What is the Cato WAN Firewall?

This article provides background information about the WAN firewall for your account.

For more information about working with the WAN firewall, see Managing the WAN Firewall Policy.

Overview of the Cato WAN Firewall

The WAN firewall in the Cato Cloud controls access to objects and entities in your Wide Area Network (WAN). Configure the WAN firewall rulebase to create a secure access control policy and protect the network.

The WAN firewall is part of the Next Gen Firewall (NGFW) that is integrated in the Cato Cloud and lets you create rules to prevent unauthorized access to the network. The WAN firewall uses a whitelist approach, and there is a default ANY-ANY block rule to drop all connections that are not explicitly allowed in the rulebase.

Use the rules to configure the firewall to inspect all connections and only allow the ones that match its configured settings. The firewall uses an ordered rulebase. This means that it starts inspecting the connection and checks to see if it matches the first rule. If not, then it continues to sequentially apply each rule to the connection until a rule matches the connection.

The WAN firewall also includes full layer 7 functionality with User Awareness, and you can create rules for specific applications.

Anti-Spoofing Protections in the Cato Firewall

One of the basic functionalities of an NGFW is to protect against anti-spoofing attacks. The security engines in the Cato Cloud implicitly drop any connection where the source IP is outside the scope of the configured entity (such as site, network range, device, or user). This blocks anti-spoofing attacks and prevents violations of the configured logical topology.

Understanding Autonomous Firewall Insights

WAN_firewall.png

The Autonomous WAN Firewall Insights are a list of best practices that evaluate your WAN Firewall policy and show how they comply with Cato’s recommendations. Following these recommendations optimizes your firewall configurations and improves security posture.

There are two types of insights:

  • Star icon (powered by AI): Enabled rules in your WAN Firewall policy are automatically analyzed by Artificial Intelligence (AI) to detect issues, for example, rules that can be discarded or modified such as:

    • Temporary Rule: Introduced as a short-term solution to address an immediate need. These rules are mostly created to function temporarily while a proper or permanent solution is being deployed or developed.

    • Testing Rule: Rules explicitly created for validating, debugging, or experimenting with a specific feature or scenario.

    • Expired Rule or Rule with Future Expiration Date: Rules created to address a specific need and have a desirable cutoff date that has already passed or that has not yet been reached or cannot be proven/evaluated.

    • Over Permissive Rules: Rules that may be overly permissive based on users, hosts, apps, or protocols defined for the rule. This insight indicates that we recommend that you remove the extra items from the rule.

      For example: restrict user access only to sampleAdmin, limit application to only RDP, and restrict protocol to only TCP.

  • Configuration-based: The configurations and settings in your Internet Firewall policy are to ensure they follow best practices.

Working with Ordered Rules

The WAN firewall inspects connections sequentially and checks to see if the connection matches a rule. The final rule in the rulebase is a default ANY-ANY block rule - so if a connection does not match a rule, then it is blocked by the final default rule. A strong access control policy contains firewall rules that allow specific connections and traffic in the WAN.

You can review the default rule settings in the Default Rules section at the end of the rulebase. These rule settings can't be edited.

Rules that are at the top of the rulebase have a higher priority because they are applied to connections before the rules lower down in the rulebase. For example, if a connection matches rule #3, the action is applied to the connection, and the firewall stops inspecting it. The firewall does not continue to apply rules #4 and below to the connection. You can increase the efficiency of the WAN firewall and give a high priority to rules that match the largest number of connections.

Working with Multiple Objects in a Single Rule

When there is a rule with objects in multiple columns, such as an application and a service, then there is an AND relationship between them. For example, if there is a rule that allows the Backup Services application for port 443, then the traffic is allowed when it matches both the application and the port.

For rules that use multiple objects in a single column, such as more than one port, then there is an OR relationship between them. For example, if there is a rule that allows access to the mail server for service SMTP and ports 25, 265, 587, and 2525, then the traffic is allowed when it matches the SMTP service, or any one of the ports.

  • Note: Each rule can have a maximum of 64 conditions with an AND relationship between them, and a rule's exceptions are included in the rule limit. For example, if there is a rule with two AND conditions (such as a source and a service), and the rule has 25 exceptions with 3 AND conditions each (such as a source, an app, and a service), then the rule has 77 conditions. This exceeds the supported limit of 64 conditions and the rule might not function properly. However, you can assign more than 64 objects within the same column of a rule, since there is an OR relationship between them. For example, you can assign more than 64 apps in one rule.

Understanding the Hit Count

The hit count helps you identify unused rules that can be removed from a policy, and optimize rule configuration to better match the required traffic scope. The hit count for a rule is based on the number of events generated by the rule. If a rule does not generate events, the hit count is zero.

The hit count contains two numbers:

  • The approximate number of events generated by each rule in the policy

  • How often the rule is hit relative to other rules (ranked by percentile)

These values are updated once every 24 hours and are based on the past 14 days of traffic.

You can quickly identify the rules with the highest and lowest hit count, based on the color of the status bar. This color reflects how often the rule is hit relative to other rules:

  • Blue: 0 - 24th percentile

  • Green: 25th - 49th percentile

  • Orange: 50th - 74th percentile

  • Red: 75th -100th percentile

Policy Revisions and Concurrent Editing by Multiple Admins

The WAN Firewall lets different admins edit the policy in parallel. Each admin can edit rules and save the changes to the rulebase in their own private revision, and then publish them to the account policy (the published revision). For more information on how to manage policy revisions, see Working with Policy Revisions.

