Summary

Although it is impossible to describe every situation you might encounter during the initial configuration of your security policy, this chapter covered the basic elements you need to know. Each element that is written into your security policy was detailed, including the rulebase properties and anti-spoofing. Different situations you might commonly encounter along the way as well as some common configuration questions were answered.