官术网_书友最值得收藏!

Summary

In this chapter, you learned how to create security profiles and how to build a set of profiles that influence how your firewall processes threats. You learned how to create a default security profile group so that your security rule base starts off with a strong baseline of protection, as well as how to create solid security rules. You can now make complex NAT policies that cater to the needs of your inbound and outbound connections.

In the next chapter, we will see how to take even more control of your sessions by leveraging policy-based routing to segregate business-critical sessions from the general internet, limit bandwidth-hogging applications with quality of service, and look inside encrypted sessions with SSL decryption.

主站蜘蛛池模板: 梨树县| 温泉县| 全椒县| 九寨沟县| 贺兰县| 镇远县| 来凤县| 富裕县| 南投市| 恩施市| 罗城| 平塘县| 泉州市| 哈巴河县| 沂水县| 邯郸县| 永州市| 江川县| 穆棱市| 宜州市| 巨鹿县| 建德市| 靖州| 华安县| 湖北省| 历史| 鄂伦春自治旗| 宜宾县| 油尖旺区| 辽宁省| 昆山市| 昌图县| 包头市| 张家川| 安平县| 唐海县| 澜沧| 榕江县| 瑞金市| 南京市| 司法|