[Contents] [Prev] [Next] [Index] [Report an Error]

Understanding Policy Configuration

You must complete the following tasks to create a security policy:

  1. Configure a security zone's host addresses and subnet addresses in its address book.
  2. Configure application or application sets.
  3. Create the policy.
  4. Create schedulers if you plan to use them for your policies.
  5. Bind a policy to a schedule.

[Contents] [Prev] [Next] [Index] [Report an Error]