This section contains the following topics:
You can operate the device either in secure or router context. With the J-Web interface and the command-line interface (CLI), you configure the routing protocols that run on the device, and the device security features, including stateful firewall policies, Network Address Translation (NAT) attack prevention screens, Application Layer Gateways (ALGs), and IPSec VPNs. You also set the properties of its network interfaces. After activating a software configuration, you can use either user interface to monitor the system and the protocol traffic passing through the device, manage operations, and diagnose protocol and network connectivity problems.
For information about secure and router contexts, see Understanding Secure and Router Contexts.