

The following options are available for defining MAC addresses: IP List: Enables you to select a value that you defined on the Policies > Common Objects > Lists > IP Lists page.IP(s): Use this when applying a rule to several machines that do not have consecutive IP addresses.Range: This applies the rule to all machines that fall within a specific range of IP addresses.Masked IP: This applies the rule to all machines that share the same subnet mask.Single IP: A specific machine is identified using its IP address.Any: No address is specified so any host can be either a source or destination.These options are available for defining IP addresses: The firewall can use an IP address, MAC address, or Port to determine traffic source and destination: IP Address
#What does mac stand for in information security code#
You can choose from the drop down list of predefined common protocols, or you can select "Other" and enter the protocol code yourself (a three digit decimal value from 0 to 255). Use the checkbox to specify whether you will be filtering for this protocol or anything but this protocol. If you select the Internet Protocol (IP) frame type, the Protocol field is enabled, where you specify the transport protocol that your rule will look for.

Action: Your Firewall Rule can behave in four different ways.

