Security policy protects network assets from threats and disruptions and helps to
optimally allocate network resources for enhancing productivity and efficiency in
business processes. Individual Security policy rules determine whether to block or
allow a session based on traffic attributes, such as the source and destination
security zone, the source and destination IP address, the application, the user, and
the service.
Policies allow you to enforce rules and take action. The different types of policy
rules that you can create are: Security, NAT, Quality of Service (QoS), Policy Based
Forwarding (PBF), Decryption, Application Override, Authentication, Denial of
Service (DoS), and Zone protection policies. All these different policies work
together to allow, deny, prioritize, forward, encrypt, decrypt, make exceptions,
authenticate access, and reset connections as needed to help secure your
network.