The cidrip of security rules.
The description of security rules.
The ip protocol of security rules.
The policy of security rules.
The port range of security rules.
The priority of security rules.
The type of security rules.