firewall rules
4 TopicsFirewall rule re-order behaviour when using "Filter Active Rules List" to edit rules.
Hello This is my 1st post on the forum and I'm am a relative newbie to the F5 BIG-IP platform so I apologise upfront if the following question is a bit basic and has been covered somewhere else in the forum. I currently have a BIG-IP running 17.1 with a number of partitions configured on it. Each partition has it's own Network Firewall policies applied to it. I usually edit the network firewall rules by going into the policy, scrolling down the rule base, finding the rule of interest and then clicking on it's name to edit it and then applying the change. I've also noticed that I can use the "Filter Active Rules List" section, find the rule and then edit it there but when I go to apply the updated rule, the system appears to then re-order the rule base and put those edited rules at the top of the policy. I'm assuming this is expected behaviour but I'm trying to find out why the platform does this and if there is anyway of disabling this behaviour. As mentioned above I'm guessing this question has been answered somewhere else on this forum but any help on this behaviour is most appreciated. Thank you and hope you all have a great day.65Views0likes0CommentsAFM / Configuring rules within a rule list through REST
Hey guys, Unfortunately I have to configure some AFM rule lists and rules, respectively. My first attempt was to add a new rule list with the whole rule set in one piece with a single POST request. I got this error message { "code": 400, "message": "Rule entries that are being added with the \"add\" option must specify either \"place-before\" or \"place-after\"", "errorStack": [], "apiError": 26214401 } I then tried to add new empty rule lists through REST which worked. After that I wanted to add several rules within that new rule list. That failed again with the error message mentioned above. Even POSTing a single rule in the this rule list fails with the same error message. It seems that the this message has been copied from the tmsh refrence documentation (see here: https://clouddocs.f5.com/cli/tmsh-reference/v15/modules/security/security_firewall_rule-list.html) . I am a bit confused now how to add rules to a list. However, I added "ruleNumber" in the JSON body and experimented with different numbers (i.e. 0) but it did not work. Configuring rules within rule lists and refrencing the list within a policy is the way to go here at my company. While writing this post I found out that it is possible to just configure rules within a policy (we rarely use the AFM module). So here are my questions: Do you have any ideas what I am doing wrong when using REST configuring rules within a rule list? The mentioned way to go seems odd to me. Is it enough for simple packet filtering ("look at the source and allow only port 443" for example) to configure rules within a policy? What is your good practice?Solved144Views0likes1CommentVPN BIG-IP Edge client : firewall rules applied by BIG-IP Edge Client
We have established a VPN connection between a Windows client and a BIG-IP v15. We are using BIG_IP Edge client, with network access. According to table 3.5 in this document : https://support.f5.com/csp/article/K49720803#link_05_04 when "always connected" mode is enabled, BIG-IP edge client applies firewall rules. Is there any other feature that allow BIG-IP edge client to apply firewall rules ? What kind of rules are applied ?1.6KViews0likes4Comments