[Contents] [Prev] [Next] [Index] [Report an Error]

Example: Configuring Security Policies—Detailed Configuration

The following instructions include a sample configuration and step-by-step guidelines explaining how to configure policies to protect resources and allow traffic through the firewall.

Before You Begin

  1. Establish basic connectivity. (See the Getting Started Guide for your device.)
  2. For background information, read:

To following steps show how to configure policies:

  1. Configure a policy to permit traffic. For more information, see Configuring a Policy to Permit Traffic.
  2. Configure a policy to deny traffic. For more information, see Configuring a Policy to Deny Traffic.
  3. Configure a policy with pass-through authentication. For more information, see Configuring for Pass-Through Authentication.
  4. Configure a policy with WebAuth authentication. For more information, see Configuring for Web Authentication.
  5. Reorder policies after they have been created. For more information, see Reordering Policies After They Have Been Created.

[Contents] [Prev] [Next] [Index] [Report an Error]