Applies To:
Show Versions
BIG-IQ Security
- 4.4.0
About rules and rule lists
Rule lists are containers for rules, which are run in the order they appear in their assigned rule list. A rule list can contain thousands of ordered rules, but cannot be nested inside another rule list. You can reorder rules in a given rule list at any time.
With BIG-IQ Network Security, you can manage rules and rule lists from the Rule Lists option (Object Editor > Rule Lists). You can also create rules and add rule lists from the Contexts and the Polices options. You can import and manage rules (and/or rule lists) from BIG-IP devices. Furthermore, you can define rules and rule lists within BIG-IQ Network Security, and then deploy back to the BIG-IP device.
You can define a list of rules for a specific firewall and/or refer to one or more shared rule lists by name from other firewalls.
Network firewalls use rules and rule lists to specify traffic-handling actions. The network software compares IP packets to the criteria specified in rules. If a packet matches the criteria, then the system takes the action specified by the rule. If a packet does not match any rule from the list, the software accepts the packet or passes it to the next rule or rule list. For example, the system compares the packet to self IP rules if the packet is destined for a network associated with a self IP address that has firewall rules defined.
A packet must pass all tests to match successfully. For example, to match against a source subnet and several destination ports, a packet must originate from the given subnet and also have one of the specified destination ports.
Rules and rule lists can be applied to all firewall types, such as:
- Global
- Route domain
- Virtual server
- Self IP
- Management IP (rules only, no iRule or geolocation support)
Filtering rule lists
To filter the system interface to display only those objects related to a selected rule list, hover over the rule list name, right-click and then click Filter 'related to'. The interface is filtered and a count appears to the right of each object type. The frame to the right provides its own filter field where you can enter text and click on the filter icon to constrain the display to those items that match the filter.
Creating rules
Reordering rules in rule lists
Removing rules
-
You remove a rule based on the object that you remove it from:
Option Description From a rule list In the left pane, expand Rules Lists and click the name of the rule list containing the rule that you want to delete. This opens the Rule List frame that provides access to Propertiesand Rules options. From a firewall context In the left pane, expand Contexts, click the name of the context containing the rule that you want to delete.This opens the Properties frame and provides access to Properties, Enforced and Staged options. Then, select Enforced or Staged as appropriate. From a policy In the left pane, expand Policies, click the name of the policy containing the rule that you want to delete. The Policy frame opens and provides access to Properties and Rules & Rule Lists options. Select Rules & Rule Lists. - Click Edit to lock for editing.
- Hover over the row containing the rule, and right-click.
- Select Delete Rule and confirm the deletion.
- Click Save to save your changes.
Adding rule lists
Editing rule lists
Clearing fields in rules
- Log in to BIG-IQ Network Security.
- Click Object Editor.
- Expand Rule Lists and click the name of a rule list that you want to edit.
- Click Edit to lock for editing.
- Click the Rules tab to ensure it is selected.
- Locate the rule containing the fields whose contents you want to remove.
-
Not all fields can be cleared, but you can remove the contents of these fields
as follows:
Option Description Address (source or destination) Hover over the text in the field. Right-click and select Remove item. Port (source or destination) Hover over the text in the field. Right-click and select Remove item. VLAN Hover over the text in the field. Right-click and select Remove item. iRule Hover over the text in the field. Right-click and select Remove item. Description Hover over the text in the field. Right-click and select Remove item. - Click Save to save your changes.
- When you are finished, click Save and Close to save your edits, clear the lock, and exit the panel.
Cloning rule lists
Removing rule lists
Rule properties
The following table lists and describes the properties required when configuring network firewall rules.
Property | Description |
---|---|
Name | Unique, user-provided name for the rule. If the name is a rule list name, it is preceded by: referenceTo_ when moved to a firewall or policy. For example: referenceTo_sys_self_allow_all. |
Address (Source) | There are many ways to construct an IPv4 or IPv6 address, address range, or
address list. The following methods and examples are not meant to be exhaustive.
