• Defining and managing security policies.
  • Rulebase and rule priorities.
  • Configuring layers and inline rules.