Firewall
Configuring the Firewall Access Rules to Control Inbound and Outbound Traffic
STEP 4
STEP 5
NOTE
Cisco ISA500 Series Integrated Security Appliance Administrator Guide
•
Schedule: By default, the access rule is always on. If you want to keep the
access rule active at the specified date and time, choose the schedule for
the access rule. If the schedule you want is not in the list, choose Create
New Schedule to create new firewall schedules. To maintain the firewall
schedules, go to the Firewall -> Schedule page. See
Firewall Schedule, page
•
Log: Click On to log the event when a firewall access rule is hit. To log the
firewall events, you first need to enable the Log feature and configure the log
settings and log facilities. For more information about how to configure the
log settings and log facilities, and how to view the logs, see
Management, page
•
Match Action: Choose the action when the traffic match up with the access
rule.
-
Deny: Deny the access.
-
Permit: Permit the access.
-
Accounting: Increase the Hit Count number by one when the packet hits
the access rule.
Click OK to save your settings.
Click Save to apply your settings.
In addition to configuring the firewall access rules, you can use the following
methods to control the traffic:
•
Preventing common types of attacks. See
Protection, page
•
Allowing or blocking traffic from specified MAC addresses. See
Configuring the MAC Filtering to Permit or Block Traffic, page 205
•
Associating IP addresses with MAC addresses to prevent spoofing. See
Configuring the IP/MAC Binding to Prevent Spoofing, page 206
•
Allowing or blocking the websites that contain a specific URL or URL
keyword. See
Internet, page
186.
302.
207.
Configuring the Content Filtering to Control Access to
201.
Configuring the
Log
Configuring the Attack
6
184