In this topic, you will learn how to create and assign an access control policy in Portnox™
Cloud.
To understand what are policies in Portnox Cloud, what types of policies are available, and how they work together with
accounts and groups, read the following topic: What are policies in Portnox Cloud?.
Note: The System Default Policy is tuned to meet the requirements of most configurations. When testing or
initially deploying Portnox Cloud, you can skip this topic and keep the default settings. The System Default
Policy is assigned to all groups, unless you create another policy and assign it manually.
-
In the Cloud portal top menu, click on the Policies option.
-
In the right-hand side pane, click on the Create policy button to create a new policy.
Note: You can also edit an existing policy by clicking on the ✎ icon on the
right-hand side of the selected line that represents the policy. The creation and editing processes are almost the
same.
-
In the Access Control Policy Name field, enter the name for the new policy and in the field
below, enter an optional description.
If you’re editing the System Default Policy, you cannot change its name.
-
On the left-hand side, click on the Wireless (Network) option to configure policy rules for
wireless networks.
Each policy contains rules for all three network types as well as for applications. If you do not configure a specific type, Portnox Cloud will use default settings for that
type.
-
In the SUCCESSFUL AUTHENTICATION tab, define the rules for successful authentication for
wireless networks:
These rules will apply if the device authenticates successfully with Portnox Cloud and gains access to the
network.
-
In the VLAN SETTINGS section, optionally activate the Quarantine devices in a
specific VLAN switch.
If this setting is not turned on, the device will be assigned to the default VLAN for that interface or
wireless network. If this setting is turned on, you can either select a VLAN ID or
VLAN name, and the NAS will assign the device to the
selected VLAN.
Note: We recommend that you use the VLAN name if the VLAN ID is
inconsistent across different sites, for example, when in one office the Sales VLAN has
ID 7, and in another office the Sales vlan has ID 42.
-
In the ACCESS CONTROL LIST SETTINGS section, optionally activate the Assign
authenticated devices to a specific Access Control List (ACL) switch.
If this setting is not turned on, the device will have access to the network without being assigned to any
ACLs. If this setting is turned on, you can either select an existing ACL rule ID
(the rule is defined on the NAC device and simply referred to by its ID), the DACL Policy
Builder to create rules one by one, or Custom DACL to paste an
existing DACL that you have defined somewhere else.
-
If you selected DACL Policy Builder in the previous step, click on the Add
new rule link to create a new rule.
Important: Only NAS devices that support dACLs (downloadable ACLs) can execute custom ACL rules.
While most professional NAS devices support this technology, there are notable exceptions. Check your NAS
device documentation for information about dACL support.
Portnox Cloud supports the following vendors for
downloadable ACLs:
- Aruba
- Brocade
- Cisco
- HP
- Huawei
- Juniper
- Ruckus
For an example of how to create dACLs on a Cisco switch using the Policy Builder, see the
following topic: Create a downloadable access control list (dACL) on a Cisco switch using the Policy Builder.
If you use devices that do not support
dACLs, for example, Cisco Wireless LAN Controllers (WLCs) and Wireless Service Modules (WiSMs), you need
to create the ACL on the device and refer to that ACL using the ACL rule
ID.
-
In the Action field, select whether this rule will Deny
or Permit packets that match the rule.
-
In the Protocol field, select the protocol that this rule applies to:
TCP, UDP, or Any.
-
In the Source IP or IP/Range field, enter the source IP address or the source
IP address in the CIDR format or leave the field empty to match all
source IP addresses.
-
In the Source port field, enter the source port number or leave the field
empty to match all source port numbers.
-
In the Destination IP or IP/Range field, enter the destination IP address or
the destination IP address in the CIDR format or leave the field empty to match all destination IP
addresses.
-
In the Destination port field, enter the destination port number or leave the
field empty to match all destination port numbers.
Click on the Confirm button to save the rule. Add more rules using the Add
new rule link (maximum 65 rules) or edit/remove existing rules using
Edit or Remove links on the right-hand side of a selected
rule.
-
If you selected Custom DACL in the previous step, in the Attribute
name field, select the attribute name relevant to your NAS device, and in the text area below,
paste your existing dACL.
For example:

Note: The Custom DACL option supports up to 65 lines.
