Description of the illustration ch07-018.jpg

This figure shows the final steps of security configuration as described in the previous steps.