Procedure
Procedure
Step 1 | In the left pane, click . | ||||
Step 2 | Click the Devices tab to locate the device or the Templates tab to locate the model device. | ||||
Step 3 | Click the FTD tab and select the device for which you are configuring an identity policy, and click Policy in the Management pane at the right. | ||||
Step 4 | Click Identity in the policy bar. | ||||
Step 5 | Do any of the following:
| ||||
Step 6 | In Order, select where you want to insert the rule in the ordered list of rules. Rules are applied on a first-match basis, so you must ensure that rules with highly specific traffic matching criteria appear above policies that have more general criteria that would otherwise apply to the matching traffic. The default is to add the rule to the end of the list. If you want to change a rule's location later, edit this option. | ||||
Step 7 | In Name, enter a name for the rule. | ||||
Step 8 | Select the Action that the FDM-managed device should apply on a match and if necessary, an Active Directory (AD) Identity Source. You must select the AD identity realm that includes the user accounts for passive and active authentication rules. choose one of the following:
| ||||
Step 9 | (Active Authentication only.) Click the Active authentication tab and select the authentication method (Type) supported by your directory server:
| ||||
Step 10 | (Active authentication only.) Select Fall Back as Guest > On/Off to determine whether users who fail active authentication are labeled as Guest users. Users get 3 chances to successfully authenticate. If they fail, your selection for this option determines how the user is marked. You can deploy access rules based on these values.
| ||||
Step 11 | Define the traffic matching criteria on the Source and Destination tabs for Passive authentication, Active authentication, or No Authentication rule actions. Keep in mind that active authentication will be attempted with HTTP traffic only. Therefore, there is no need to configure No Auth rules for non-HTTP traffic, and there is no point in creating Active Authentication rules for any non-HTTP traffic. However, passive authentication is valid for any type of traffic. The Source/Destination criteria of an identity rule define the security zones (interfaces) through which the traffic passes, the IP addresses or the country or continent (geographical location) for the IP address, or the protocols and ports used in the traffic. The default is any zone, address, geographical location, protocol, and port. To modify a condition, you click the button within that condition, select the desired object or element, and click OK in the popup dialog box. If the criterion requires an object, you can click Create New Object if the object you require does not exist. To remove an object from a condition, hover over the object and click the X. You can configure the following traffic matching criteria. Source Zones, Destination Zones The security zone objects that define the interfaces through which the traffic passes. You can define one, both, or neither criteria: any criteria not specified applies to traffic on any interface.
Use this criteria when the rule should apply based on where the traffic enters or exits the device. For example, if you want to ensure that user identity is collected from all traffic originating from inside networks, select an inside zone as the Source Zones while leaving the destination zone empty.
Source Networks, Destination Networks The network objects or geographical locations that define the network addresses or locations of the traffic.
When you add this criteria, you select from the following tabs:
Source Ports, Destination Ports/Protocols The port objects that define the protocols used in the traffic. For TCP/UDP, this can include ports.
| ||||
Step 12 | Click Save. | ||||
Step 13 | Return to the Security Devices page. | ||||
Step 14 | Select the device to which you added these rules to the identity policy. | ||||
Step 15 | Review and deploy now the changes you made, or wait and deploy multiple changes at once. |