How to Configure a Critical System Protection (CSP) Intrusion Prevention System (IPS) Policy to Allow Remote Access via SSH.