The firewall rules are processed in the order that they appear. You can add, edit, delete, duplicate, enable or disable, and change the order of firewall rules.
- To add a custom rule, selectAdd. The components you add to a new firewall rule are not available for other rules. See:
- To edit a rule, select the cell you want to modify.
- To change the order that the rule is processed, selectCut, select the rule that should appearafterwhere you want the rule to appear, and selectPaste. To cancel the move, after you selectCut, selectCancel Cut. See:
- To create a copy of the rule within the same policy, selectCopy, select the rule that should appearafterwhere you want the rule to appear, and selectPaste. To cancel the copy, after you selectCopy, selectCancel Copy
- To permanently remove a rule from the list, selectDelete. However, if you remove all of the default rules, when you save the policy, the missing default rules reappear automatically and in their original order.
Hover over the policy icon until it turns into a check box. Check the box to select the rule.
Displays the order that the firewall processes the rules. You can reorder rules to change priorities.
Displays the name of the rule.
Enables the rule. If you disable the rule, the firewall ignores it.
Specifies what happens to traffic if the traffic matches the following rule conditions:
Specifies the applications that trigger the rule. If the application is detected on the device, the rule takes effect.
Specifies the hosts that trigger the rule.
Specifies the services that trigger the rule.
Typically, specific types of services occur on specific ports. For example, web traffic (HTTP and HTTPS) generally occurs on ports 80 and 443. The Service list lets you group multiple ports together.
The rule can apply to inbound network traffic, outbound network traffic, or network traffic in both directions.
Logs a security event when a traffic event matches the criteria that are set for this rule. The event is tracked in the client's Traffic log. You can specify whether or not to log the event.
Assigns a level of importance to the event.
Firewall events appear on the
Alerts and Eventspage >
Security Eventstab >
Threats Preventedcategories. See:
Specifies the adapters that trigger the rule. A network adapter is a hardware component that a device uses to connect to the network and communicate with other devices.
Specifies the times during which the rule is active or inactive. You must enter time in UTC format.
Specifies whether a locked screen or unlocked screen affects the rule.
Provides the additional information for the rule, such as how it works.