Software Secure Access
Activity Manage

Limitations of Composite Sources

  • Private Access rules with composite sources only support the Allow and Block actions.
  • Composite sources do not include ports or protocols.