Walkthroughs Supported in Secure Firewall Management Center
The walkthroughs guide you to perform the steps required to achieve a task by taking you through each step, one after the other, until you complete the task. To view the walkthroughs, on the management center menu bar, choose . You can use the global search feature of the management center to quickly find walkthroughs of your interest. Search for the walkthrough title or terms in the walkthrough title for better search results. For more information about searching and finding walkthroughs of your interest in the management center, see Search for How To Walkthroughs.
The following is the list of feature walkthroughs supported in the management center:
Version |
Use case |
Walkthrough Title |
---|---|---|
7.6.0 and later |
Register and Preprovision SD-WAN Branch Office Devices Using Device Template. |
|
7.6.0 and later |
Set up your device. |
|
7.6.0 and later |
Configure identity policies. |
|
7.4.1 and later |
Configure SD-WAN capabilities.. |
|
Manage your chassis. |
|
|
Set up your device. |
Configure External Authentication. |
|
7.4.0 and later |
Configure a Site-to-Site VPN Topology with Dynamic VTI. |
|
Loopback Support for BGP Routing. |
|
|
Snort 3 IPS – A Feature Walkthrough. |
View the Summary Layer. |
|
Working with Snort 3. |
Convert all Snort 2 Custom Rules to Snort 3. |
|
7.3.0 and later |
Configure Decryption Policies. |
|
|
Snort 3 IPS – A Feature Walkthrough. |
|
7.2.6 and later |
Configuring VPN |
|
Configure Dynamic Access Policy for Remote Access VPN. |
|
|
Troubleshoot Your Device. |
|
|
7.2.0 and later |
The New Access Control Policy UI–A Feature Walkthrough. |
|
Working with Snort 3. |
|
|
Configure User Identity–Dynamic Objects. |
|
|
Create and Install an Identity Certificate on Device for Remote Access VPN Configuration. |
|
|
7.1.0 and later |
Working with Snort 3. |
|
Create and Manage a Cluster. |
|
|
Change the Management Center Access Interface from Management to Data. |
|
|
Change the Management Center Access Interface from Data to Management. |
|
|
Upgrade Secure Firewall Threat Defense. |
||
|
Enabling the SecureX Ribbon. |
|
7.0.0 and later |
Add a Device to Management Center Using Remote Branch Deployment. |
|
6.7.0 through 7.4.1 |
Configuring identity policies. |
|
6.7.0 and later |
Set Up Your Device. |
|
Configure network discovery policies. |
|
|
Create a Decryption Policy With One or More Do Not Decrypt Rules (formerly known as Create an SSL Do Not Decrypt Policy). |
|
|
Create a Decryption Policy With One or More Decrypt–Resign Rules (formerly known as Create an SSL Decrypt–Resign Policy). |
|
|
Create a Decryption Policy With One or More Decrypt–Known Key Rules (formerly known as Create an SSL Decrypt–Known Key Policy). |
|
|
Create a Decryption Policy With One or More Block Rules (formerly known as Create an SSL Decrypt–Known Key Policy). |
|
|
Create Intrusion Policies. |
|
|
Create File (Malware) Policies. |
|
|
Configure identity policies. |
|
|
Configure and Customize Site-to-Site VPN. |
|
|
Certificate Authentication for Remote Access (RA) VPN |
|
|
Configuring Traffic Filtering for Remote Access (RA) VPN Connections. |
|
|
Configure a VTI tunnel. |
|
|
Configure Virtual Routing for Secure Firewall Threat Defense. |
|
|
|