cancel
Showing results for 
Search instead for 
Did you mean: 

Using unique identifiers for applications in a security rule by studying the existing traffic flow

My suggestion is to using unique identifiers for applications in a security rule by studying the existing traffic flow and to not use service-IDs in a security rule. If the existing rules can show and/or suggest what applications are using that rule, then the firewall administrator can replace the service-IDs with a particular application to make the traffic more restrictive and secure.

0 Kudos