, so you can identify port-based
rules to convert to application-based rules.
Unused Apps
—Rules that include applications that have
never matched the rule.
Field
Description
Name
The name of the Security policy rule.
Service
Any services associated with the Security
policy rule.
Traffic (Bytes, 30 days)
Traffic (30 days)
—The
amount of traffic in bytes seen during the last 30-day period.
A
longer time period would result in the oldest rules remaining at
the top of the list because they are likely to have the most cumulative
traffic. This can result in newer rules being listed below older
rules even if the newer rules see heavy traffic.
Apps Allowed
The applications that the rule allows. Open
the
Application
dialog, from which you can
add and delete applications on the rule.
Apps Seen
The number of applications seen on the rule.
Click the number to open the
Applications & Usage
dialog,
which enables you to compare the applications configured on the
rule against the applications seen on the rule and to modify the
applications.
Day with No New Apps
The number of days since the last new application
was seen on the rule.
Compare
Opens the
Applications &
Usage
dialog to compare the applications configured
on the rule against the applications seen on the rule and modify
the rule.
Last Hit
The most recent time that traffic matched
the rule.
First Hit
The first time that traffic matched the
rule.
Modified
The date and time that the rule was last
modified.