System > Network > Basic Network > Zone
By configuring security zones, you can configure various security policies.
In the Zone page, you can perform the following actions:
Options in the Zone Configuration dialog:
Option | Description | |
Basic Tab | ||
Zone |
Type the name for the zone into the textbox. |
|
Type |
Specify a type for the security zone. If selecting Layer 2 Zone, select a VSwitch for the zone from the VSwitch drop-down list below; if selecting Layer 3 Zone, select a VRouter from the VR drop-down list; if selecting TAP, the device supports the bypass deployment mode. |
|
Binding Interface |
Bind interfaces to the zone by selecting interfaces from the drop-down list. |
|
Application Identification |
Select the Enable checkbox to enable APP identification for the zone. |
|
WAN Zone |
Select the Enable checkbox to set the zone as a WAN zone, assuring the accuracy of the statistic analysis sets that are based on IP data. |
|
NBT Cache |
Select the Enable check box to enable NetBIOS host query for the zone. For detailed instructions, see NBT Cache. |
|
Threat Protection Tab: refer to Configuring Threat Protection. |
Notes: