Security Policies Configuration Overview

You must complete the following tasks to create a security policy:

  1. Create zones. See Example: Creating Security Zones

  2. Configure the address book for the policy. See: Example: Configuring Address Books

  3. Create addresses for use in the policies. See: Example: Configuring Address Books

  4. Create an application (or application set) that indicates that the policy applies to traffic of that type. See: Example: Configuring Applications and Application Sets

  5. Create the policy. See: Example: Configuring a Security Policy to Permit and Deny Traffic

  6. Create schedulers if you plan to use them for your policies. See: Example: Configuring Schedulers (CLI)

  7. Bind a policy to a schedule. See: Example: Associating a Policy to a Scheduler (CLI)

Related Topics