Profile Name
Check for Disallow
3
.
4
.
6
C
S
M
-
P
2
3
.
4
.
6
C
S
M
-
P
2
You can define policy profiles for P2P (Point-to-Point) application. The object profile(s)
configured here will be seen and adopted in CSM>>IM/P2P Profile page.
62
Type a name for the CSM profile.
Check the items that disallow to use. Any device that uses
such profile might not be allowed to access into the forbidden
items.
P
O
b
j
e
c
t
P
O
b
j
e
c
t
Vigor2930 Series User's Guide