Hello Jim,

I spoke with Andrae and during the call we discussed the allow rule needed to be created. He mentioned it would be a penetration test-like event from the internet needing inbound access, but despite there being no inbound access rules existing for CISA he mentioned there was never any reports of the tests not working in the past.

We created address objects for the CISA IPs listed and then added them to a group. We then created an inbound access rule to allow those IPs in the group access any zone with any port/service. There was no NAT policy created since it doesn’t seem like they need access to a specific device at a specific private IP.

To create these address objects, in the top menu select Object

      On the left menu select Addresses

      Click Add towards the right side of the Addresses menu

      Put a unique name, because the IPs are on the internet select WAN zone, for the first IP select Host because it’s a /32 (255.255.255.255)

            For the other IPs, since they are a /29 and /28 network we chose Network and put the corresponding subnet masks under the network IP.

      Click Save

To create an address group, or add new objects to an existing group, click Address Groups at the top left of the Adress Object menu

      To create a group Click Add, to edit an existing group search for the group name, hover over it and click the Pencil icon to edit

      Search for the address objects you want to add on the left side by the unique name

      Select each address object by clicking on each or holding down left click while dragging the cursor over the group of Address objects you wish to select

      Click the right facing arrow in the middle to move the selected objects into the group

      Click Save

To create access rules, on the top menu navigate to Policy and on the left side menu select Access Rules

      Click the +Add option on the bottom left to bring up the screen below.

      Since we created an inbound access rule from the internet, we selected WAN for the Source Zone

      For the Source Address we selected the group we created which contains the address objects we created.

            This locks the rule down to only allow traffic with a source IP from the IP pool in the “G – CISA IPs” group

      We left the Destination as Any to allow them open access to the network.

As discussed, I’ll close this ticket for you now but if you have any questions in the future feel free to reach out anytime.

Thank you and have a great rest of your day!

Kind Regards,

Josh Littaua    
Western NRG, Inc.  Total Internet Security
(805) 658-0800 |  Fax: (805) 465-8480
j.littaua@westernnrg.com www.WesternNRG.com