Overview of the Network Firewall Service

Use the Network Firewall service to create a firewall with intrusion detection and prevention for your virtual cloud networks (VCNs).

Powered by Palo Alto Networks®, the Network Firewall service gives you visibility into network traffic entering cloud environments (north-south) and between subnets (east-west). You can use the Network Firewall service with other security services to create a layered network security solution.

A firewall is a highly available and scalable instance that you create in a subnet. The firewall applies business logic defined in a policy to network traffic. Use routing in the VCN to direct traffic to and from the firewall.

The Network Firewall service provides a throughput rate of 4 Gbps.

Security Features

The Network Firewall service provides the following security features:
  • Stateful network filtering: Create stateful network filtering rules that allow or deny network traffic based on source IP (IPv4 and IPv6), destination IP (IPv4 and IPv6), port, and protocol.
  • Custom URL and FQDN filtering: Restrict ingress and egress traffic to a specified list of fully qualified domain names (FQDNs), including wild cards and custom URLs.
  • Intrusion Detection and Prevention (IDPS): Monitor networks for malicious activity. Log information, report, or block the activity.
  • SSL inspection: Decrypt and inspect TLS-encrypted traffic with ESNI support for security vulnerabilities. Encrypted Server Name Indication (ESNI) is a TLSv1.3 extension that encrypts the Server Name Indication (SNI) in the TLS handshake.
  • Intra VCN subnet traffic inspection: Route traffic between two VCN subnets through a firewall.
  • Inter VCN traffic inspection: Route traffic between two VCNs through a firewall.
  • VXLAN traffic inspection: Route traffic to a virtual test access point (VTAP) through a firewall. For more information on VTAPs, see Virtual Test Access Points.

Common use cases for Network Firewall

Each scenario uses intra VCN routing to route traffic to the firewall. See Intra VCN Routing for more information.

Securing traffic between an on-premises network and a VCN

In this example, routing is configured from an on-premises network through a dynamic routing gateway (DRG) to the firewall. Traffic is routed from the DRG, through the firewall, and then from the firewall subnet to a private subnet.
Diagram of routing from a DRG through a firewall, and then to a private subnet.
Callout 1: Dynamic routing gateway route table
Destination CIDR Route target
0.0.0.0/0 Network Firewall (10.0.2.2)
Callout 2: DMZ subnet route table
Destination CIDR Route target
0.0.0.0/0 DRG
Callout 3: DMZ subnet route table
Destination CIDR Route target
0.0.0.0/0 Network Firewall (10.0.2.2)

Securing traffic between the internet and a VCN

In this example, routing is configured from the internet to the firewall. Traffic is routed from the internet gateway (IGW), through the firewall, and then from the firewall subnet to a public subnet.

This diagram shows routing from the internet, through a firewall, and then to a public subnet.
Callout 1: Internet gateway route table
Destination CIDR Route target
VCN (10.0.0.0/16) Network Firewall (10.0.2.2)
Callout 2: Public DMZ subnet route table
Destination CIDR Route target
0.0.0.0/0 IGW
Callout 3: Public subnet route table
Destination CIDR Route target
0.0.0.0/0 Network Firewall (10.0.2.2)

Securing traffic between subnets in a VCN

In this example, routing is configured from a subnet to the firewall. Traffic is routed from Subnet A, through the firewall, and then from the firewall subnet to Subnet B.

This diagram shows routing from Subnet A, through a firewall, and then to Subnet B.
Callout 1: Regional private subnet A route table
Destination CIDR Route target
Subnet B (10.0.1.0/24) Network Firewall (10.0.2.2)
Callout 2: Regional private subnet B route table
Destination CIDR Route target
Subnet A (10.0.3.0/24) Network Firewall (10.0.2.2)

Regions and Availability Domains

You can use the Network Firewall service in all regions. For a list of supported regions and general information, see Regions and Availability Domains.

When you create a firewall, you can create it in a region or a specific Availability domain within a region. The default when you create a firewall is regional.

When planning a network firewall, be sure to take the following factors into consideration:
  • Regional firewall instances are distributed across all availability domains in the region, which reduces the risk of AD failure.
  • Regional firewalls are high-availability, and have high fault tolerance.
  • Using regional firewalls might add minor inter Availability domain latencies. For example, if the client or server is in a different Availability domain than the firewall instance, there can be latency in milliseconds. If the client or server is in the same Availability domain as the firewall instance, then latency is in microseconds.
  • Availability domain-specific firewall instances are distributed across many fault domains within a single specified Availability domain.
  • Availability domain-specific firewalls might cause redirection of traffic if it comes from a regional subnet.

Network Firewall Concepts

The following are descriptions of key concepts and the main components of Network Firewall:
Firewall
A firewall is a resource that exists in a chosen subnet and controls incoming and outgoing network traffic based on a set of security rules. Traffic is routed to and from the firewall from resources such as internet gateways and dynamic routing gateways (DRGs). To create a firewall, you must have at least one policy that you can attach to the firewall. For information about how to create and manage this resource, see Creating and Managing Firewalls.
Firewall policy
A firewall policy is a resource that contains the rules that control how a firewall inspects, allows, or denies network traffic. You can associate a firewall policy to one or more firewalls. To create or manage this resource, see Creating and Managing Firewall Policies.
Firewall policy component
Firewall policy components such as lists, secrets, and decryption profiles help you build rules for a firewall policy. To create or manage firewall policy components, see Creating and Managing Firewall Policy Components.
availability domain
The data center within a geographical region that hosts cloud resources. For more information, see Regions and Availability Domains. A firewall exists in a single Availability domain in a region.

Creating Automation with Events

You can create automation based on state changes for your Oracle Cloud Infrastructure resources by using event types, rules, and actions. For more information, see Overview of Events.