A Cleanup rule:
A.
logs connections that would otherwise be dropped without logging by default.
B.
drops packets without logging connections that would otherwise be dropped and logged by default.
C.
logs connections that would otherwise be accepted without logging by default.
D.
drops packets without logging connections that would otherwise be accepted and logged by default.
Basic Rules
Best Practice – These are basic Access Control rules we recommend for all Rule Bases:
• Stealth rule that prevents direct access to the Security Gateway
• Cleanup rule that drops all traffic that is not allowed by the earlier rules in the policy
Note – There is also the implicit drop rule that drops all traffic that did not match all other rules. This rule does not create log entries. If you want to log the traffic, create an explicit Cleanup rule
Basic Rules
Best Practice – These are basic Access Control rules we recommend for all Rule Bases:
• Stealth rule that prevents direct access to the Security Gateway
• Cleanup rule that drops all traffic that is not allowed by the earlier rules in the policy
Note – There is also the implicit drop rule that drops all traffic that did not match all other rules. This rule does not create log entries. If you want to log the traffic, create an explicit Cleanup rule.