Skip to main content

Create & Push Policy (network rules)

Follow these steps to create and push a network firewall policy to your device.

1. Login to the enforza portal

Open a browser and click here.

portal

2. On the dashboard click "Policy Management" from the left hand menu

portal

3. From the Policy Management page, click "Manage Policy" on your device

portal

4. Policy details

info

Policies are pushed to Target Groups. Devices are associated with Target Groups.

This means you can push the same policy to many devices simultaneously for consistent security posture.

Note: this feature is not available for Freemium devices; each Freemium device gets statically associated with its own Target Group that cannot be changed.

The policy details page shows:

  • the version of the policy (increments each save or save/push)
  • when the policy was last saved or saved/pushed
  • the comment that the user made for this policy at time of push/save
  • the Target Group that this device belongs to (not available in Freemium)
  • the devices that are associated with the Target Group (not available in Freemium)

portal

5. Management Rules

Management rules are to permit or deny traffic to the device itself. Use these rules to allow SSH connections etc from known trusted IP addresses like your HQ public IP ranges, zScaler IP ranges, internal management IP ranges (i.e. VPC/VNET peered).

warning

Ensure that your Management Rules here do not contradict or override any rules set by the cloud platform (i.e. Security Groups, Network Security Groups, NACLs) or you may get unexpected results - for example, you permit SSH here, but you cannot access the device as the NSGs override these!

Platform configured SG/NSG/NACLs always take precedence.

portal

5. Network Rules

Network rules are to permit or deny traffic through the device from your users/servers to other locations i.e. other servers in your VNET/VPC (known as east/west or lateral traffic) or to the internet.

tip

You can create your rules and selectively source NAT traffic on a per-rule basis. Use this if you need more control over NAT.

Alternatively, you can select "Enable Source NAT Globally" that will NAT all traffic outbound.

portal

5. Save & Apply Policy

Click the "Save & Apply Policy" button. You will be prompted to enter a comment for this push.

You can either

  • "Save" - to be used when you want to build a policy but want to push it later.
  • "Save & Apply" - to be used when you want to build a policy, save it and push it immediately

If everything is ok, your device is connected, the policy looked ok and was pushed successfully, you will see the following message:

portal

note

If your license does not permit FQDN Filtering, you will see the message saying "FQDN Filtering disabled"

Any other errors will show here if the policy could not be pushed.

🎉 Success!

You’ve successfully created and pushed your first policy! 🚀

Next Steps

  • View the logs and telemetry (license type permitting)