To view information about temporary openings known as pinholes or gates in the security firewall, select Monitor>Security>Flow Gate Information in the J-Web interface, or enter the following CLI command:
show security flow gate
Table 36 summarizes key output fields in the flow gate display.
Table 36: Summary of Key Flow Gate Output Fields
Field |
Values |
Additional Information |
---|---|---|
Flow Gate Information | ||
Hole |
Range of flows permitted by the pinhole. |
|
Translated |
Tuples used to create the session if it matches the pinhole:
|
|
Protocol |
Application protocol, such as UDP or TCP. |
|
Application |
Name of the application. |
|
Age |
Idle timeout for the pinhole. |
|
Flags |
Internal debug flags for pinhole. |
|
Zone |
Incoming zone. |
|
Reference count |
Number of resource manager references to the pinhole. |
|
Resource |
Resource manager information about the pinhole. |