Overriding a Profile's Security Configuration

A profile can have its own firewall policy, wireless client role policy, WEP shared key authentication, NAT policy, and VPN policy applied. If an existing firewall, client role, or NAT policy is unavailable, create the required security policy configuration. Once created, a configuration can have an override applied as needed to meet the changing data protection requirements of a device‘s deployed environment. When this done, however, the device must now be managed separately from the profile configuration shared by other identical models within the network.

For more information on applying an override to an existing device profile, refer to the following sections: