Summary
In this chapter, you learned how to create security profiles and how to build a set of profiles that influence how your firewall processes threats. You learned how to create security profiles that leverage best practices and can add these to a default security profile group so that your security rule base starts off with a strong protection stance. You are also able to create complete security rules that leverage reusable objects, easy to identify tags, and are set to allow all desirable access based on application identification rather than ports. You can now make complex NAT policies that cater to the needs of your inbound and outbound connections.
If you’re studying for the PCNSE, take specific note of how the best practice security profiles are set with reset-both and single-packet packet capture for critical, high, and medium severity, while low and informational are set to default with no packet capture. Remember how zones play an important role in the original...