Control traffic egress with source IP anchoring and allowlisting
Now that you have created firewall policies to secure your organization, you can begin creating egress policies to control what IP address your users egress to the Internet with.
By the end of this module, you will be able to:
- Understand when your organization may need source IP anchoring.
- Create egress policies to make use of dedicated egress IPs.
- Follow best practices for deploying egress IPs.