The combination of:

Zone Permissions

Devices within these zones will be given certain permissions.

  • Restrictive permissions from those that are accessing from an untrusted network
  • Trusted permissions for devices within the office