With Security Zones, you can create a powerful Access Control Policy that controls the flow of traffic between different parts of a network. Different security zones are used by networks to protect resources and to combat malware on networks. Set up rules so that only appropriate traffic can enter and leave a security zone. Listed below are the predefined Security Zones, along with their intended purpose:
WirelessZone : The network that is accessible via wireless connections by users and applications.
ExternalZone : Unsecured networks, such as the Internet and external networks.
DMZZone : Demilitarized zones (DMZ) are sometimes called perimeter networks. It contains servers accessible from insecure sources, such as the Internet or external sources.
InternalZone : Company networks containing sensitive data that needs to be protected and accessed only by authenticated users.