You should familiarize yourself with a few different configurations that involve user authentication of traffic through the security appliance but also administrative access to the security appliance.
Editorial Note: Talk Android may contain affiliate links on some articles. If you make a purchase through these links, we will earn a commission at no extra cost to you. Learn more. SSH, or Secure ...