Security Configuration
Data For each rule, the following data is shown:
Name - The name you assigned to the rule.
Source - The traffic covered by this rule, defined by the source IP
address. If the IP address is followed by ... this indicates there is
range of IP addresses, rather than a single address.
Destination - The traffic covered by this rule, defined by destina-
tion IP address. If the IP address is followed by ... this indicates
there is range of IP addresses, rather than a single address.
Action - Action will be "Forward" or "Block"
Add To add a new rule, click the "Add" button, and complete the resulting
screen. See the following section for more details.
Edit To Edit or modify an existing rule, select it and click the "Edit" button.
Move There are 2 ways to change the order of rules
Use the up and down indicators on the right to move the selected
rule. You must confirm your changes by clicking "OK". If you
change your mind before clicking "OK", click "Cancel" to reverse
your changes.
Click "Move" to directly specify a new location for the selected
rule.
Delete To delete an existing rule, select it and click the "Delete" button.
View Log Clicking the "View Log" button will open a new window and display
the Firewall log.
System Rules Clicking the "System Rules" button will open a new window and
display the default firewall rules currently applied by the system. These
rules cannot be edited, but any rules you create will take precedence
over the default rules.
57