This image shows the Create Security Rule dialog box. There is text at the top reading "Enter the name of your security rule. The rule is enabled by default, but you can disable it until you are ready to use it. You must specify the security application and the source and destination security lists or security IP lists to which the security rule will apply." There is a link for Learn More. There are the following fields: - A required text field for Name, showing DefaultPublicSSHAccess. - Drop-down lists for Status, showing Enabled, and Security Application, showing ssh. The Source options include the following: - A radio button for Security List, which is not selected, and a drop-down list, which is not enabled. - A selected radio button for Security IP List, and a drop-down list showing public-internet. The Destination options include the following: - A selected radio button for Security Lists, and a drop-down list showing default. - A radio button for Security IP List, which is not selected, and a drop-down list, which is not enabled. There is a text field for Description, with truncated text beginning "Default security rule for public SSH." There is a Create button, surrounded by a red border, and a Cancel button.