Working with the Firewall Access Policy
R81.10.X Quantum Spark 1500, 1600, 1800, 1900, 2000 Appliances Locally Managed Administration Guide|218
These are the fields that manage the rules for the Firewall Access Policy:
Rule Base
Field
Description
No. Rule number in the Firewall Rule Base.
Source IP address, network object, user group, or domain object that initiates the
connection.
Destination IP address or network object that is the target of the connection.
Application Applications or web sites that are accepted or blocked. You can filter the
list by common applications, categories, custom defined applications,
URLs or groups. For more information, see
"Managing Applications &
URLs" on page390
.
This field is only shown in the Outgoing access to the Internet section.
Service Type of network service that is accepted or blocked.
Action Firewall action that is done when traffic matches the rule.
For outgoing traffic rules, you can use the Customize messages option to
configure "Ask" or "Inform" actions in addition to the regular Block or
Accept actions.
The messages shown can be set for these action types: Accept and Inform,
Block and Inform, or Ask. Ask action lets the end user decide if this traffic is
for work purposes or personal. See the Customize messages section
below. Users are redirected to a portal that shows a message or question.
If a time range is set for the rule, a clock icon is shown.
Log The tracking and logging action that is done when traffic matches the rule.
Comment /
Auto
generated
rule
Details shown immediately below the above fields for:
n
Comments you enter when you create a rule.
n
Rules that the system automatically generates. You can click the
object name link in the comment to open its configuration tab.