After you’ve defined your VPN resources, you control which ones are available to users by creating an access policy.
After a user successfully authenticates (that is, his or her identity is verified), the appliance evaluates the rules that control access to specific resources. Rules appear on the Access Control page (see below image).
Access control rules are displayed as an ordered list in AMC. When the appliance evaluates a connection request, it begins at the top of the list and works its way down until it finds a match. When it finds a match, the action required by the rule—either Permit or Deny—is applied and no further rules are evaluated.
Access to a resource can be based on several criteria. Most rules control access based on who the user is—that is, the user’s name or group membership—and the destination resource. (If you don’t restrict access to a particular user or destination resource, the word Any appears in the access control list.)
With Tunnel Access, an access control rule that allows access to “Any resource” allows access to everything behind the SMA, not only the defined resources.
In addition, you can control access based on several other criteria such as:
The EPC zone from which the connection request originates. Suppose you want to require users accessing a sensitive financial application. If so, you could configure a rule that allows access only to systems in a trusted zone that are running a particular program.
In Access Control rules page, access to Remote office desktops is restricted to users in the Remote group who have device profiles that place them in the Trusted laptop zone.
A connection request can be summarized as follows:
The appliance reads the first rule in the access control list and compares it to the request criteria:
If the appliance processes all of the rules without finding a match, an implicit Deny rule is applied.