Background
Complex traffic on a network complicates security policy deployment. Incorrectly configured security policies may affect operations management of organizations. Firewall administrators are concerned about how to configure security policies without affecting service running.
The following provides a recommended deployment method to ensure zero service interruption during security policy configuration.