Access Control Policy Settings

How to configure recommended the following best practice settings for your access control policy:

  • Associate your decryption policy with an access control policy. (If you fail to do this, your decryption policy and rules have no effect.)

  • Set the default policy action to Intrusion Prevention: Balanced Security and Connectivity.

  • Enable logging.

Procedure


Step 1

Click Policies > Access Control.

Step 2

Click Edit (edit icon) next to your access control policy.

Step 3

(If your decryption policy is not set up yet, you can do this later.)

  1. Click the Decryption link at the top of the page as the following figure shows.

    For your decryption policy to have any effect, you must associate it with an access control policy.

  2. From the list, click the name of your decryption policy.

  3. Click Apply.

  4. At the top of the page, click Save.

Step 4

From the Default Action list at the bottom of the page, click Intrusion Prevention: Balanced Security and Connectivity.

The following figure shows an example.

Step 5

Click Logging (logging icon).

Step 6

Select the Log at End of Connection check box and click OK.

Step 7

Click Save.


What to do next

See Decryption Rule Examples.