Best practices for access control rules
Properly configuring and ordering access control rules is essential to protecting your network. The following topics summarize best practices to maximize rule performance and efficacy.
Note | When you deploy configuration changes, the system evaluates all rules together and creates an expanded set of criteria that assigned devices use to evaluate network traffic. If these criteria exceed the resources (physical memory, processors, and so on) of a device, you cannot deploy to that device. |