IPv4 format: a.b.c.d[/prefix]. For example: 60.63.10.10 IPv6 format: a:b:c:d:e:f:g:h[/prefix]. For example: 2001:db7:3f4a:9dd:ca90:ff00:42:8329 You can specify subnets using forward slash (/) notation; for example: 60.63.10.0/24. An example of an IPv6 subnet is as follows: 2001:db8:a::/64. You can append a route domain to an address using the format %RouteDomainID/Mask. For example, 12.2.0.0%44/16. From the list, select:
Options are provided to add additional addresses, address ranges, address lists, or countries/regions (+) and to delete addresses, address ranges, address lists, or countries/regions (X). When you are finished, click Save or Add. |
Port | Ports, port ranges, or port lists. From the list, select:
Options are provided to add additional ports, port ranges, or port lists (+) and to delete ports, port ranges, or port lists (X). When you are finished, click Save or Add. |
VLAN | Name of the VLAN physically present on the device (Internal, External, or Any). If you specify a VLAN in a rule without also specifying the VLAN's partition, the deployment task will fail when you attempt to deploy that rule to a firewall. Use the format partition/VLAN or /partition/VLAN. For example: Common/external or /Common/external. When finished, click Save or Add. |
Address (Destination) | There are many ways to construct an IPv4 or IPv6 address, address range, or
address list. The following methods and examples are not meant to be exhaustive.
IPv4 format: a.b.c.d[/prefix]. For example: 60.63.10.10 IPv6 format: a:b:c:d:e:f:g:h[/prefix]. For example: 2001:db7:3f4a:9dd:ca90:ff00:42:8329 You can specify subnets using forward slash (/) notation; for example: 60.63.10.0/24. An example of an IPv6 subnet is as follows: 2001:db8:a::/64. You can append a route domain to an address using the format %RouteDomainID/Mask. For example, 12.2.0.0%44/16. From the list, select:
Options are provided to add additional addresses, address ranges, address lists, or countries/regions (+) and to delete addresses, address ranges, address lists, or countries/regions (X). When you are finished, click Save or Add. |
Port | Ports, port ranges, or port lists. From the list, select:
Options are provided to add additional ports, port ranges, or port lists (+) and to delete ports, port ranges, or port lists (X). When you are finished, click Save or Add. |
Action | Click in the column and select one of the following:
When you are finished, click Save or Add. |
iRule | Click in the column and enter the iRule name, including partition. For example:
/Common/_sys_AXX_Support_OA_BasicAuth. iRules use syntax based on the industry-standard Tools Command Language (Tcl). For complete and detailed information on iRules syntax, see the F5 Networks DevCentral web site, http://devcentral.f5.com. Note that iRules must conform to standard Tcl grammar rules. For more information on Tcl syntax, see http://tmml.sourceforge.net/doc/tcl/index.html. Note that iRules are not supported on the management IP context. |
Description | Optional description for the current rule. To add a description, click in the column, type text, and click Save or Add. |
Protocol | IP protocol to compare against the packet. Select the appropriate protocol from
the list and click Save or Add. If you select ICMP, IPv6-ICMP, or Other, a popup dialog box opens where you can specify Type and Code combinations. The default type is Any and the default code is Any.
Note: The type and code combinations
are too numerous to document here. For details, consult the F5 Networks DevCentral
site, http://devcentral.f5.com or the documentation for the
specific BIG-IP platform.
|
State | Click in the column and select an option from the list to specify whether the
rule is enabled, disabled, or scheduled. The field is updated. Click
Save or Add when you are ready to save
your changes. If you select scheduled from the list, the Select Schedule list is displayed in the screen. Select a schedule and click OK. If you have assigned a schedule, then a gear icon appears to the right of the State setting in the State column. To make changes to the State setting, click the gear icon to open the Select Schedule popup screen. If you have no pre-defined schedules, you cannot assign the scheduled state to the rule. |
Log | Click in the column and select an option from the list to specify whether or not
the firewall software should write a log entry for any packets that match this rule.
From the list, select true (log an entry) or
false (do not log an entry). When finished, click
Save or Add. For you to set or edit this setting, the discovered device must be at version 11.3 HF6 or later. The setting is not editable earlier than version 11.3 HF6. When a new rule is added to a firewall through the BIG-IQ Network Security system interface, editing is enabled for the Log setting even for devices with versions earlier than 11.3 HF6. |