Skip to main content
Cisco Meraki Documentation

Creating a Layer 7 Firewall Rule

Cisco Meraki Access points and WAN appliances provide the ability to create layer 7 firewall rules to deny certain traffic based on traffic type. Where most firewall rules only inspect headers at layer 3 (IP address), 4 (Transport), and 5 (Port), a layer 7 rule inspects the payload of packets to match against known traffic types. To enable a Layer 7 firewall rule, follow the steps below:

Configuration Steps

  1. Select the Dashboard network where the rule is to be configured.
  2. Navigate to Wireless > Configure > Firewall and traffic shaping (or Security & SD-WAN > Configure > Firewall on WAN appliances).
  3. (wireless only) Select the SSID the firewall rule will apply to, through the SSID dropdown.
  4. Under Layer 7 firewall rules, click Add a layer 7 firewall rule.
  5. Select an Application to be blocked, using the second drop-down to be more specific if necessary.
  6. Click Save Changes.

2017-07-25 16_18_43-Traffic Shaping - Meraki Dashboard.png

To remove a Layer 7 firewall rule, click its Delete icon next to the Reorder icon, then click Save Changes.

Layer 3 rules are processed first, followed by layer 7, with the first match taking priority. For more information refer to Layer 3 & 7 Firewall Processing.

Blocking specific applications not listed under Layer 7 firewall rules

WAN appliances and Access points can block clients from accessing specific applications using Layer 7 firewall rules. The dashboard lists the most popular applications within each predefined category, but there might be a specific application the network administrator needs to block that is not listed. Consider the example below, for an administrator who would like to block access to the game League of Legends

league of legens.png

Note that League of Legends is currently not listed under the Gaming category, but it can be blocked by following the steps below. 

  1. Identify public IP addresses and URLs used by the application's servers
  2. Configure a Layer 3 rule that blocks outbound connections to the application's servers
  3. Create a Layer 7 rule that blocks the URLs used by the application

Some services, such as Amazon Video, may be included in the traffic shaping applications list but not included in the layer 7 firewall application list. When blocked, these services fail over to a content distribution network (CDN) that may be shared by many content services. Meraki makes every effort to identify services from CDNs, however, in some cases, the traffic is not distinguishable from other services hosted on the CDN. In cases like these, we recommend that the application is limited to extremely minimal bandwidth usage instead of attempting to block the traffic entirely.

Identify Public IP Addresses

As of this writing, League of Legends uses the following subnets and URLs:

  • IP Addresses
    • 192.64.168.0/24 

    • 192.64.169.0/24 

    • 192.64.170.0/24 

    • 216.133.234.0/24

    • 31.186.224.0/24

    • 31.186.226.0/24

    • 64.7.194.0/24

    • 66.150.148.0/24

    • 95.172.70.0/24

    • 95.172.65.0/24

  • URLs

    • pvp.net

    • leagueoflegends.com

Create a Layer 3 Firewall Rule for IPs

Navigate to Wireless > Configure > Firewall & traffic shaping (or Security & SD-WAN > Configure > Firewall on WAN appliances) and select “Add a layer 3 firewall rule” for the SSID(s) or VLAN(s) you would like to block League of Legends onDeny the subnets listed as shown below. The Layer 3 rules will block clients from accessing any of the servers hosting League of Legends on these subnets:

league of legends F3.png

Create a Layer 7 Rule for URLs

Navigate to Wireless > Configure > Firewall and traffic shaping (or Security & SD-WAN > Configure > Firewall on WAN appliances) and Add a layer 7 firewall rule for the SSID(s) or VLAN(s) you would like to block League of Legends on. Deny the listed URLs as shown below. The Layer 7 rules will block clients on that SSID or VLAN from connecting to pvp.net and leagueoflegends.com. 

league of legends F7.png

Caveats

 

  • Unlike Layer 3 stateful firewall rules on the WAN appliances, the configured Layer 7 rules on both the WAN appliances and Access points are stateless. 
  • Layer 7 rules not utilizing NBAR content categorization will not show up in the Event Log under the event type "Layer 7 firewall rule". 
  • Some services, such as Amazon Video, may be included in the traffic shaping applications list but not included in the layer 7 firewall application list. When blocked, these services fail over to a content distribution network (CDN) that may be shared by many content services. Meraki makes every effort to identify services from CDNs, however in some cases the traffic is not distinguishable from other services hosted on the CDN. In cases like these, we recommend that the application be limited to extremely minimal bandwidth usage instead of attempting to block the traffic entirely. 
  • When splash page authentication is configured, captive portal strength settings take precedence over configured traffic shaping and firewall rules. This means traffic shaping and firewall rules will only apply after Splash page authentication has occurred successfully. If firewall or traffic shaping rules are configured on an SSID, use the "Block all access until sign-on is complete" captive portal strength setting to apply the principle of least privilege to the SSID. This captive portal strength will ensure all traffic is blocked until the desired firewall and traffic shaping rules can be applied. 
  • Was this article helpful?