Cisco ISA500 Series Administration Manual page 188

Integrated security appliance
Hide thumbs Also See for ISA500 Series:
Table of Contents

Advertisement

Firewall
Configuring the Firewall Access Rules to Control Inbound and Outbound Traffic
Cisco ISA500 Series Integrated Security Appliance Administrator Guide
Add: To add a new entry, click Add.
Edit: To edit an entry, click Edit.
Delete: To delete an entry, click Delete.
Delete Selection: To delete multiple selected entries, check the boxes in the
first column of the table heading and click Delete Selection.
Log: Check this box to log the events when a firewall access rule is hit.
To log the firewall events, check the Log boxes for the firewall access rules,
and then go to the Device Management -> Loggings pages to configure the
log settings and log facilities:
-
To save the firewall logs in the lcoal syslog daemon, you need to enable
the Log feature, set the log buffer size and the severity for local log, and
then check the Local Log box for the Firewall log facility.
-
To save the firewall logs to the remote syslog server if you have a remote
syslog server support, you need to enable the Log feature, specify the
Remote Log settings, and then check the Remote Log box for the
Firewall log facility.
For more information about how to configure the log settings and log
facilities, and how to view the logs, see
Action: To permit traffic access, choose Permit. To deny traffic access,
choose Deny. To increase the Hit Count number by one when the packet hits
the access rule, choose Accounting.
Detail: To view the detail of an access rule, click Detail.
Reset Count: To set the values in the Hit Count culumn for all access rules to
zero, click Reset Count.
The default access rules can not be disabled, deleted, edited, and
NOTE
moved.
Log Management, page
6
302.
182

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Isa550Isa570Isa570wIsa550w

Table of Contents