Applies To:
Show Versions
BIG-IQ Security
- 4.4.0
About managing firewall contexts in BIG-IQ Network Security
In BIG-IQ Network Security, a firewall context is a BIG-IP network object to which a firewall policy can be attached. In BIG-IQ Network Security, these network objects are called Global (global), Route Domain (rd), Virtual Server (vip), Self IP (sip), or Management (mgmt).
Firewall contexts provide policy-based access control to and from address and port pairs, inside and outside the network. Using a combination of contexts, a firewall can apply rules in a number of different ways, including at a global level, per virtual server, per route domain, and even for the management port or a self IP address.
Firewall properties include the firewall name, an (optional) description), its partition, its type, and its parent device on the partition in which it resides. Note that an administrative partition is a part of the BIG-IP configuration that is accessible only to a particular group of administrators. The default partition for all BIG-IP configurations, /Common, is accessible to all administrators. A sufficiently-privileged administrator can make additional partitions. Each partition corresponds to a folder (with the same name) to hold its configuration objects.
From the Enforced tab, you can view and configure policies or rules/rule lists whose actions (accept, accept decisively, drop, reject) are in force. You are restricted to a single, enforced policy on any specific firewall. If you have an enforced policy on a firewall, you cannot also have inline rules and rule lists on that same firewall.
You can edit inline rules from the Enforced tab. You can edit all other firewall shared objects only from within the object's panel. For example, you can edit rule lists, including the reordering of rules inside rule lists, only from the Rule Lists panel.
About BIG-IP system firewall contexts
A firewall context is the category of object to which a rule applies. In this case, category refers to Global, Route Domain, Virtual Server, Self IP, or Management. Rules can be viewed and reorganized separately within each context.
It is possible to have multiple layers of firewalls on a single BIG-IP device. These layers constitute the firewall hierarchy. Within the firewall hierarchy, rules progress from Global, to Route Domain, and then to either Virtual Server or Self IP.
If a packet matches a firewall rule within a given context, that action is applied to the packet, and the packet then moves to the next context for further processing. If the packet is accepted, it travels on to the next context. If the packet is accepted decisively, it goes directly to its destination. If the packet is dropped or rejected, all processing stops for that packet; it travels no further.
On each firewall, you can have rules, rule lists, or policies that are enforced or staged. Rules, rule lists, or policies are processed in order within their context and within the context hierarchy.
Rules for the Management interface are processed separately and not as part of the context hierarchy.
About global firewalls
A global firewall is an IP packet filter that resides on a global firewall on a BIG-IP device. Except for packets traveling to the management firewall, it is the first firewall that an IP packet encounters. Any packet reaching a BIG-IP device must pass through the global firewall first.
When you create firewall rules, rule lists, or policies, you can select one of several contexts. Global is one of the contexts you can select. Rules for each context form their own list, and are processed both in the context hierarchy and in the order within each context list.
About route domain firewalls
A route domain firewall is an IP packet filter that resides on a route domain firewall on a BIG-IP device.
A route domain is a BIG-IP system object that represents a particular network configuration. After creating a route domain, you can associate various BIG-IP system objects with the domain: unique VLANs, routing table entries such as a default gateway and static routes, self IP addresses, virtual servers, pool members, and firewalls.
When a route domain firewall is configured to apply to one route domain, it means that any IP packet that passes through the route domain is assessed and possibly filtered out by the configured firewall.
When you create firewall rules, rule lists, or policies, you can select one of several contexts. Route domain is one of the contexts you can select. Rules for each context form their own list and are processed both in the context hierarchy and in the order within each context list.
Route domain rules apply to a specific route domain configured on the server. Route domain rules are checked after global rules. Even if you have not configured a route domain, you can apply route domain rules to Route Domain 0, which is effectively the same as the global rule context.
Route domain rules are collected in the Route Domain context. Route domain rules apply to a specific route domain defined on the server. Route domain rules are checked after global rules.
