CAUTION: Before proceeding Please Export Settings Configuration
NOTE: Due to some changes, may have you edit or add another physical interface or change your local network host
Please be onsite with settings before proceeding.
There are two ways of Securing the Virtual Office to be seen from the External Access
Option1:
EXAMPLE: CompanyNameUsers or Vendors or ....
EXAMPLE: SMA X0 is 192.168.200.1 and the Default Gateway is 192.168.200.2 So, the custom IP would be 192.168.200.3
Then change your firewall Nat policy to the new custom address IP you created.
Submit/Save Changes

Summation: this will keep IP of SMA not part of the inbound Nat policy, so the virtual office is not seen publicly
NOTE: This has a Limitation only one portal with unique internal IP to one public IP
Option 2:
Secures the Virtual Office Portal from All External Access. However, for many Portal names, you want it attached to single public IP. You will need to do a Second way of Securing the Virtual Office from External Access
NOTE: (if using x1 then use another interface that is Available)

TIP: For physical SMA devices, create a new zone and network on another firewall interface for your new SMA interface
(if any issues in set up, please check with our firewall team or your 3rd party firewall support)
TIP: For the virtual SMA devices, create a new virtual switch tied to another separate physical interface of your virtual host server or create VLAN to separate that
(if any issues in set up, please check your 3rd party virtual server support)

EXAMPLE: CompanyNameUsers or Vendors or ....

NOTE: This is the Hostname assigned to the public IP of your SMA by global DNS tied to your company.com name

CAUTION: Make Sure you have access to other SMA Interface IPs before proceeding

CAUTION: This change will disconnect active Users and Restart device is Suggested

CAUTION: Be Onsite with SMA backup before proceeding
TIP: you may need to make further adjustments on virtual SMA's to see both networks internally thru the virtual host or cloud provider
If traffic does not flow check your firewall/router access rules and NAT policies for each SMA internal IP you have
if many user portals give each separate IP, then create a group object in the firewall and set all of them to the same public IP. This may have you create a few NAT policies for each object or group NAT policy.
**remember each user portal needs DNS Hostname created and posted publicly with your DNS service provider**