Cisco Cisco Firepower Management Center 2000
13-37
FireSIGHT System User Guide
Chapter 13 Using Access Control Policies
Managing Access Control Policies
The Intrusion Policies Column
The Intrusion Policies column provides one or more check boxes for indicating whether to apply
intrusion policies associated with the access control policy to a device. A single grayed check box
indicates that all associated intrusion policies are identical to currently running policies, in which case
the check box is cleared and cannot be selected. You cannot apply an unchanged intrusion policy; only
changed intrusion policies are listed, and can be selected individually. When the same intrusion policy
is associated with multiple rules in a policy, the intrusion policy is listed only once for each device.
intrusion policies associated with the access control policy to a device. A single grayed check box
indicates that all associated intrusion policies are identical to currently running policies, in which case
the check box is cleared and cannot be selected. You cannot apply an unchanged intrusion policy; only
changed intrusion policies are listed, and can be selected individually. When the same intrusion policy
is associated with multiple rules in a policy, the intrusion policy is listed only once for each device.
The check box for an intrusion policy is selected and the check box is grayed and cannot be changed
when the access control policy and the intrusion policy must be applied together, as described above, in
either of the following cases:
when the access control policy and the intrusion policy must be applied together, as described above, in
either of the following cases:
•
when the access control policy is being applied to the device for the first time
•
when an intrusion policy has been newly added to the access control policy
Status messages indicate whether intrusion policies are currently up to date or out of date. An intrusion
policy is out of date when it is not identical to an intrusion policy currently running on the listed device.
An identical intrusion policy on the device is up to date. When the policy is out of date, you can
conveniently display a comparison of the policy to the currently running policy in a new browser
window.
policy is out of date when it is not identical to an intrusion policy currently running on the listed device.
An identical intrusion policy on the device is up to date. When the policy is out of date, you can
conveniently display a comparison of the policy to the currently running policy in a new browser
window.
To apply selected access control policy configurations:
Access:
Admin/Security Approver
Step 1
Select
Policies > Access Control
.
The Access Control page appears.
Step 2
Click the apply icon (
) next to the policy you want to apply.
The Apply Access Control Rules pop-up window appears.
Alternatively, you can click
Save and Apply
on the policy Edit page; see
Step 3
Click
Details
.
The detailed Apply Access Control Rules pop-up window appears.
Tip
You can also open the pop-up window from the Access Control page (
Policies > Access Control
) by
clicking on an out-of-date message in the
Status
column for the policy.
Step 4
Select or clear the access control policy check box next to the device name to specify whether to apply
the access control policy to a targeted device.
the access control policy to a targeted device.
Step 5
Select or clear the intrusion policy check box next to the device name to specify whether to apply an
intrusion policy to a targeted device.
intrusion policy to a targeted device.
Step 6
Click
Apply Selected Configurations
.
Your policy apply task is queued. Click
OK
to return to the Access Control page.
Tip
You can monitor the progress of the policy apply task on the Task Status page (
System > Monitoring > Task
Status
).