Check Point UTM-1 Edge User Manual page 355

Internet security appliance
Hide thumbs Also See for UTM-1 Edge:
Table of Contents

Advertisement

8.
Complete the fields using the relevant information in the following table.
Click Next.
9.
The Step 4: Rule Options dialog box appears.
10. Complete the fields using the relevant information in the following table.
11. Click Next.
Chapter 12: Setting Your Security Policy
Using Rules
341

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the UTM-1 Edge and is the answer not in the manual?

Subscribe to Our Youtube Channel

Table of Contents

Save PDF