Based on criteria such as the source IP handle of a packet or the incoming network’s interface, visitors is divided into the firewall guidelines for the suitable zone. Each zone can have its own listing of ports