-
In the AUTHENTICATION VIOLATION tab, define the rules for authentication violation for wireless
networks:
These rules will apply if the device fails to authenticate with Portnox Cloud for any reason.
-
In the VLAN SETTINGS section, select the action to be taken upon authentication
violation:
-
Deny access: The NAS will deny the device access to the network.
-
Quarantine devices in a specific VLAN: The NAS will allow the device to access
the network but will assign the device to a specific VLAN.
-
If you selected the Quarantine devices in a specific VLAN, follow the instructions as
described for the SUCCESSFUL AUTHENTICATION tab.
-
In the RISK POLICY VIOLATION tab, define the rules for risk policy violation for wireless
networks. The configuration process is identical to the one for the AUTHENTICATION VIOLATION
tab.
-
In the BLOCKED BY ADMIN tab, define the rules for when the wireless device is blocked by the
administrator. The configuration process is identical to the one for the AUTHENTICATION VIOLATION
tab.
These rules will apply if the Portnox Cloud administrator manually blocks the device on the
Devices screen.
-
In the left-hand side menu, select the Wired (Network) option and repeat the steps above for
wired networks.
The configuration options for wired networks are identical to those for wireless networks.
-
In the left-hand side menu, select the VPN (Network) option and repeat the following steps for
all tabs: SUCCESSFUL AUTHENTICATION, AUTHENTICATION VIOLATION,
RISK POLICY VIOLATION, and BLOCKED BY ADMIN:
The configuration options for VPNs are identical for all four tabs.
-
Click on the Assign VPN-connected devices to a Group policy switch to activate it.
This setting applies to Windows Group Policies on the VPN server. If this setting is not turned on,
VPN-connected devices will be assigned to the default Group Policy. If this setting is turned on, you can
select the Group Policy to assign the device to.
-
In the Policy name field, enter the name of the Group Policy.
Important: In this context, the term
group policy refers to the Cisco definition, as
outlined in
Cisco documentation, rather than the more popular Microsoft interpretation
of group policy:
A group policy is a set of user-oriented attribute/value pairs for IPSec connections that
are stored either internally (locally) on the device or externally on a RADIUS server.
-
If you’re creating an access control policy for application access,
in the left-hand side menu, select the ZTNA Resource option.
Application access control policies are used only by the Portnox Zero Trust Network Access functionality, and in such
policies, there are no network-related settings.
-
In the Authorized resources tab, add or edit conditions using a condition builder. These
conditions will control hosted resource access with ZTNA.
Note: This does not apply to SSO Web resources. These resources are always accessible to all groups by default
because they are public Internet applications and do not require access control.
Click on the + Add new link to add a new condition set or click on the ✎ icon to edit an existing condition set.
-
Click on the AND/OR button in a logical branch to
change the logical condition.
-
Click on the + button in a logical branch and select Add
rule to add another condition to the current logical branch.
-
Click on the + button in a logical branch and select Add And/Or
block to add a sub-branch to the current logical branch.
-
In the first column of a logical rule, select Resource or
Gateway to set the class of parameters to be tested in the condition.
-
In the second column of a logical rule, select a parameter applying to the site or to the NAS, such
as Name (for both resources and gateways) or Region
(for gateways) to be tested in the condition.
-
In the third column of a logical rule, select Equals,
NotEquals, StartsWith,
EndsWith, or Contains to set the comparison
operator.
-
In the fourth column of a logical rule, enter a value for comparison or select from a list of
possible values (depending on the condition).
-
In the Risk policy violation tab, decide what action to take if a device that is
attempting to access a resource violates a risk assessment policy.
-
To save your policy settings, click on the Save button on the bottom right of the page.
Result: You created or edited an access control policy. You can now assign this policy to groups.
To assign policies to groups, see the following topic: Assign policies to a group.
Important: If you change the VLAN/ACL assignments of a policy that is already used by devices, these changes do not
apply immediately, but only after the device disconnects and reconnects to the network. This is because only then the device
will receive the new assignments from the RADIUS server. However, you can force such a disconnect by using the RADIUS Change
of Authorization (CoA) feature. To learn more about how to set up your environment to support RADIUS CoA, see the following
topic:
Enable the RADIUS Change of Authorization feature.