[ Contents] [ Prev] [ Next] [ Index] [ Report an Error]

Reordering Policies After They Have Been Created

Reordering policies is the last step in the sample configuration explaining how to configure a policy.

Before You Begin

  1. Establish basic connectivity. (See the Getting Started Guide for your device.)
  2. Create zones. (See Creating Security Zones.)
  3. Configure the address book for the policy. (See Configuring a Policy to Permit Traffic.)
  4. Configure a policy to permit traffic. (See Configuring a Policy to Permit Traffic.)
  5. Configure a policy to deny traffic. (See Configuring a Policy to Deny Traffic.)
  6. Configure a policy with pass-through authentication. (See Configuring for Pass-Through Authentication.)
  7. Configure a policy with WebAuth authentication. (See Configuring for Web Authentication.)
  8. For background information, read Example: Configuring Security Policies—Detailed Configuration.

The following configuration commands show how to move policies around after they have been created.

user@host#edit security policies from-zone RED to-zone GREEN
insert policy passTauth after policy wAuth

[ Contents] [ Prev] [ Next] [ Index] [ Report an Error]