Using Layer 3 Firewall Rules (2024)

  1. Last updated
  2. Save as PDF

Layer3 Firewall rules provide an administrator granular access control of outbound client traffic. With the MR series, outbound traffic refers to client traffic originating from the wireless network that is destined for the wired LAN or Internet. On the MX, outbound traffic refers to traffic originating from one VLAN that is destined for another VLAN or traffic originating from the LAN that is destined for the Internet or a remote network that is located over a static LAN route.This article discusses how to use Layer 3 Firewall rules on MR series access points, MX Security Appliance or Z-seriesTeleworker gateways.

A layer3 firewall rule on the MX or Z-series appliance is stateful and can be based on protocol, source IP address and port, and destination IP address (or FQDN) and port.Layer 3 firewall rules on the MR are statelessand can be based on destination IP address and port.Dashboard presents the rules in numeric order, they are evaluated from top to bottom beginning with rule number 1. The first rule that matches is applied, and subsequent rules are not evaluated. If no rules match, the default rule (allow all traffic) is applied.

Note: Layer 3 firewall rules are stateless when configured within Meraki Dashboard group policies. Group policy layer 3 firewall rules can be based on protocol, destination IP (or FQDN for MX and Z-series appliances), and port.

An explanation of the fields in a Layer-3 firewall rule is shown below.

  • #: The sequence number of a particular firewall rule.
  • Policy: Specifies the action the firewall should take when traffic matches the rule. Matching traffic can be allowed or denied.
  • Protocol:Specifies the protocol to match in outbound traffic i.e. TCP, UDP, ICMP, ANY.
  • Source (MX/Z-seriesonly): Specifies the source IP address or network address using CIDR notation to match in outbound traffic. "Any" can also be used to specify all networks.
  • Src port (MX/Z-seriesonly): Specifies the source port number to match in outbound traffic. This can be a single port, port range, multiple comma-separated ports,or "any".
  • Destination: Specifies the destination IP address, FQDN (for MX and Z-series appliances), or network address using CIDR notation to match outbound traffic. "Any" can also be used to specify all networks. Note that, on a network with an MX handling inter-VLAN routing, the IP address of the MX on the destination subnet may still respond to any services (For example:ICMPpings, SNMP, and so forth) it's configured to listen for, evenif the rule is set to block traffic. This is due to the nature of software routing on the MX and does not pose a security risk; host devices on the destination subnet will still be blocked according to the rule.
  • Dst port: Specifies the remote port number to match in outbound traffic. On the MX, this can be a single port or multiple comma-separated ports. On the MR, this can be a single port or port range.
  • Comment: A description of the rule.
  • Hits (MX/Z-seriesonly): A counter reflecting the number of times the rule was applied. The counter starts each time the page is accessed.
  • Actions: Options to delete or change the order of a rule.
  • Logging:If syslogreporting is enabled, denotes whether or not to report on a given rule.

When specifying theSrc portand theDst portwith the use ofport ranges, theformatting should be considered.

For example: "1024-5000" or"1024, 5000" is valid, but "1024-5000, 5004" is not valid.

In MX 13.4 firmware and higher, fully qualified domain names (FQDNs) can be configured in the Destinationfield.For more details, please read the FQDN Support section of Firewall Settings.FQDNs cannot be configured for MR network firewall rules and will not apply to MR clients if configured in a group policy.

Example Configurations

Use Case 1: In the example below we want to block all IP traffic originating from network 10.0.0.0/8 that is destined for network 192.168.1.0/24. However, we do not want to block traffic originating from network 192.168.1.0/24 that is destined for 10.0.0.0/8 or block either network from accessing other remote networks such as the Internet.

Using Layer 3 Firewall Rules (1)

Based on the rules shown below, any traffic originating from the 10.0.0.0/8 network destined for the 192.168.1.0/24 network matches rule 1 which is evaluated first. Because the "Policy" for this rule specifies a "Deny" action, the firewall will block all traffic when the rule is hit. The second rule evaluated which is the default rule, enforces an implicit allow all. All other traffic will match this rule. Hosts on either network can send data to any other remote network.

Note: When selecting “ANY” from the Protocol menu, the choice for Src port and Dst port become grayed out because this setting matches all IP traffic.

Using Layer 3 Firewall Rules (2)

Use Case 2: In the example below, we want to allow any host in the network 10.0.0.0/8 to access a web server 192.168.1.254 that is listening on TCP port 80. However, we want to block any other outbound traffic from hosts in 10.0.0.0/8 or host 192.168.1.254.

