Manual Chapter : Objects to configure for L2 inbound topologies

Applies To:

BIG-IQ Centralized Management

  • 8.4.0

Objects to configure for L2 inbound topologies

Depending on which protocol you select for your L2 inbound topology, the system will guide you through different pages to configure corresponding required objects, as shown in the table. Be prepared, and have this information on-hand before beginning a topology configuration.

Protocol Objects to configure for an L2 inbound topology
TCP SSL → Service → Service Chain → Security Policy → Interception Rule → Log Settings (SSLO RPM 6.0 and later)
UDP Service → Service Chain → Security Policy → Interception Rule → Log Settings (SSLO RPM 6.0 and later)
Other Interception Rule → Log Settings (SSLO RPM 6.0 and later)
Any Disable L2 Inbound option in SSL Orchestrator Topologies