Chapter 8: Introduction to Policies, Layers, and Rules
In this chapter, we will learn about policy packages, blades used in Access Control policies, and their use in layers. We will look at the possible policy organization methods, rules' structure and capabilities, and their placement based on the packet flows and use of acceleration technology.
In this chapter, we are going to cover the following main topics:
- Access Control policies, layers, and rules
- Packet flows and acceleration
- Best practices for Access Control rules
- Application Control and URL Filtering layer structure
- Logs, tracking depth, and oddities