Group policy and Firewall inbound and outbound rules

Solved
ShlomiTufin
Just browsing

Group policy and Firewall inbound and outbound rules

Hi,

 

Can someone tell what is the exact packet inspection flow in Meraki Mx appliance?


What comes first “Firewall L3 Inbound/outbound rules” or “Group policy L3 rules”? 
And what about VPN L3 outbound rules?


can someone just add the group policy l3 rules inspection to the below diagram and for any other inspection fix it if needed?

 

packet ->

firewall L3 inbound ->

routing -> 

is going to vpn?

   vpn L3 outbound ->

Else

   firewall L3 outbound 

 

 

1 Accepted Solution
ww
Kind of a big deal
Kind of a big deal

There is always a hit when using gp with custom fw rules, because the last rule is allow any any.

 

The gp has 3 options

  • Use the global fw rules
  • Ignore the global fw rules
  • Use custom fw rules

View solution in original post

4 Replies 4
ww
Kind of a big deal
Kind of a big deal

All Packets uses the group policy (if configured). Note: this are stateless rules.

 

if the packets have destination in vpn it (also) uses the vpn firewall rules

 

All other packets (non vpn, non gp) will use the L3 fw rules.

ShlomiTufin
Just browsing

What if there is no matching rule in the gp rules? Will the firewall rules be inspected as well ?  Or packet can be inspected by gp or firewall rules only ?

alemabrahao
Kind of a big deal
Kind of a big deal

Anything not in a group policy will match the default firewall rules.

I am not a Cisco Meraki employee. My suggestions are based on documentation of Meraki best practices and day-to-day experience.

Please, if this post was useful, leave your kudos and mark it as solved.
ww
Kind of a big deal
Kind of a big deal

There is always a hit when using gp with custom fw rules, because the last rule is allow any any.

 

The gp has 3 options

  • Use the global fw rules
  • Ignore the global fw rules
  • Use custom fw rules
Get notified when there are additional replies to this discussion.
Welcome to the Meraki Community!
To start contributing, simply sign in with your Cisco account. If you don't yet have a Cisco account, you can sign up.
Labels