Firewall
Configuring the Firewall Access Rules to Control Inbound and Outbound Traffic
Cisco ISA500 Series Integrated Security Appliance Administrator Guide
184
6
•
Schedule:
By default, the access rule is always on. If you want to keep the
access rule active at the specified date and time, choose the schedule for
the access rule. If the schedule you want is not in the list, choose
Create
New Schedule
to create new firewall schedules. To maintain the firewall
schedules, go to the
Firewall -> Schedule
page. See
•
Log:
Click
On
to log the event when a firewall access rule is hit. To log the
firewall events, you first need to enable the
Log
feature and configure the log
settings and log facilities. For more information about how to configure the
log settings and log facilities, and how to view the logs, see
•
Match Action:
Choose the action when the traffic match up with the access
rule.
-
Deny:
Deny the access.
-
Permit:
Permit the access.
-
Accounting:
Increase the Hit Count number by one when the packet hits
the access rule.
STEP 4
Click
OK
to save your settings.
STEP 5
Click
Save
to apply your settings.
NOTE
In addition to configuring the firewall access rules, you can use the following
methods to control the traffic:
•
Preventing common types of attacks. See
.
•
Allowing or blocking traffic from specified MAC addresses. See
Configuring the MAC Filtering to Permit or Block Traffic, page 205
•
Associating IP addresses with MAC addresses to prevent spoofing. See
Configuring the IP/MAC Binding to Prevent Spoofing, page 206
•
Allowing or blocking the websites that contain a specific URL or URL
keyword. See
Configuring the Content Filtering to Control Access to
.