Create a secondary configuration
Now set up the configuration for your secondary location. For information on how to do this, see About configuring the firewall and the other topics in the Configuring the firewall section.
Caution If this computer is a laptop, and it is used out of the office, it may connect to an unknown local network. If this
happens, firewall rules in the secondary configuration that use the local network as an address may inadvertently allow unknown
traffic. For that reason, we strongly advise caution when using local network rules as part of secondary configurations.