6.5.1. Understanding Application-level Gateway firewall rules

Application-level Gateway firewall rules are managed on the <Host> > Application-level Gateway > Firewall Rules page. The following information is displayed for every rule:

Configuring SidestackChainer

Figure 6.38. Configuring SidestackChainer

Note

Not every column is displayed by default. To show or hide a particular column, right-click on the header of the table and select the column from the menu.

  • Active: Shows if the rule is enabled or disabled.

  • ID: The unique ID number of the firewall rule.

  • Tags: The tags (labels) assigned to the firewall rule. For details on assigning tags to rules, see Procedure 6.5.5, Tagging firewall rules.

  • Protocol: The transport protocol used in the connection. This is the protocol used in the transport layer (Layer 4) of the OSI model. For example, TCP, UDP, ICMP, and so on.

  • VPN: The rule permits traffic only from the listed VPN connections (or IPSec connections with the specified Request ID).

  • Source Zone/Subnet: The rule permits traffic only for the clients of the listed zones and subnets.

  • Source Port: The rule permits traffic only for connections targeting the listed ports of the firewall host.

  • Destination Zone/Subnet: The rule permits traffic only for connections that target addresses of the listed zones and subnets.

  • Destination Interface/Group: The rule permits traffic only for connections that target an existing IP address of the selected interface (or interface group) of the firewall host. This parameter can be used to provide nontransparent service on an interface that received its IP address dynamically.

  • Destination Port: The rule permits traffic only for connections that target the listed ports of the destination address.

  • Service: The name of the service used to inspect the traffic.

  • Instance: The service started by the rule belongs to the instance shown.

  • Description: The description of the rule.