Security Hierarchy and Statements

Use the statements in the security configuration hierarchy to configure certificates, dynamic virtual private networks (VPNs), firewall authentication, flow, forwarding options, group VPNs, Intrusion Detection Prevention (IDP), Internet Key Exchange (IKE), Internet Protocol Security (IPsec), logging, Network Address Translation (NAT), public key infrastructure (PKI), policies, resource manager, screens, secure shell known hosts, trace options, Unified Threat Management (UTM), and zones.

This chapter contains the following topics: