Device Configuration
5-63
7. Select the OK button to save the changes and overrides. Select Reset to revert to the last saved
configuration.
5.4.3 Overriding a Profile’s Security Configuration
A profile can have its own firewall policy, wireless client role policy, WEP shared key authentication, NAT
policy and VPN policy applied. If an existing firewall, client role or NAT policy is unavailable, an administrator
can be navigated from the Configuration > Profiles section of the UI to the Configuration > Security
portion of the UI to create the required security policy configuration. Once created, a policy’s configuration
can have an override applied as needed to meet the changing data protection requirements of a device’s
deployed environment. However, in doing so this device must now be managed separately from the profile
configuration shared by other device models within the network.
For more information on applying an override to an existing device profile, refer to the following sections:
• Overriding a Profile’s General Security Settings
• Overriding a Profile’s Certificate Revocation List (CRL) Configuration
• Overriding a Profile’s NAT Configuration