Summary
In this chapter, we have covered policies, layers, and rules, and learned about a variety of ways policies could be structured. We have been introduced to a number of performance optimization technologies, such as CoreXL and SecureXL. We've discovered how the properties of layers and the placement of rules impact traffic acceleration and affect latency. We've learned about column-based matching and how it works with firewall/network rules, as well as rules in layers with a content inspection. We have also learned about the best approaches to the Application Control layer structure, Content Awareness, and track settings for logs based on active blades in the layers. We also discussed and explained edge cases for missing rule logs.
The next chapter is a mix of theory and practice. We will cover secure internal communication, internal certificate authority, and create a cluster object. Additionally, we will learn about object types and create some of the objects that...