Implementing Dynamic NAT would enable an internal machine behind the firewall to act as an FTP Server for external clients.
In most cases when you are building the Rule Base you should place the Stealth Rule above all other rules except:
The fw fetch command allows an administrator to specify which Security Policy a remote enforcement module retrieves.
You can edit VPE objects before they are actualized (translated from virtual network objects to real).
If the security policy editor or system status GUI is open, you can open the log viewer GUI from the window menu.
Which is the best method of authentication for users who must use specific computers for Internet access?