To perform audit tasks, you sometimes need to find all access rules for a certain server, for example, with the IP address A.B.C.D. In other cases, you need to add a new access rule, but before that, you need to make sure that a similar rule already ...