Image rac_proxy_3.png shows the Enforcement Point Details page. From top to bottom are the following components:
Mode, which shows DPE
Traffic Sources
Firewalls
Following Firewalls is a table showing the configured firewall, with from left to right, Status, Name, and IP Address
Secured Target
Following Secured target is information about the target: Name, Database Type, Policy, and a table entitled Secured Target Addresses. The columns in this table are from left to right, Address, Port, and Service name.