How block and allow Overlay policies interact

Understand how overlay policies behave when you combine block and allow policies.

Default deny
Trust policy follows a strict secure-by-default approach. For two devices to be allowed to communicate across the overlay, there must be at least one overlay network that has trust policy between the two devices. This policy can be either between the individual device IPs or policy between network objects that include the device IPs.
Overlay policies are additive among all overlay networks
The complete set of overlay policies for a Conductor deployment is the union of all policies from each overlay network ignoring disabled overlay networks as well as disabled Airwall Edge Services or Airwall groups and devices/device groups.
Bypass device policies work the same as policies for normal devices
The main difference between normal and bypass devices is that bypass devices have no fixed Airwall ownership. Any Airwall with a bypass port can become the egress point of a bypass device depending on the peer device that sends packets to it. For policy enforcement, it makes no difference.
Block policies override normal policies
Block policies take system-wide precedence over allow policies. If two devices have block policies in any overlay, the block policy overrides all allow policies that might exist for the same two devices. Note that this is true even if the block policy is using less-specific network objects.

Example:

  • Overlay 1 has allow policy between two network objects 10.0.3.0/24 and 192.168.10.100/30
  • Overlay 2 has a block policy between 10.0.0.0/16 and 192.168.10.0/24
  • This configuration results in traffic being blocked between all IPs from the block policy – including those from the more specific allow rule.
Policies are tied to the Airwall Gateways that own the respective network objects
This rule is intuitive if there are only allow policies, but it can lead to surprising results when allow- and block policies are present. As an example, consider the following scenario:
  • Airwall 1 has a device 192.168.1.100
  • Airwall 2 has a network object 10.0.3.0/24
  • Airwall 3 has a network object 10.0.0.0/16
  • Allow policy between 192.168.1.100 and 10.0.3.0/24
  • Block policy between 192.168.1.100 and 10.0.0.0/16

Result: Any traffic from 192.168.1.100 to any IP included in 10.0.3.0/24 will be allowed, because the Airwall that owns the 10.0.0.0/16 network object (Airwall 3) associated with the block policy is different from the Airwall that has the allow policy (Airwall 2). If both network objects were owned by Airwall 2, the block policy would apply and prevent network communications.