Known Issues for Network Firewall

Known issues have been identified for the Network Firewall service.

See also Troubleshooting Network Firewall.

Editing a firewall policy can cause a connection reset in certain circumstances

Details
When you make the following changes to a firewall, the update causes a connection reset in the firewall:
  • Updating mapped secret information in a policy attached to a firewall.
  • Changing the firewall policy to one that uses different mapped secret information than the old policy.

Editing other types of information in the attached policy besides mapped secrets will not result in a connection reset.

Security rule creation fails for ICMP with port-based services

Details

When you create or change a security rule, the operation fails if the rule matches a port-agnostic application such as ICMP or ICMPv6 together with a port-specific service in the same match criteria. To allow ICMP or ICMPv6 traffic to match the rule, set Services to Any, meaning no services are specified

Use separate rules for services and applications, as shown in the following examples.

Example: Rule with service only
resource "oci_network_firewall_network_firewall_policy_security_rule" "SECURITY-RULE" {
  action = "INSPECT"
  name   = "SECURITY-RULE"

  condition {
    application         = []
    destination_address = ["APP-IP-ADDRESS-LIST"]
    service             = ["SSH"]
    source_address      = ["CLIENT-IP-ADDRESS-LIST"]
    url                 = ["URL-LIST"]
  }

  network_firewall_policy_id = oci_network_firewall_network_firewall_policy.EXAMPLE-POLICY.id

  inspection = "INTRUSION_PREVENTION"
  position {
    after_rule  = var.network_firewall_policy_security_rule_position_after_rule
    before_rule = var.network_firewall_policy_security_rule_position_before_rule
  }
}
Example: Rule with application only
resource "oci_network_firewall_network_firewall_policy_security_rule" "SECURITY-RULE" {
  action = "INSPECT"
  name   = "SECURITY-RULE"

  condition {
    application         = ["ICMP"]
    destination_address = ["APP-IP-ADDRESS-LIST"]
    service             = []
    source_address      = ["CLIENT-IP-ADDRESS-LIST"]
    url                 = []
  }

  network_firewall_policy_id = oci_network_firewall_network_firewall_policy.EXAMPLE-POLICY.id

  inspection = "INTRUSION_PREVENTION"
  position {
    after_rule  = var.network_firewall_policy_security_rule_position_after_rule
    before_rule = var.network_firewall_policy_security_rule_position_before_rule
  }
}

Terraform times out firewall creation

Details

When the firewall creation task exceeds 30 to 35 minutes, Terraform times out before it completes because of the Terraform refreshing state.

Workaround
To avoid the timeout, set the timeout to 35 minutes plus buffer time for the Terraform state refresh at the oci_network_firewall_network_firewall resource level.

Policy upgrade failure

Details
To prevent failures during network firewall policy upgrades, ensure your policy meets the following criteria:
  • Application List: If a policy includes an application list with a name longer than 24 characters, it might cause an upgrade failure. We recommend shortening these application list names to 24 characters or less.

  • Security Rules: On the Security Rules tab, if any of the lists (Applications, URLs, Sources, or Destinations) contain more than 25 elements, split the rule into several rules.

  • Decryption Rules: Similarly on the Decryption Rules tab, if any of the Sources or Destinations lists for a rule exceeds 25 elements, divide the rules into several rules.