Firewall
Configuring the Firewall Access Rules to Control Inbound and Outbound Traffic
Cisco ISA500 Series Integrated Security Appliance Administrator Guide
182
6
•
Add:
To add a new entry, click
Add
.
•
Edit:
To edit an entry, click
Edit
.
•
Delete:
To delete an entry, click
Delete
.
•
Delete Selection:
To delete multiple selected entries, check the boxes in the
first column of the table heading and click
Delete Selection
.
•
Log:
Check this box to log the events when a firewall access rule is hit.
To log the firewall events, check the
Log
boxes for the firewall access rules,
and then go to the
Device Management -> Loggings
pages to configure the
log settings and log facilities:
-
To save the firewall logs in the lcoal syslog daemon, you need to enable
the Log feature, set the log buffer size and the severity for local log, and
then check the
Local Log
box for the
Firewall
log facility.
-
To save the firewall logs to the remote syslog server if you have a remote
syslog server support, you need to enable the Log feature, specify the
Remote Log settings, and then check the
Remote Log
box for the
Firewall
log facility.
For more information about how to configure the log settings and log
facilities, and how to view the logs, see
•
Action:
To permit traffic access, choose
Permit
. To deny traffic access,
choose
Deny
. To increase the
Hit Count
number by one when the packet hits
the access rule, choose
Accounting
.
•
Detail:
To view the detail of an access rule, click
Detail
.
•
Reset Count:
To set the values in the Hit Count culumn for all access rules to
zero, click
Reset Count
.
NOTE
The default access rules can not be disabled, deleted, edited, and
moved.