Associate the Decryption Policy with an Access Control Policy and Advanced Settings

This task discusses how to associate the decryption policy with an access control policy and setting recommended advanced settings for the access control policy.

For your decryption policy to be used by the system, you must associate it with an access control policy.

Before you begin

Create the sample decryption policy as discussed in this guide.

For more information about decryption policy advanced options, see Decryption Policy Advanced Options.

Procedure


Step 1

Log in to the Secure Firewall Management Center if you haven't already done so.

Step 2

Click Policies > Access Control.

Step 3

Either create a new access control policy or click Edit (edit icon) to edit an existing one.

Step 4

Click the word Decryption as the following figure shows.

In the firewall management center, for the access control policy, click the word Decryption to select a decryption policy to associate

Step 5

From the list, click the name of your decryption policy and also check Early application detection and URL categorization as the following figure shows.

For the selected decryption policy, select the Early application detection and URL categorization check box

Step 6

Click Apply.

Step 7

Click More > Advanced Settings as the following figure shows.

Select the access control policy's Advanced Settings

Step 8

Click Edit (edit icon) next to TLS Server Identity Discovery.

Step 9

Select the check box as the following figure shows.

In the access control policy's Advanced Settings, select the Server Identity Discovery check box

Step 10

Click OK.

Step 11

At the top of the page, click Save.

Step 12

At the top of the page, click Return to Access Control Policy Management, as the following figure shows

At the top of the page, click Return to Access Control Policy Management

Step 13

Click Edit (edit icon) to edit the access control rule.

Step 14

At the bottom of the page, next to the default action, click (Default Logging and Inspection).

Step 15

Check Log at beginning of connection and any other options you choose.

For more information, see Logging Settings for Access Control PoliciesLogging Settings for Access Control Policies in the Cisco Secure Firewall Management Center Device Configuration Guide.

Step 16

Click Apply.

Step 17

At the top of the page, click Save.


What to do next