Manual Chapter :
Objects to configure for L2 outbound topologies
Applies To:
Show VersionsBIG-IQ Centralized Management
- 7.0.0
Objects to configure for L2 outbound topologies
Depending on which protocol you select for your L2 outbound topology, the system guides you through different screens to configure corresponding required objects, as shown in the table. Be prepared, and have this information on-hand before you begin a topology configuration.
Protocol | Objects to configure in an L2 outbound topology
workflow
|
---|---|
TCP | SSL Configuration → Service → Service Chain → Security Policy → Interception Rule |
UDP | Service → Service Chain → Security Policy → Interception Rule |
Other | Interception Rule |
Any | SSL Configuration → Service → Service Chain → Security Policy → Interception Rule |