Security policies

Security policies

One of the foundations upon which a firewall works is the use of policies. These are what bring the other firewall objects and components together into an elegant mechanism for the governing of the traffic going through the network.

 

This Chapter includes information on the following topics:

  • Firewall policies
  • Security profiles
  • SSL/SSH Inspection
  • Identity Based Policies
  • Device Identity Policies
  • VPN Policies
  • Interface Policies
  • One-Arm IDS
  • Local-In Policies l  Security Policy 0 l  Deny Policies
  • Accept Policies
  • IPv6 Policies
  • Fixed Port
  • Endpoint Security
  • Traffic Logging
  • Quality of Service
  • Policy Monitor

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.