The combination of:

  • Where a device is coming from
  • Where a device is going These security zones are enforced with PEP

Zone Permissions

Devices within these zones will be given certain permissions.

  • Restrictive permissions from those that are accessing from an untrusted network
  • Trusted permissions for devices within the office