What is the Cato Internet Firewall?

This article provides background information about the Internet firewall for your account.

For more information about configuring the Internet firewall, see Managing the Internet Firewall Policy.

Note

Note: Cato is gradually enabling the Policy Revisions and Concurrent Editing by Multiple Admins feature on accounts over a period of several weeks. It is possible that it may not be available in the Cato Management Application for your account.

Overview of the Ordered Internet Firewall

The Internet firewall inspects traffic between the WAN and the Internet and lets you create rules to control this traffic. Similar to the WAN firewall, the Internet firewall uses an ordered rulebase, starting from the first rule, connections are inspected according to each rule. The Internet firewall uses a blacklist approach. This means that there is an implicit ANY - ANY rule to allow any traffic and connections that are not explicitly blocked in the rulebase. The Internet firewall also includes full layer 7 functionality with User Awareness, and you can create rules for specific applications. For example, you can use the Internet firewall to:

  • Block specific website such as Facebook or LinkedIn

  • Block categories of inappropriate websites, such as Guns, Alcohol, and Gambling

  • Allow only the IT department to use remote administration applications (SaaS and IaaS)

Anti-Spoofing Protections in the Cato Firewall

One of the basic functionalities of an NGFW is to protect against anti-spoofing attacks. The security engines in the Cato Cloud implicitly drop any connection where the source IP is outside the scope of the configured entity (such as site, network range, device, or user). This blocks anti-spoofing attacks and prevents violations of the configured logical topology.

Working with Ordered Rules

The Internet firewall inspects connections sequentially, and checks to see if the connection matches a rule. The final rule in the rulebase is an implicit ANY - ANY allow rule - so if a connection does not match a rule, then it is allowed by the final implicit rule.

Rules that are at the top of the rulebase have a higher priority because they are applied to connections before the rules lower down in the rulebase. If a connection matches on rule #3, the action is applied to the connection and the firewall stops inspecting it. The firewall does not continue to apply rules #4 and below to the connection.

Traffic Blocked Related to the MSA

The Cato Networks Master Service Agreement (MSA) defines traffic that is potentially illegal or malicious that is automatically blocked. There is a hidden implicit rule at the top of the Internet firewall rulebase that blocks these connections.

For more about the MSA, see Cato Networks MSA.

Working with Multiple Objects in a Single Rule

When there is a rule with objects in multiple columns, such as an application and a service, then there is an AND relationship between them. For example, if there is a rule that blocks the Netflix application for port 443, then the traffic is blocked when it matches both the application and the port.

For rules that use multiple objects in a single column, such as more than one application, then there is an OR relationship between them. For example, if there is a rule that blocks access to the Netflix, iTunes, and YouTube applications, then the traffic is blocked when it matches any of the applications.

Note

Note: Each rule can have a maximum of 64 conditions with an AND relationship between them, and a rule's exceptions are included in the rule limit. For example, if there is a rule with two AND conditions (such as a source and a service), and the rule has 25 exceptions with 3 AND conditions each (such as a source, an app, and a service), then the rule has 77 conditions. This exceeds the supported limit of 64 conditions and the rule might not function properly. However, you can assign more than 64 objects within the same column of a rule, since there is an OR relationship between them. For example, you can assign more than 64 apps in one rule.

Policy Revisions and Concurrent Editing by Multiple Admins

The Internet Firewall contains features to help multiple admins work on editing the policy at the same time. This section describes these features.

Policy Revisions

Each admin can edit rules and save the changes to the rulebase in their own draft policy revision, and then publish them to the account policy. The unpublished revision is saved for the admin even if they log out of the Cato Management Application, and they can continue editing the policy in their next session. Until the changes are published, they have no impact on the account policy and remain available to the admin for editing. For more about policy revisions, see Managing the Internet Firewall Policy.

Locked Rules

To prevent admins from interfering with each other’s work, when an admin has unpublished changes to a rule, the rule is locked to restrict other admins from editing it. However, if there is an urgent need, an admin can override the lock and edit the rule anyway. This is useful, for example, if an admin forgets to publish changes before going on vacation. For more about locked rules, see Managing the Internet Firewall Policy.

Understanding the Settings for Internet Firewall Rules

This section explains the fields and settings for the rules in the Internet firewall rule base. A thorough understanding of the Internet firewall helps to successfully manage access control for the corporate network.

Internet Firewall Rulebase Columns

For a description of the different rulebase columns and Source, App, and Category items for rules, see What is the Cato WAN Firewall? and Reference for Rule Objects. Unlike the WAN firewall, the Destination for the Internet firewall is always the Internet. When there are multiple columns configured for a rule, then there is an AND relationship between them.

Setting the Rule Order

Rule order is defined by setting a rule’s position relative to other rules. For example, set a rule to follow a specific rule, or to be first in a section.

These are the options for defining the rule order:

  • Before Rule - The rule is positioned immediately before the selected rule

  • After Rule - The rule positioned immediately after the selected rule

  • First in Section - The rule is positioned first in the selected section

  • Last in Section - The rule is positioned last in the selected section

  • First - The rule is positioned at the top of the rulebase

  • Last - The rule is positioned at the bottom of the rulebase

Enabling the Ordered Internet Firewall

The Internet firewall in the Cato Cloud lets you control Internet access for your corporate network. Easily create an Internet security policy that allows users to access business related web content and blocks inappropriate websites, applications, and so on.

InternetFW.png

To enable or disable the Internet firewall:

  1. From the navigation menu, click Security > Internet Firewall.

  2. At Firewall Enabled above the rulebase, click the slider toggle.png to enable (green) or disable (gray) the Internet firewall for the account.

  3. Click Save.

Was this article helpful?

3 out of 3 found this helpful

1 comment

  • Comment author
    Jonathan Rabinowitz

    From June 16, 2024, these features will be gradually enabled on accounts:

    • Unpublished draft revisions for each admin
    • Locked rules to prevent editing by other admins
    • Defining rule order based on position relative to other rules
Add your comment