Firewall Rules

The firewall rules are processed in the order that they appear. You can add, edit, delete, duplicate, enable or disable, and change the order of firewall rules.
  • To add a custom rule, select
    . The components you add to a new firewall rule are not available for other rules. See:
  • To edit a rule, select the cell you want to modify.
  • To change the order that the rule is processed, select
    , select the rule that should appear
    where you want the rule to appear, and select
    . To cancel the move, after you select
    , select
    Cancel Cut
    . See:
  • To create a copy of the rule within the same policy, select
    , select the rule that should appear
    where you want the rule to appear, and select
    . To cancel the copy, after you select
    , select
    Cancel Copy
  • To permanently remove a rule from the list, select
    . However, if you remove all of the default rules, when you save the policy, the missing default rules reappear automatically and in their original order.
Rules columns
Policy icon
/check box
Hover over the policy icon until it turns into a check box. Check the box to select the rule.
Displays the order that the firewall processes the rules. You can reorder rules to change priorities.
Rule Name
Displays the name of the rule.
Enables the rule. If you disable the rule, the firewall ignores it.
Specifies what happens to traffic if the traffic matches the following rule conditions:
  • Allow
    Allows any communication of this type to take place.
  • Block
    Prevents any communication of this type.
Specifies the applications that trigger the rule. If the application is detected on the device, the rule takes effect.
Specifies the hosts that trigger the rule.
Specifies the services that trigger the rule.
Typically, specific types of services occur on specific ports. For example, web traffic (HTTP and HTTPS) generally occurs on ports 80 and 443. The Service list lets you group multiple ports together.
The rule can apply to inbound network traffic, outbound network traffic, or network traffic in both directions.
Logs a security event when a traffic event matches the criteria that are set for this rule. The event is tracked in the client's Traffic log. You can specify whether or not to log the event.
Assigns a level of importance to the event.
Firewall events appear on the
Alerts and Events
page >
Security Events
tab >
Total Events
Threats Prevented
categories. See:
Specifies the adapters that trigger the rule. A network adapter is a hardware component that a device uses to connect to the network and communicate with other devices.
Specifies the times during which the rule is active or inactive. You must enter time in UTC format.
Screen Saver
Specifies whether a locked screen or unlocked screen affects the rule.
Provides the additional information for the rule, such as how it works.