As per the suggestion of Dr. Raghavender K V, you may use the Internet Firewall Dataset. But Actually, for a firewall, the dataset is not required. You will analyze the intrusion datasets and study different attacks. Thereafter, you will write your rule for a particular attack and append it to firewall rules.