perimeter intrusion setup

perimeter intrusion setup