Google News
logo
CCSA - Interview Questions
Explain Some Security Zones
With Security Zones, you can create a powerful Access Control Policy that controls the flow of traffic between different parts of a network. Different security zones are used by networks to protect resources and to combat malware on networks. Set up rules so that only appropriate traffic can enter and leave a security zone. Listed below are the predefined Security Zones, along with their intended purpose:
 
WirelessZone : The network that is accessible via wireless connections by users and applications.

ExternalZone : Unsecured networks, such as the Internet and external networks.

DMZZone : Demilitarized zones (DMZ) are sometimes called perimeter networks. It contains servers accessible from insecure sources, such as the Internet or external sources.

InternalZone : Company networks containing sensitive data that needs to be protected and accessed only by authenticated users.
Advertisement