![](/images/backgrounds/287651/hp-x-unified-security-platform-series-users-manual-15357989x1.png)
How Firewall Rule Enforcement Works
STEP G To record sessions matching this firewall rule in the Firewall Session Log (for permitted sessions) or Firewall Block log (for blocked sessions), check Enable logging.
To offload log entries to a remote syslog server, check Enable syslog logging.
STEP 4 In the Network table, configure the Source zone parameters.
STEP A From the Source Zone
Select ANY from the list if you want the firewall rule to match traffic from any source zone.
Select
Note An implicit
STEP B For Source IP, select the IP addresses in the source zone to which you want to apply the rule, either:
•Select All IP addresses. This is the default selection.
•Select IP Address Group and then select the group from the
•Select IP Subnet and type the IP address/subnet mask.
•Select IP Range and type the range of IP addresses.
STEP 5 In the Network table, configure the Destination zone parameters.
STEP A From the Destination Zone
Select ANY from the list if you want the firewall rule to match traffic to any destination zone.
Select
STEP B For Destination IP, select the IP addresses in the destination zone to which you want to apply the rule; do one of the following:
•Select All IP addresses. This is the default setting.
•Select IP Address Group and then select the group from the
•Select IP Subnet and enter the IP address/subnet mask.
•Select IP Range and enter the range of IP addresses.
STEP 6 In the Firewall Rule Setup (Advanced) table, if required, check Enable bandwidth management . Bandwidth management only works on Permit rules.
X Family LSM User’s Guide V 2.5.1 | 73 |
|
|