Exit Print View
In addition to firewall access control based on IP addresses, you can configure other access control rules that are based on both IP addresses and user roles.