官术网_书友最值得收藏!

Summary

In this chapter, you learned how to create security profiles and how to build a set of profiles that influence how your firewall processes threats. You learned how to create a default security profile group so that your security rule base starts off with a strong baseline of protection, as well as how to create solid security rules. You can now make complex NAT policies that cater to the needs of your inbound and outbound connections.

In the next chapter, we will see how to take even more control of your sessions by leveraging policy-based routing to segregate business-critical sessions from the general internet, limit bandwidth-hogging applications with quality of service, and look inside encrypted sessions with SSL decryption.

主站蜘蛛池模板: 安福县| 阳江市| 乌什县| 凭祥市| 泸定县| 肃南| 南江县| 普格县| 吴川市| 奉新县| 军事| 旬阳县| 金塔县| 枝江市| 凤城市| 邵东县| 秭归县| 宜君县| 通州市| 文山县| 桃江县| 都江堰市| 阿拉善右旗| 榆中县| 黄浦区| 大新县| 江油市| 喀什市| 德令哈市| 阿鲁科尔沁旗| 大名县| 嘉兴市| 宁乡县| 会泽县| 林芝县| 固原市| 贡嘎县| 赤城县| 班玛县| 图木舒克市| 桐城市|