You are here: Monitor > Flow Gate.
Use this page to view information about gates in the security firewall.
Table 100 describes the fields on the Flow Gate page.
Table 100: Fields on the Flow Gate Page
Field | Description |
---|---|
Flow Gate Search | |
Source Prefix | Enter the source prefix which you have already defined, to be included in the match condition. |
Source Port | Enter the source port type to be included in, or excluded from, the match condition. |
Destination Prefix | Enter the destination prefix which you have already defined, to be included in the match condition. |
Destination Port | Enter the port types to be included in, or excluded from, the match condition. |
Protocol | Provides the option to enter protocol details. |
Flow Gate Summary —Provides a summary of the all the options selected in the Flow Gate. | |
Flow Gate Information | |
Hole | Range of flows permitted by the pinhole. |
Translated | Tuples used to create the session if it matches the pinhole:
|
Protocol | Application protocol, such as UDP or TCP. |
Application | Name of the application. |
Age | Idle timeout for the pinhole. |
Flags | Internal debug flags for pinhole. |
Zone | Incoming zone. |
Reference count | Number of resource manager references to the pinhole. |
Resource | Resource manager information about the pinhole. |
© 2020 Juniper Networks, Inc. All rights reserved