Forum Discussion
Bradley11530
Jul 29, 2022Nimbostratus
Network firewall rules provide additional flexibility when configuring security for the management interface. You can configure the action to accept, drop, or reject incoming connections based on the protocol, source ports and IP addresses, and destination ports and IP addresses. For example, you can configure a positive security posture by creating rules that allow access to specific ports on the management interface from specific hosts on your network. The last rule you create in the rule list is an inclusive rule that drops all traffic destined to the management interface. As a result, the BIG-IP system drops any traffic that does not match an allow rule. PFMLogin