User Manual
Checklist
4
84 | 85
A6V11646120_enUS_b_40
● WirelessZone – Networks that can be accessed by users and applications with a
wireless connection.
● ExternalZone – Networks that are not secure, such as the Internet and other
external networks.
● DMZZone – A DMZ (demilitarized zone) is sometimes referred to as a perimeter
network. It contains company servers that can be accessed from external sources.
A DMZ lets external users and applications to access specific internal servers, but
prevents external users from accessing secure company networks. Add rules to
the firewall Rule Base that allow traffic to the company DMZ: for example, a rule
that allows HTTP and HTTPS traffic to your web server in the DMZ.
● InternalZone – Company networks with sensitive data that must be protected and
used only by authenticated users.
Controls
Status
Implement physical and environmental security controls.
Implement network separation.
Implement protective firewall rules.
Implement access control measures.
Implement operational security controls.
Implement user management controls