Summary
In this chapter, you learned how to configure the firewall so that it is able to work with a DHCP enabled ISP and how to serve IP addresses to clients on local networks or relay DHCP for an internal server. You also learned how to set the firewall as a DNS proxy and ensure internal hosts resolve domain names efficiently and securely. You are now able to set up HA, and form a functional cluster, and can maintain certificates.
In the next chapter, we'll take a closer look at the various methods to identify users and how group mapping can help build policies that enforce Role-Based Access Control (RBAC).