The Firewall Rules Report shows the top firewall rules triggered on this firewall, grouped by different categories.
How to export report in PDF, CSV, XLS formats, on demand?
The Top Used Rules table shows the used Firewall rules and number of log counts that have triggered the firewall rules. The table shows the Rule Number or ID of the used rule, the Count of log entries that have triggered the particular rule, and Total Bytes (MB). Drill down from the rule to see the Rule Usage Trend with Date/Time and Hits, Rule usage with hosts, protocols, user, destination, status, message, total bytes consumed (MB) by the rules and count that triggered the firewall rule, and Rule description.
The Top Unused Rules table shows the Firewall rules that have not triggered. The table shows the Rule Number or ID of the unused rule. Drill down from the rule to see the description of the unused rule.
The Top Rules - Protocol Group Based graph shows the top protocol groups that have triggered firewall rules. The table below the graph shows the protocol group, the rule triggered, and the number of hits. Drill down from this graph to see the top hosts, the top protocols and the top conversations that triggered the firewall rule in that protocol group.
The Top Rules - Host Based graph shows the top hosts that have triggered firewall rules. The table below the graph shows the host, the rule triggered, the number of hits. Drill down from this graph to see the top destinations accessed, the top protocols and the top conversations for each host that triggered the firewall rule.
The Top Rules - Destination Based graph shows the top destinations for which firewall rules have been triggered. The table below the graph shows the destination host name or IP address, the rule triggered, and the number of hits. Drill down from this graph to see the top hosts, the top protocols and the top conversations that triggered the firewall rule.
Refer Configure Firewall Rules page to know how to configure firewall rules.
Refer the below pages for more details about Firewall Rule Management: