup automatically switches to 'Public Internet' if all of the following are true:

    • You are creating a new rule

    • The Destination SmartGroup has not already been modified

    • At least one WebGroup has been selected

  2. Select the protocol used: TCP, UDP, ICMP, or Any. If you select TCP or UDP you can enter a port number or port range.

  3. If the Enforcement slider is On (the default), the rule is enforced in the data plane. If the Enforcement slider is Off, the packets are only watched. This allows you to observe if the traffic impacted by this rule causes any inadvertent issues (such as traffic being dropped).

    For any VNets that have Security Group Orchestration applied, and that are included in a rule that is not enforced, the application security group (ASG) in the network security group (NSG) rule remains associated with the VM even though the NSG rule using the ASG is not present.

    After the rule is created you can enable or disable rule enforcement from the vertical ellipsis 25 menu next to the rule.

  1. If the Logging slider is On, information (such as five-tuple, source/destination MAC address, etc.) related to the action is logged.

    Since logging uses a lot of disk space, be careful when enabling logging on your rules. It is best to enable logging for only a short period of time while you are debugging, and then disable logging again when you are finished. Logs for inter-VPC/VNet rules are available on the Distributed Cloud Firewall > Monitor tab.

    After the rule is created you can enable or disable logging from the vertical ellipsis 25 menu next to the rule.

    As per the workload isolation use case above (blocking traffic between the Shopping Cart application and the Product Logging app), the rule would look like this:

    • Source SmartGroup: Shopping Cart application

    • Destination SmartGroup: Product Logging app

    • Action: Deny

    • Protocol: Any

    • Ports: 0-65535 (Any)

    • Logging: Off

    • Enforcement: On

  1. Select if the rule is allowed or denied. This determines the action to be taken on the traffic.

  2. The SG (Security Group) Orchestration toggle is On by default unless any of the conditions in the note below are true.

    If the toggle is On the rule is available for Security Group Orchestration. You can change this toggle to Off if you do not want the rule to be available for Security Group Orchestration.

    The SG Orchestration toggle is Off and disabled for new rules when any of the following conditions are true:

    • WebGroup is present in the rule

    • Source SmartGroup is 'Anywhere' and action is 'Permit'

    • Source SmartGroup is 'Anywhere'; Destination SmartGroup is 'Anywhere'; and action is 'Deny'

  1. Enable Ensure TLS if you want any traffic that matches the ports and Source and Destination SmartGroups, but that is not TLS, to be dropped. Traffic is also dropped even if it is HTTP traffic that matches the domains or URLs in the WebGroups.

  2. You can enable TLS Decryption (if the rule action is Allow) and Intrusion Detection. If Intrusion Detection is enabled, traffic is inspected for threats, and the results are displayed on the Detected Intrusions tab.

    If Intrusion Detection and TLS Decryption are both enabled, the TLS stream is temporarily decrypted, and the decrypted data is examined for intrusions.

    The Intrusion Detection column on the Distributed Firewalling tab indicates if Intrusion Detection is "On" or "On with TLS Decryption." The results are available on the Detected Intrusions tab.

  1. Determine the rule order by selecting the following in the Place Rule list:

    • Above, Below, Top or Bottom. If you select Above or Below, you must select the existing rule that is affected by the position of the new rule.

    • Priority; you then enter a Priority Number for the rule. If an existing rule already has that priority, it is bumped down in the list. Zero (0) is the highest priority number.

After the rule is created you can click the arrow icon next to that rule in the Rule table to change the priority.

  1. Click Save in Drafts.

Before committing the rule, you can click the rule on the Rules tab and click Discard Change in the vertical ellipses menu to discard the most recent change (whether it was an addition, deletion, or an edit).
  1. Make additional modifications as needed by clicking the pencil icon next to the rule.

  2. You can then review, commit, or discard the rule changes.

Editing a Rule

  1. Click the Edit 25 icon next to a rule. You can edit all rule properties.

  2. Click Save.

Deleting a Rule

caveats here before deleting a rule. I imagine that this has consequences.

To delete a rule:

  1. Next to the applicable rule, click the vertical ellipsis 25 menu and then click Delete Rule.

  2. Click Commit to delete the rule. You can click Discard if you want to keep the rule.

Default Deny Policy

By default, Distributed Cloud Firewall includes a Default Deny rule that blocks traffic to any CIDR covered in Distributed Cloud Firewall policies.

Retaining Log Files

To configure how many days to keep your Distributed Cloud Firewall logs, in CoPilot navigate to Settings > Resources > Disk Utilization and scroll down to Distributed Cloud Firewall Logs. Use the slider to select the number of days to retain your logs (default is five days).

Viewing Rule Statistics

You can open a previously created rule to view the statistics related to the execution of that particular rule. You can view traffic statistics from the last hour, week, or month, or a custom time period. The resulting graph indicates if the traffic is Observed, Enforced & Allowed, or Enforced & Denied.

Resetting Traffic Count

On the Policy tab, you can select a rule and then click the vertical ellipses 25 to select Reset Traffic Count. This resets the traffic count statistics for that rule.

Monitor

Under Security > Distributed Cloud Firewall > Monitor, you can filter packet logs for rules with logging enabled to determine why a rule may not be working as intended. You can filter based on the following information: timestamp, rule, source/destination IPs, protocol, source/destination port, action (allowed or dropped), and if the rule is enforced. The table refreshes every 15 seconds, and you can also refresh the table manually.

CoPilot throttles the logs for each connection shown on the Monitor tab to one packet per minute in each direction.

Configuring the Polling Interval

Lowering the polling interval can create more load on the Controller. The default setting should be sufficient.

The Aviatrix Controller periodically polls your clouds to gather and inventory its resources. For example, if you modified your cloud tags, you may want to poll data more frequently so that CoPilot reflects those changes.

  1. In CoPilot navigate to Settings > Configuration > Advanced Settings > Distributed Cloud Firewall Settings.

  2. Toggle on the CSP Resource Polling Enabled slider.

  3. Enter the desired polling interval in minutes (default is 60). This can be a value between 1-1440.

Toggle off the CSP Resource Polling Enabled slider if you do not want the Controller to periodically poll your CSP resources.

You can manually trigger a poll to fetch resources directly from your CSPs by clicking Refetch CSP Resources on the SmartGroups tab. The poll may take several minutes to complete depending on the size of your environment.

Supported Capabilities

Capability 6.7 6.8 6.9 7.0 7.1

Distributed Cloud Firewall is supported in the following cloud providers:

AWS, Azure

AWS, AWS GovCloud, Azure, Azure Government, and GCP

AWS, AWS GovCloud, Azure, Azure Government, and GCP

AWS, AWS GovCloud, Azure, Azure Government, and GCP

AWS, AWS GovCloud, Azure, Azure Government, and GCP

You can configure up to 500 SmartGroups

x

x

x

x

x

You can have up to 3000 CIDRs per SmartGroup

x

x

x

x

x

Number of rules per policy

64

2000

2000

2000

2000

Number of port ranges

1

64

64

64

64

Overlapping IPs are supported

x

x

Security Group Orchestration is supported

x (Azure)

x (AWS and Azure)