Cisco Acs 5x User Guide
Have a look at the manual Cisco Acs 5x User Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 53 Cisco manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
10-37 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 10 Managing Access Policies Configuring Access Service Policies Creating Policy Rules When you create rules, remember that the order of the rules is important. When ACS encounters a match as it processes the request of a client that tries to access the ACS network, all further processing stops and the associated result of that match is found. No further rules are considered after a match is found. The Default Rule provides a default policy in cases where no rules are matched or defined. You can edit the result of a default rule. Before You Begin Configure the policy conditions and results. See Managing Policy Conditions, page 9-1. Select the types of conditions and results that the policy rules apply. See Customizing a Policy, page 10-4. To create a new policy rule: Step 1Select Access Policies > Service Selection Policy service > policy, where service is the name of the access service, and policy is the type of policy. If you: Previously created a rule-based policy, the Rule-Based Policy page appears, with a list of configured rules. Have not created a rule-based policy, the Simple Policy page appears. Click Rule-Based. Step 2In the Rule-Based Policy page, click Create. The Rule page appears. Step 3Define the rule. Step 4Click OK The Policy page appears with the new rule. Step 5Click Save Changes to save the new rule. To configure a simple policy to use the same result for all requests that an access service processes, see: Viewing Identity Policies, page 10-21 Configuring a Group Mapping Policy, page 10-26 Configuring a Session Authorization Policy for Network Access, page 10-29 Configuring a Session Authorization Policy for Network Access, page 10-29 Configuring Shell/Command Authorization Policies for Device Administration, page 10-34 Related Topics Duplicating a Rule, page 10-38 Editing Policy Rules, page 10-38 Deleting Policy Rules, page 10-39
10-38 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 10 Managing Access Policies Configuring Access Service Policies Duplicating a Rule You can duplicate a rule if you want to create a new rule that is the same, or very similar to, an existing rule. The duplicate rule name is based on the original rule with parentheses to indicate duplication; for example, Rule-1(1). After duplication is complete, you access each rule (original and duplicated) separately. NoteYou cannot duplicate the Default rule. To duplicate a rule: Step 1Select Access Policies > Service Selection Policy > service > policy, where service is the name of the access service, and policy is the type of policy. The Policy page appears with a list of configured rules. Step 2Check the check box next to the rule that you want to duplicate. You cannot duplicate the Default Rule. Step 3Click Duplicate. The Rule page appears. Step 4Change the name of the rule and complete the other applicable field options. Step 5Click OK. The Policy page appears with the new rule. Step 6Click Save Changes to save the new rule. Step 7Click Discard Changes to cancel the duplicate rule. Related Topics Creating Policy Rules, page 10-37 Editing Policy Rules, page 10-38 Deleting Policy Rules, page 10-39 Editing Policy Rules You can edit all values of policy rules; you can also edit the result in the Default rule. To edit a rule: Step 1Select Access Policies > Service Selection Policy > service > policy, where service is the name of the access service, and policy is the type of policy. The Policy page appears, with a list of configured rules. Step 2Click the rule name that you want to modify; or, check the check box for the Name and click Edit. The Rule page appears. Step 3Edit the appropriate values.
10-39 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 10 Managing Access Policies Configuring Access Service Policies Step 4Click OK. The Policy page appears with the edited rule. Step 5Click Save Changes to save the new configuration. Step 6Click Discard Changes to cancel the edited information. Related Topics Creating Policy Rules, page 10-37 Duplicating a Rule, page 10-38 Deleting Policy Rules, page 10-39 Deleting Policy Rules NoteYou cannot delete the Default rule. To delete a policy rule: Step 1Select Access Policies > Service Selection Policy > service > policy, where service is the name of the access service, and policy is the type of policy. The Policy page appears, with a list of configured rules. Step 2Check one or more check boxes next to the rules that you want to delete. Step 3Click Delete. The Policy page appears without the deleted rule(s). Step 4Click Save Changes to save the new configuration. Step 5Click Discard Changes to retain the deleted information. Related Topics Creating Policy Rules, page 10-37 Duplicating a Rule, page 10-38 Editing Policy Rules, page 10-38
10-40 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 10 Managing Access Policies Configuring Compound Conditions Configuring Compound Conditions Use compound conditions to define a set of conditions based on any attributes allowed in simple policy conditions. You define compound conditions in a policy rule page; you cannot define them as separate condition objects. This section contains the following topics: Compound Condition Building Blocks, page 10-40 Types of Compound Conditions, page 10-41 Using the Compound Expression Builder, page 10-44 Compound Condition Building Blocks Figure 10-1 shows the building blocks of a compound condition. Figure 10-1 Building Blocks of a Compound Condition Operands—Any attribute or condition type, such as Protocol/Request Attributes, Identity Attributes, Identity Groups, Network Device Groups (NDGs), Date/Time, and Custom or Standard Conditions. Relational Operators—Operators that specify the relation between an operand and a value; for example, equals (=), or does not match. The operators that you can use in any condition vary according to the type of operand. Binary condition—A binary condition defines the relation between a specified operand and value; for example, [username = “Smith”]. Logical Operators—The logical operators operate on or between binary conditions. The supported logical operators are AND and OR. Precedence Control—You can alter the precedence of logical operators by using parentheses. Nested parentheses provide administrator control of precedence. The natural precedence of logical operators, that is, without parenthesis intervention, is NOT, AND, OR, where NOT has the highest precedence and OR the lowest. Table 10-21 summarizes the supported dynamic attribute mapping while building Compound Conditions.
