3
Chapter3 Installation 97
Caution
Behavior rules have a regular threshold. There could be false-positives in threshold-based detection,
so adjust it according to the traffic characteristics of sites. Do not just use the default value as is.
Step 7: Set Firewall Policy
Use the registered IP address, service, user, authentication server, schedule, QoS and IPS profile to set
the firewall based on the site environment.
Step 8: Apply Policy
Click Apply.
Step 9: Terminate System
After completing the system and policy settings, terminate the system to connect the device to the
network. Before terminating the system, check as follows:
1 All the network settings used in the temporary network have been removed.
2 The network settings are correct.
3 The security settings are completed.
4 Terminate the system.
• Log in to Terminal.
• Type system and press the Enter key to enter the system mode.
• Type shutdown and press the Enter key.
• Go throught the administrator authentication process again.
• When the system shuts down, remove all cables.
Keep the product safe in the box.