Getting started with Access rules
Access rules filter traffic by defining matching criteria and an action that is applied to packets that match all criteria defined in the rule.
Access rules are used by Firewalls, IPS engines, Layer 2 Firewalls, Master Engines, Virtual Firewalls, Virtual IPS engines, and Virtual Layer 2 Firewalls:
- In Firewall and Layer 2 Firewall policies, the Access rules are the most important type of rules. The criteria you define in the Access rules determines which connections are allowed. By
default, Firewall and Layer 2 Firewall Access rules stop traffic that you do not specifically allow. Note: Master Engines always use Firewall Policies regardless of the role of the Virtual Engines they host. Virtual Firewalls use Firewall Policies. Virtual IPS engines use IPS policies. Virtual Layer 2 Firewalls use Layer 2 Firewall Policies.
-
In IPS policies, Access rules can be used to optionally filter out some traffic and to exclude some traffic from further inspection. Only traffic on Inline Interfaces can be filtered with Access rules. IPS engines allow all traffic that you do not specifically deny. For IPS policies based on the IPS Template, all traffic allowed by rules placed after the inherited rules is inspected against the Inspection Policy by default.