📄️ Configuring TCP/IP
Configuring TCP/IP and a Virtual Router
📄️ Malware Analysis
Create, Test, and Examine a WildFire Security Profile
📄️ Creating a Zero Trust Environment
Load Lab Configuration
📄️ Configuring Authentication
Configure the Firewall to use a Captive Portal to Authenticate
📄️ 2FA to Secure the Firewall
Two-Factor Authentication Using a Certificate
📄️ Allowing Only Trusted Applications
Allow Trusted Applications by Creating an Application Group