官术网_书友最值得收藏!

Summary

In this chapter, you learned how to create security profiles and how to build a set of profiles that influence how your firewall processes threats. You learned how to create a default security profile group so that your security rule base starts off with a strong baseline of protection, as well as how to create solid security rules. You can now make complex NAT policies that cater to the needs of your inbound and outbound connections.

In the next chapter, we will see how to take even more control of your sessions by leveraging policy-based routing to segregate business-critical sessions from the general internet, limit bandwidth-hogging applications with quality of service, and look inside encrypted sessions with SSL decryption.

主站蜘蛛池模板: 清苑县| 当阳市| 衡阳市| 雷山县| 都兰县| 贵定县| 宁化县| 沙河市| 页游| 大埔县| 勃利县| 达日县| 马鞍山市| 静安区| 南雄市| 垣曲县| 临湘市| 通化县| 黔江区| 巴彦县| 尼勒克县| 威远县| 金昌市| 泰顺县| 龙门县| 德江县| 贵定县| 盐池县| 凌云县| 林芝县| 民和| 久治县| 瓮安县| 元朗区| 弥勒县| 白城市| 望奎县| 内丘县| 屏山县| 含山县| 武邑县|