Process Flow - Firewall rule components (target, source, protocol)
Start: Define Firewall Rule
Set Target: Which VMs to protect
Set Source: Where traffic comes from
Set Protocol: What traffic type
Apply Rule: Allow or Deny traffic
Traffic checked against rule
Allow or Block traffic based on rule
This flow shows how a firewall rule is created by choosing targets, sources, and protocols, then applied to control traffic.