We use cookies on our website to ensure we provide you with the best experience on our website. By using our website, you agree to the use of cookies for analytics and personalized content.This website uses cookies. More Information
It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda CloudGen Firewall

How to Create an IP or Hostname Network Object

  • Last updated on

IP or hostname network objects are network objects that can be used on a Control Center to configure a host by using its IP address or a custom name that is associated with that IP address. The network object must be defined either on a Global/Multi-Range, Range, or Cluster level.

Currently, only IPv4 addresses are accepted.

Before You Begin

If you want to enable IP or hostname network objects on a Range or Cluster level, see How to Enable Firewall Objects on a Range or Cluster Level before you continue.

Configure an IP or Hostname Network Object

In the following example, an IP or hostname network object will be configured on the Multi-Range level.

  1. Log into your Control Center.
  2. Depending on the level on which you want to configure the IP or hostname network object:
    • Global / Multi-Range level: Go to CONFIGURATION > Configuration Tree > Multi-Range > Global Settings > Global Firewall Objects.
    • Range or Cluster level: Go to CONFIGURATION > Configuration Tree > Your Range/Cluster > Range/Cluster Settings > Range/Cluster Firewall Objects.
  3. Click Lock.
  4. Right-click in the list.
  5. Select New from the list.
  6. The Edit/Create Network Object window is displayed.
  7. For Type, select Single IPv4 Address.
  8. For Name, enter the name for the new network object.
  9. Click + to add an IP address that must be associated with the name of the network object.
  10. For IP, enter the IP address.
  11. Click Insert and Close.
    ip_net.png
  12. Click OK.
  13. Click Send Changes and Activate.

As an example, an IP or hostname network object can be used for configuring a destination host that receives syslog data from a firewall. For more information, see How to Configure Syslog Streaming.

Last updated on