Overview
Configure a basic security policy to get your Secure Firewall 6100 up and running.
Configure a basic security policy with the following settings:
-
Inside and outside interfaces—Assign a static IP address to the inside interface, and use DHCP for the outside interface.
-
DHCP server—Use a DHCP server on the inside interface for clients.
-
Default route—Add a default route through the outside interface.
-
NAT—Use interface PAT on the outside interface.
-
Access control—Allow traffic from inside to outside.
You can also ccustomize your security policy to include more advanced inspections.
Navigate to the Cloud-delivered Firewall Management Center
How to open Cloud-Delivered Firewall Management Center from Security Cloud Control so you can configure policies and manage Secure Firewall 6100 in a separate management tab.
Configure interfaces
Learn how to configure Secure Firewall 6100 interfaces, including assigning inside and outside zones and setting IP addressing for routed deployments.
Configure the DHCP server
How to enable the DHCP server on a Secure Firewall 6100 interface so internal clients can automatically receive IP addresses and related network settings.
Configure NAT
Learn how to create an interface PAT (NAT) policy so inside clients can access external networks using the outside interface IP address.
Configure an access control rule
How to add an access control rule to allow traffic from the inside zone to the outside zone on Secure Firewall 6100, and apply optional security inspection policies.
Enable SSH on the outside interface
Learn how to enable SSH access to the Secure Firewall 6100 outside interface so you can manage the device remotely from approved IP addresses.
Deploy the configuration
How to deploy policy changes to the Secure Firewall 6100 so your interface, NAT, DHCP, and access control updates take effect on the device..