107
Chapter 6
Security
Chapter contents
Introduction ........................................................................................................................................................108
Configuring the IAD ...........................................................................................................................................108
Configuring the security interfaces.......................................................................................................................109
Deleting a Firewall Policy .............................................................................................................................110
Enabling the Firewall...........................................................................................................................................111
Firewall Portfilters ...............................................................................................................................................111
Security Triggers..................................................................................................................................................112
Intrusion Detection System (IDS) .......................................................................................................................114