Tomer Sole

Layers - Best Practices

Discussion created by Tomer Sole Expert on Aug 22, 2018
Latest reply on Aug 22, 2018 by Enis Dunic

In this page we will add all relevant links that showcase playbooks for using layers in your security policy. 


We want to start with some of the practical examples:


Layer Design Patterns - #1: inspect additional content 

Layers and the cleanup rule 

Using inline layers together with zone pairs 

Sharing a layer across different policies 



In case you are interested with how layers technically work, please see the following:

Layers in R80 

How do layers work in a multi-domain environment? 

How do Threat Prevention Layers work?