Data Center Security Policy Rulebase Order

Order the rules properly in the Security policy rulebase to ensure that you allow only the applications and traffic you intend to allow and so that no rule shadows another rule.
Order the Data Center Security policy rulebase shows the full rulebase from the previous examples (whitelist and blocking rules) in the correct order and explains each rule’s placement.

Recommended For You