Skip to content

Control traffic egress with source IP anchoring and allowlisting

Now that you have created firewall policies to secure your organization, you can begin creating egress policies to control what IP address your users egress to the Internet with.

Objectives

By the end of this module, you will be able to:

  • Understand when your organization may need source IP anchoring.
  • Create egress policies to make use of dedicated egress IPs.
  • Follow best practices for deploying egress IPs.