Hi,
and welcome to the forums.
I must admit I' m a bit puzzled by your question.
By default, the policy table is displayed grouping interface pairs. A policy controls traffic between 2 interfaces. So this grouping seems natural.
If you want to search through all policies at once you can switch the display to ' global' .
This only holds true for one exception: if you use the ' any' interface anywhere then the grouped display will no longer be available.
Generally one should avoid using ' any' to denote an interface. You should know in advance which path data is taking through your firewall.
(OTOH, sniffing the ' any' interface quickly shows where traffic is coming in or going out if you don' t know!)
Then...grouping inbound policies by destination...more or less this is to your liking. The general rule is that more specific policies must be defined above more general policies. Otherwise, the more specific policy can be shadowed.
I personally have never had a situation where I had an incoming policy to a VIP, and another one to the real server' s address at the same time. Internal servers tend to have non-routeable addresses which prevents direct access from the WAN.
One tip: if unsure you can add the ' Count' field to the policy table display, to see that and how much traffic hits a policy. In FOS v5, there even is a field with ' last seen' timestamp.
Ede Kernel panic: Aiee, killing interrupt handler!