Manual Chapter :
Objects to configure for L2 outbound topologies
Applies To:
Show VersionsBIG-IQ Centralized Management
- 7.1.0
Objects to configure for L2 outbound topologies
Depending on which protocol you select for your L2 outbound topology, the system guides you through different screens to configure corresponding required objects, as shown in the table. Be prepared, and have this information on-hand before you begin a topology configuration.
Protocol | Objects to configure in an L2 outbound topology workflow |
---|---|
TCP | SSL Configuration → Service → Service Chain → Security Policy → Interception Rule → Log Settings (SSLO RPM 6.0 and later) |
UDP | Service → Service Chain → Security Policy → Interception Rule → Log Settings (SSLO RPM 6.0 and later) |
Other | Interception Rule |
Any | SSL Configuration → Service → Service Chain → Security Policy → Interception Rule → Log Settings (SSLO RPM 6.0 and later) |