Contents

 

Deleting an Authorizations and Permissions Policy Element

9-32

 

 

Configuring Security Group Access Control Lists

9-33

 

 

 

Managing Access Policies

 

 

 

 

 

 

 

 

 

C H A P T E R 10

10-1

 

 

 

 

 

 

 

 

 

Policy Creation Flow

10-1

 

 

 

 

 

 

 

 

 

 

Network Definition and Policy Goals

10-2

 

 

 

 

 

 

Policy Elements in the Policy Creation Flow

10-3

 

 

 

 

Access Service Policy Creation

10-4

 

 

 

 

 

 

 

Service Selection Policy Creation

10-4

 

 

 

 

 

 

Customizing a Policy

10-4

 

 

 

 

 

 

 

 

 

 

Configuring the Service Selection Policy

10-5

 

 

 

 

 

 

Configuring a Simple Service Selection Policy

10-6

 

 

 

 

Service Selection Policy Page

10-6

 

 

 

 

 

 

 

Creating, Duplicating, and Editing Service Selection Rules

10-8

 

 

Displaying Hit Counts

10-10

 

 

 

 

 

 

 

 

 

Deleting Service Selection Rules

10-10

 

 

 

 

 

 

Configuring Access Services

10-11

 

 

 

 

 

 

 

 

Editing Default Access Services

10-11

 

 

 

 

 

 

Creating, Duplicating, and Editing Access Services

10-12

 

 

 

Configuring General Access Service Properties

10-13

 

 

 

Configuring Access Service Allowed Protocols

10-15

 

 

 

Configuring Access Services Templates

10-19

 

 

 

 

Deleting an Access Service

10-20

 

 

 

 

 

 

 

Configuring Access Service Policies

10-21

 

 

 

 

 

 

Viewing Identity Policies 10-21

 

 

 

 

 

 

 

 

Viewing Rules-Based Identity Policies

10-23

 

 

 

 

Configuring Identity Policy Rule Properties

10-24

 

 

 

 

Configuring a Group Mapping Policy

10-26

 

 

 

 

 

 

Configuring Group Mapping Policy Rule Properties

10-28

 

 

 

Configuring a Session Authorization Policy for Network Access 10-29

 

Configuring Network Access Authorization Rule Properties

10-31

 

 

Configuring Device Administration Authorization Policies

10-32

 

 

Configuring Device Administration Authorization Rule Properties

10-33

 

Configuring Device Administration Authorization Exception Policies

10-33

 

Configuring Shell/Command Authorization Policies for Device Administration 10-34

 

Configuring Authorization Exception Policies

10-35

 

 

 

 

Creating Policy Rules

10-37

 

 

 

 

 

 

 

 

 

Duplicating a Rule

10-38

 

 

 

 

 

 

 

 

 

 

 

 

 

Editing Policy Rules

10-38

 

 

 

 

 

 

User Guide for Cisco Secure Access Control System 5.3

 

 

 

 

 

 

 

 

 

 

 

x

 

 

 

 

OL-24201-01

 

 

 

 

 

 

 

Page 10
Image 10
Cisco Systems OL-24201-01 manual Managing Access Policies