Security Rule Lifecycle

The Security Rule policy defines the lifecycle states of a security rule.

The Security Rule lifecycle includes these states:

This page discusses:

Inactive

Security rules are created in the Inactive state by the Leader. The setup and validation are performed in the Inactive state. The Leader promotes the security rule to the Active state.

Active

The security rule is available. The Leader promotes the security rule to the Archived state when it is no longer used.

Archived

Activity is complete and the security rule is no longer available.