Configure Granular Rules
Set various access rules in your policy for example, bring your own device (BYOD) corporate networks, guest Wi-Fi, server-only networks, by specifying the internal IP or IP range. Granular rules make it easy to filter unwanted content and malicious traffic on a per-network basis.