Create Access rules allowing third-party monitoring
If a third-party device and the Log Server are separated by a Firewall or Layer 2 Firewall, edit the Policy to allow traffic from the device to the Log Server.
 For more details about the product and how to configure features, click Help or
            press F1.
Steps
- 
                Select Configuration. 
- Expand Policies, then browse to the type of policy you want to edit.
- Right-click the Firewall or Layer 2 Firewall policy, then select Edit Firewall Policy or Edit Layer 2 Firewall Policy.
- 
Switch to the IPv4 Access or IPv6 Access tab, then add an Access rule with the following values: 
- Source — the third-party element.
- Destination — your Log Server.
- 
Service — ICMP Ping, SNMP (UDP), or SNMP (TCP). The Service depends on the probing method that is used in the Probing Profile selected in the Monitoring rule. 
- Action — Allow.
- Logging — None.
 
- Save and install the policy to start using the new configuration.