B. Configure the Security Proxy.

The Security Proxy Server uses files generated by the Security Proxy Wizard or the automated installer to manage the encrypted connections that pass through the Security Proxy.

The Security Proxy cannot be run until the server is configured.

Use the Security Proxy Wizard to configure the Security Proxy server. (When available, the automated installer will configure the Security Proxy Server.)