官术网_书友最值得收藏!

Summary

In this chapter, you learned how to create security profiles and how to build a set of profiles that influence how your firewall processes threats. You learned how to create a default security profile group so that your security rule base starts off with a strong baseline of protection, as well as how to create solid security rules. You can now make complex NAT policies that cater to the needs of your inbound and outbound connections.

In the next chapter, we will see how to take even more control of your sessions by leveraging policy-based routing to segregate business-critical sessions from the general internet, limit bandwidth-hogging applications with quality of service, and look inside encrypted sessions with SSL decryption.

主站蜘蛛池模板: 临澧县| 丽江市| 曲麻莱县| 射洪县| 周口市| 湖口县| 新巴尔虎右旗| 乃东县| 西丰县| 来安县| 西藏| 施秉县| 大理市| 古丈县| 贵阳市| 开阳县| 峨边| 全州县| 崇文区| 洪雅县| 图们市| 昂仁县| 凤山市| 新蔡县| 二连浩特市| 博罗县| 达拉特旗| 海伦市| 长治县| 平塘县| 江油市| 镶黄旗| 綦江县| 沂水县| 东至县| 金川县| 荃湾区| 汝阳县| 梧州市| 漳州市| 义乌市|