[Contents]
[Prev]
[Next]
[Index]
[Report an Error]
Understanding Policy Configuration
You must complete the following tasks to create
a security policy:
- Configure a security zone's host addresses and subnet
addresses in its address book.
- Configure application or application sets.
- Create the policy.
- Create schedulers if you plan to use them for your policies.
- Bind a policy to a schedule.
[Contents]
[Prev]
[Next]
[Index]
[Report an Error]