Additional configuration files
Additional configuration commands may be executed through one or several CSV files (fields separated by commas) in UTF-8.
These files make it possible to build an operational firewall cluster.
Do note that all CSV files found on the USB key will be run during the configuration of the firewall.
The following section will set out allowed operations and the structure of the additional configuration file.