Role-based access control rules accept or drop traffic, based on the user's role and IP address. Like firewall rules, the order of rules is important, since the rules are executed in numerical order.
Action |
Do this... |
---|---|
Add a rule to the end of the rules list |
|
Insert a rule between two existing rules |
|