Recommended Windows OS-Based Policy Configuration
Always specify ports and protocols in policies when possible; we recommend not to allow ANY port, ANY protocol.
For example, a generated policy with port and protocol restrictions might look like this:
dst_ports {
start_port: 22
end_port: 22
consumer_filters {
application_name: "c:\\test\\putty.exe"
}
}}
ip_protocol: TCP
In contrast, if you allow network connections that are initiated by iperf.exe with ANY protocol and ANY port, the generated policy looks like this:
match_set {
dst_ports {
end_port: 65535
consumer_filters {
application_name: "c:\\test\\iperf.exe"
}
}
address_family: IPv4
inspection_point: EGRESS
match_comment: "PolicyId=61008290755f027a92291b9d:61005f90497d4f47cedacb86:"
}
For the above filter, Secure Workload creates a policy rule to allow the network traffic on the provider as follows:
match_set {
dst_ports {
end_port: 65535
}
address_family: IPv4
inspection_point: INGRESS
match_comment: "PolicyId=61008290755f027a92291b9d:61005f90497d4f47cedacb86:"
}
This network rule opens all the ports on the Provider. We strongly recommend not to create OS-based filters with Any protocol.