Troubleshoot Private Access Rules

Ad

To troubleshoot private access rules:

General Troubleshooting Tips

  • Navigate to the Overview page for possible status notifications
  • Use Activity Search to look for logged events

Problems While Creating a Rule

Next button is not available

The Next button is not available until you give the rule a name and then click out of the Rule name field.

Problems After Creating a Rule

Traffic is unexpectedly blocked

A few things to try, either to temporarily suspend problematic blocks, or to narrow down the cause:

  • Verify that any existing rule allowing the traffic is enabled.
  • To allow immediate access to a necessary destination that is being blocked, you can create a new access rule allowing the traffic (using the "Enter manually" option for source and/or destination if necessary).
  • You can disable intrusion prevention (IPS) for a rule.
  • You can disable intrusion prevention (IPS) on the Rule Defaults page, which disables it for all rules that are configured to use the default setting for IPS.
  • You can disable decryption for intrusion prevention (IPS) for all rules in Global Settings, which effectively disables intrusion prevention.
  • If a Zero Trust connection is unsuccessful:
    • Make sure that zero trust connections are enabled for the resource.
    • Check the Traffic Steering page (Connect > End User Connectivity > Zero Trust) for absence of, exceptions to, or conflicts with the applicable Private Resource configuration.
    • Endpoint requirements as specified in the applicable zero trust posture profile.
    • Posture profiles are rule-matching criteria, not security criteria. Try specifying posture profile(s) that have no requirements and see if the traffic matches.
    • For browser-based connections, you may need to configure a custom host header for the resource in order to forward traffic correctly. See Add a Private Resource.
  • If a VPN connection is unsuccessful, ensure that:
    • There is a VPN traffic steering rule for the applicable network address space
    • There is an access rule allowing the traffic (either for a configured private resource or for the applicable network address space)
    • If a Private Resource is configured for the resource, it must permit VPN connections.
  • Assess whether the following situation applies: App A is dependent on App B, but App B is not included in the private resource or access rule configurations.
  • If your organization is using Resource Connectors, see Troubleshoot Resource Connectors and Connector Groups.

Traffic is unexpectedly allowed

A few things to try, either to block problematic traffic, or to narrow down the cause:

  • Because traffic to private destinations is blocked by default, this means there is one or more existing rules that explicitly allows this traffic. You will need to find any such rules.
  • Make sure the applicable rule is enabled (toggle at top of rule page)
  • Make sure IPS is not disabled in the rule default or in the rule. Any rule tagged to use the default setting continues to use the default setting even if the default setting has changed.
  • Make sure IPS Decryption is not disabled in Global Settings.
  • Check each rule component (rule action and each posture and security control) to be sure each specifies the behavior you expect.
  • Check to see that an expected exception to connect to the private resource appears as expected on the Traffic Steering page (Connect > End User Connectivity > Zero Trust.)
  • To immediately block access to a problem destination that is unexpectedly being allowed, you can create a new access rule (using the "Enter manually" option for source and/or destination if necessary) and put this rule at or near the top of the rule list on the Policy page so it hits before more general rules that would otherwise apply to the traffic.

Rule does not match traffic as expected

Some things to try:

  • Check the private resource configuration.
  • Check the sources and destinations configured in the rule to be sure they include the problematic source and destination.
  • Endpoint requirements as specified in posture profiles are matching criteria, not security criteria. Try specifying posture profile(s) that have no requirements and see if the traffic matches.
  • Check other rules in the rule order; traffic may be hitting a different rule than the one you expect.
  • If you have configured a Private Resource, then modified the automatically created entry on the Traffic Steering page (for example, to exclude subdomains from zero-trust access), then modified addresses on the Private Resource configuration page, the resource addresses are not updated for traffic steering purposes. You must manually update the address(es) on the Traffic Steering page.

Global Settings for Private Access Rules < Troubleshoot Private Access Rules > Add Rules with the Cisco Assistant