The firewall uses your secondary configuration when it detects
that you are not connected to your primary location.
Now set up the configuration for your secondary
location. For information on how to do this, see
About configuring the firewall and the other topics in the
Configuring the firewall section.
CAUTION: If this
computer is a laptop, and it is used out of the office, it may
connect to an unknown local network. If this happens, firewall
rules in the secondary configuration that use the local network as
an address may inadvertently allow unknown traffic. For that
reason, we strongly advise caution when using local network rules
as part of secondary configurations.