Working with the Firewall Access Policy
Quantum Spark 1500, 1600 and 1800 Appliance Series R80.20.40 Locally Managed Administration Guide | 166
These are the fields that manage the rules for the Firewall Access Policy:
Rule Base Field
Description
No.
Rule number in the Firewall Rule Base.
Source
IP address, network object, user group, or
domain object that initiates the connection.
Destination
IP address or network object that is the target of
the connection.
Application
Applications or web sites that are accepted or
blocked. You can filter the list by common
applications, categories, custom defined
applications, URLs or groups. For more
information, see
.
This field is only shown in the Outgoing access to
the Internet section.
Service
Type of network service that is accepted or
blocked.
Action
Firewall action that is done when traffic matches
the rule.
For outgoing traffic rules, you can use the
Customize messages
option to configure "Ask"
or "Inform" actions in addition to the regular
Block or Accept actions.
The messages shown can be set for these action
types: Accept and Inform, Block and Inform, or
Ask. Ask action lets the end user decide if this
traffic is for work purposes or personal. See the
Customize messages
section below. Users are
redirected to a portal that shows a message or
question.
If a time range is set for the rule, a clock icon is
shown.
Log
The tracking and logging action that is done
when traffic matches the rule.
Comment /
Auto generated rule
Details shown immediately below the above
fields for:
n
Comments you enter when you create a
rule.
n
Rules that the system automatically
generates. You can click the object name
link in the comment to open its
configuration tab.