Last updated: YYYY-MM-DD • Category: Config Guides
A structured method to document firewall rule intent and prove behavior with targeted tests.
Environment / assumptions
- IPs anonymized (e.g.,
10.0.x.0/30,fd00:xxxx::/64) - Simulated environment for demonstration (not production)
Procedure
- Wrote rule intent in plain English (what should be allowed/blocked).
- Implemented rules (anonymized) and saved config.
- Tested traffic for each rule (allowed + denied) and recorded evidence.
- Captured logs/counters to corroborate test results.
Verification
- List the outputs that prove success.
- Include command outputs (anonymized) when possible.
Troubleshooting
- Issue: …
- Cause: …
- Fix: …
Artifacts
- Configs, diagrams, logs