Configuring the Time Settings for a Rule

Configure the Time settings for a WAN Firewall rule to define when the rule is active. For example, you can choose to apply a rule during weekdays only. This means that rules with configured time settings are not active outside of the defined hours.

The options for Time settings are:

  • No time constraint: The rule is always active. This is the default behavior of the WAN Firewall rules.

  • Limit to working hours: The rule is active only during the working hours configured in the Cato Management Application. For more about working hours, see Defining Default Working Hours for the Account.

  • Custom: Select the time of the day and the days of the week when the rule is active. Uncheck the Recurring option, and select the Date the time setting for the rule.

    • Recurring: The time setting will be applied more than once, for example, every Tuesday from 9:00am to 5:00pm.

To configure the Time settings for an existing rule:

  1. From the navigation menu, select Security and then select Internet Firewall or WAN Firewall.

  2. Click New > New Rule.

    The New Rule panel opens.

  3. Expand the Actions section.

  4. In Time, select the desired time settings for that rule.

  5. Click Apply.

To configure the Time settings for a new rule:

  1. From the navigation menu, select Security and then select Internet Firewall or WAN Firewall.

  2. Use the mouse to hover over the rule.

  3. In either the Source, App/Category, or Service/Port column, clickedit_rule.png.

    The Edit panel opens.

  4. Expand the Actions section.

  5. In Time, select the desired time settings for that rule.

  6. Click Apply and then click Save.

Understanding the Settings for WAN Firewall Rules

This section explains the fields and settings for the rules in the WAN firewall rule base. A thorough understanding of the WAN firewall helps to successfully manage access control for the corporate network.

Rulebase Columns

The following table describes each column in the WAN firewall rulebase. When there are multiple columns configured for a rule, then there is an AND relationship between them.

For more about Source, Destination, App, and Category items for a rule, see Reference for Rule Objects.

Item

Description

#

Shows the priority of the rule in the WAN firewall rule base.

  • Use the Rule Order field to change the priority of the rule.

  • Use the Enabled toggle to enable or disable the rule. The toggle is green toggle.png when enabled.

Name

Enter a Name for the rule

Source

Source of the traffic for this rule

Direction

Indicates the direction of the rule. Options include:

  • To - This rule allows the traffic in only one direction, Source to the Destination. For example, site Alpha is allowed to connect to site Bravo, but site Bravo cannot connect with site Alpha.

  • Both - This rule manages traffic in both directions, to and from the Source and Destination.

Destination

Destination of the traffic for this rule

App/Category

Only applies to matching objects for the specific applications, categories, and other objects

Service/Port

Only applies to traffic that matches the specified services and ports

Action

Apply the specified action to traffic that matches the rule

For example, when the traffic is blocked, the connection is dropped and the lower priority rules are not applied to this connection

Track

When the rule is matched, an event is generated or an email notification alert is sent to the specified list

Hit Count

The hit count for this rule

More_icon.png

Opens a drop-down menu with these options:

  • Add Rule Above - Add a new rule above the selected rule

  • Add Rule Below - Add a new rule below the selected rule

  • Duplicate Rule: Create a new identical rule directly below the original selected rule in the same section

  • Move Rule - Change the priority of the rule by defining a different position for it in the rule order

  • Add Exception - Create a new exception to the selected rule

  • Enable/Disable - When a rule is disabled, the firewall doesn't inspect connections for the settings in the rule

  • View Rule Events - Show the Events page prefiltered for events related to the rule

  • Delete Rule - Delete the selected rule

Setting the Rule Order

Rule order is defined by setting a rule’s position relative to other rules. For example, set a rule to follow a specific rule, or to be first in a section.

These are the options for defining the rule order:

  • Before Rule - The rule is positioned immediately before the selected rule

  • After Rule - The rule positioned immediately after the selected rule

  • First in Section - The rule is positioned first in the selected section

  • Last in Section - The rule is positioned last in the selected section

  • First - The rule is positioned at the top of the rulebase

  • Last - The rule is positioned at the bottom of the rulebase

Enabling and Disabling the WAN Firewall

When the WAN firewall is disabled, there is no access control and all WAN resources are accessible to anyone.

WAN-FW-enabled.png

To enable or disable the WAN firewall:

  1. From the navigation menu, click Security > WAN Firewall.

  2. At Firewall Enabled above the rulebase, click the slider toggle.png to enable (green) or disable (gray) the WAN firewall for the account.

  3. Click Save.

Related Resources for the WAN Firewall

Was this article helpful?

0 out of 0 found this helpful

4 comments

  • Comment author
    Yaakov Simon

    Added IP Range to the Source and Destination Objects section.

  • Comment author
    Ronny Chan

    Are hosts on the same network subject to WAN firewall rules, or does traffic between the two hosts bypass the WAN FW because they are on the same network?

  • Comment author
    Yaakov Simon

    Ronny Chan Great question! The engine for the WAN firewall is in a PoP in the Cato Cloud, and WAN firewall rules apply to WAN traffic over the Cato Cloud. The WAN firewall rules do not apply to two hosts behind a site in the same network range.

    You can use the LAN Firewall to create rules for two hosts are on the same network and bypass the WAN firewall.

    Thanks,

    Yaakov

  • Comment author
    JM

    Isn't a TLD just the rightmost segment of the domain name (e.g., .com and .net)? Cato documentation refers to “the TLD sample.com” all over the place, and even in CMA I see this: