[Contents]
[Prev]
[Next]
[Index]
[Report an Error]
Example: Configuring Security Policies—Detailed Configuration
The following instructions include a sample configuration
and step-by-step guidelines explaining how to configure policies to
protect resources and allow traffic through the firewall.
|
Before You Begin
|
- Establish basic connectivity. (See the Getting Started
Guide for your device.)
- For background information, read:
|
To following steps show how to configure policies:
- Configure a policy to permit traffic. For more information,
see Configuring a Policy to Permit Traffic.
- Configure a policy to deny traffic. For more information,
see Configuring a Policy to Deny Traffic.
- Configure a policy with pass-through authentication. For
more information, see Configuring for Pass-Through Authentication.
- Configure a policy with WebAuth authentication. For more
information, see Configuring for Web Authentication.
- Reorder policies after they have been created. For more
information, see Reordering Policies After They Have Been Created.
[Contents]
[Prev]
[Next]
[Index]
[Report an Error]