Hello Jim,
I spoke with Andrae and during the call we discussed the allow rule needed to be created. He mentioned it would be a penetration test-like event from the internet needing inbound access, but despite there being no inbound access rules existing for CISA he mentioned there was never any reports of the tests not working in the past.
We created address objects for the CISA IPs listed and then added them to a group. We then created an inbound access rule to allow those IPs in the group access any zone with any port/service. There was no NAT policy created since it doesn’t seem like they need access to a specific device at a specific private IP.
To create these address objects, in the top menu select Object
On the left menu select Addresses
Click Add towards the right side of the Addresses menu
Put a unique name, because the IPs are on the internet select WAN zone, for the first IP select Host because it’s a /32 (255.255.255.255)
For the other IPs, since they are a /29 and /28 network we chose Network and put the corresponding subnet masks under the network IP.
Click Save

To create an address group, or add new objects to an existing group, click Address Groups at the top left of the Adress Object menu
To create a group Click Add, to edit an existing group search for the group name, hover over it and click the Pencil icon to edit
Search for the address objects you want to add on the left side by the unique name
Select each address object by clicking on each or holding down left click while dragging the cursor over the group of Address objects you wish to select
Click the right facing arrow in the middle to move the selected objects into the group
Click Save

To create access rules, on the top menu navigate to Policy and on the left side menu select Access Rules
Click the +Add option on the bottom left to bring up the screen below.
Since we created an inbound access rule from the internet, we selected WAN for the Source Zone
For the Source Address we selected the group we created which contains the address objects we created.
This locks the rule down to only allow traffic with a source IP from the IP pool in the “G – CISA IPs” group
We left the Destination as Any to allow them open access to the network.


As discussed, I’ll close this ticket for you now but if you have any questions in the future feel free to reach out anytime.
Thank you and have a great rest of your day!
Kind Regards,
| Josh Littaua | |
| Western NRG, Inc. | Total Internet Security | |
| (805) 658-0800 | Fax: (805) 465-8480 | |
| j.littaua@westernnrg.com | www.WesternNRG.com |