Overview of configuring IP security policy

There are three options for IP security policy configuration for a system:

Although not an error, note that when using the last approach, it is possible for duplicate statements to exist in the common and the stack-specific IP security configuration files (for example, two IpFilterRule statements with the same name). In this case, the statement in the stack-specific IP security configuration file is honored. Statements in the stack-specific IP security configuration file always take precedence over the common IP security configuration file.