Configuring a Security Zone

System > Network > Basic Network > Zone

By configuring security zones, you can configure various security policies.

In the Zone page, you can perform the following actions:

Options in the Zone Configuration dialog:

Option Description
Basic Tab  
Zone

Type the name for the zone into the textbox.

Type

Specify a type for the security zone. If selecting Layer 2 Zone, select a VSwitch for the zone from the VSwitch drop-down list below; if selecting Layer 3 Zone, select a VRouter from the VR drop-down list; if selecting TAP, the device supports the bypass deployment mode.

Binding Interface

Bind interfaces to the zone by selecting interfaces from the drop-down list.

Application Identification

Select the Enable checkbox to enable APP identification for the zone.

WAN Zone

Select the Enable checkbox to set the zone as a WAN zone, assuring the accuracy of the statistic analysis sets that are based on IP data.

NBT Cache

Select the Enable check box to enable NetBIOS host query for the zone. For detailed instructions, see NBT Cache.

Threat Protection Tab: refer to Configuring Threat Protection.  

Notes: