Access Control Policy Advanced Settings
Advanced access control policy settings typically require little or no modification. The default settings are appropriate for most deployments. Note that many of the advanced preprocessing and performance options in access control policies may be modified by rule updates as described in Update Intrusion Rules.
If View () appears instead, settings are inherited from an ancestor policy, or you do not have permission to modify the settings. If the configuration is unlocked, uncheck Inherit from base policy to enable editing.
Caution | See Configurations that Restart the Snort Process When Deployed or Activated for a list of advanced setting modifications that restart the Snort process, temporarily interrupting traffic inspection. Whether traffic drops during this interruption or passes without further inspection depends on how the target device handles traffic. See Snort Restart Traffic Behavior for more information. |
General Settings
Option |
Description |
---|---|
Maximum URL characters to store in connection events |
To customize the number of characters you store for each URL requested by your users, see Limiting Logging of Long URLs. To customize the length of time before you re-block a website after a user bypasses an initial block, see Setting the User Bypass Timeout for a Blocked Website. |
Allow an Interactive Block to bypass blocking for (seconds) |
|
Retry URL cache miss lookup |
The first time the system encounters a URL that does not have a locally stored category and reputation, it looks up that URL in the cloud and adds the result to the local data store, for faster processing of that URL in the future. This setting determines what the system does when it needs to look up a URL's category and reputation in the cloud. By default, this setting is enabled: The system momentarily delays the traffic while it checks the cloud for the URL's reputation and category, and uses the cloud verdict to handle the traffic. If you disable this setting: When the system encounters a URL that is not in its local cache, the traffic is immediately passed and handled according to the rules configured for Uncategorized and reputationless traffic. In passive deployments, the system does not retry the lookup, as it cannot hold packets. |
Enable Threat Intelligence Director |
Disable this option to stop publishing TID data to your configured devices. |
Enable reputation enforcement on DNS traffic |
This option is enabled by default, for improved URL filtering performance and efficacy. For details and additional instructions, see DNS Filtering: Identify URL Reputation and Category During DNS Lookup (Beta) and subtopics. |
Inspect traffic during policy apply |
To inspect traffic when you deploy configuration changes unless specific configurations require restarting the Snort process, ensure that Inspect traffic during policy apply is set to its default value (enabled). When this option is enabled, resource demands could result in a small number of packets dropping without inspection. Additionally, deploying some configurations restarts the Snort process, which interrupts traffic inspection. Whether traffic drops during this interruption or passes without further inspection depends on how the target device handles traffic. See Snort® Restart Scenarios for more information. |
Associated Policies
Use advanced settings to associate subpolicies (SSL/TLS decryption, identity, prefilter) with access control; see Associating Other Policies with Access Control.
TLS Server Identity Discovery
The latest version of the Transport Layer Security (TLS) protocol 1.3, defined by RFC 8446, is the preferred protocol for many web servers to provide secure communications. Because the TLS 1.3 protocol encrypts the server's certificate for additional security, and the certificate is needed to match application and URL filtering criteria in access control rules, the Firepower System provides a way to extract the server certificate without decrypting the entire packet.
You can enable this feature, referred to as TLS server identity discovery, when you configure advanced settings for an access control policy.
To enable TLS server identity discovery, click the Advanced tab, click Edit () for the setting, and select Early application detection and URL categorization.
We strongly recommend enabling it for any traffic you want to match on application or URL criteria, especially if you want to perform deep inspection of that traffic. An SSL policy is not required because traffic is not decrypted in the process of extracting the server certificate.
Note |
|
Network Analysis and Intrusion Policies
Advanced network analysis and intrusion policy settings allow you to:
-
Specify the intrusion policy and associated variable set that are used to inspect packets that must pass before the system can determine exactly how to inspect that traffic.
-
Change the access control policy’s default network analysis policy, which governs many preprocessing options.
-
Use custom network analysis rules and network analysis policies to tailor preprocessing options to specific security zones, networks, and VLANs.
For more information, see Advanced Access Control Settings for Network Analysis and Intrusion Policies.
Threat Defense Service Policy
You can use the Threat Defense Service Policy to apply services to specific traffic classes. For example, you can use a service policy to create a timeout configuration that is specific to a particular TCP application, as opposed to one that applies to all TCP applications. This policy applies to Firepower Threat Defense devices only, and will be ignored for any other device type. The service policy rules are applied after the access control rules. For more information, see Service Policies.
File and Malware Settings
Tuning File and Malware Inspection Performance and Storage provides information on performance options for file control and AMP for Networks.
Intelligent Application Bypass Settings
Intelligent Application Bypass (IAB) is an expert-level configuration that specifies applications to bypass or test for bypass if traffic exceeds a combination of inspection performance and flow thresholds. For more information, see Intelligent Application Bypass.
Transport/Network Layer Preprocessor Settings
Advanced transport and network preprocessor settings apply globally to all networks, zones, and VLANs where you deploy your access control policy. You configure these advanced settings in an access control policy rather than in a network analysis policy. For more information, see Advanced Transport/Network Preprocessor Settings.
Detection Enhancement Settings
Advanced detection enhancement settings allow you to configure adaptive profiles so you can:
-
Use file policies and applications in access control rules.
-
Use service metadata in intrusion rules.
-
In passive deployments, improve reassembly of packet fragments and TCP streams based on your network’s host operating systems.
For more information, see Adaptive Profiles.
Performance Settings and Latency-Based Performance Settings
About Intrusion Prevention Performance Tuning provides information on improving the performance of your system as it analyzes traffic for attempted intrusions.
For information specific to latency-based performance settings, see Packet and Intrusion Rule Latency Threshold Configuration.
Experimental Features
Experimental features are those that are being tested in active networks to obtain real-world results. These features might not work as expected. When you enable an experimental feature, verify your actual results with the expected behavior.
-
Encrypted Visibility Engine—This is an experimental feature for FMC 7.1.0. For details about this feature, see Encrypted Visibility Engine.