The Inbound Firewall rules have a priority order that determines the order in which the rules are applied to network traffic.
The rules are applied from top to bottom.
The first rule that matches the traffic will be applied and overrides all the other rules below.
Configurable options for a Inbound firewall rule are:
|Name||Outbound Firewall Rule name|
|Enable||Define if the rule is disable, enabled or following a configured schedule.|
|WAN Connection||Specify the WAN connection to allow or deny certain traffic|
|Protocol||Choose between Any, TCP, UDP, ICMP and IP and select a particular protocol from the dropdown list of services.|
|Source||Configure the source of the traffic based on IP address, IP Network, Mac Address, Grouped Network or Access Control List. A Single Port number or Port Range can also be defined.|
|Destination||Configure the destination of the traffic based on IP address, IP Network, Mac Address, Grouped Network, SaaS, Region or Access Control List. A Single Port number or Port Range can also be defined.|
|Action||Define if traffic matching this rule is Allowed or Denied of leaving the network|
|Event logging||Enable Event logging if required.|