Identifying the firewall rules