Security Group
The Security Group page allows you to create new security groups for inbound and outbound traffic rule management. This is especially useful for the management of new devices to avoid exposure of the device after provisioning and before custom configuration.
Security groups can be used to specify a list of trusted hosts and subnets which are then translated into policies that manage traffic.
Security groups can be implemented for a device when the order is being configured. See Creating a new order.
This section includes: