You should familiarize yourself with a few different configurations that involve user authentication of traffic through the security appliance but also administrative access to the security appliance.
This is a comprehensive and flexible product upon which may be built an equally comprehensive access security model. It is scalable and facilitates the management of both local and remote network ...