Monitoring Flow Gate Information
Purpose
View information about temporary openings known as pinholes or gates in the security firewall.
Action
Select Monitor>Security>Flow Gate in the J-Web user interface, or enter the show security flow gate command.
Table 227 summarizes key output fields in the flow gate display.
Table 227: Summary of Key Flow Gate Output Fields
Field | Values | Additional Information |
---|---|---|
Flow Gate Information | ||
Hole | Range of flows permitted by the pinhole. | – |
Translated | Tuples used to create the session if it matches the pinhole:
| – |
Protocol | Application protocol, such as UDP or TCP. | – |
Application | Name of the application. | – |
Age | Idle timeout for the pinhole. | – |
Flags | Internal debug flags for pinhole. | – |
Zone | Incoming zone. | – |
Reference count | Number of resource manager references to the pinhole. | – |
Resource | Resource manager information about the pinhole. | – |