Got it

Define firewall zones and use

Latest reply: Feb 14, 2022 14:02:10 647 36 17 0 0

Today, let's discuss the division and definition of firewall security zones, which will help us to be more clear in the future. If you have any good suggestions, please let me know.

What is firewall zone?

The firewall zone is also called a security zone or zone. It is a special feature of our security products. It is also implemented by invoking the security zone when the firewall implements security policies. In the firewall, all data packets are insecure by default. In this case, you can assign different interfaces to different security zones to configure different security policies for different security zones. Administrators can assign different network devices to different security zones. Of course, security zones are not fixed. You can customize security zones based on network requirements. In a security zone, there is also a priority. The priority ranges from 0 to 100. A larger value indicates a higher priority. If a packet is sent from a low-priority security zone to a high-priority security zone, the packet is referred to as the inbound direction. On the other hand, we can call it the outbound direction of the packet.

1

 

Classification of firewall zones

Local: Indicates the security zone where the firewall is located or packets destined for the firewall. For example, the device needs to access and manage the firewall. Both are security policies that allow the security zone where the device resides to be transferred to the Local zone. This area has the highest priority and does not need to be modified.

 

Trust: It is generally used to connect to the security zone where intranet devices are located. It is an area with a high priority. This area allows you to add interfaces and modify priorities.

Untrust: It is generally used to connect to the security zone where external devices, such as routers or front switches, are located. is a low-priority area. You can add interfaces and modify priorities in this area. We usually think this area is unsafe.

 

DMZ: This zone is used to connect to the security zone where the server resides. The security level of this zone is lower than that of the trust zone because the server is usually accessed by external devices. This area allows you to modify configurations, such as interfaces or priorities.

 

Other: This zone is used to customize new security zones. You can create security zones based on actual service requirements.

1

Proper use of firewall zones

Previously, we explained what security zones are and how security zones are divided. So, how do we use it properly? Perhaps, we can use an example to understand how to use the firewall correctly.

1. How Do I Configure Security Policies to Restrict Terminals from Logging In to the Firewall?

When a computer in the Trust zone is used to manage the firewall through SSH, related services, such as STelnet, are enabled on the interface. If we do not enable the access service management function under the interface, we can allow it through the interzone policy. In the firewall security policy, set Source Security Zone to trust, Destination Security Zone to local, and Allowed Protocol to SSH. Then we can manage firewalls by configuring security zones.

 

1

 

Name

test

Source Zone

trust

Destination Zone

local

User

/all

Action

permit

 

Terminals in the Trust zone need to communicate with the Untrust server.

On the firewall, you can set the source security zone to the Trust zone and the destination zone to the Untrust zone. Configure the action of the two security zones to permit so that they can access each other.

 

In a firewall, it is very important to know and configure security zones. It is an important part of the firewall. If we don't use it correctly, we'll be disconnected from the network.


  • x
  • convention:

wissal
wissal Created Dec 6, 2021 07:33:58 (0) (0)
Thank you, my friend  
zaheernew
zaheernew Created Dec 7, 2021 03:38:13 (0) (0)
useful info  
fuzi_yao
fuzi_yao Reply zaheernew  Created Dec 7, 2021 05:02:12 (0) (0)
 
taha_29four
taha_29four Created Dec 7, 2021 11:49:40 (0) (0)
got it  
Saqibaz
Saqibaz Created Feb 15, 2022 07:59:12 (1) (0)
 
Is there any limit to creating number of zones on a firewall?
View more
  • x
  • convention:

fuzi_yao
fuzi_yao Created Dec 6, 2021 06:08:51 (1) (0)
The number limit cannot be found in our manual or in our specification tool. We can think of it as unlimited in quantity.  
IndianKid
Moderator Author Created Dec 6, 2021 06:27:24

very good share about different ZOones for firewall
View more
  • x
  • convention:

fuzi_yao
fuzi_yao Created Dec 6, 2021 06:31:18 (0) (0)
 
IndianKid
Moderator Author Created Dec 6, 2021 06:34:54

Usually, Most Vendors come with LAN, WAN, DMZ, VPN Zones.

Here What is the difference between Trust and Local?
View more
  • x
  • convention:

fuzi_yao
fuzi_yao Created Dec 6, 2021 06:53:53 (1) (0)
LAN,WAN These zones are used in our switches and routers and are called Trust and Untrust zones in firewalls. Of course, if we simply understand it, the LAN zone can be considered as the Trust zone, and the WAN zone can be referred to as the Untrust zone.  

A security zone is a portion of a network that has specific security requirements set. Each zone consists of a single interface or a group of interfaces, to which a security policy is applied. 

In a very broad sense, a firewall is used to monitor traffic destined to and originating from a network.

View more
  • x
  • convention:

fuzi_yao
fuzi_yao Created Dec 6, 2021 07:35:38 (0) (0)
yes, Your understanding is correct that a firewall can also filter some insecure traffic.  
Very interesting to know
View more
  • x
  • convention:

Great definition, thanks for sharing
View more
  • x
  • convention:

Great share
View more
  • x
  • convention:

fuzi_yao
fuzi_yao Created Dec 6, 2021 10:56:51 (0) (0)
 
learning new thing is always fun
View more
  • x
  • convention:

fuzi_yao
fuzi_yao Created Dec 8, 2021 05:00:14 (0) (0)
 
12
Back to list

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.