Software Secure Access
Activity Manage

Cisco Secure Access Help Manage the Access Policy About the Access Policy Rule Data

Last updated: Aug 07, 2025

Rule Data

The Secure Access policy displays various columns of data on your configured internet and private access rules. For information about choosing additional data on your rules, see Show Additional Data on Your Access Rules.

  • #—The pound sign (hash symbol) indicates the priority of the rule.

  • Rule name—The name that you assigned to the rule.

  • Access—The type of access rule either Internet or Private.

  • Action—The type of action on the rule.

    • For internet access rules: Allow, Block, Isolate, or Warn.
    • For private access rules: Allow or Block.
  • Sources—The sources that can connect to the destinations.

  • Destinations—The resources that are available on the organization and from the internet.

  • Security—The security controls applied to the rule.

    Security controls are the globally-configured profiles that are enabled on the rule: Intrusion Prevention (IPS), Security profiles, and Tenant profiles. Hover over the security icon to display the profile information for the rule.

  • Hits—The number of times Secure Access applied the rule to the traffic defined by the sources and destinations. For more information, see Edit the Order of the Rules in Your Access Policy.

  • Status—The state of the rule. Indicates whether the rule is enabled or disabled.

    Status of Rule Status Icon
    Enabled
    Disabled