![]() Therefore, it is recommended that security zones be used for refined network partitioning.Īdding an interface to a security zone means that the network connected to the interface is added to the security zone, not the interface itself. To be specific, if a subnet is intruded, attackers can access only resources in a security zone corresponding to the subnet. Once security zones are defined, traffic cannot flow between security zones unless the administrator specifies valid access rules. Security zones are designed to reduce network attack surfaces. Interfaces on the firewall must be added to security zones (except independent management interfaces on some models) to process traffic. By assigning firewall interfaces to different security zones, the networks connected to the interfaces are classified into different security levels. A firewall identifies different networks by security zone. As mentioned, firewalls are used to isolate networks of different security levels.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |