, so you can identify port-based
rules to convert to application-based rules.
—Rules that include applications that have
never matched the rule.
The name of the Security policy rule.
Any services associated with the Security
Traffic (Bytes, 30 days)
Traffic (30 days)
amount of traffic in bytes seen during the last 30-day period.
longer time period would result in the oldest rules remaining at
the top of the list because they are likely to have the most cumulative
traffic. This can result in newer rules being listed below older
rules even if the newer rules see heavy traffic.
The applications that the rule allows. Open
dialog, from which you can
add and delete applications on the rule.
The number of applications seen on the rule.
Click the number to open the
Applications & Usage
which enables you to compare the applications configured on the
rule against the applications seen on the rule and to modify the
Day with No New Apps
The number of days since the last new application
was seen on the rule.
dialog to compare the applications configured
on the rule against the applications seen on the rule and modify
The most recent time that traffic matched
The first time that traffic matched the
The date and time that the rule was last