Figure 11: Partial Name Search with Single Character Replacement
Figure 32: vSRX, Security Director, and VMware NSX Integration Workflow
Figure 33: Service Manager Registration: Entering the License Key
Figure 74: Comparing Traditional SRX Customers to Policy Enforcer Customers
Figure 76: Policy Enforcer and Software-Defined Security Model
Figure 78: Components of the Policy Enforcer Deployment Model
Figure 82: Defining the Basic Network Configuration Settings
Figure 86: Reviewing and Changing Your Configuration Settings
Figure 88: Defining the Basic Network Configuration Settings
Figure 92: Reviewing and Changing Your Configuration Settings
Figure 107: ClearPass API Client Operator Profile Minimum Privileges
Figure 114: Cisco ISE: Create Admin User and Assign to Admin Groups
Figure 117: Cisco ISE: Network Device Profile, Enable RADIUS
Figure 118: Cisco ISE: Configure Change of Authorization (CoA)
Figure 122: Cisco ISE: Configure Simple Conditions, Match Expression
Figure 123: Cisco ISE: Configure Simple Conditions, Match Expression
Figure 145: Spotlight Secure: Create Security Intelligence Profile
Figure 147: Spotlight Secure: Create Security Intelligence Policy
Figure 148: Spotlight Secure: Apply Security Intelligence Policy to Firewall Policy
Figure 149: Policy Enforcer: Create Threat Prevention Policy
Figure 150: Policy Enforcer: Create Threat Prevention Policy, Select Threat Score and Logging
Figure 151: Policy Enforcer: Apply Threat Prevention Policy to Firewall Policy
Figure 155: Spotlight Secure: Enter Server Login for Custom File Upload
Figure 156: Spotlight Secure: Select Custom Feed in Dynamic Address Group
Figure 157: Spotlight Secure: Select Dynamic Address in Security Policy
Figure 158: Spotlight Secure: Edit Global Whitelist or Blacklist
Figure 161: Policy Enforcer: Use Dynamic Addresses in Firewall Policy
Figure 162: Spotlight Secure: Create Geo IP with Dynamic Address Group
Figure 165: Policy Enforcer: Use Geo IP in the Firewall Policy