Drag the items from the left that are part of a secure network lifecycle and drop them in the spaces on the right.
Drag the CLI configurationi steps to implement a zone-based prolicy firewall from the left and drop them in the correct order on the right.