The figure below illustrates how network objects can become part of a connection configuration.
ACCOUNTING DEPARTMENT George 191.1.10.1 Susan 191.1.10.3 Helen 191.1.10.5 Peter 191.1.10.7 John 191.1.10.9You could represent all of these addresses with a single network object (IP address = 191.1.10.0, subnet mask = 255.255.255.0). For purposes of improving the performance of rule processing, this would be much more efficient than if each of these addresses had been placed into one network group.
![]() |
Network Objects |
Note: Anytime you click on a checkbox that pertains to a Predefined Service, and you click on "OK", you must activate these changes via the Connection Activation window. You do not need to activate after changing either of the Transparent Proxy checkboxes as these two do not pertain to Predefined Services.
![]() |
Using the Configuration Client to Define a Security Policy |
Warning: Use of this Service can open your Firewall up to security exposures. Use this service with extreme caution.
![]() | Create new |
![]() | Carrier |
![]() | Create new modem |
![]() | Modem |