Cisco Firepower 4150 시작하기 - 페이지 34

{카테고리_이름} Cisco Firepower 4150에 대한 시작하기을 온라인으로 검색하거나 PDF를 다운로드하세요. Cisco Firepower 4150 42 페이지. Rack-mount and ground the chassis
Cisco Firepower 4150에 대해서도 마찬가지입니다: 유지 관리 및 업그레이드 매뉴얼 (20 페이지), 매뉴얼 (36 페이지), 매뉴얼 (26 페이지), 매뉴얼 (8 페이지), 매뉴얼 (42 페이지)

Cisco Firepower 4150 시작하기
Configuring Security Policies
Changes are not active on the device until you deploy them. See
What to do next
Click Policies in the main menu and configure the security policy for the system. You can also click Objects
to configure the objects needed in those policies.
Configuring Security Policies
Use the security policies to implement your organization's acceptable use policy and to protect your network
from intrusions and other threats.
Procedure
Step 1
Click Policies.
The Security Policies page shows the general flow of a connection through the system, and the order in which
security policies are applied.
Step 2
Click the name of a policy and configure it.
You might not need to configure each policy type, although you must always have an access control policy.
Following is a summary of the policies:
• SSL Decryption—If you want to inspect encrypted connections (such as HTTPS) for intrusions, malware,
• Identity—If you want to correlate network activity to individual users, or control network access based
• Security Intelligence—Use the Security Intelligence policy to quickly drop connections from or to
• NAT (Network Address Translation)—Use the NAT policy to convert internal IP addresses to externally
• Access Control—Use the access control policy to determine which connections are allowed on the
• Intrusion—Use the intrusion policies to inspect for known threats. Although you apply intrusion policies
Getting Started
34
and so forth, you must decrypt the connections. Use the SSL decryption policy to determine which
connections need to be decrypted. The system re-encrypts the connection after inspecting it. See
Configuring SSL Decryption
on user or user group membership, use the identity policy to determine the user associated with a given
source IP address. See
Configuring Identity
selected IP addresses or URLs. By blocking known bad sites, you do not need to account for them in
your access control policy. Cisco provides regularly updated feeds of known bad addresses and URLs
so that the Security Intelligence block lists update dynamically. Using feeds, you do not need to edit the
policy to add or remove items in the block lists. See
routeable addresses. See
Configure
network. You can filter by security zone, IP address, protocol, port, application, URL, user or user group.
You also apply intrusion and file (malware) policies using access control rules. Use this policy to
implement URL filtering. See
using access control rules, you can edit the intrusion policies to selectively enable or disable specific
intrusion rules. See
Intrusion
Policies.
Policies.
Configuring Security
NAT.
Configuring the Access Control
Policies.
Deploying Your Changes, on page
Intelligence.
Policy.
Getting Started
35.