- Newest
- Most votes
- Most comments
Hi Paul, your understanding of the strict rule order is correct. " With strict ordering, the rule groups are evaluated by order of priority, starting from the lowest number, and the rules in each rule group are processed in the order in which they're defined."
You might want to check other rule variable such as IP sets (HOME_NET) and make sure the rule is applied to the correct flow.
Thanks for your answer. The problem was actually coming from my testing tool that was generating traffic not recognized as HTTP. Paul
Hi I know its to late but let me post the following link for others that's face such problems
https://docs.aws.amazon.com/en_en/network-firewall/latest/developerguide/troubleshooting-rules.html#troubleshoot-rules-strict-ordering-rule-order You need to add "flow:to_server" to make it running as you expect.
Each TCP application communication starts with some standard TCP communications to establish the connection. This initial communication is needed to establish the application level and you should not block this. In your case the firewall detect the TCP initiation traffic and allow the whole firewall connection (no future checks on application level) flow:to_server fix this and additionally roles on application level will work.
Relevant content
- asked 2 years ago