SonicWALL 5.8.1 Microscope & Magnifier User Manual


  Open as PDF
of 1490
 
Network > Zones
286
SonicOS 5.8.1 Administrator Guide
Public: A Public security type offers a higher level of trust than an Untrusted zone, but a
lower level of trust than a Trusted zone. Public zones can be thought of as being a secure
area between the LAN (protected) side of the security appliance and the WAN
(unprotected) side. The DMZ, for example, is a Public zone because traffic flows from it to
both the LAN and the WAN. By default traffic from DMZ to LAN is denied. But traffic from
LAN to ANY is allowed. This means only LAN initiated connections will have traffic between
DMZ and LAN. The DMZ will only have default access to the WAN, not the LAN.
Untrusted: The Untrusted security type represents the lowest level of trust. It is used by
both the WAN and the virtual Multicast zone. An Untrusted zone can be thought of as being
on the WAN (unprotected) side of the security appliance.By default, traffic from Untrusted
zones is not permitted to enter any other zone type without explicit rules, but traffic from
every other zone type is permitted to Untrusted zones.
Note When creating custom zones, the security type can be set to either Trusted, Public, or
Wireless.
Allow Interface Trust
The Allow Interface Trust setting in the Add Zone window automates the creation of Access
Rules to allow traffic to flow between the interface of a zone instance. For example, if the LAN
zone has both the LAN and X3 interfaces assigned to it, checking Allow Interface Trust on
the LAN zone creates the necessary Access Rules to allow hosts on these interfaces to
communicate with each other.
Enabling SonicWALL Security Services on Zones
You can enable SonicWALL Security Services for traffic across zones. For example, you can
enable SonicWALL Intrusion Prevention Service for incoming and outgoing traffic on the WLAN
zone to add more security for internal network traffic. You can enable the following SonicWALL
Security Services on zones:
Enforce Content Filtering Service – Enforces content filtering on multiple interfaces in the
same Trusted, Public and WLAN zones. After enabling this, select the appropriate CFS
Policy in the pulldown menu.
Enforce Client AV Enforcement Service – Enforces anti-virus protection on multiple
interfaces in the same Trusted, Public or WLAN zones.
Enable Gateway Anti-Virus Service – Enforces gateway anti-virus protection on multiple
interfaces in the same Trusted, Public or WLAN zones.
Enable IPS – Enforces intrusion detection and prevention on multiple interfaces in the
same Trusted, Public or WLAN zones.
Enable App Control Service – Enforces App Control to create network policy object-based
control rules to filter network traffic flows.
Enable Anti-Spyware Service – Enforces anti-spyware detection and prevention on
multiple interfaces in the same Trusted, Public or WLAN zones.
Enforce Global Security Clients – Requires users on this zone to use the Global Security
client for desktop security.
Create Group VPN – Creates a GroupVPN policy for the zone, which is displayed in the
VPN Policies table on the VPN > Settings page. You can customize the GroupVPN policy
on the VPN > Settings page. If you uncheck Create Group VPN, the GroupVPN policy is
removed from the VPN > Settings page.