Networks utilize various security zones for protecting essential resources and defending against malware. Create rules which enable the relevant traffic out and in a security zone. We must ensure that we have different rules in the Firewall rule base that specify the traffic to and from the security zone.