10-41 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 10 Managing Access Policies Configuring Compound Conditions NoteDynamic attribute mapping is not applicable for ExternalGroups attribute of Type String Enum and Time And Date attribute of type Date Time Period. For hierarchical attribute, the value is appended with attribute name so while configuring any string attribute to compare with hierarchical attribute the value of the string attribute has to start with hierarchical attribute name. For example: When you define a new string attribute named UrsAttr to compare against DeviceGroup attribute created under NDG, then the value of the UsrAttr has to be configured as follows: DeviceGroup: Va l u e When you want to compare a string attribute with UserIdentityGroup which is a hierarchy type attribute within each internal users, then the string attribute has to be configured as follows: IdentityGroup:All Groups:”Identity Group Name” Related Topics Types of Compound Conditions, page 10-41 Using the Compound Expression Builder, page 10-44 Types of Compound Conditions You can create three types of compound conditions: Atomic Condition Consists of a single predicate and is the only entry in the list. Because all simple conditions in a rule table, except for NDGs, assume the equals (=) operation between the attribute and value, the atomic condition is used to choose an operator other than equals (=). See Figure 10-2 for an example. Table 10-21 Supported Dynamic Attribute Mapping in Policy Compound Condition Operand1 Operand2 Example String attribute String attribute — Integer attribute Integer attribute — Enumeration attribute Enumeration attribute — Boolean attribute Boolean attribute — IP address attribute IP address attribute — Special cases Hierarchical attribute String attribute NDG:Customer vs. Internal Users string attribute String attribute Hierarchical attribute —
10-42 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 10 Managing Access Policies Configuring Compound Conditions Figure 10-2 Compound Expression - Atomic Condition Single Nested Compound Condition Consists of a single operator followed by a set of predicates (>=2). The operator is applied between each of the predicates. See Figure 10-3 for an example. The preview window displays parentheses [()] to indicate precedence of logical operators. Figure 10-3 Single Nested Compound Expression Multiple Nested Compound Condition You can extend the simple nested compound condition by replacing any predicate in the condition with another simple nested compound condition. See Figure 10-4 for an example. The preview window displays parentheses [()] to indicate precedence of logical operators.
10-43 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 10 Managing Access Policies Configuring Compound Conditions Figure 10-4 Multiple Nested Compound Expression Compound Expression with Dynamic value You can select dynamic value to select another dictionary attribute to compare against the dictionary attribute selected as operand. See Figure 10-5 for an example. Figure 10-5 Compound Expression Builder with Dynamic Value
10-44 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 10 Managing Access Policies Configuring Compound Conditions Related Topics Compound Condition Building Blocks, page 10-40 Using the Compound Expression Builder, page 10-44 Using the Compound Expression Builder You construct compound conditions by using the expression builder in Rule Properties pages. The expression builder contains two sections: a predicate builder to create primary conditions and controls for managing the expression. In the first section, you define the primary conditions. Choose the dictionary and attribute to define the operand, then choose the operator, and specify a value for the condition. Use the second section to organize the order of conditions and the logical operators that operate on or between binary conditions. Table 10-22 describes the fields in the compound expression builder. Table 10-22 Expression Builder Fields Field Description ConditionUse this section to define the primary conditions. Dictionary Specifies the dictionary from which to take the operand. These available options depend on the policy that you are defining. For example, when you define a service selection policy, the Identity dictionaries are not available. Attribute Specifies the attribute that is the operand of the condition. The available attributes depend on the dictionary that you chose. Operator The relational operator content is dynamically determined according to the choice in the preceding operand field. Value The condition value. The type of this field depends on the type of condition or attribute. Select one of the following two options: Static—If selected, you have to enter or select the static value depending on attribute type. Dynamic—If selected, you can select another dictionary attribute to compare against the dictionary attribute selected as operand. Current Condition SetUse this section to organize the order of conditions and the logical operators that operate on or between binary conditions. Condition list Displays a list of defined binary conditions for the compound conditions and their associated logical operators. Add After you define a binary condition, click Add to add it to the Condition list. Edit To edit a binary condition, select the condition in the Condition list and click Edit. The condition properties appear in the Condition fields. Modify the condition as required, then click Replace. Replace Click to replace the selected condition with the condition currently defined in the Condition fields. And OrSpecifies the logical operator on a selected condition, or between the selected condition and the one above it. Click the appropriate operator, and click Insert to add the operator as a separate line; click the operator and click Replace, to replace the selected line. Delete Click to delete the selected binary condition or operator from the condition list. Preview Click to display the current expression in corresponding parenthesis representation. The rule table displays the parenthesis representation after the compound expression is created.
