What zones, specifically, do they fulfill within the ESM?
Is it recommended to set the receiver to a zone?
The two main use cases for zones are:
- Overlapping IP space from multiple networks.
- Restricting access to data. Permissions can be applied on a per zone basis.
Configuring zones is not required.