This table identifies if an application protocol has
been configured for inspection and if so, the name of
the firewall policy or the inspection configuration
that configures the specified protocol for inspection.
The table also identifies if the specified protocol is
actively being inspected.
This table may be used by an administrator to quickly
identify if a protocol is being subjected to application
inspection by the managed firewall.