Perform the following steps to add an access control rule to control which users or groups are allowed to access which resources using a specific application from a personal device (within the context of a specific Application Zone).
To add an access control rule for Application Access Control
In the AMC, navigate to Security Administration > Access Control.
Click the + (New) icon.
The Add Access Rule page displays.
3 to a new one, it is inserted before the
current rule 3 (which will become rule 4). This field is required.Complete the information listed under Basic settings:
Select the Direction to create a rule controlling a connection from a resource or a user. The User and Resource buttons toggle. The default is User.
The From field specifies the users or groups allowed or denied access to the related Resource list using an application on the selected Application list. Click Edit to select from a list. If no resources are specified, the default value for this field is Any user.
The To field specifies the required resources to which the user or group can access using an application on the selected Application list. Click Edit to select from a list. If no users are selected, the default value for this field is Any resource.
Complete the information listed under End Point Control zones.
Click the Next> button at the bottom to display the Advanced tab.
In the Access method restrictions section, select Any or Selected for Client software agents, Client platforms, and Protocols to permit or deny access based on the software agent or client initializing the connection. If you choose Selected, check all desired types from the options that are displayed; see the below table.
| Client software agents | Client platforms | Protocols |
| Web browser (HTTP/HTTPS) | Windows | TCP |
| Network Explorer (Web access to file system resources) | macOS | UDP |
| Connect Tunnel and/or SonicWall OnDemand VPN | iOS | ICMP |
| Connection (TCP/IP) |
Android Linux ChromeOS |
In the Client restrictions section either use the default of Any User’s network address or click the Edit button and select the resources that will use this rule.
In the Destination restrictions section either use the default of Any port to enable access on any port or select Selected to restrict access over individual Ports or a range of ports and type the ports to allow. For example, if you are building a policy to control access to an SMTP mail server, you might allow access only over port 25 (the well-known port for SMTP traffic). A list of the latest port number assignments is available at http://www.iana.org/assignments/port-numbers.
To specify multiple ports, separate the port numbers with a semicolon. To specify a port range, type the beginning and ending numbers separated by a hyphen.
Click Finish.