Demonstration #1 - Wireless Authentication (Successful) A unique firewall rule set is loaded upon successful authentication.