官术网_书友最值得收藏!

Summary

In this chapter, you learned how to create security profiles and how to build a set of profiles that influence how your firewall processes threats. You learned how to create a default security profile group so that your security rule base starts off with a strong baseline of protection, as well as how to create solid security rules. You can now make complex NAT policies that cater to the needs of your inbound and outbound connections.

In the next chapter, we will see how to take even more control of your sessions by leveraging policy-based routing to segregate business-critical sessions from the general internet, limit bandwidth-hogging applications with quality of service, and look inside encrypted sessions with SSL decryption.

主站蜘蛛池模板: 兴化市| 邢台县| 东莞市| 塔城市| 德保县| 盐山县| 房山区| 平湖市| 河源市| 海阳市| 呼伦贝尔市| 吉安市| 海伦市| 大渡口区| 淮滨县| 酒泉市| 迁西县| 星子县| 八宿县| 张北县| 崇明县| 洪江市| 吉林市| 肥城市| 神农架林区| 南皮县| 昔阳县| 牙克石市| 祁连县| 革吉县| 天津市| 朝阳区| 合作市| 开江县| 梓潼县| 夏邑县| 鸡西市| 山阴县| 和政县| 运城市| 红原县|