18-Access Control Policy
18-Access Control Policy
18-Access Control Policy
Use the access control policy to control access to network resources. The policy consists of a set
of ordered rules, which are evaluated from top to bottom. The rule applied to traffic is the first
one where all the traffic criteria are matched. If no rules match the traffic, the default action
shown at the bottom of the page is applied.
To configure the access control policy, select Policies > Access Control. Click the > button next
to the rule number in the left-most column to open the rule diagram. The diagram can help you
visualize how the rule controls traffic. Click the button again to close the diagram.
If no rules match the traffic, the default action shown at the bottom of the page is applied.
Application—The application, or a filter that defines applications by type, category, tag, risk, or
business relevance. The default is any application. The system identifies applications based on
layer 7 criteria, so that you can write rules for different web-based applications rather than a
single rule that covers all TCP port 80 (HTTP) traffic. Although you can specify individual
applications in the rule, application filters simplify policy creation and administration.
Users—The user or user group. Your identity policies determine whether user and group
information are available for traffic matching. You must configure identity policies to use these
criteria. If you configure identity policies to establish user identity based on source IP address,
you can control access based on username or user group membership. By controlling access
based on user identity, you can apply the appropriate access controls whether the user changes
workstations or obtains a different address through DHCP. If you base rules on group
membership, user network access changes as users change roles in your organization, moving
from one group to another.
File Policy- Use file policies to detect malicious software, or malware, using Advanced Malware
Protection for Firepower (AMP for Firepower). You can also use file policies to perform file
control, which allows control over all files of a specific type regardless of whether the files
contain malware.