The access control policy based on certificate attributes is an extra measure for certificate-based authentication. Only the certificates meeting specific requirements can be authenticated. This achieves refined control on user access permissions.
In the application scenario where the certificate verification mechanism is used to establish an IPsec tunnel, there is a possibility that only the certificates meeting specific requirements can be authenticated for the establishment of the IPsec tunnel. For example, only certificates issued by a specific CA can be authenticated. You can also configure the access control policy that allows only certificates of specific devices to be authenticated, and these specific devices can establish IPsec tunnels. This achieves refined control on user access permissions.
If information in a certificate does not match the rules in the access control policy, the default action permit in the access control policy is performed on the NetEngine 8000 F. As a result, the certificate can be authenticated.