Hello, everyone.
I would like to tell you about a very odd situation that happened to me with a client, and I would like to discuss it with you to see if you have any idea what might have happened. I have been reading the following documents, but I am still not clear on what might have happened:
R82 Quantum Security Management Administration Guide
R82 Best Practices for Access Control Rules
ATRG: Unified Policy
My client wanted to test how application control policies work and generated some rules, but here's something important: they did NOT enable the ApplicationControl Blade within the firewall, they only created the policy layer within the policy package as follows:
1. Network Layer: Firewall Blade
2. AppControl: Firewall and Application Control blades.
Reference: see image Policypakage.png
They left the rules on a Friday as follows (reference Appctrl1_policy.png) and nothing happened; only the Network layer flow was respected, and according to the logs, the flow did not reach the AppControl layer. Then on Monday, they wanted to install policies, but an error message appeared saying, “The app control policy will not work until you enable app control blade on the firewall.” So, to avoid seeing those messages, they disabled all the rules in the AppControl layer, including the cleanup rule, and that's where the tragedy happened.
The implicit cleanup rule of the app control layer acted in drop mode because it was left at drop by default, causing everything to be blocked. That's when they call us, and we acted first by setting the implicit rule to accept, and it started accepting everything.
Now, this part of the context is important. One of the clients, for reasons unknown to us, enabled the explicit cleanup rule in the app control layer, changing it from accept to drop. For some reason, this policy began to be enforced and blocked all connections again. The logs now read “dropped by cleanup rule” instead of “dropped by implicit cleanup rule” or “accepted by implicit cleanup rule.”
What confuses me is why these rules weren't applied before, and after those strange movements, it began to be considered and filtered with that cleanup rule.
In the end, what I did was remove the firewall blade from the application control layer and set both the explicit and implicit cleanup rules to accept. This is how the rules ended up (see Appctrl2_policy.png). The first two rules remained disabled from the incident until now, but that policy layer is no longer taken into account.
My question is why this happened. I read the admin guide I mentioned at the beginning of the post, but I don't know if I need to understand them better or if they don't say anything about this:
Has anyone else experienced something similar or know why this happened?