How Firewall Rule Enforcement Works
The following figure shows the Firewall Rules page.
Figure
You can complete the following tasks from the Firewall Rules page:
•Create/Edit a firewall rule
•Delete a firewall rule
•Filter the Firewall Rules List to display only those configured for a
When the Firewall Rules List is filtered, the LSM only shows filters that match the criteria selected in the Filter Firewall Rules by Zone filter options.
Firewall Rules List DetailsThe Firewall Rules List page displays the following information for each rule in the list:
Table
Column | Description |
|
|
|
|
ID | A unique ID |
|
|
Action | The action that will be applied when this firewall rule is matched for a given |
| session. Either Permit or Block or Web Filter. |
|
|
Source Zone | Indicates the Source Security Zone for the session request. By default, the source |
(Addresses) | zone includes all IP addresses within the given zone. If the firewall rule has been |
| configured to apply only to a subset of IP addresses, the subset (IP address |
| group, subnet, IP address range) is displayed. |
|
|
Destination | This field indicates the destination security zone where traffic will be directed if |
Zone | it is permitted. By default, the destination zone includes all IP addresses within |
(Addresses) | the given zone. If the firewall rule has been configured to send permitted traffic |
| to only a subset of IP addresses, the subset (IP address group, subnet, IP address |
| range) is displayed. |
|
|
X Family LSM User’s Guide V 2.5.1 | 69 |
|
|