Creating and installing policies

After successfully applying the initial configuration and establishing contact between the Security Engines and the Management Server, the Security Engine is in the initial configuration state. Now you can create and install policies for access control or inspecting traffic.

In addition to the rules in the policy, other configuration information, such as interface definitions and routing information, is also transferred to the Security Engine when you install a policy.