Chapter8 Create Firewall
How Do I...
8-16
Cisco Router and Security Device Manager 2.5 User’s Guide
OL-4015-12
Each access rule appears in the upper table on the right side of the screen. The
lower table shows the specific source and destination IP addresses and the
services that are permitted or denied by the rule.
Step3 In the upper table, click the rule that you want to modify.
Step4 Click Edit.
The Edit a Rule dialog box appears.
Step5 The Rule Entry field shows each of the source IP/destination IP/service
combinations that are permitted or denied by the rule. Click the rule entry that you
want to configure to generate log entries.
Step6 Click Edit.
Step7 In the rule entry dialog box, check the Log Matches Against this Entry check
box.
Step8 Click OK to close the dialog boxes you have displayed.
The rule entry that you just modified will now generate log entries whenever a
connection is attempted from the IP address range and services that the define the
rule entry.
Step9 Repeat Step 4 through Step 8 for each rule entry that you want to configure to
generate log entries.
Once your logging configuration is complete, follow the steps below to view your
firewall activity:
Step1 From the toolbar, select Monitor Mode.
Step2 From the left frame, select Firewall Status.
In the Firewall statistics, you can verify that your firewall is configured and view
how many connection attempts have been denied.
The table shows each router log entry generated by the firewall, including the time
and the reason that the log entry was generated.