- Define the list of gateway
MAC addresses or domain names of your primary locations. Typically, these are
your office networks.
-
Create the firewall configuration to be used for your primary locations. Typically, this
configuration is less restrictive.
- Create a secondary firewall
configuration. Typically, this configuration is more restrictive.
- Choose a configuration to
apply.
Depending on the detection method you are using, the firewall obtains
the DNS or gateway address for each computer's network adapters, and then
matches it against your list of addresses.
- If any of the addresses in
your list matches the address of a network adapter, the adapter is assigned the
configuration for the
primary location.
- If none of the addresses in
your list matches the address of a network adapter, the adapter is assigned the
policy for the
secondary location.
Important: The secondary configuration switches from
Interactive mode to
Block by default mode on a computer when both the
following conditions are met:
- Both locations are active.
- The primary configuration
is
not interactive.