To enable remote devices to send log messages to Dimension through the gateway Firebox, what must you verify is included in your gateway Firebox configuration? (Select one.)
To enable remote devices to send log messages to Dimension through the gateway Firebox, what must you verify is included in your gateway Firebox configuration? (Select one.)
To enable remote devices to send log messages to Dimension through the gateway Firebox, it is essential to ensure that either the WG-Logging packet filter policy or another policy that permits external connections to Dimension over port 4115 is included in your gateway Firebox configuration. This is because remote devices need a designated path to communicate log data to Dimension, and port 4115 is specifically used for this purpose.
Isn't D the correct answer?
For external Fireboxes to send log messages to a Dimension instance behind a Firebox, the Firebox must have a policy to allow inbound TCP port 4115 connections, with a static NAT action to forward those connections to Dimension.
The correct answer is D
https://www.watchguard.com/help/docs/help-center/en-US/Content/en-US/Fireware/dimension/deploy_behind-device_d.html
The correct answer is D
Just configure allow source device can access to dimension server with TCP/4115
So D is right ans
it isn't clear, to enable Dimension there's a section in System Manager called "logging"
D is correct. "For external Fireboxes to send log messages to a Dimension instance behind a Firebox, the Firebox must have a policy to allow inbound TCP port 4115 connections, with a static NAT action to forward those connections to Dimension." https://www.watchguard.com/help/docs/help-center/en-US/Content/en-US/Fireware/dimension/deploy_behind-device_d.html
D is the right answer
D is right