The combination of:
- Where a device is coming from
- Where a device is going
These security zones are enforced with PEP
Zone Permissions
Devices within these zones will be given certain permissions.
- Restrictive permissions from those that are accessing from an untrusted network
- Trusted permissions for devices within the office