Download Print this page

Cisco ASA Easy Setup Manual page 7

Firepower module

Advertisement

2-3
Configuring Access Control Policy: Blocking
Because the [Default Allow All Traffic] allows all traffic through, configure access
control rules to block specific traffic, for example, application or web traffic that is
high risk or has low business relevance.
2
4
3
5
Caution
At step
, the URL reputation requires the URL License. And you can only select one reputa-
tion level. Selecting a reputation level also selects all reputations more severe than that level.
For example, if you configure a rule to block [Suspicious sites] (level 2), it also automatically
blocks [High Risk] (level 1) sites.
1
Click [Add Rule].
The [Add Rule] pop-up window
appears.
1
2
Enter a name for your new
rule in the [Name] field.
3
Select [Block] from the
[Action] drop-down list.
4
Select [above rule] from
the [Insert] drop-down
list.
5
Click [Applications].
6
8
7
9
10
12
11
13
14
2
Configuring Security Policy
6
Select one or more [Avail-
able Applications].
7
Click [Add to Rule].
You can select one or more
[Application Filters] and search
for a application by its name or
description.
8
Click [URL].
9
Select one or more
[Categories and URLs].
10
Select one [Reputations].
11
Click [Add to Rule].
If you do not specify a reputa-
tion level, the system defaults to
[Any], meaning all levels.
12
Click [Logging].
13
Click [Log at Beginning
and End of Connection].
14
Click [Add].
Cisco ASA Firepower Module Easy Setup Guide

Advertisement

loading