Table 5: Examples when the sensor-detected situations that required the Firewall rules to change.

Source addressDate/timeOperationSensor

xx.xx.200.352011-07-12Add rulexx.xx.21.62
01:03:12
xx.xx.17.2122011-07-12Remove rulexx.xx.32.63
03:25:19
xx.xx.117.512011-07-13Add rulexx.xx.21.62
01:23:17
xx.xx.94.1392011-07-13Add rulexx.xx.31.63
02:27:11
xx.xx.13.2312011-07-14Remove rulexx.xx.21.62
03:42:52