Firewall Rules

The firewall rules are processed in the order that they appear. You can add, edit, delete, duplicate, enable or disable, and change the order of firewall rules.
  • To add a custom rule, select
    Add
    .The components you add to a new firewall rule are not available for other rules.
  • To edit a rule, select the cell you want to modify.
  • To change the order that the rule is processed, select
    Cut
    , select the rule that should appear
    after
    where you want the rule to appear, and select
    Paste
    . To cancel the move, after you select
    Cut
    , select
    Cancel Cut
    .
  • To create a copy of the rule within the same policy, select
    Copy
    , select the rule that should appear
    after
    where you want the rule to appear, and select
    Paste
    . To cancel the copy, after you select
    Copy
    , select
    Cancel Copy
  • To permanently remove a rule from the list, select
    Delete
    . However, if you remove all of the default rules, when you save the policy, the missing default rules reappear automatically and in their original order.
Rules columns
Column
Description
Policy icon
/check box
Hover over the policy icon until it turns into a check box. Check the box to select the rule.
No
Displays the order that the firewall processes the rules. You can reorder rules to change priorities.
Rule Name
Displays the name of the rule.
Enabled
Enables the rule. If you disable the rule, the firewall ignores it.
Action
Specifies what happens to traffic if the traffic matches the following rule conditions:
  • Allow
    Allows any communication of this type to take place.
  • Block
    Prevents any communication of this type.
Applications
Specifies the applications that trigger the rule. If the application is detected on the device, the rule takes effect.
Host
Specifies the hosts that trigger the rule.
Service
Specifies the services that trigger the rule.
Typically, specific types of services occur on specific ports. For example, web traffic (HTTP and HTTPS) generally occurs on ports 80 and 443. The Service list lets you group multiple ports together.
The rule can apply to inbound network traffic, outbound network traffic, or network traffic in both directions.
Log
Logs a security event when a traffic event matches the criteria that are set for this rule. The event is tracked in the client's Traffic log. You can specify whether or not to log the event.
Severity
Assigns a level of importance to the event.
Firewall events appear on the
Alerts and Events
page >
Security Events
tab >
Total Events
and
Threats Prevented
categories
Adapter
Specifies the adapters that trigger the rule. A network adapter is a hardware component that a device uses to connect to the network and communicate with other devices.
Time
Specifies the times during which the rule is active or inactive. You must enter time in UTC format.
Screen Saver
Specifies whether a locked screen or unlocked screen affects the rule.
Description
Provides the additional information for the rule, such as how it works.