About virtual server firewalls
A virtual server firewall is an IP packet filter configured on the virtual server and, therefore, designated for client-side traffic. Any IP packet that passes through the virtual server IP address is assessed and possibly filtered out by this firewall.
When you create firewall rules, rule lists, or policies, you can select one of several contexts, including virtual server. Rules for each context form their own list and are processed both in the context hierarchy and in the order within each context list.
Virtual server rules apply to the selected virtual server only. Virtual server rules are checked after route domain rules.
About self IP firewalls
A self IP firewall is an IP packet filter configured on the self IP address, a firewall designated for server-side traffic. Any IP packet that passes through the self IP is assessed and possibly filtered out by this firewall.
A self IP address is an IP address on a BIG-IP system that is associated with a VLAN and used to access hosts in that VLAN. By virtue of its netmask, a self IP address represents an address space; that is, a range of IP addresses spanning the hosts in the VLAN, rather than a single host address.
A static self IP address is an IP address that is assigned to the system and does not migrate between BIG-IP systems. By default, the self IP addresses created with the Configuration utility are static self IP addresses. One self IP address must be defined for each VLAN.
When you create firewall rules, rule lists, or policies, you can select one of several contexts, including self IP. Rules for each context form their own list and are processed both in the context hierarchy and in the order within each context list.
The self IP context collects firewall rules that apply to the self IP address on the BIG-IP device. Self IP rules are checked after route domain rules.
About management IP firewalls
A management IP firewall is an IP packet filter configured on the management IP address and, therefore, designated to examine management traffic. Any IP packet that passes through the management IP address is assessed and possibly filtered out by this firewall.
The network software compares IP packets to the criteria specified in management firewall rules. If a packet matches the criteria, then the system takes the action specified by the rule. If a packet does not match a rule, then the software compares the packet against the next rule. If a packet does not match any rule, the packet is accepted.
Management IP firewalls collect firewall rules that apply to the management port on the BIG-IP device. Management port firewalls are outside the firewall context hierarchy and management port rules are checked independently of other rules.
You can also drag-and-drop address lists, and port lists onto management IP firewalls.
About firewall policy types
In BIG-IQ Network Security, you can add the following firewall policy types:
- Enforced
- An enforced firewall policy modifies network traffic based on a set of firewall rules.
- Staged
- A staged firewall policy allows you to evaluate the effect a policy has on traffic without actually modifying the traffic based on the firewall rules.
You can assign to a firewall either an enforced firewall policy or a set of explicitly-defined rules and rule lists. The firewall cannot have both in force at the same time. However, you can configure simultaneously on the same firewall both staged firewall policies and enforced inline rules and rule lists.
Firewall properties
The Properties tab displays the properties for the selected firewall. All fields are for information purposes only and cannot be edited, with the exception of the (optional) description.
Property | Description |
---|---|
Name | Name as shown in the system interface: global for the global firewall; management-ip for the management IP firewall; 0 for route domain; the IP address for self-ip; and the firewall name for a virtual server. |
Description | (Optional) description for the firewall. |
Partition | Usually, Common. An administrative partition is a part of the BIG-IP configuration that is accessible only to a particular group of administrators. The default partition for all BIG-IP configurations, Common, is accessible to all administrators. A sufficiently-privileged administrator can make additional partitions. Each partition corresponds to a folder (with the same name, for instance, /Common) to hold its configuration objects. |
Type | One of the following: global (global); route-domain (rd); virtual server (vip); self-ip (self-ip); or management-ip (mgmt). |
Route Domain ID | Used for Route Domain firewall types only; displays a number that identifies the route domain. |
IP Address | For Virtual server (VIP), self IP, and Management firewall types only; this is an informational, read-only field displaying the IP address retrieved (if available) during DMA. |
Device | Name of the BIG-IP device where the firewall resides. |
Adding an enforced firewall policy
Adding a staged firewall policy
Rule and rule lists are not allowed on staged firewall policies.