How Firewall Rule Enforcement Works

The following figure shows the Firewall Rules page.

Figure 4–2: FIREWALL - Firewall Rules Page

You can complete the following tasks from the Firewall Rules page:

Create/Edit a firewall rule

Delete a firewall rule

Filter the Firewall Rules List to display only those configured for a user-specified Source and Destination zone.

When the Firewall Rules List is filtered, the LSM only shows filters that match the criteria selected in the Filter Firewall Rules by Zone filter options.

Firewall Rules List Details

The Firewall Rules List page displays the following information for each rule in the list:

Table 4–2: Firewall Rules List Details

Column

Description

 

 

 

 

ID

A unique ID system-assigned to the firewall rule.

 

 

Action

The action that will be applied when this firewall rule is matched for a given

 

session. Either Permit or Block or Web Filter.

 

 

Source Zone

Indicates the Source Security Zone for the session request. By default, the source

(Addresses)

zone includes all IP addresses within the given zone. If the firewall rule has been

 

configured to apply only to a subset of IP addresses, the subset (IP address

 

group, subnet, IP address range) is displayed.

 

 

Destination

This field indicates the destination security zone where traffic will be directed if

Zone

it is permitted. By default, the destination zone includes all IP addresses within

(Addresses)

the given zone. If the firewall rule has been configured to send permitted traffic

 

to only a subset of IP addresses, the subset (IP address group, subnet, IP address

 

range) is displayed.

 

 

X Family LSM User’s Guide V 2.5.1

69