cc/td/doc/product/ismg/policy/ver21
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Policy Domains and Perimeters

Policy Domains and Perimeters

The Policy Domains branch of the Tools and Services tree is where you create, store, and manage your Policy Domains. A policy domain is a logical collection of perimeters that you can reference from a source or destination condition node within a security policy or add to the Security Policy Enforcement branch of the Network Policy tree.

You cannot create perimeters contained in policy domains in the Policy Domains branch; you create perimeters when you add gateway objects to your network topology. As you create each perimeter, a perimeter node representing that perimeter is added to the Unassigned policy domain in the Policy Domains branch. You can then move that perimeter to another policy domain for use in a security policy or in the Security Policy Enforcement folder.

Learn More About Policy Domains and Perimeters

A policy domain is simply a user-defined, logical collection of perimeters. You can reference policy domains in source or destination condition nodes of security policies or add them to the Security Policy Enforcement branch of the Network Policy tree and apply policy to them.

A perimeter represents a network or collection of networks that is bounded by one or more gateways. Each interface on a gateway object can only be associated with a single perimeter; a single gateway object cannot have two interfaces associated with the same perimeter, but two gateway objects may each have a single interface associated with one perimeter. As you can for policy domains, you can reference perimeters in the source or destination condition nodes of security policies or add them to the Security Policy Enforcement branch of the Network Policy tree and apply policy to them.

Although perimeter nodes appear in policy domains in the Policy Domains branch, you cannot create a perimeter in the Policy Domains branch; you create perimeters when you define gateway objects in the Network Topology tree. Each interface on a gateway object is associated with a single perimeter.

Figure 6-1 illustrates the concept of perimeters.


Figure 6-1: Perimeter Example

The topology in the above figure contains two Policy Enforcement Points, P1 and P2.  P1 contains three interfaces, Interface 0 through Interface 2. P2 contains two interfaces, Interface 0 and Interface 1.

Perimeter A is defined by Interface 1 of P1. Perimeter B is defined by Interface 2 of P1 and Interface 0 of P2 and represents all IP addresses that exist between the two interfaces. Perimeter C is defined by Interface 1 of P2. The Internet Perimeter, defined by Interface 0 of P1, represents all unknown networks or IP addresses.

You can use these perimeters in a policy domain to simplify the construction of network policy. If, for example, you want to allow some set of standard network services from the hosts residing on the networks within each perimeter to the Internet, you could construct the policy in the following manner:

First, you create a network service bundle that contains the standard services that you want to allow to the Internet. In this example, we will call it Standard Network Services. Next, you create a policy domain, called Trusted Networks in this example, that contains Perimeter A, Perimeter B, and Perimeter C and place the policy domain in the Security Policy Enforcement branch of the Network Policy tree. Finally, you create a security policy that contains a source condition of "this network object," a service condition of "Standard Network Services" (your service bundle that contains the services that you want to allow), and a destination condition of "Internet," and you apply that policy to the Trusted Networks policy domain in the Security Policy Enforcement branch.

Without the use of the policy domain, you would have to add each network to a folder in the Security Policy Enforcement branch each time you want to apply policy to those networks, which can be a time-consuming process in larger networks, and then apply the policy to the folder. Additionally, by using the policy domain, you create a more scalable security policy. As your network grows, you can add additional perimeters to the policy domain and have the security policy applied to the policy domain in the Security Policy Enforcement branch automatically include the new perimeter when you update and publish the command sets. For this reason, even if you have only a single perimeter to add to the Security Policy Enforcement branch, destination condition, or source condition, you should create a policy domain to contain that perimeter and add the policy domain instead.

Unassigned Policy Domain

The Unassigned policy domain of the Policy Domains branch of the Tools and Services tree is used to store perimeters that have not yet been assigned to a policy domain. When you define a gateway object in the Network Topology tree, one or more perimeter objects representing the perimeter or perimeters created as part of the gateway definition are placed in the Unassigned folder. The perimeter object can then be moved to a user-defined policy domain.

The Trusted and Untrusted Policy Domains

When you first install Cisco Secure Policy Manager, the Policy Domains branch of the Tools and Services tree contains two unpopulated policy domains: Trusted and Untrusted. You can safely rename, delete, or add perimeters to them.

Policy Domains Task List

You can perform the following tasks with folders:

Creating a Policy Domain

You can create policy domains on the Policy Domains branch of the Tools and Services tree in which to organize your perimeters.

To create a policy domain, perform the following task:


Step 1 Expand the Tools and Services tree.

Step 2 Right-click the Policy Domains branch, point to New on the shortcut menu, and then click Policy Domain.

Result: A new node representing the new policy domain appears under the Policy Domains branch. The default name of the policy domain is automatically selected for renaming.

Step 3 Type the new name in the selected box, and then press Enter.

Result: The new name appears in the Name box of the selected folder.

Cisco Secure Policy Manager enables long names and the use of most alphanumeric or symbol characters. Also, you can use both uppercase and lowercase characters. However, you cannot use quotation marks (") or a semicolon (;).


Tips If you cannot edit the name, right-click the new Policy Domain node, and click Rename on the shortcut menu.

Step 4 To save any changes you have made, click Save on the File menu.


 

Moving a Perimeter Between Policy Domains

When a perimeter is first created in the Network Topology tree, a node that represents that perimeter is automatically added to the Unassigned policy domain in the Policy Domains branch of the Tools and Services tree. You can move that perimeter, or any other perimeter contained in a policy domain, to another policy domain on the Policy Domain branch.  However, you cannot move a perimeter to the Policy Domain branch itself.

To move a perimeter between policy domains, perform the following task:


Step 1 Expand the Tools and Services tree, the Policy Domains branch, and the policy domain that contains the perimeter.

Step 2 Drag the icon of the perimeter you want to move and drop it on the destination policy domain.

Result: The perimeter is moved to the designated policy domain.

If the policy domain that originally contained the perimeter is referenced in a policy, the perimeter will no longer be referenced in the policy and the appropriate commands will be removed when the command sets are next generated.

If the policy domain that now contains the perimeter is referenced in a policy, the perimeter will be included in the policy and the appropriate commands created when the command sets are next generated.

Step 3 To save any changes you have made, click Save on the File menu.


 


hometocprevnextglossaryfeedbacksearchhelp
Posted: Mon Jun 5 19:59:48 PDT 2000
Copyright 1989 - 2000©Cisco Systems Inc.