Manual Chapter : Objects to configure for L2 outbound topologies

Applies To:

BIG-IQ Centralized Management

  • 8.4.0

Objects to configure for L2 outbound topologies

Depending on which protocol you select for your L2 outbound topology, the system guides you through different screens to configure corresponding required objects, as shown in the table. Be prepared, and have this information on-hand before you begin a topology configuration.

Protocol Objects to configure in an L2 outbound topology workflow
TCP SSL Configuration → Service → Service Chain → Security Policy → Interception Rule → Log Settings (SSLO RPM 6.0 and later)
UDP Service → Service Chain → Security Policy → Interception Rule → Log Settings (SSLO RPM 6.0 and later)
Other Interception Rule
Any SSL Configuration → Service → Service Chain → Security Policy → Interception Rule → Log Settings (SSLO RPM 6.0 and later)