<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Application based access-control Policy query in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/application-based-access-control-policy-query/m-p/2998755#M1009122</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I have a simple query around access control policy using applications in the rule. If we want to create access control policies with applications is it necessary for configuring the port/protocol information as well. Or can we just use applications in the policy without defining the ports/protocols. Will Firepower automatically detect the allowed application across any port ?&lt;/P&gt;
&lt;P&gt;Is it also possible to bind an application to be detected &amp;amp; allowed on the custom port.&lt;/P&gt;
&lt;P&gt;Can someone please advise on the same.&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Vaibhav&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 13:13:01 GMT</pubDate>
    <dc:creator>vaibhav.parlekar1</dc:creator>
    <dc:date>2019-03-12T13:13:01Z</dc:date>
    <item>
      <title>Application based access-control Policy query</title>
      <link>https://community.cisco.com/t5/network-security/application-based-access-control-policy-query/m-p/2998755#M1009122</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I have a simple query around access control policy using applications in the rule. If we want to create access control policies with applications is it necessary for configuring the port/protocol information as well. Or can we just use applications in the policy without defining the ports/protocols. Will Firepower automatically detect the allowed application across any port ?&lt;/P&gt;
&lt;P&gt;Is it also possible to bind an application to be detected &amp;amp; allowed on the custom port.&lt;/P&gt;
&lt;P&gt;Can someone please advise on the same.&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Vaibhav&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 13:13:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/application-based-access-control-policy-query/m-p/2998755#M1009122</guid>
      <dc:creator>vaibhav.parlekar1</dc:creator>
      <dc:date>2019-03-12T13:13:01Z</dc:date>
    </item>
    <item>
      <title>hi,</title>
      <link>https://community.cisco.com/t5/network-security/application-based-access-control-policy-query/m-p/2998756#M1009124</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;
&lt;P&gt;logical operator between tabs within the rule statement is an "and", therefor I suggest to only use a "port" rule, if want to be sure the rule is hit. you can not believe on the attacker to use the correct application-id and port :-). otherwise an other rule will be hit or default action comes in place, but with default action no file check is possible.&lt;/P&gt;
&lt;P&gt;"&lt;A name="ID-2190-00000005__ID-2190-00000034"&gt;&lt;/A&gt;&lt;!-- --&gt;&lt;STRONG&gt;&lt;A name="ID-2190-00000005__ID-2190-00000036"&gt;&lt;/A&gt;&lt;!-- --&gt;Default Action&lt;/STRONG&gt; handles all traffic that does not match any of the rules. In this scenario, the default action performs intrusion prevention before allowing non-malicious traffic to pass. In a different deployment, you might have a default action that trusts or blocks all traffic, without further inspection. (You cannot perform file or malware inspection on traffic handled by the default action.)&amp;nbsp;"&lt;/P&gt;
&lt;P&gt;hope that helps, br&lt;/P&gt;
&lt;P&gt;thomas&lt;/P&gt;</description>
      <pubDate>Wed, 07 Dec 2016 14:57:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/application-based-access-control-policy-query/m-p/2998756#M1009124</guid>
      <dc:creator>tneuhuber</dc:creator>
      <dc:date>2016-12-07T14:57:42Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/application-based-access-control-policy-query/m-p/2998757#M1009126</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Thanks for your reply. So since the tabs are with a "and" operator I can practically bind an application to a port. I can create a rule to only allow e.g. facebook on port 8080. In this case both the conditions of Application &amp;amp; port have to match for the rule to be matched?. if facebook is recognized on lets day port 80 the rule will not match &amp;amp; be checked by the action set in the default rule ?&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Vaibhav&lt;/P&gt;</description>
      <pubDate>Thu, 22 Dec 2016 21:43:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/application-based-access-control-policy-query/m-p/2998757#M1009126</guid>
      <dc:creator>vaibhav.parlekar1</dc:creator>
      <dc:date>2016-12-22T21:43:30Z</dc:date>
    </item>
    <item>
      <title>Hi, yes, that is what I have</title>
      <link>https://community.cisco.com/t5/network-security/application-based-access-control-policy-query/m-p/2998758#M1009128</link>
      <description>&lt;P&gt;Hi, yes, that is what I have observed.&lt;/P&gt;
&lt;P&gt;from my point of view, it is better to use a "port rule" for a connection from outside to inside to get it hit.&lt;/P&gt;
&lt;P&gt;inside to outside rule (permit or deny apps) can rely on the open app-id (snort), which is the basic algorithm to detect applications.&lt;/P&gt;
&lt;P&gt;br, Thomas&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Dec 2016 09:53:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/application-based-access-control-policy-query/m-p/2998758#M1009128</guid>
      <dc:creator>tneuhuber</dc:creator>
      <dc:date>2016-12-27T09:53:00Z</dc:date>
    </item>
    <item>
      <title>Vaibhav,</title>
      <link>https://community.cisco.com/t5/network-security/application-based-access-control-policy-query/m-p/2998759#M1009130</link>
      <description>&lt;P&gt;Vaibhav,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You are asking whether device is able to detect application on any port? Yes, it is. Actually, this is the way is designed to work.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The traffic is first identified, regardless of ports used on the ACP rule. If you add the ports, also, will narrow the matching condition of the entire rule, will not prevent the application to be identified.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;So, if you add Facebook as Appid on a rule, it will match any traffic that is Facebook, regardless of the port used for that traffic.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Jan 2017 10:04:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/application-based-access-control-policy-query/m-p/2998759#M1009130</guid>
      <dc:creator>Claudiu Cismaru</dc:creator>
      <dc:date>2017-01-09T10:04:05Z</dc:date>
    </item>
  </channel>
</rss>

