Manual Chapter : Objects to configure for L2 inbound topologies

Applies To:

Show Versions Show Versions

BIG-IQ Centralized Management

  • 7.1.0, 7.0.0
Manual Chapter

Objects to configure for L2 inbound topologies

Depending on which protocol you select for your L2 inbound topology, the system will guide you through different pages to configure corresponding required objects, as shown in the table. Be prepared, and have this information on-hand before beginning a topology configuration.
Protocol
Objects to configure for an L2 inbound topology
TCP
SSL → Service → Service Chain → Security Policy → Interception Rule → Log Settings (SSLO RPM 6.0 and later)
UDP
Service → Service Chain → Security Policy → Interception Rule → Log Settings (SSLO RPM 6.0 and later)
Other
Interception Rule → Log Settings (SSLO RPM 6.0 and later)
Any
Disable L2 Inbound option in SSL Orchestrator Topologies