Create Access rules allowing third-party monitoring
If a third-party device and the Log Server are separated by a Firewall or Layer 2 Firewall, edit the Policy to allow traffic from the device to the Log Server.
For more details about the product and how to configure features, click Help or press F1.
Steps
- Select Configuration.
- Expand Policies, then browse to the type of policy you want to edit.
- Right-click the Firewall or Layer 2 Firewall policy, then select Edit Firewall Policy or Edit Layer 2 Firewall Policy.
-
Switch to the IPv4 Access or IPv6 Access tab, then add an Access rule with the following values:
- Source — the third-party element.
- Destination — your Log Server.
-
Service — ICMP Ping, SNMP (UDP), or SNMP (TCP).
The Service depends on the probing method that is used in the Probing Profile selected in the Monitoring rule.
- Action — Allow.
- Logging — None.
- Save and install the policy to start using the new configuration.