12-7
User Guide for Cisco Security Manager 4.4
OL-28826-01
Chapter1 2 Introduction to Firewall Services
Managing Your Rules Tables
Access list ACLs
AAA ACLs
Static ACLs
NAT0 ACLs
NAT ACLs
For example, if an access ACL and a NAT0 ACL try to reuse the same ACL, the access ACL uses the
original name as configured on the device and the NAT0 ACL is renamed by Security Manager.
Managing Your Rules Tables
The following sections explain some of the basics of using rules tables, which appear in many of the
firewall rules, NAT, and select other policies:
Using Rules Tables, page12-7
Adding and Removing Rules, page 12-9
Editing Rules, page 12-9
Finding and Replacing Items in Rules Tables, page12-16
Moving Rules and the Importance of Rule Order, page 12-19
Enabling and Disabling Rules, page 12-20
Using Sections to Organize Rules Tables, page12-20
Combining Rules, page 12-22
Generating Policy Query Reports, page 12-28
Optimizing Network Object Groups When Deploying Firewall Rules, page12-35
Expanding Object Groups During Discovery, page 12-35

Using Rules Tables

Rules tables in Security Manager display sets of rules (for example, access rules) that make up a policy.
These types of tables are used in only a select group of policies, but many of the firewall services rules
policies use them. Rules tables are used when the order of the rules within the policy matter.
Figure 12-1 details the features in rules tables.