Now set up your secondary configuration. For information on how to do this, see Configuring the firewall.
We strongly advise caution when using local network rules as part of secondary configurations. If the computer is a
laptop, and it is used out of the office, it may connect to an unknown local network. If this happens, firewall rules in the secondary
configuration that use the local network as an address may inadvertently allow unknown traffic.