CHAPTE R
7-1
Cisco ASA Series Firewall ASDM Configuration Guide
7
Configuring Access Rules
This chapter describes how to control network access through the ASA using access rules and includes
the following sections:
Information About Access Rules, page7-1
Licensing Requirements for Access Rules, page 7-7
Guidelines and Limitations, page7-7
Default Settings, page7-7
Configuring Access Rules, page7-8
Feature History for Access Rules, page 7-14
Note You use access rules to control network access in both routed and transparent firewall modes. In
transparent mode, you can use both access rules (for Layer 3 traffic) and EtherType rules (for Layer 2
traffic).
To access the ASA interface for management access, you do not also need an access rule allowing the
host IP address. You only need to configure management access according to Chapter45, “Configuring
Management Access,” in the general operations configuration guide.

Information About Access Rules

Your access policy is made up of one or more access rules and/or EtherType rules per interface or
globally for all interfaces.
You can use access rules in routed and transparent firewall mode to control IP traffic. An access rule
permits or denies traffic based on the protocol, a source and destination IPaddress or network, and
optionally the source and destination ports.
For transparent mode only, an EtherType rule controls network access for non-IP traffic. An EtherType
rule permits or denies traffic based on the EtherType.
This section includes the following topics:
General Information About Rules, page7-2
Information About Access Rules, page7-5
Information About EtherType Rules, page7-6