Skip to content
Shared VPC Firewall Example Policy

Shared VPC Firewall Example Policy

Andi Lamprecht Andi Lamprecht ·· 1 min read· Accepted
ADR-0003 · Author: GitHub Service Account (Deactivated) · Date: 2024-03-29 · Products: platform
Originally 0002-SHARED-VPC_firewall-example-policy (v5) · Source on Confluence ↗

Firewall Policy

Policy and rule evaluation order

image

Example Policy

Policy Typedirectionsourcedestinationactionprioritycomment
Org firewall policyingressKnown malicious IP addresses
TOR exit nodes
any

BLOCK

1000block known bad actors
egressanyKnown malicious IP addresses
TOR exit nodes

BLOCK

5000
egressanyany TCP:80/443

ALLOW

5500
implied goto\_next
VPC firewall rulesingress10.0.0.0/8172.16.0.0/12

ALLOW

10000controlled at Cato WAN firewall
egress172.16.0.0/1210.0.0.0/8

ALLOW

30000
implied goto\_next
Global network firewall policyingress

PROD:ITL

PROD:ITL

ALLOW

66000source and destination IAM-governed tags
egress

PROD:ITL

PROD:ITL

ALLOW

66500
ingress

PROD:AIRBOSS

PROD:AIRBOSS

ALLOW

67000
egress

PROD:AIRBOSS

PROD:AIRBOSS

ALLOW

67500
ingress

DEV:ITL

DEV:ITL

ALLOW

68000
egress

DEV:ITL

DEV:ITL

ALLOW

68500
ingress

DEV:AIRBOSS

DEV:AIRBOSS

ALLOW

69000
egress

DEV:AIRBOSS

DEV:AIRBOSS

ALLOW

69500
ingressanyany

BLOCK

2147483642NIST 800-53 SC-7(5) BOUNDARY PROTECTION | DENY BY DEFAULT — ALLOW BY EXCEPTION
egressanyany

BLOCK

2147483643
implied goto\_next
implicitingressanyany

BLOCK

egressanyany

ALLOW

implicit rule not used due to 2147483643
Last updated on