Secure Mobile Access 12.4 Administration Guide

Viewing Access Control Rules

Access control rules are displayed in numerical order on the Access Control page. The appliance evaluates the rules in numbered order. All access control rules are displayed by default, but you can use the Filters settings to filter them by resource type or other criteria.

To view access control rules

  1. In AMC, navigate to Security Administration > Access Control.

  2. By default, all rules that you have created, regardless of resource type, are displayed. Use the Filters section to display a subset of rules. For information about using filters, see Filters. To see a particular rule set, select one of the following from the Method drop-down menus in Filters; see the below table.

    Rule set descriptions
    Web browserDisplay rules controlling access to Web-based (HTTP and HTTPS) resources.
    Connect Tunnel/OnDemand Mapped ModeDisplay rules controlling access to client/server (TCP/IP) resources
    Network ExplorerDisplay rules controlling access to Windows file system resources using WorkPlace.
  3. Review the data shown in the access control rule list:

    • Use the checkbox column to select one or more rules to delete, copy, or reorder (using the Move Up and Move Down buttons).

    • The number column indicates the order in which the rule will be evaluated. To edit a rule, click its corresponding number.

    • To display configuration details and the objects referenced in a rule, click the plus sign (+) next to it.

    • The Action column indicates whether a rule permits or denies access, or is ignored; see the below table.

      Rule action indicators
      GreenAccess is permitted.
      RedAccess is denied.
      GrayThe rule is not evaluated. (Disabling a rule is a convenient way to temporarily stop using a rule without deleting it).
      • The Description column lists the descriptive text you typed when creating the rule.

      • The From column indicates the users to whom the rule applies (Any: all users). In the case of a reverse connection, this column indicates the resource that is connecting to a user or group. See Access Control Rules for Bi-Directional Connections.

      • The To column lists the destination resources to which the rule applies (Any: all users). In the case of a reverse connection, this column can also indicate the user or group that is connecting back to a resource. See Access Control Rules for Bi-Directional Connections.
      • The Method column indicates whether a specific access method is associated with a rule. A globe icon signifies Web browser-based HTTP access; a globe icon with a folder represents Network Explorer, which provides Web access to file system resources; the Secure Mobile Access logo indicates access using the Connect Tunnel or proxy clients, or the OnDemand Tunnel or proxy agents. Any indicates that the rule applies to all access methods.
      • The Zone column indicates whether an access rule is associated with a particular End Point Control zone. EPC zones are used to classify a connection request based on the attributes of the client device. Any indicates the rule applies to all EPC zones; a red Restricted icon indicates that the rule controls access for one or more specific zones.

Was This Article Helpful?

Help us to improve our support portal

Techdocs Article Helpful form

Techdocs Article NOT Helpful form

  • Still can't find what you're looking for? Try our knowledge base or ask our community for more help.