Cisco Cisco Firepower Management Center 4000

Page of 1844
 
13-37
FireSIGHT System User Guide
 
Chapter 13      Using Access Control Policies
  Managing Access Control Policies
The Intrusion Policies Column
The Intrusion Policies column provides one or more check boxes for indicating whether to apply 
intrusion policies associated with the access control policy to a device. A single grayed check box 
indicates that all associated intrusion policies are identical to currently running policies, in which case 
the check box is cleared and cannot be selected. You cannot apply an unchanged intrusion policy; only 
changed intrusion policies are listed, and can be selected individually. When the same intrusion policy 
is associated with multiple rules in a policy, the intrusion policy is listed only once for each device.
The check box for an intrusion policy is selected and the check box is grayed and cannot be changed 
when the access control policy and the intrusion policy must be applied together, as described above, in 
either of the following cases:
  •
when the access control policy is being applied to the device for the first time
  •
when an intrusion policy has been newly added to the access control policy
Status messages indicate whether intrusion policies are currently up to date or out of date. An intrusion 
policy is out of date when it is not identical to an intrusion policy currently running on the listed device. 
An identical intrusion policy on the device is up to date. When the policy is out of date, you can 
conveniently display a comparison of the policy to the currently running policy in a new browser 
window.
To apply selected access control policy configurations:
Access: 
Admin/Security Approver
Step 1
Select 
Policies > Access Control
.
The Access Control page appears.
Step 2
Click the apply icon (
) next to the policy you want to apply.
The Apply Access Control Rules pop-up window appears.
Alternatively, you can click
 Save and Apply
 on the policy Edit page; see 
Step 3
Click 
Details
.
The detailed Apply Access Control Rules pop-up window appears.
Tip
You can also open the pop-up window from the Access Control page (
Policies > Access Control
) by 
clicking on an out-of-date message in the 
Status
 column for the policy.
Step 4
Select or clear the access control policy check box next to the device name to specify whether to apply 
the access control policy to a targeted device.
Step 5
Select or clear the intrusion policy check box next to the device name to specify whether to apply an 
intrusion policy to a targeted device. 
Step 6
Click 
Apply Selected Configurations
.
Your policy apply task is queued. Click 
OK
 to return to the Access Control page.
Tip
You can monitor the progress of the policy apply task on the Task Status page (
System > Monitoring > Task 
Status
).