Security Policies Configuration Overview

You must complete the following tasks to create a security policy:

  1. Create zones. See Example: Creating Security Zones

  2. Configure an address book with addresses for the policy. See Example: Configuring Address Books

  3. Create an application (or application set) that indicates that the policy applies to traffic of that type. See Example: Configuring Applications and Application Sets

  4. Create the policy. See Example: Configuring a Security Policy to Permit or Deny All Traffic and Example: Configuring a Security Policy to Permit or Deny Selected Traffic

  5. Create schedulers if you plan to use them for your policies. See Example: Configuring Schedulers (CLI)

  6. Bind a policy to a scheduler. See Example: Associating a Policy to a Scheduler (CLI)

Related Topics