Overview
Configure a basic security policy to get your Secure Firewall 6100 up and running.
Configure a basic security policy with the following settings:
-
Inside and outside interfaces—Assign a static IP address to the inside interface, and use DHCP for the outside interface.
-
DHCP server—Use a DHCP server on the inside interface for clients.
-
Default route—Add a default route through the outside interface.
-
NAT—Use interface PAT on the outside interface.
-
Access control—Allow traffic from inside to outside.
You can also ccustomize your security policy to include more advanced inspections.
Configure interfaces
Learn how to configure Secure Firewall 6100 interfaces, including assigning inside and outside zones and setting IP addressing for routed deployments.
Configure the DHCP server
How to enable the DHCP server on a Secure Firewall 6100 interface so internal clients can automatically receive IP addresses and related network settings.
Add the default route
Learn how to verify or add a default route in Firewall Management Center so the Secure Firewall 6100 can reach upstream networks through the outside interface.
Configure NAT
Learn how to create an interface PAT (NAT) policy so inside clients can access external networks using the outside interface IP address.
Configure an access control rule
How to add an access control rule to allow traffic from the inside zone to the outside zone on Secure Firewall 6100, and apply optional security inspection policies.
Deploy the configuration
How to deploy policy changes to the Secure Firewall 6100 so your interface, NAT, DHCP, and access control updates take effect on the device..