I have configured a rule in the Default NAC that is supposed to block a Layer 7 protocol application. When I analyze hit counts, it shows the rule has been matched. And when I analyze connection events, the traffic is showing as dropped. This is the 2nd rule in the access policy.
The rule is configured as such:
Rule_Name src_zone "any" dst_zone "any" src_net "any" dst_net "any" applications "chatGPT" src_port "any" dst_port "any" Action "Block"
ChatGPT is just the example application I'm using for this discussion.
Here is the issue. When I looked at the command line, this rule has an advanced permit ip any any. The reason it was brought to my attention, was that we were trying to configure a Layer 3 deny rule, (rule 33) and the permit ip any any was allowing the traffic.
How is this possible? Can anyone provide insight or resolution?
The default action for the Default NAC is "Block all traffic".