Several Security Policies can be used for different installation targets. The firewall protecting Human
Resources' servers should have a unique Policy Package. These rules may only be installed on this
machine and not accidentally on the Internet firewall. How can this be configured?
In a distributed management environment, the administrator has removed the default check from Accept
Control Connections under the Policy > Global Properties > FireWall tab. In order for the Security
Management Server to install a policy to the Firewall, an explicit rule must be created to allow the server to
communicate to the Security Gateway on port __________.
To check the Rule Base, some rules can be hidden so they do not distract the administrator from the
unhidden rules. Assume that only rules accepting HTTP or SSH will be shown. How do you accomplish
this?
Your perimeter Security Gateway's external IP is 200.200.200.3. Your network diagram shows:
RequireD. Allow only network 192.168.10.0 and 192.168.20.0 to go out to the Internet, using 200.200.200.5.
The local network 192.168.1.0/24 needs to use 200.200.200.3 to go out to the Internet. Assuming you
enable all the settings in the NAT page of Global Properties, how could you achieve these requirements?