Note that the clone facility acts to copy configuration files from one location on the Enterprise Firewall Manager to create new files that are also on the Enterprise Firewall Manager. The files themselves will not be transferred to the newly created firewall until the administrator distributes these files via the Distribution Facility.
Note that the Recipient firewall must have "Host Only" selected for its Security Agreement. When the recipient firewall is cloned, the source's assigned Security Agreement will be assigned to the recipient.
Note: Anytime you click on a checkbox that pertains to a Predefined Service, and you click on "OK", you must activate these changes via the Connection Activation window. You do not need to activate after changing either of the Transparent Proxy checkboxes as these two do not pertain to Predefined Services.
![]() |
Using the Configuration Client to Define a Security Policy |
Warning: Use of this Service can open your Firewall up to security exposures. Use this service with extreme caution.
![]() | Create new |
![]() | Carrier |
![]() | Create new modem |
![]() | Modem |