Using Layer 3 Firewall Rules (3)

Based on the rules shown below, traffic originating from any host on the 10.0.0.0/8 network that is destined for web server 192.168.1.254 on TCP port 80 is allowed. When the local host communicates with a service on a remote host, it normally picks an ephemeral source port and sends traffic to the port used by the service on the remote host. This is why the source port in this rule is set to "Any." Because there is an implicit allow rule processed last and we want to perform a "Deny" action on all other outbound traffic from hosts on the 10.0.0.0/8 network and the web server, a deny all rule is required. This rule needs to be evaluated right after rule 1. Because the firewall is stateful, replies from the web server to hosts on the 10.0.0.0/8 network are allowed the bypass the deny rule due to the connection is already being established. The deny will rule which is processed second will match all other traffic besides traffic to the web server.

Note: Cisco Meraki firewalls implement an inherent Allow All rule which can't be modified and is the last rule processed. Firewall rules are processed from the top down.
Using Layer 3 Firewall Rules (4)

AdditionalResources

MR Firewall Rules

MX Firewall Settings

Creating a Layer 7 Firewall Rule

Layer 3 and 7 Firewall Processing Order

Content Filtering Troubleshooting

Using Layer 3 Firewall Rules (2024)
Top Articles
How to Invest $1,000 per Month in a 5-Year SIP - Sarwa
How To Earn $4,000 a Month in Passive Income
What Is Single Sign-on (SSO)? Meaning and How It Works? | Fortinet
Where To Go After Howling Pit Code Vein
Radikale Landküche am Landgut Schönwalde
Davita Internet
Yogabella Babysitter
How To Be A Reseller: Heather Hooks Is Hooked On Pickin’ - Seeking Connection: Life Is Like A Crossword Puzzle
Overnight Cleaner Jobs
DENVER Überwachungskamera IOC-221, IP, WLAN, außen | 580950
Craigslist Cars And Trucks Buffalo Ny
Gw2 Legendary Amulet
Nwi Police Blotter
13 The Musical Common Sense Media
Zoebaby222
More Apt To Complain Crossword
Los Angeles Craigs List
Craigslist Mpls Cars And Trucks
Les Schwab Product Code Lookup
2016 Ford Fusion Belt Diagram
Wilmot Science Training Program for Deaf High School Students Expands Across the U.S.
SXSW Film & TV Alumni Releases – July & August 2024
Boscov's Bus Trips
Air Quality Index Endicott Ny
Craigslist Wilkes Barre Pa Pets
Parkeren Emmen | Reserveren vanaf €9,25 per dag | Q-Park
What Equals 16
Mjc Financial Aid Phone Number
Miller Plonka Obituaries
Halsted Bus Tracker
Fox And Friends Mega Morning Deals July 2022
Goodwill Houston Select Stores Photos
Shih Tzu dogs for sale in Ireland
Stafford Rotoworld
Craigslist Lakeside Az
Busted Newspaper Campbell County KY Arrests
Samantha Lyne Wikipedia
2007 Jaguar XK Low Miles for sale - Palm Desert, CA - craigslist
The Conners Season 5 Wiki
Achieving and Maintaining 10% Body Fat
Promo Code Blackout Bingo 2023
John M. Oakey & Son Funeral Home And Crematory Obituaries
Swoop Amazon S3
Frequently Asked Questions
Samsung 9C8
Cvs Minute Clinic Women's Services
Hampton Inn Corbin Ky Bed Bugs
What Is The Gcf Of 44J5K4 And 121J2K6
Turning Obsidian into My Perfect Writing App – The Sweet Setup
Southern Blotting: Principle, Steps, Applications | Microbe Online
Latest Posts
Article information

Author: Trent Wehner

Last Updated:

Views: 5772

Rating: 4.6 / 5 (76 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Trent Wehner

Birthday: 1993-03-14

Address: 872 Kevin Squares, New Codyville, AK 01785-0416

Phone: +18698800304764

Job: Senior Farming Developer

Hobby: Paintball, Calligraphy, Hunting, Flying disc, Lapidary, Rafting, Inline skating

Introduction: My name is Trent Wehner, I am a talented, brainy, zealous, light, funny, gleaming, attractive person who loves writing and wants to share my knowledge and understanding with you.