You should familiarize yourself with a few different configurations that involve user authentication of traffic through the security appliance but also administrative access to the security appliance.