.. role:: red .. role:: bred Guided configuration Summary ============================= .. image:: ../images/summary-path.png :align: center :scale: 100 The summary page presents an expandable list of all of the workflow-configured objects. To expand the details for any given setting, click the corresponding arrow icon on the far right. To edit any given setting, click the corresponding pencil icon. Clicking the pencil icon will send the workflow back to the selected settings page. .. image:: ../images/summary.png :scale: 100 % :align: center - When satisfied with the defined settings, click :red:`Deploy`. .. image:: ../images/module1-31.png Upon successfully deploying the configuration, SSL Orchestrator will now display a **Configure** view: .. image:: ../images/summary-1.png :scale: 100 % :align: center The **Interception Rules** tab shows the listener that were created per the selected topology. .. image:: ../images/summary-ir.png :scale: 100 % :align: center In the above list: - The **-in-t-4** listener defines normal TCP IPv4 traffic. - The **-in-u-4** listener defines normal UDP IPv4 traffic. - The **-ot-4** listener defines normal non-TCP/non-UDP IPv4 traffic. This completes the Guided Configuration of SSL Orchestrator as a transparent forward proxy. In the next section, you will use an internal client **(Ubuntu18.04 Client)** to browse to external (Internet) resources. Decrypted traffic will flow across the security service.