Traffic coming from trusted hosts is assumed to be safe. You can designate one or more trusted hosts by IP address and netmask.
Trusted Hosts are not blocked by the security policy.
Traffic coming from trusted hosts is assumed to be safe. You can designate one or more trusted hosts by IP address and netmask.
Trusted Hosts are not blocked by the security policy.