Policy

The Policy is used to control access to objects such as protocols, sites, applications, possible threat situations, or any combination thereof. It is also used to inspect and secure the traffic that is routed through the firewall.