This figure shows the final steps of security configuration as described in the previous steps.