10-45 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 10 Managing Access Policies Security Group Access Control Pages Related Topics Compound Condition Building Blocks, page 10-40 Types of Compound Conditions, page 10-41 Security Group Access Control Pages This section contains the following topics: Egress Policy Matrix Page, page 10-45 Editing a Cell in the Egress Policy Matrix, page 10-46 Defining a Default Policy for Egress Policy Page, page 10-46 NDAC Policy Page, page 10-47 NDAC Policy Properties Page, page 10-48 Network Device Access EAP-FAST Settings Page, page 10-50 Egress Policy Matrix Page The Egress policy, also known as an SGACL policy, determines which SGACLs to apply at the Egress points of the network, based on the source and destination SGTs. ACS presents the Egress policy as a matrix; it displays all the security groups in the source and destination axes. Each cell in the matrix can contain a set of ACLs to apply to the corresponding source and destination SGTs. The network devices add the default policy to the specific policies that you defined for the cells. For empty cells, only the default policy applies. Use the Egress policy matrix to view, define, and edit the sets of ACLs to apply to the corresponding source and destination SGTs. To display this page, choose Access Policies > Security Group Access Control > Egress Policy. Table 10-23 Egress Policy Matrix Page Option Description Destination Security GroupColumn header displaying all destination security groups. Source Security GroupRow header displaying all source security groups. Cells Contain the SGACLs to apply to the corresponding source and destination security group. Edit Click a cell, then click Edit to open the Edit dialog box for that cell. See Editing a Cell in the Egress Policy Matrix, page 10-46. Default Policy Click to open a dialog box to define the default Egress policy. See Defining a Default Policy for Egress Policy Page, page 10-46. Set Matrix View To change the Egress policy matrix display, choose an option, then click Go: All—Clears all the rows and columns in the Egress policy matrix. Customize View—Launches a window where you can customize source and destination security groups corresponding to the selected cell.
10-46 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 10 Managing Access Policies Security Group Access Control Pages Related Topic Creating an Egress Policy, page 4-27 Editing a Cell in the Egress Policy Matrix Use this page to configure the policy for the selected cell. You can configure the SGACLs to apply to the corresponding source and destination security group. To display this page, choose Access Policies > Security Group Access Control > Egress Policy, select a cell, then click Edit. Related Topic Creating an Egress Policy, page 4-27 Defining a Default Policy for Egress Policy Page Use this page to define the default Egress policy. The network devices add the default policy to the specific policies defined for the cells. For empty cells, only the default policy applies. To display this page, choose Access Policies > Security Group Access Control > Egress Policy, then click Default Policy. Related Topics Creating an Egress Policy, page 4-27 Creating a Default Policy, page 4-28 Table 10-24 Edit Cell Page Option Description Configure Security GroupsDisplay only. Displays the source and destination security group name for the selected cell. General Description for the cell policy. ACLs Move the SGACLs that you want to apply to the corresponding source and destination security group from the Available list to the Selected list. To specify the order of the list of SGACLs, use the Up (^) and Down (v) arrows. Table 10-25 Default Policy Page Option Description ACLs Move the SGACLs that you want to apply to the corresponding source and destination security group from the Available list to the Selected list. To specify the order of the list of SGACLs, use the Up (^) and Down (v) arrows. Select Permit All or Deny All as a final catch-all rule.